BeyondTrust Privileged Remote Access Valuable Features

JL
reviewer1419198
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees

Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe.

Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that.

View full review »
BrunoMassoutier
Head of Communications at Stadt Winterthur

The most valuable feature is that this solution can be implemented regardless of the operating system. It can be used with Microsoft, Linux, Unix, and Cisco, and we can use the same product to access every different service.

This solution is simple to use.

View full review »
Find out what your peers are saying about BeyondTrust, Citrix, TeamViewer and others in Remote Access. Updated: June 2021.
510,204 professionals have used our research since 2012.