BeyondTrust Privileged Remote Access vs. Microsoft Enterprise Mobility + Security

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
BeyondTrust Privileged Remote Access
Score 9.1 out of 10
N/A
BeyondTrust Privileged Remote Access enables security professionals to control, monitor, and manage access to critical systems by privileged users and third-party vendors (e.g. authorized employees, contractors, etc). BeyondTrust's approach is designed to allow companies to quickly gain control of system access and protect themselves against cyberattacks without requiring time-consuming process changes. Features for secure access, vault credentials, and audit…N/A
Microsoft Enterprise Mobility + Security
Score 9.4 out of 10
N/A
Microsoft Enterprise Mobility + Security is a suite of applications supporting mobile device and application security, MDM, as well as conditional or privileged access with multi-factor authentication, and advanced security reporting. Products in the suite includes Microsoft Intune mobile device management, Azure Information Protection, Microsoft Identity Manager, Microsoft Cloud App Security, Azure Active Directory, and other ancillary applications.N/A
Pricing
BeyondTrust Privileged Remote AccessMicrosoft Enterprise Mobility + Security
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
BeyondTrust Privileged Remote AccessMicrosoft Enterprise Mobility + Security
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
BeyondTrust Privileged Remote AccessMicrosoft Enterprise Mobility + Security
Top Pros
Top Cons
Best Alternatives
BeyondTrust Privileged Remote AccessMicrosoft Enterprise Mobility + Security
Small Businesses
Getscreen.me
Getscreen.me
Score 9.8 out of 10
NinjaOne
NinjaOne
Score 9.2 out of 10
Medium-sized Companies
mRemoteNG
mRemoteNG
Score 9.7 out of 10
NinjaOne
NinjaOne
Score 9.2 out of 10
Enterprises
Remote Desktop Services
Remote Desktop Services
Score 9.1 out of 10
Citrix Endpoint Management
Citrix Endpoint Management
Score 8.3 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
BeyondTrust Privileged Remote AccessMicrosoft Enterprise Mobility + Security
Likelihood to Recommend
7.9
(4 ratings)
9.5
(3 ratings)
User Testimonials
BeyondTrust Privileged Remote AccessMicrosoft Enterprise Mobility + Security
Likelihood to Recommend
BeyondTrust
BeyondTrust Privileged Remote Access is well suited to grand monitored privileged access to resources. It works in a proxy mode so end-users don't have direct access to servers. This can help prevent attacks on servers from users' machines since all the traffic to the servers goes through the Privileged Remote Access server which performs auth according to the policies. In cases where direct access to the servers/service from the end-user's machine is required, it is a little bit complicated to set up that kind of connection using protocol tunneling.
Read full review
Microsoft
Microsoft Enterprise Mobility + Security has been ideal for our organization (and would be for any I can think of) for securing user accounts through MFA and admin accounts through PIM. Its end-point management is also great for set-up and configuration as well as management of your devices. It also provides you with useful metrics and feedback on your devices.
Read full review
Pros
BeyondTrust
  • It's comprehensive, intelligent and easy to use.
  • It has lots of features i.e. it allows special commands to be used whereas the other programs don't allow them.
  • This tool is effective in allowing you to access all your applications through a single sign-on page.
  • Actively manage the ongoing operational use of network devices, hardware, and application access via Secure App.
  • Bomgar Privileged Access deploys on-premises via a hardened physical or virtual appliance, or through the Bomgar Secure Cloud.
Read full review
Microsoft
  • Simple pre-packed solution for many popular Microsoft products
  • Advanced threat protection
  • Simplified end user management with Intune
Read full review
Cons
BeyondTrust
  • questionnaire from technician for installation was difficult to follow
  • after purchase of a product, an initial audio discussion with an Engineer would be great for better understanding the installation phase
  • provide plans for on-premise and cloud strategies in different documents
Read full review
Microsoft
  • InTune deployment via Hybrid Azure AD. The instructions seem very simple but there are lots of little areas you can get tripped up and there is little logging to see where you've gone wrong.
  • Advanced Threat Protection anti-impersonation. It is WAY too sensitive. Users emailing themselves from personal accounts get their mail sent to quarantine just because the name/label of the personal account matches their Office 365 mailbox name/label? HUH???
  • Licensing. Typical of Microsoft, what you're actually getting and details of licensing are confusing.
Read full review
Alternatives Considered
BeyondTrust
  • More secure
  • Firewall compatible
  • Privacy screen
  • Application sharing
  • Session recording
Read full review
Microsoft
Microsoft Enterprise Mobility + Security is better than any of the products I have used that do similar things. There is a huge convenience to all the things Microsoft Enterprise Mobility + Security brings together in one place. Also, the speed and streamlining nature of Intune helps with the management and set up of devices.
Read full review
Return on Investment
BeyondTrust
  • Improve security by improving the management of external remote access
  • Help us meet Remote Access Compliance Requirements by creating audit trails, session forensics, and giving access monitoring and reporting data
  • Simplify employee access and workflows by giving employees the exact amount of privileged access to systems and applications they need, without hindering productivity or overwhelming the service desk
Read full review
Microsoft
  • Increased productivity, including service requests for our customers
  • Reduced operational costs, and threat/risk of cyber-attacks
Read full review
ScreenShots