BrunoMassoutierHead of Communications at Stadt Winterthur
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
"The interface is very simple. It doesn't need any plug-ins, just browsers that are installed at the beginning."
"Its video recording capabilities have definitely been key for us."
"Changing your password should be simplified, and there should not be a charge for it."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"The product doesn't have behavior analytics. They promised to develop this, but only for the cloud, not for on-premise versions."
"For me, the main issue has to do with the system performance itself."
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.
- Privileged Access Control: Enforce least privilege by giving users the right level of access.
- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.
- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.
- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.
- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.
- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
WALLIX offers cybersecurity and privileged access management solutions that secure and protect your most critical IT assets.
BeyondTrust Privileged Remote Access is ranked 13th in Remote Access with 2 reviews while WALLIX Bastion is ranked 6th in Privileged Access Management with 2 reviews. BeyondTrust Privileged Remote Access is rated 9.0, while WALLIX Bastion is rated 7.6. The top reviewer of BeyondTrust Privileged Remote Access writes "A simple, stable, and secure solution that is FIPS compliant and is easy and quick to deploy". On the other hand, the top reviewer of WALLIX Bastion writes "A solution with a simple interface and a strong access manager that's easy to install". BeyondTrust Privileged Remote Access is most compared with CyberArk PAS, BeyondTrust Remote Support, One Identity Safeguard, Thycotic Secret Server and BeyondTrust Endpoint Privilege Management, whereas WALLIX Bastion is most compared with CyberArk PAS, One Identity Safeguard, BeyondTrust Endpoint Privilege Management, ARCON Privileged Access Management and ManageEngine Password Manager Pro.
See our list of .
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.