Try our new research platform with insights from 80,000+ expert users

BeyondTrust Remote Support vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Remote Support
Ranking in Privileged Access Management (PAM)
23rd
Average Rating
9.0
Reviews Sentiment
6.9
Number of Reviews
34
Ranking in other categories
Remote Access (12th)
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
6.8
Number of Reviews
229
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (3rd), Mainframe Security (2nd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Remote Support is 1.0%, down from 1.0% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 11.6%, down from 20.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
CyberArk Privileged Access Manager11.6%
BeyondTrust Remote Support1.0%
Other87.4%
Privileged Access Management (PAM)
 

Featured Reviews

Hahn Rolf - PeerSpot reviewer
CEO at MICRODYN AG
Solution elevates team collaboration and manages remote support efficiently
For me as a user in the service desk, there is already a lot of functionality in the product. I don't have any specific ideas for improvement on that side. Some technical aspects could be improved, particularly in product management. For the end user, enhancements do not seem necessary at the moment. They could probably give the technician client a more modern interface, but the crucial factor is stable connectivity in a remote session. I see more potential for improvement on the administration side, like better transparency when a patch is installed. It would be useful for administrators to see the version and patch levels of the product easily. BeyondTrust could also enhance their quality control process before releasing a new build to ensure no new bugs are present. This is a common issue among software manufacturers.
SI
Senior PAM Consultant at iC Consult GmbH
Makes privileged access management easy with automation and granular control
Many people underestimate the value of these tools because they treat them as simple automated password management. Once you realize the volume of passwords in your organization and factor in nonhuman passwords, you realize its value. Last year, CyberArk Impact cited 45 nonhuman passwords for every human password. If you have 10,000 employees, you can imagine the number of passwords. There are also many other operations. For example, you have a Qualys scanner that needs to reach out and touch all your endpoints and scan them for vulnerabilities. They use an API call to CyberArk to pull out a Privileged credential that allows them to log in to that target. This is an automated machine call. It is tapping into CyberArk to get that credential. There can be hundreds of thousands of those operations a day. You do not want to manage those passwords by hand. Some people marginalize the significance of such a solution by saying that it is just a fancy password changer. It goes well beyond that, especially with API calls and automation. Its importance extends beyond merely changing passwords; it involves automation, API calls, and process integration, crucial in agile environments for standing up new Amazon servers or other processes needing privileged credentials. CyberArk can automate these tasks into their build processes. Another critical feature is the proxy service via Privileged Session Manager (PSM), providing not only a proxy between your user and the target servers, protecting against malware but also offering session recording. Many companies I have worked with implemented a PAM product as a knee-jerk reaction to SOX audit requirements. They discovered they needed session recording and retention for regulatory compliance. This has become a major factor for clients instituting CyberArk, so PSM is a big deal in addition to regular password rotation.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"This is a very secure product."
"One of the great features is that service desk members can work together in a remote session."
"One of the largest values that we get from Bomgar Remote Support tool is the ability to assist our drivers with their mobile devices. We were unable to do this previously."
"The file transfer feature allows IT to provide needed drivers and files without interfering with the employee's workflow."
"The jump to feature function is the most valuable to us as it allows us to directly remote control customers."
"The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients."
"The time savings that we experience from being able to get hands on with a device experiencing trouble, and the time to resolve an issue is substantial."
"We have the ability to securely assist users remotely with a stable product, which allows for reporting capabilities, SAML authentication, and ServiceNow integration."
"The most beneficial feature in CyberArk Privileged Access Manager is its simple user interface."
"CyberArk Privileged Access Manager has made our operations more streamlined. There is an approval process, so it helps us keep tabs on who's working on what and for how long."
"If properly set up, CyberArk Enterprise Password Vault has good stability, and is a very solid tool. It can run by itself. Its most valuable features are auto password recycling and PSM."
"The most valuable feature is that it is flexible. It has many connectors. that have done well, the EPV and SSH sessions are all being recorded and everything works fine."
"CyberArk Privileged Access Manager’s ability to safeguard credentials is very important."
"CyberArk Privileged Access Manager's main benefit is it provides secure access to our servers. There are features to capture the user activity, it provides video recording processing. If the users are logged in to the server, we can see what activities they are performing. It's a very nice tool for Privileged Access Management. They have plenty of useful services and the solution has fulfilled our needs."
"Provides improved security around having your credentials locked down and rotated regularly."
"Right off the bat, the most valuable feature is the DNA scan. It gives us the ability to scan our environment and find the accounts that we're going to need to take under control."
 

Cons

"In the next release, I would like remote access to Chrome included."
"Static notes for hosts: If I could enter notes on a Jump Client and have them appear every time I connect to that Client, it would be a huge benefit."
"There are not enough product partners in Turkey, making it difficult for me to get assistance."
"Some technical aspects could be improved, particularly in product management."
"Customer support was better in the past. About two years ago, the response times became longer."
"It could be more compatible with other applications. We had trouble with compatibility when it came to Entrust. This is because we had issues with Windows machines when we installed Entrust."
"It needs better Linux support. We have had issues with Ubuntu specifically."
"It is pricey. It would be nice if it weren't so expensive because then you could afford more licenses and have more people involved, but I get it. They do have something that's unique compared to some of their competitors out on the market. It is a very robust and safe tool. If the price could come down, that'd be great."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
"My impression of their technical support team is that it is very bad. The support team's response time is quick, however, the resolution process takes too long."
"More than the product itself, there is room for improvement in the documentation. The documentation should be very detailed and very structured. It has a lot of good information, on one level, but I feel that it could be more elaborate and more structured."
"Upgrading the product is very difficult, so this could be an area for improvement."
"Pricing is a problem. CyberArk is expensive compared to other products I know."
"it manages creds based on Organizational Units. That is, a "safe" is limited to specific OUs. That makes for very elaborate OU structure, or you risk exposing too many devices by putting most of them in fewer OUs."
"The initial setup of CyberArk is a challenge if you do not have prior experience with it."
"CyberArk has a lot on the privileged access side but they have to concentrate more on the application side as well."
 

Pricing and Cost Advice

"I rate Remote Support eight out of 10 for affordability. It's definitely not the cheapest product, but you get a good return on your investment."
"We believe for the money, it is worth what you pay."
"The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
"We pay every year for the box, and there are no additional costs."
"Bomgar has a very fair pricing structure."
"This product provides value for money."
"It is not the most cost effective solution on the market."
"​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
"Overall, its pricing is really good. The main difference from all the other vendors is that they have one package that covers all the functionality and modules of the basic PAM, except the add-on modules like adware and server protection. It also doesn't include the licenses for domain controller protection or maybe an API call-related feature. For the basic privileged access management, the bundle pricing is really good, but when it comes to an agent-based solution for advanced cyber protection or application identity managers, it is expensive. Services are also very expensive if you hire the services team from CyberArk, but these guys are really good. For a couple of large banking projects, we had an experience with them. The banks wanted to have things quickly and efficiently, so we had to hire them. If we take four weeks, these guys can do everything on a weekend. They charge quite a big sum of money, but they know the system well."
"I would rate the tool’s pricing a six out of ten."
"The price of this solution is quite reasonable."
"No, I do not have any advice on the price of the product."
"It costs us around $200 per user."
"The cost is high compared to other products."
"If you want a Ferrari, it will cost you. The solution is really nice, so it costs the client, but in the long run, it is very good. If you buy a solution that costs a lot to maintain because it is not stable, and you are frequently asking for consultant support, it costs more."
"The price of CyberArk Privileged Access Manager could be less expensive."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
11%
Computer Software Company
10%
Government
9%
Financial Services Firm
8%
Financial Services Firm
15%
Manufacturing Company
10%
Computer Software Company
9%
Government
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business16
Midsize Enterprise9
Large Enterprise18
By reviewers
Company SizeCount
Small Business59
Midsize Enterprise40
Large Enterprise173
 

Questions from the Community

What needs improvement with BeyondTrust Remote Support?
For me as a user in the service desk, there is already a lot of functionality in the product. I don't have any specific ideas for improvement on that side. Some technical aspects could be improved,...
What advice do you have for others considering BeyondTrust Remote Support?
If used properly by a service desk agent, the cost of the tool is justified. The price reflects the tool's capabilities. I would rate the product ten out of ten. Overall, I give it a rating of ten ...
What is your experience regarding pricing and costs for BeyondTrust Remote Support?
The cost depends on the number of licenses a customer buys. For a smaller customer, the cloud solution costs around $2300 per user per year. If you have an on-premises solution, you'll also need to...
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
My thoughts on the pricing of CyberArk Privileged Access Manager depend entirely on the vendors' requirements. If they want their things to be secure, they have to spend accordingly. We have four t...
 

Also Known As

Bomgar Remote Support
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
Rockwell Automation
Find out what your peers are saying about BeyondTrust Remote Support vs. CyberArk Privileged Access Manager and other solutions. Updated: December 2025.
881,082 professionals have used our research since 2012.