Overview
Product Information on BeyondTrust Privileged Remote Access
What is BeyondTrust Privileged Remote Access?
BeyondTrust Privileged Remote Access Pricing
Overall experience with BeyondTrust Privileged Remote Access
“Product Highly Customizable But Involves Complex and Lengthy Initial Configuration”
“BeyondTrust Offers Endpoint Security but Faces Training and Support Difficulties”
About Company
Company Description
BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.
Company Details
Do You Manage Peer Insights at BeyondTrust?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About BeyondTrust Privileged Remote Access
Reviewer Insights for: BeyondTrust Privileged Remote Access
Performance of BeyondTrust Privileged Remote Access Across Market Features
BeyondTrust Privileged Remote Access Likes & Dislikes
The customer support provided was very good with multiple meetings taken place to assist on setting up and maintaining. Is very modifiable to fit into company needs and support seemed very agreeable for taking suggestions on what we wanted to see added to the product going forward.
The capabilities of BeyondTrust. Once we get it setup to the level we want, it will help secure our endpoints even better.
1. The ability to manage and monitor privileged sessions in a controlled manner has significantly improved oversight for vendor and admin access. 2. Session recording and auditing features have been useful during investigations and internal reviews. 3. Granular access controls allow us to define who can access what, and under which conditions, which helps enforce least-privilege practices.
Was complex to set up and took many working hours to get into a place we were happy with, in addition does take continued maintenance hours to keep in proper order as users require access. This does translate into being complex to make additions with a required teaching session to bring in more administrators for the tool. We have also found the dashboards/interfaces we work with lacking in additional functionality to allow us to really use the tool to full ability.
Training is limited. They don't happen enough. A lot are scheduled more for people in India than the US. Hard to learn. Getting support isn't as easy as other services or vendors provide.
1. Initial setup and policy design can be complex, especially when aligning with existing access processes. 2. The user interface requires some learning, particularly for administrators configuring advanced rules. 3. Troubleshooting access issues sometimes involves checking multiple configuration points, which can slow resolution.
Top BeyondTrust Privileged Remote Access Alternatives
Peer Discussions
BeyondTrust Privileged Remote Access Reviews and Ratings
- IT Associate50M-1B USDManufacturingReview Source
BeyondTrust Offers Endpoint Security but Faces Training and Support Difficulties
I have to knock 2 stars off on the overall rating. Training, ease of use, and accessing support in an easy manner are a BIG issue. Training would be the biggest. Some key points: limited live training, live training courses are scheduled more for people in India than the US. archived recordings, web based (self paced) training. Using the console can be daunting when implementing or learning the product. This prevents implementing the product quicker, getting people knowledgeable on the product. - Cybersecurity Analyst1B-10B USDManufacturingReview Source
Product Highly Customizable But Involves Complex and Lengthy Initial Configuration
Was and is time consuming to set up and maintain but does exactly what it is set out to do in providing Privileged remote access management - Network And Security Engineer<50M USDIT ServicesReview Source
Effective control and visibility for privileged remote access, with some upfront configuration effort reuired.
In our environment, we use BeyondTrust Privileged Remote Access primarily to control and monitor third-party and internal privileged access. It has given us better visibility and tighter control over remote sessions compared to what we had before. It has been dependable in daily operations with minimal unexpected behavior. - MANAGER, IT SECURITY AND RISK MANAGEMENT<50M USDIT ServicesReview Source
Granular Configuration and Active Community Engagement Stand Out in BeyondTrust Experience
Whit more than 10 years of experience with BeyondTrust product, the continuos evolution is evident. The TAM team is always close, the forum mechanisms for sharing ideas, the new features and the feature request resources are truly admirable. - Network Engineer10B+ USDBankingReview Source
Remote Workforce Sees Benefits And Complexity With Granular Privileged Access Management
Beyond Trust is a comprehensive tool which I have used for privilege management for Windows systems. Overall it covers a critical space in managing specific requirements for a remote workforce and is has a comprehensive feature set and a good support network.



