Compare BeyondTrust Privileged Remote Access vs. Thycotic Secret Server

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about TeamViewer, Citrix, Microsoft and others in Remote Access. Updated: July 2021.
521,690 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
"The most valuable feature is that this solution can be implemented regardless of the operating system.""Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that.""The scalability is excellent."

More BeyondTrust Privileged Remote Access Pros »

"It offers the possibility of secure administration of hardware devices, as well as Linux systems administration from a Windows environment.""Ease of use because of its monolithic software.""The most valuable feature is session monitoring.""The user interface is quite good. It's very straightforward.""I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy.""The GUI interface is well-designed and user-friendly.""What I like best about this product is the interface.""I have found the password management and the secret management features to be the most valuable. Our customers find its ease of integration and the use of power shells really attractive."

More Thycotic Secret Server Pros »

Cons
"Changing your password should be simplified, and there should not be a charge for it.""It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution.""They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case."

More BeyondTrust Privileged Remote Access Cons »

"I would like to see the shadowing of ongoing terminal sessions (Remote Desktop Mirroring).""Documentation could be improved if they were to include more about connectors. There is not enough documentation.""Having more detailed reporting would improve this solution.""There could be tweaks here and there. For example, instead of going to one main function to do this and another main function to do that, the solution could remap the user interface so that a person only has to go through one function. The way that function branches off should make a bit more sense.""There are some things that I know are really important to include like A/B version features which are available in Windows. I would say that they should be included in the road map.""This product is excellent in every way except minor details in handling extremely large environments.""I think that the main interface should integrate better with non-standard applications and clients, to connect with other systems.""We always ask for partner enablement, which is more like a soft requirement rather than a product requirement. It would be great if they can provide us deeper knowledge of their products for integration."

More Thycotic Secret Server Cons »

Pricing and Cost Advice
Information Not Available
"The price of this solution is good.""Pricing is comparable to competing products.""The pricing is standard in this business and we have no complaints about it.""Its price is okay. We don't compete on pricing. We seldom use price to win over our competitors. We prefer it this way because if we can sustain the price, we make more margin as well. We don't want the price to go down to the bottom where despite the win, there's no margin at all.""Secret Server is expensive when compared to the cost to some alternatives.""There are different plans and additional licensing costs that can be instituted for add-ons.""There is an annual license fee per user and the price is fair."

More Thycotic Secret Server Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
521,690 professionals have used our research since 2012.
Questions from the Community
Top Answer: Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to… more »
Top Answer: It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password… more »
Top Answer: I have a hundred different use cases. They're all different because every customer is different. One of the top use cases is where a third-party vendor needs to internally access one of the servers or… more »
Top Answer: This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
Top Answer: I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is… more »
Top Answer: There is an annual license fee per user and the price is fair.
Ranking
13th
out of 35 in Remote Access
Views
1,100
Comparisons
747
Reviews
2
Average Words per Review
459
Rating
9.0
Views
11,206
Comparisons
7,755
Reviews
9
Average Words per Review
484
Rating
8.1
Popular Comparisons
Also Known As
Bomgar Privileged Access
Learn More
Overview

BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.

Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.

Features include:

- Privileged Access Control: Enforce least privilege by giving users the right level of access.

- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.

- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.

- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.

- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.

- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.

Secret Server is a fully-featured Privileged Access Management (PAM) solution available both on premise and in the cloud. It empowers security and IT ops teams to secure and manage all types of privileged accounts and offers the fastest time to value of any PAM solution.

Offer
Learn more about BeyondTrust Privileged Remote Access
Learn more about Thycotic Secret Server
Sample Customers
Horizon Beverage, Air Liquide, Gateway Bank of Florida
Secure-24, University of San Diego, International Rescue Committee, San Francisco Ballet, Perkins Coie, University of San Diego, D.S.S. Limited, Turbo's Hoet, Eclipse Computing, Cathay Bank, Stellarise, J&R Consulting
Top Industries
VISITORS READING REVIEWS
Computer Software Company22%
Comms Service Provider22%
Government8%
Retailer6%
VISITORS READING REVIEWS
Computer Software Company28%
Comms Service Provider17%
Financial Services Firm6%
Government6%
Company Size
No Data Available
REVIEWERS
Small Business33%
Midsize Enterprise28%
Large Enterprise39%
Find out what your peers are saying about TeamViewer, Citrix, Microsoft and others in Remote Access. Updated: July 2021.
521,690 professionals have used our research since 2012.

BeyondTrust Privileged Remote Access is ranked 13th in Remote Access with 3 reviews while Thycotic Secret Server is ranked 2nd in Enterprise Password Managers with 10 reviews. BeyondTrust Privileged Remote Access is rated 9.0, while Thycotic Secret Server is rated 8.2. The top reviewer of BeyondTrust Privileged Remote Access writes "Great integration capabilities with excellent support and very good ROI". On the other hand, the top reviewer of Thycotic Secret Server writes "Excellent access management that can serve very large networks". BeyondTrust Privileged Remote Access is most compared with WALLIX Bastion, BeyondTrust Remote Support, CyberArk Privileged Access Manager, One Identity Safeguard and Citrix Virtual Apps and Desktops, whereas Thycotic Secret Server is most compared with CyberArk Privileged Access Manager, HashiCorp Vault, Microsoft Azure Key Vault, IBM Security Secret Server and BeyondTrust Endpoint Privilege Management.

See our list of .

We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.