10 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 7.1 out of 100
22 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.9 out of 100

Feature Set Ratings

  • Access Auditor ranks higher in 1 feature set: Identity Management

Identity Management

7.6

Access Auditor

76%
7.3

BeyondTrust Privileged Remote Access

73%
Access Auditor ranks higher in 4/7 features

ID-Management Access Control

7.0
70%
1 Rating
8.2
82%
3 Ratings

ID Management Single-Sign On (SSO)

7.0
70%
1 Rating
7.7
77%
3 Ratings

Multi-Factor Authentication

8.0
80%
1 Rating
7.6
76%
4 Ratings

Password Management

6.0
60%
1 Rating
5.9
59%
3 Ratings

Account Provisioning and De-provisioning

9.0
90%
1 Rating
6.7
67%
3 Ratings

ID Management Workflow Automation

7.0
70%
1 Rating
7.7
77%
3 Ratings

ID Risk Management

9.0
90%
1 Rating
7.3
73%
2 Ratings

Attribute Ratings

  • Access Auditor and BeyondTrust Privileged Remote Access are tied in 1 area: Likelihood to Recommend

Likelihood to Recommend

8.0

Access Auditor

80%
1 Rating
8.0

BeyondTrust Privileged Remote Access

80%
4 Ratings

Support Rating

8.0

Access Auditor

80%
2 Ratings

BeyondTrust Privileged Remote Access

N/A
0 Ratings

Likelihood to Recommend

Access Auditor

Access Auditor is great for evaluate your Governance Process and enhances that workflow before deployment. As we had to get the business up to speed afterword and that slowed us down.
Anonymous | TrustRadius Reviewer

BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access is well suited to grand monitored privileged access to resources. It works in a proxy mode so end-users don't have direct access to servers. This can help prevent attacks on servers from users' machines since all the traffic to the servers goes through the Privileged Remote Access server which performs auth according to the policies. In cases where direct access to the servers/service from the end-user's machine is required, it is a little bit complicated to set up that kind of connection using protocol tunneling.
Anonymous | TrustRadius Reviewer

Pros

Access Auditor

  • Create internal/operational efficiencies
  • Improve business process outcomes
Anonymous | TrustRadius Reviewer

BeyondTrust Privileged Remote Access

  • It's comprehensive, intelligent and easy to use.
  • It has lots of features i.e. it allows special commands to be used whereas the other programs don't allow them.
  • This tool is effective in allowing you to access all your applications through a single sign-on page.
  • Actively manage the ongoing operational use of network devices, hardware, and application access via Secure App.
  • Bomgar Privileged Access deploys on-premises via a hardened physical or virtual appliance, or through the Bomgar Secure Cloud.
Anonymous | TrustRadius Reviewer

Cons

Access Auditor

  • Product functionality and performance
  • Product roadmap and future vision
Anonymous | TrustRadius Reviewer

BeyondTrust Privileged Remote Access

  • questionnaire from technician for installation was difficult to follow
  • after purchase of a product, an initial audio discussion with an Engineer would be great for better understanding the installation phase
  • provide plans for on-premise and cloud strategies in different documents
Anonymous | TrustRadius Reviewer

Pricing Details

Access Auditor

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Starting Price

BeyondTrust Privileged Remote Access

General

Free Trial
Free/Freemium Version
Premium Consulting/Integration Services
Entry-level set up fee?
No

Starting Price

Support Rating

Access Auditor

Access Auditor 8.0
Based on 2 answers
It is hard to pick just one. Access Auditor has dramatically improved our processes and saved us a ton of time. Also, their support is top-notch.
Anonymous | TrustRadius Reviewer

BeyondTrust Privileged Remote Access

No score
No answers yet
No answers on this topic

Alternatives Considered

Access Auditor

Even if you only use their Auditing/Access Certification tool and not their Identity Management/Password Management tools, you're still able to complete entitlement reviews for SOX or any other compliance requirements.
Anonymous | TrustRadius Reviewer

BeyondTrust Privileged Remote Access

  • More secure
  • Firewall compatible
  • Privacy screen
  • Application sharing
  • Session recording
Anonymous | TrustRadius Reviewer

Return on Investment

Access Auditor

  • Strong customer focus
  • Overall cost
Anonymous | TrustRadius Reviewer

BeyondTrust Privileged Remote Access

  • Improve security by improving the management of external remote access
  • Help us meet Remote Access Compliance Requirements by creating audit trails, session forensics, and giving access monitoring and reporting data
  • Simplify employee access and workflows by giving employees the exact amount of privileged access to systems and applications they need, without hindering productivity or overwhelming the service desk
Anonymous | TrustRadius Reviewer

Add comparison