


Both BeyondTrust Privileged Remote Access and Rocket Exceed TurboX cater to tech buyers looking for robust remote access solutions. Users seem more satisfied with the pricing and customer support of BeyondTrust Privileged Remote Access, yet Rocket Exceed TurboX is often praised for its superior features and is considered worth the higher price by many users.
Features: BeyondTrust Privileged Remote Access is highlighted for its strong security protocols, session recording, and customizable access controls as per user reviews. Rocket Exceed TurboX is commended for its high-performance remote sessions, seamless integration with various applications, and enhanced multi-monitor support.
Room For Improvement: Users indicate that BeyondTrust Privileged Remote Access could benefit from a more streamlined installation process and enhanced reporting tools. Rocket Exceed TurboX users suggest improvements in reducing initial setup complexity and a more intuitive configuration interface.
Ease of Deployment and Customer Service: BeyondTrust Privileged Remote Access receives praise for its straightforward deployment options and efficient customer service. Conversely, Rocket Exceed TurboX users find the deployment process somewhat complex, though they appreciate responsive customer support.
Pricing and ROI: BeyondTrust Privileged Remote Access is considered affordable and provides good ROI based on user feedback. Rocket Exceed TurboX is perceived as more expensive but is also seen as offering substantial long-term value due to its comprehensive feature set.
| Product | Mindshare (%) |
|---|---|
| Microsoft Intune | 8.9% |
| Rocket Exceed TurboX | 3.0% |
| BeyondTrust Privileged Remote Access | 2.3% |
| Other | 85.8% |


| Company Size | Count |
|---|---|
| Small Business | 124 |
| Midsize Enterprise | 53 |
| Large Enterprise | 167 |
| Company Size | Count |
|---|---|
| Small Business | 12 |
| Midsize Enterprise | 4 |
| Large Enterprise | 7 |
Microsoft Intune is a cloud-based service designed for device management, security, and compliance. It supports automation and facilitates endpoint management for Windows, iOS, and Android devices, ensuring data protection and efficient policy enforcement.
Microsoft Intune offers seamless integration with tools like Windows Autopilot to automate device setup and deployment. Integrated with Azure Active Directory, it enhances policy management while providing robust reporting and analytics tools for compliance tracking. Despite its intuitive interface aimed at simplifying navigation and device security management, there are challenges such as compatibility issues with Linux and Mac, limited policy support for Android, and demands for better third-party integration. It's widely used for both corporate-owned devices and BYOD scenarios in dynamic IT environments.
What are the key features of Microsoft Intune?In industries such as finance and healthcare, Microsoft Intune is implemented to ensure data protection and compliance with regulatory standards. Manufacturing sectors utilize Intune for managing a distributed workforce across global locations, while educational institutions employ it to secure and manage devices in learning environments supporting both students and faculty.
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.
Features include:
- Privileged Access Control: Enforce least privilege by giving users the right level of access.
- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.
- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.
- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.
- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.
- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
Rocket Exceed TurboX is secure virtual desktop software that enables modern hybrid work. Leveraging the Exceed TurboX hybrid cloud VDI (virtual desktop infrastructure), organizations can allow employees to work from anywhere and any device. Exceed TurboX includes support for demanding, high-performance graphical software used in engineering product design, semiconductor design and other graphic-intense fields.
Exceed TurboX features:
Fast desktop virtualization software - Uses
ThinX and Windows Direct protocols to offer reliable virtual access for
high performance and excellent user experiences, with fast and safe
protocols built directly into the remote access software.
Centralized virtual infrastructure administration - Offers a central web portal for IT staff to monitor and manage user access to applications and includes central license management and IT-definable thresholds for system status notifications.
Suspend-and-resume virtual sessions - Allows users to resume sessions on any computer, auto-adjusting to the new monitor resolution, whether reconnecting after connection interruptions or through a manual session suspension.
Pixel-perfect virtual session display - Displays graphically demanding virtual desktops, including support for UHD displays and multiple monitors as part of the powerful OpenText VDI solution.
Virtual GPU support - Supports NVIDIA vGPU, enabling a single graphics card to be split across up to 16 virtual machines for hardware-based rendering, H.264 compression and direct framebuffer access to open 3D applications faster.
Browser and native clients - Offers access through any device to virtual applications and desktops using the native clients for Windows, MacOS and Linux.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.