Overview
Product Information on BeyondTrust Privileged Remote Access
What is BeyondTrust Privileged Remote Access?
BeyondTrust Privileged Remote Access Pricing
Overall experience with BeyondTrust Privileged Remote Access
“Controlled Vendor Access Enhances Security Yet Licensing Costs Remain a Concern”
“BeyondTrust Offers Endpoint Security but Faces Training and Support Difficulties”
About Company
Company Description
BeyondTrust focuses on Privileged Access Management (PAM), providing services and products to organizations globally. They help businesses secure and manage their privileges both within traditional and hybrid environments, including the cloud. BeyondTrust's integrated solutions offer an advanced PAM solution, designed to minimize the attack surface. The Universal Privilege Management methodology from BeyondTrust aims to secure privileges across access, passwords and endpoints. This provides organizations with the necessary control and visibility to foster operational performance, gain compliance, and mitigate risks.
Company Details
Do You Manage Peer Insights at BeyondTrust?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
User Sentiment About BeyondTrust Privileged Remote Access
Reviewer Insights for: BeyondTrust Privileged Remote Access
Performance of BeyondTrust Privileged Remote Access Across Market Features
BeyondTrust Privileged Remote Access Likes & Dislikes
One of the standout strengths is the session monitoring and recording capability. It Allows administrators to track privileged sessions in real time and review recordings later if needed, which is very useful for auditing and security reviews. Another strong feature is the controlled vendor access. Instead of giving direct network access, vendors can connect through the platform with proper authentication and limited permissions, which greatly improves overall security. The centralized management is also very helpful. Administrators can manage users, permissions, and access policies from a single interface, making it easier to enforce security policies and maintain visibility across different systems.
The capabilities of BeyondTrust. Once we get it setup to the level we want, it will help secure our endpoints even better.
The customer support provided was very good with multiple meetings taken place to assist on setting up and maintaining. Is very modifiable to fit into company needs and support seemed very agreeable for taking suggestions on what we wanted to see added to the product going forward.
One issue we noticed is that the system can require a fair amount of ongoing administration. Managing users, access approvals and session policies needs regular attention to ensure everything stays aligned with security requirements. the user interface could also be more intuitive. Some settings and configuration options are not very easy to locate, which can slow down administrators when managing users or troubleshooting issues. Another challenge is the licensing cost. For organizations with many users or external vendors requiring access, The pricing can be increase quickly compared to some other competitors
Training is limited. They don't happen enough. A lot are scheduled more for people in India than the US. Hard to learn. Getting support isn't as easy as other services or vendors provide.
Was complex to set up and took many working hours to get into a place we were happy with, in addition does take continued maintenance hours to keep in proper order as users require access. This does translate into being complex to make additions with a required teaching session to bring in more administrators for the tool. We have also found the dashboards/interfaces we work with lacking in additional functionality to allow us to really use the tool to full ability.
Top BeyondTrust Privileged Remote Access Alternatives
Peer Discussions
BeyondTrust Privileged Remote Access Reviews and Ratings
- Business Sales Engineer<50M USDIT ServicesReview Source
Controlled Vendor Access Enhances Security Yet Licensing Costs Remain a Concern
Using Beyond Trust Privileged Remote Access Helped us manage remote connections to critical systems in a more controlled and secure way. The platform provides good visibility into sessions and allows us to monitor and manage privileged access effectively. It has been particularly useful for handling third-party vendors while maintaining proper security and accountability. - IT Associate50M-1B USDManufacturingReview Source
BeyondTrust Offers Endpoint Security but Faces Training and Support Difficulties
I have to knock 2 stars off on the overall rating. Training, ease of use, and accessing support in an easy manner are a BIG issue. Training would be the biggest. Some key points: limited live training, live training courses are scheduled more for people in India than the US. archived recordings, web based (self paced) training. Using the console can be daunting when implementing or learning the product. This prevents implementing the product quicker, getting people knowledgeable on the product. - Cybersecurity Analyst1B-10B USDManufacturingReview Source
Product Highly Customizable But Involves Complex and Lengthy Initial Configuration
Was and is time consuming to set up and maintain but does exactly what it is set out to do in providing Privileged remote access management - Cyber Security Staff Analyst1B-10B USDManufacturingReview Source
Confidence In System Security Despite Challenges With Reporting And SIEM Integration
BeyondTrust Privileged Remote Access is a great tool to elevate security of access to the levels where you can live with a confidence your system is secured and consistently under protection of accounts accessing it. - Network And Security Engineer<50M USDIT ServicesReview Source
Effective control and visibility for privileged remote access, with some upfront configuration effort reuired.
In our environment, we use BeyondTrust Privileged Remote Access primarily to control and monitor third-party and internal privileged access. It has given us better visibility and tighter control over remote sessions compared to what we had before. It has been dependable in daily operations with minimal unexpected behavior.



