Try our new research platform with insights from 80,000+ expert users
Nicholas Shange - PeerSpot reviewer
Senior Specialist: Security Solutions at Altron
Real User
Top 20
A stable product with the ability to address the specific requirements of different clients
Pros and Cons
  • "It's a stable product. Based on the demos and interaction with it, it was stable."
  • "Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things."

What needs improvement?

Improvement-wise, I would like to look at the assessment results. Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things.

For how long have I used the solution?

I have experience with BeyondTrust Privileged Remote Access. I am a customer of the solution.

What do I think about the stability of the solution?

It's a stable product. Based on the demos and interaction with it, it was stable.


What do I think about the scalability of the solution?

I think the solution can be scaled, and it can be enhanced. I think that the thought process did include some feature scenarios that were not present in the solution at the moment. It is good in terms of scalability, considering some of the issues that may arise in the future.

Buyer's Guide
BeyondTrust Privileged Remote Access
May 2025
Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.

How was the initial setup?

The setup was done by somebody else in my company. The solution is deployed on the cloud.

What's my experience with pricing, setup cost, and licensing?

Though the solution was a bit expensive, the overall pricing was average.

What other advice do I have?

BeyondTrust Privileged Remote Access was a great product. A consultant was assigned to us. They helped us understand the product with the demo.

It does address setting and specific requirements for different clients. It is not a one-size fits all type of solution, but it does address a number of important requirements for specific clients to an extent.

I think BeyondTrust Privileged Remote Access should expand its use cases, considering that customers may have ten use cases. The solution should include some of the recommended use cases by customers.

I rate the overall solution a ten out of ten.


Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Anil Kumar 1 - PeerSpot reviewer
PAM Security Consultant at Cybersec Consulting
Real User
Top 5Leaderboard
Has an efficient screen-sharing feature, but its web interface needs enhancement
Pros and Cons
  • "Its initial setup process is straightforward."
  • "Its access process for third-party vendors needs to be simplified."

What is our primary use case?

We use the solution to give the network access to third-party vendors or remote basis employees. It helps us authenticate their credentials directly without a VPN connection.

What is most valuable?

The solution has the best screen-sharing feature. We can invite external vendors without exposing any credentials or network access to them using it.

What needs improvement?

The solution's access process for third-party vendors needs to be simplified. It should eliminate the process of installing client applications on users' machines for better security. Instead, we can publish a URL link for them. Also, its web interface needs enhancement as well.

For how long have I used the solution?

We have been using the solution for four years.

What do I think about the stability of the solution?

It is a stable solution. I rate its stability an eight out of ten.

What do I think about the scalability of the solution?

The solution's scalability is a five or six out of ten.

How are customer service and support?

The solution's technical support is good. Whenever we raise any case, they try to solve it as soon as possible.

How would you rate customer service and support?

Positive

How was the initial setup?

The solution's initial setup process is straightforward. It is developed and managed by BeyondTrust itself. They provide us with the virtual appliance, and we ask the customer to deploy that profile on their server. Once the appliance is deployed, we can access the URL and start with the initial configuration. Further, it integrates with the active directory and the customer's NTP server to configure two-factor authentication. The users can easily enable it for their IDs by scanning the QR code using any authenticator app or mobile device.

What other advice do I have?

I advise others to use BeyondTrust if they have an existing PAM solution. It will help them with seamless access to privileged accounts and credentials. I rate the solution a seven out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Implementor
PeerSpot user
Buyer's Guide
BeyondTrust Privileged Remote Access
May 2025
Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,823 professionals have used our research since 2012.
reviewer2254515 - PeerSpot reviewer
Presales manager at a security firm with 11-50 employees
Real User
Top 20
A tool that is easy to deploy and helps facilitate the management of RDP sessions
Pros and Cons
  • "Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good."
  • "The integration of the solution with many platforms is a difficult area to manage and needs to be made easy."

What is our primary use case?

My company uses BeyondTrust Privileged Remote Access for privileged access management to facilitate the management of RDP sessions and the rotation of credentials or passwords.

What is most valuable?

The most valuable features of the solution are the seamless features that allow you to use the password without manually copying it while also providing it in a clear format. The solution's feature injects the password directly into the application you use.

What needs improvement?

The integration of the solution with many platforms is a difficult area to manage and needs to be made easy. For example, I don't think BeyondTrust Privileged Remote Access works with products from Sophos.

For how long have I used the solution?

I have been using BeyondTrust Privileged Remote Access for around three months. My company has a partnership with BeyondTrust.

What do I think about the stability of the solution?

It is a stable tool. Stability-wise, I rate the solution a nine out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight to eight and a half out of ten.

In my company, there are less than ten users of the solution. I have dealt with my company's clients, with more than five hundred people working with the product.

The solution can be used in small and enterprise-sized businesses.

How are customer service and support?

Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good.

How was the initial setup?

BeyondTrust Privileged Remote Access is one of the easiest products to deploy.

The solution is deployed mainly on virtual appliances.

What's my experience with pricing, setup cost, and licensing?

I rate the product's pricing a four on a scale of one to ten, where one is high, and ten is low. It is an expensive product.

Which other solutions did I evaluate?

I have only compared BeyondTrust Privileged Remote Access with Delinea Secret Server till now. From a technical standpoint, Delinea has more features. From a practical point of view, I think BeyondTrust Privileged Remote Access is easier to manage and deploy. I haven't worked with Delinea to be able to give an elaborate opinion about it.

What other advice do I have?

I rate the overall solution an eight and a half to nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
it_user843969 - PeerSpot reviewer
Head of Communications at Stadt Winterthur
Real User
A easy-to-use solution for providing multi-platform remote support
Pros and Cons
  • "The most valuable feature is that this solution can be implemented regardless of the operating system."
  • "Changing your password should be simplified, and there should not be a charge for it."

What is our primary use case?

We use this solution to provide remote authentication for a support system that we are providing. We have a data center with many different products that are based on Windows, Linux, and hardware appliances.

How has it helped my organization?

There are many different ways to configure this solution in order to provide what we need. Depending on the kind of system that we're supporting, we can directly access the server, and application, or even a web page.

What is most valuable?

The most valuable feature is that this solution can be implemented regardless of the operating system. It can be used with Microsoft, Linux, Unix, and Cisco, and we can use the same product to access every different service.

This solution is simple to use.

What needs improvement?

Changing your password should be simplified, and there should not be a charge for it. For every server that we are supporting, we have an administrator password to log in. This is for remote access and remote support, and we do not like to give this password to the local support people. I would like to be able to assign a dedicated password that can be used only for one day. There are other products that can do this.

For how long have I used the solution?

We have been using this solution for one year.

What do I think about the stability of the solution?

We built this system with redundancy and we have never had a crash or any other problem with it.

How are customer service and technical support?

We deal with a person from the vendor to handle our maintenance, and we never have to contact technical support directly. We are very happy with the support.

How was the initial setup?

This initial setup of this solution is straightforward.

It is not very easy to implement because there are so many types of servers. It depends on the knowledge of the person. However, if it is properly defined then it is very simple to use.

The length of time for deployment depends on the implementation. If everything is known then it can take one to two hours. In other cases, it can take a week or two.

What other advice do I have?

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1419198 - PeerSpot reviewer
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees
Real User
A simple, stable, and secure solution that is FIPS compliant and is easy and quick to deploy
Pros and Cons
  • "Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
  • "It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."

What is our primary use case?

I have a hundred different use cases. They're all different because every customer is different. One of the top use cases is where a third-party vendor needs to internally access one of the servers or applications. 

What is most valuable?

Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe.

Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that.

What needs improvement?

It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution.

For how long have I used the solution?

I have been using this solution for eight years.

What do I think about the stability of the solution?

It is very stable. In eight years, I've never seen a bug.

What do I think about the scalability of the solution?

Our clients are large businesses. 

How are customer service and technical support?

I used to work there. I know this stuff by heart, so I don't need to call them. 

How was the initial setup?

It is easy to set up. The complex part is to explain all the beneficial features and functionality to the customer because it can pretty much do everything. Discussing the environment and use cases is where you spend most of the time before you do the deployment.

Its deployment can be done very quickly. It can be deployed within 24 hours, which is useful if there is any hacking or breach. After that, you can add more complexity to it and configure it for a use case.

What other advice do I have?

I would rate BeyondTrust Privileged Remote Access a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1037646 - PeerSpot reviewer
Cybersecurity Architect at a tech vendor with 1-10 employees
Real User
You get what you pay for
Pros and Cons
  • "This product is very stable and scalable. This is an excellent platform."
  • "The price is pretty expensive."

What is our primary use case?

The primary use case is for customers who are aware of RDP, remote desktop insecurity, and want to resolve this by deploying BeyondTrust Remote Access. There are so many features built into the system, and both cloud and on-premises deployment are offered. 

What is most valuable?

This product is very stable and scalable. This is an excellent platform. 

What needs improvement?

I can't think of any specific improvements because the product is already so rich. 

What do I think about the stability of the solution?

This solution is very stable. 

What do I think about the scalability of the solution?

It's very scalable—horizontal, vertical, you name it. 

How are customer service and support?

This product is backed up by excellent, very knowledgeable support. 

What was our ROI?

The company guarantees the best ROI, provided you take advantage of all the features. If you're buying a product, though, you shouldn't use only the basic function features anyway—use the advanced features. So the ROI is almost guaranteed when you invest in this product, but you need to find the right partner for deployment. You need a partner who will show you all the features you can take advantage of so that you benefit from the ROI, otherwise you're wasting it and you might as well buy something cheaper and more basic. 

What's my experience with pricing, setup cost, and licensing?

The price is pretty expensive, but you get what you pay for and this is a great product. 

What other advice do I have?

This product is the de facto standard, based on function features, installation, and customer base. There is a reason why so many well-known companies use it. 

I rate BeyondTrust Privileged Remote Access a nine out of ten, just because there's no such thing as a perfect product. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free BeyondTrust Privileged Remote Access Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Buyer's Guide
Download our free BeyondTrust Privileged Remote Access Report and get advice and tips from experienced pros sharing their opinions.