TrustRadius: an HG Insights company
BeyondTrust Privileged Remote Access Logo

BeyondTrust Privileged Remote Access Reviews and Ratings

Rating: 9.2 out of 10
Score
9.2 out of 10

Community insights

TrustRadius Insights for BeyondTrust Privileged Remote Access are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.

Business Problems Solved

Users have found the product to be extremely useful in securing their servers and ensuring secure login. Acting as a gateway between the user and the server, it provides a safe connection that has helped troubleshoot issues quickly by accessing logs for further analysis. With full visibility and control over who accesses the servers and what actions they perform, users have praised its ability to make auditing external parties/vendors easier and improve overall security awareness. By using this product, users no longer have to compromise security to allow vendors access to critical systems, solving a significant problem in maintaining secure environments. It is widely used for remote administrative access to critical systems in a secure manner for both employees and third-party vendors, making it an essential tool for IT professionals. Additionally, it has proven helpful in troubleshooting VPN connectivity issues and resolving Level 1 problems, ensuring efficient support for end-users. Recognized as an industry leader in interactive remote access, this product adds credibility during compliance audits. Highly privileged credentials are protected with password changes on a schedule, while limited access through an access code prevents unauthorized joiners. Users also benefit from its password manager function, which helps manage multiple passwords in a single sign-on environment.

Reviews

6 Reviews

Endpoint access security.

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

The company I work for provides consulting services to clients in the area of ​​information security using technologies from our partners. We use BeyondTrust Privileged Remote Access to access the technologies that are in our clients' environments. With BeyondTrust Privileged Remote Access, BeyondTrust Privileged Remote Access solved a problem we had in accessing this information. With this change, our access is much more secure.

A empresa em que trabalho fornece serviços de consultoria para clientes na área de segurança da informação usando tecnologias de nossos parceiros. Usamos o BeyondTrust Privileged Remote Access para acessar as tecnologias que estão nos ambientes de nossos clientes. Com o BeyondTrust Privileged Remote Access, a BeyondTrust Privileged Remote Access resolveu um problema que tínhamos para acessar essas informações. Com essa mudança, nosso acesso está muito mais seguro.

Pros

  • Remote access with various protocols
  • Access auditing, with logs, recordings, user information.
  • Remote access without the need to use a VPN.

Cons

  • One way to use it is by using a machine as an access proxy, this machine being Linux, has limitations such as copy and paste and does not allow access to more than one web access.
  • Improve the desktop application view.

Likelihood to Recommend

For remote access in all forms, being fully adopted, for remote support cases it is also an excellent and suitable form of use.

Para acesso remoto de todas as formas, sendo totalmente adotado, para casos de suporte remoto também é uma forma excelente e adequada de uso.

A simple to use solution for Secure Remote Access

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

BeyondTrust Privileged Remote Access provides a secure method for users to access applications and infrastructure as well as our administrators. The web based jumps are very useful to present application UIs removing the need for jump boxes, decreasing costs and administration.

Pros

  • Remote RDP
  • Secure outbound initiated access
  • Web Jumps

Cons

  • Update releases that break things can take months to resolve

Likelihood to Recommend

Overall a great secure product, easy setup and administration. There is room for improvement with correcting issues that develop from apply system updates, for example performance issues with new operating system releases, issues with RDP Jump items caused by underlying software upgrades, these issues can take weeks and sometimes months to correct.

Vetted Review
BeyondTrust Privileged Remote Access
4 years of experience

Secured Remote Access Solution

Rating: 9 out of 10

Use Cases and Deployment Scope

BeyondTrust Privileged Remote Access has replaced our VPN solution for vendors and external users/partners. It allows us to grant secure remote access to specific resources in our internal networks to those external partners. It supports many types of applications and has a good granularity in terms of the types of privileges you can allow.

Pros

  • RDP Jump
  • Shell Jump
  • Web Jump
  • Protocol Tunnel Jump
  • VNC Jump

Cons

  • Ability to have a list of allowed hosts who are allowed to remote on some specific resources
  • Improve the colors display on best quality mode (highest image resolution)
  • Match the web access console experience to the desktop client access console experience. The desktop client version of the access console offers a smooth experience while the web version shows some limitations.

Likelihood to Recommend

BeyondTrust Privileged Remote Access is well suited to grand monitored privileged access to resources. It works in a proxy mode so end-users don't have direct access to servers. This can help prevent attacks on servers from users' machines since all the traffic to the servers goes through the Privileged Remote Access server which performs auth according to the policies. In cases where direct access to the servers/service from the end-user's machine is required, it is a little bit complicated to set up that kind of connection using protocol tunneling.

Vetted Review
BeyondTrust Privileged Remote Access
1 year of experience

BeyondTrust Remote Support Tool

Rating: 7 out of 10

Use Cases and Deployment Scope

Our organization uses BeyondTrust Privileged

Access Management Suite as a Security Bastion to secure, manage, and audit remote

privileged access to customers' infrastructures. It allows remote assist sessions to be logged and optionally be monitored in real-time and recorded for a

detailed audit trail. It is very helpful in our ISO27001 strategy.

Pros

  • Audit and secure remote privileged access
  • Manage roles and accesses
  • Centralized console to connect to any protocl

Cons

  • Localization of the user interface

Likelihood to Recommend

Securely access and support any device or system.

Vetted Review
BeyondTrust Privileged Remote Access
3 years of experience

New to Beyond Trust PRA, be we like it a lot!

Rating: 10 out of 10
Incentivized

Use Cases and Deployment Scope

We are using Beyond Trust to allow 3rd party vendors to connect to specific Servers in our organization. These 3rd party vendors support their software and provide technical services to us when we ask them for assistance.

Pros

  • simple interface for users
  • good technical resources available to speak with
  • training

Cons

  • questionnaire from technician for installation was difficult to follow
  • after purchase of a product, an initial audio discussion with an Engineer would be great for better understanding the installation phase
  • provide plans for on-premise and cloud strategies in different documents

Likelihood to Recommend

This allows us to provide 3rd party vendors access to our environment from anywhere in the world, and we do not have to manage VPNs, or separate logins for each server.

Vetted Review

Bomgar Privileged Access Management - A Great Tool

Rating: 8 out of 10
Incentivized

Use Cases and Deployment Scope

Bomgar Privileged Access allows us to provide remote access to our servers to an external employee in a controlled manner. Bomgar is very easy to use and very efficient.

Pros

  • It's comprehensive, intelligent and easy to use.
  • It has lots of features i.e. it allows special commands to be used whereas the other programs don't allow them.
  • This tool is effective in allowing you to access all your applications through a single sign-on page.
  • Actively manage the ongoing operational use of network devices, hardware, and application access via Secure App.
  • Bomgar Privileged Access deploys on-premises via a hardened physical or virtual appliance, or through the Bomgar Secure Cloud.

Cons

  • The menu system is a bit dated.
  • Sometimes the application takes a little longer than expected to load.
  • It has a somewhat clunky interface and some areas can accidentally be clicked causing issues due to no pop-up warning.

Likelihood to Recommend

The Password Manager function is the main area that this solution provides tremendous benefit for me. It allows me to manage multiple passwords for different applications in a single sign-on environment.

Vetted Review
BeyondTrust Privileged Remote Access
2 years of experience