BrunoMassoutierHead of Communications at Stadt Winterthur
MARK BRANDONSr VP fo Business Operations at Networking Technologies and Support, Inc.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
"You can't compete with TeamViewer or any other similar products. It's completely in a class of its own."
"The solution has been very stable. We haven't had issues at all. It doesn't crash or freeze. There aren't bugs or glitches either."
"This is a very secure product."
"Changing your password should be simplified, and there should not be a charge for it."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"It lacks voice integration like the other products because they need the compression to support that large amount of concurrent sessions. We've had to sacrifice voice."
"Non-Windows support capabilities need improvement. They need to expand into Macs, iOS, and Android. It's there now, however, there's room for growth and that's probably the best area to expand."
"Technical support for this region can be improved."
"The licensing is concurrent and we spend about $10,000. It's my understanding that there aren't any extra costs beyond just the straight licensing."
"I would prefer that it was more affordable."
Earn 20 points
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.
- Privileged Access Control: Enforce least privilege by giving users the right level of access.
- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.
- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.
- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.
- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.
- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
BeyondTrust Remote Support (formerly Bomgar Remote Support) is the #1 solution for organizations that need to securely access and support any device or system, anywhere in the world. Technicians using Remote Support can quickly connect to, view, and control remote systems and devices, chat and collaborate with end-users or other technicians, all while improving remote access security. Organizations in all vertical markets around the globe use Remote Support to deliver superior support services and reduce threats to valuable data and systems. BeyondTrust is privately held and headquartered in Atlanta, GA with offices and channel partners around the world. Connect with BeyondTrust at www.beyondtrust.com, the BeyondTrust Blog, or on Facebook, Twitter and LinkedIn. Get a free trial of Remote Support at https://www.beyondtrust.com/remote-support/trial.
BeyondTrust Privileged Remote Access is ranked 15th in Remote Access with 2 reviews while BeyondTrust Remote Support is ranked 7th in Remote Access with 3 reviews. BeyondTrust Privileged Remote Access is rated 9.0, while BeyondTrust Remote Support is rated 9.0. The top reviewer of BeyondTrust Privileged Remote Access writes "A simple, stable, and secure solution that is FIPS compliant and is easy and quick to deploy". On the other hand, the top reviewer of BeyondTrust Remote Support writes "Easy to deploy, has good performance, good pre and post-sales support, and is an undisputed global leader". BeyondTrust Privileged Remote Access is most compared with WALLIX Bastion, CyberArk PAS, One Identity Safeguard, Thycotic Secret Server and BeyondTrust Endpoint Privilege Management, whereas BeyondTrust Remote Support is most compared with TeamViewer, Microsoft Remote Desktop Services, Check Point Remote Access VPN, LogMeIn Rescue and Citrix Virtual Apps and Desktops.
See our list of best Remote Access vendors.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.