

CyberArk Privileged Access Manager and BeyondTrust Privileged Remote Access compete in the privileged access management category. BeyondTrust seems to have the upper hand due to its superior integration options and ease of access.
Features: CyberArk is recognized for its robust security controls, detailed auditing capabilities, and effective management of complex environments. BeyondTrust offers seamless multi-platform support, remote functionalities, and adaptability for varied user needs.
Room for Improvement: CyberArk could enhance its automation features, improve navigation, and streamline its user interface. BeyondTrust may benefit from more advanced analytics, enhanced reporting tools, and increased customization options.
Ease of Deployment and Customer Service: CyberArk's deployment often requires expert involvement but is backed by thorough documentation and reliable customer service. BeyondTrust provides an easy setup with quick user adoption and prompt support responsiveness.
Pricing and ROI: CyberArk offers value in long-term ROI despite higher initial setup costs, while BeyondTrust is recognized for lower upfront costs and a faster return on investment.
The return on investment lies in improved security infrastructure, addressing over-privileged access, and reducing the risk of credential compromise, which is a major source of data breaches.
The end users have the authority to reconcile the password or verify it before using session isolation, which is one of the unique features that can be enabled through Privileged Session Manager, preventing any attacks from happening within the organization when connected with sessions through CyberArk Privileged Access Manager.
CyberArk Privileged Access Manager has helped customers save on costs primarily by reducing the number of engineering and information security personnel.
Support now requires opening a ServiceNow ticket, which can be time-consuming.
CyberArk has been exceptional in coming back to us with immediate responses.
It could be forever until you talk to someone who knows what they are doing.
Based on the issue resolution and support quality, I rate the support 10 out of 10.
I would give it an eight or nine out of ten for scalability, possibly even a ten, as I do not see a limitation in scaling.
BeyondTrust Privileged Remote Access is a scalable solution based on user requirements.
The CPM can reportedly handle up to 50,000 accounts independently without issue.
I would rate it a ten out of ten for scalability.
They had 40,000 passwords in this one safe, and it was saving the last ten iterations of each password object. That means they had 400,000 password objects in this safe. They exceeded the limit.
Updates sometimes introduce bugs or issues, especially with non-English versions.
Proper fine-tuning and expertise ensure the product performs well.
Overall, the stability of the solution is high.
It has a large customer base and positive feedback within my network.
BeyondTrust should focus on automating the update process to reduce unnecessary ticket creation.
We are looking for a feature where if someone is doing something risky during their session, it should alert and possibly disable their credentials.
They want everything to be on the cloud, but even in the SaaS version of CyberArk Privileged Access Manager, they need to deploy some servers on-premises.
We cannot generate a plug-in for web-based applications.
If they want clients to move to the cloud, they need to support them in real-time.
My experience with pricing, setup cost, and licensing is that it is expensive, yet not the most expensive in the market, so the price can be considered justifiable.
CyberArk is expensive compared to other products I know.
CyberArk is comparatively expensive compared to other PAM solutions, such as Delinea, especially during renewal.
CyberArk's SaaS solution is particularly expensive.
The secure access must be audited live, ensuring patient data protection.
The session monitoring and recording feature definitely helps security and audit with BeyondTrust Privileged Remote Access.
CyberArk Privileged Access Manager helps ensure data privacy because we now know who is using which credentials and at what time.
It keeps a record of activities, allowing me to easily fetch screen recordings to detect any misuse and see who did what and what happened.
It can integrate with Splunk, SNMP, and other solutions and technologies.
| Product | Mindshare (%) |
|---|---|
| CyberArk Privileged Access Manager | 10.4% |
| BeyondTrust Privileged Remote Access | 2.8% |
| Other | 86.8% |

| Company Size | Count |
|---|---|
| Small Business | 12 |
| Midsize Enterprise | 4 |
| Large Enterprise | 7 |
| Company Size | Count |
|---|---|
| Small Business | 59 |
| Midsize Enterprise | 42 |
| Large Enterprise | 174 |
BeyondTrust Privileged Remote Access enhances network security with flexibility and FIPS-compliant encryption. It enables rapid deployment without a VPN, simplifying credential handling and compliance while reducing complexity in remote work environments.
Designed to secure internal and vendor access to servers, applications, and energy grids, BeyondTrust Privileged Remote Access supports compliance requirements such as NERC, NIST, and FedRAMP. It manages RDP sessions, credential rotations, and high-privilege access, serving as a VPN alternative. Active Directory integration and robust vault features simplify credential management. With session and access monitoring, it offers enhanced security and control, facilitating a smooth transition to cloud-based deployments while improving network operations.
What are the key features of BeyondTrust Privileged Remote Access?Enterprises in industries like energy, finance, and technology deploy BeyondTrust Privileged Remote Access to control and monitor secure access, aligning with strict regulatory requirements. Its capability to integrate seamlessly with existing systems and support cloud-based transitions makes it a strategic tool for enhancing operational efficiency and security.
CyberArk Privileged Access Manager safeguards privileged accounts through password management, credential rotation, and session recording. With seamless integration and real-time monitoring, it ensures robust security across platforms.
CyberArk Privileged Access Manager is recognized for its extensive capabilities in managing and securing privileged accounts. It offers vital functionalities such as automatic password rotation, real-time session monitoring, and cross-platform integration through APIs and custom connectors. Users find the flexibility in workflows and granular access controls beneficial, particularly in protecting access across cloud and on-prem infrastructures. However, improvements in its interface, installation process, plugin support, and integration with third-party tools are often suggested. Pricing is a concern for many, along with the need for better dashboard reporting, user provisioning, and enhanced documentation. Organizations leverage this tool for encrypting and monitoring critical account activities and automating password management to bolster security.
What are the key features of CyberArk Privileged Access Manager?CyberArk Privileged Access Manager finds substantial use in industries such as finance, healthcare, and technology, where the protection of privileged accounts is critical. These sectors rely on its capabilities to manage application credentials securely and provide safe access for developers, administrators, and vendors across various infrastructures.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.