2019-11-13T05:28:00Z

What is your primary use case for BeyondTrust Privileged Remote Access?

Julia Miller - PeerSpot reviewer
  • 0
  • 27
PeerSpot user
16

16 Answers

Kazi Ibrahim Khalil - PeerSpot reviewer
Real User
2024-02-26T08:26:50Z
Feb 26, 2024

I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the solution.

Search for a product comparison
AH
Real User
Top 20
2023-09-11T16:04:06Z
Sep 11, 2023

My company uses BeyondTrust Privileged Remote Access for privileged access management to facilitate the management of RDP sessions and the rotation of credentials or passwords.

Anil Kumar 1 - PeerSpot reviewer
Real User
Top 5
2023-06-22T07:28:00Z
Jun 22, 2023

We use the solution to give the network access to third-party vendors or remote basis employees. It helps us authenticate their credentials directly without a VPN connection.

Sorin Hrincu - PeerSpot reviewer
MSP
Top 10
2023-06-21T13:22:00Z
Jun 21, 2023

We are an MSP, and we have customers actively using the solutions and the services. We do the backend administration and implementation, troubleshooting and incident handling, and other things like that. Our use cases include adding users, adding environments to the system, and general and advanced configurations for users and environments. Those are just the standard regular use cases. Other than those, we handle platform maintenance, and platform restoration and recovery in case of an incident. We also use PRA to provide access to third-party vendors. It restricts access only to the devices and only to a certain section of that device or environment that the vendor would need to access. It can also limit access in terms of time and time of day. Access can be subject to approval, which adds an additional layer of security, and we can also set in advance the number of days that that vendor will have access through PRA.

PR
Real User
Top 5
2022-10-21T21:37:00Z
Oct 21, 2022

I work for a massive company. They have 6,000-plus servers integrated into the PRA solution. BeyondTrust is a remote solution for administrators and other privileged accounts across the organization. It controls access to critical servers, domain controllers, Active Directory, Exchange, or any client servers they'll be using. Right now, there are about 10 products on the market globally, and BeyondTrust is the market leader. Within BeyondTrust, there are multiple sub-products, including Password Safe, Privileged Remote Access (PRA), and Endpoint Protection. PRA is unique among BeyondTrust products and other solutions. We use Password Safe to store all the passwords in a vault, indicating when a privileged user attempts to access a privileged account on a server. PRA doesn't provide direct access to the process. Instead, we'll provide PRA access to Password Safe through a connector. In other words, the user doesn't have access to the critical account via Password Safe. Whenever a user wants to initiate a session, they will log into Password Safe, which will inject the credentials. PRA limits access to Password Safe itself. Only a Password Safe engineer has access to that solution, and the engineer is responsible for onboarding the servers and end users. The user will initiate the session via PRA, which will retrieve the credentials. In addition to this core feature, it has reporting tools to record sessions, providing a list of clear logs. Right now, BeyondTrust is an on-premise solution. We have a cloud version, but we are not using it. Eventually, we plan to move it to the cloud. BeyondTrust is being used extensively in our organization. There are between 100 and 130 concurrent sessions daily. Our server can easily maintain that usage level, so we don't need to add another.

Temitope Popoola - PeerSpot reviewer
Real User
Top 20
2022-07-18T15:10:00Z
Jul 18, 2022

Our company has been growing, and we have many audits as well as SOX compliance requirements. We have different SOX requirements, and we wanted to ensure that every activity is monitored. That was the main reason for deploying this solution into the environment. We are using it like a VPN access for our external users, such as vendors, to allow them to access the resources within the organization. Instead of providing them the regular VPN access, we give them access to the privileged access solution so that we can monitor what they are doing, and we are able to view back the recordings of all the activities they've done. We have not integrated Privileged Remote Access (PRA) with other solutions at the moment. We also have another solution of BeyondTrust. We have integrated that solution with other solutions, but we haven’t integrated PRA with other solutions. We just use it for remote access and credential injection.

Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
Aaron Margerum - PeerSpot reviewer
Real User
Top 10
2022-07-13T14:04:00Z
Jul 13, 2022

We use it for remote support for our clients. The main reason we use it is that it allows us to elevate our privileges remotely. While we're using it or supporting the users, we can elevate our smart card. We are currently using the latest available version of Bomgar. In terms of deployment, we like to have solutions like this on-prem, but it is good to know that it is available in the cloud because we are moving a lot towards the cloud. In the future, once this appliance dies out, we might just transition over to a cloud version. It is good to know that we have the flexibility to do that.

SteveJenovai - PeerSpot reviewer
Consultant
Top 10
2022-06-25T18:44:00Z
Jun 25, 2022

Our company provides a software/platform as a service to state and local governments, municipalities, and provinces. Since all of those need to be NIST 800-54 and FedRAMP compliant, we needed a privileged remote access tool to take care of that access piece. BeyondTrust fills that piece for us.

PR
Real User
Top 5
2022-06-20T18:26:00Z
Jun 20, 2022

It is used for server access. I am using the latest version. Initially, I started with 10.6, and now, I am on the latest version. It is currently on-premises, and down the line, we will be moving to the cloud. As of now, we have physical appliances for PRA. We do have plans to move the cloud. We've added two more servers at our end, and they will be moved to the cloud.

KL
Real User
Top 20
2022-06-01T10:56:00Z
Jun 1, 2022

We have two use cases. We have it for the PAM, Privileged Identity (PI), the Vault solution, and Password List. We also have it on the desktop side of the house for our admin accounts. Our network requires that Privileged Remote Access (PRA) does not require a VPN. We are extensively using Privileged Identity, but not PRA. We are one version back from the latest.

Lance Jones - PeerSpot reviewer
Real User
Top 10
2022-04-27T18:25:00Z
Apr 27, 2022

The help desk utilizes it for basic end-user support to make sure they can get something installed or just walk through an issue with an end-user. I use it a lot for helping other admins to fix servers. Our RPA team also uses it. They basically have virtual desktops that have a script running on them constantly to move data from one location to another manually. They get in, and they use it to manage 50 different desktops for that team. So, three team members manage those 50 clients just to make sure that they're processing all the data correctly throughout the day. We have a cloud solution. The virtual server is in the cloud, and then it installs the client down to all of our desktops. From there, the ones that utilize it install the admin client on their machines. We have 20 accounts in there that are utilizing the solution, but not all of them are active at the same time. Throughout the day, all 20 of those may go in. They do what they need to do and then drop out of it to free up a license.

Chase Cole - PeerSpot reviewer
Real User
2022-03-02T22:45:00Z
Mar 2, 2022

I am in the energy sector. The solution is primarily used for something called interactive remote access. We have a secure environment where we manage the energy grid. The BeyondTrust PRA solution helps us meet a compliance requirement since we need to establish a protocol break before we start working on the electrical grid. Therefore, we don't have to walk into the room where the stuff is. It can be remotely accessed for us internally for the most part. Right now, it is in the NERC system, which is the compliance control. This has an electronic access control system that allows us to get to our stuff. It also allows our vendors to possibly get to our stuff.

SH
Real User
2021-11-19T15:26:00Z
Nov 19, 2021

The primary use case is for customers who are aware of RDP, remote desktop insecurity, and want to resolve this by deploying BeyondTrust Remote Access. There are so many features built into the system, and both cloud and on-premises deployment are offered.

RH
Reseller
2021-07-02T07:55:31Z
Jul 2, 2021

We primarily use the solution for Privileged Remote Access. The primary use case is to let the suppliers connect in a very, very secure way on privileged endpoints and internal privilege endpoints or internal operators, probably from Azure. They operate something in the Azure cloud, and that's a very secure way to connect to the Azure cloud.

JL
Real User
2021-02-10T18:49:11Z
Feb 10, 2021

I have a hundred different use cases. They're all different because every customer is different. One of the top use cases is where a third-party vendor needs to internally access one of the servers or applications.

it_user843969 - PeerSpot reviewer
Real User
2019-11-13T05:28:00Z
Nov 13, 2019

We use this solution to provide remote authentication for a support system that we are providing. We have a data center with many different products that are based on Windows, Linux, and hardware appliances.

BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN. Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security. Features include: - Privileged Access Control: Enforce least privilege by giving users the right level...
Download BeyondTrust Privileged Remote Access ReportRead more