BeyondTrust Privileged Remote Access vs. CyberArk Workforce Identity

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
BeyondTrust Privileged Remote Access
Score 9.1 out of 10
N/A
BeyondTrust Privileged Remote Access enables security professionals to control, monitor, and manage access to critical systems by privileged users and third-party vendors (e.g. authorized employees, contractors, etc). BeyondTrust's approach is designed to allow companies to quickly gain control of system access and protect themselves against cyberattacks without requiring time-consuming process changes. Features for secure access, vault credentials, and audit…N/A
CyberArk Workforce Identity
Score 8.0 out of 10
N/A
CyberArk Identity is a SaaS-delivered suite of solutions designed to simplify identity and access management in enterprises. CyberArk Identity unifies Workforce Access and Identity Management solutions in a single offering. Workforce Access capabilities include single sign-on, multi-factor authentication, session security, and credential management. Identity Management capabilities include lifecycle management, identity orchestration, and identity governance. With CyberArk Identity,…N/A
Pricing
BeyondTrust Privileged Remote AccessCyberArk Workforce Identity
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
BeyondTrust Privileged Remote AccessCyberArk Workforce Identity
Free Trial
YesYes
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoYes
Entry-level Setup FeeNo setup fee$4 per user/per month
Additional DetailsThere are multiple factors that influence price, if you would like a rough estimate of your specific use-case please contact us.
More Pricing Information
Community Pulse
BeyondTrust Privileged Remote AccessCyberArk Workforce Identity
Ask people about this product

See helpful people who have experience with this product

Top Pros
Top Cons
Features
BeyondTrust Privileged Remote AccessCyberArk Workforce Identity
Identity Management
Comparison of Identity Management features of Product A and Product B
BeyondTrust Privileged Remote Access
-
Ratings
CyberArk Workforce Identity
9.0
3 Ratings
11% above category average
ID-Management Access Control00 Ratings9.03 Ratings
ID Management Single-Sign On (SSO)00 Ratings9.02 Ratings
Multi-Factor Authentication00 Ratings9.02 Ratings
Password Management00 Ratings9.02 Ratings
Account Provisioning and De-provisioning00 Ratings9.03 Ratings
ID Management Workflow Automation00 Ratings9.03 Ratings
ID Risk Management00 Ratings9.03 Ratings
Best Alternatives
BeyondTrust Privileged Remote AccessCyberArk Workforce Identity
Small Businesses
Getscreen.me
Getscreen.me
Score 9.8 out of 10
Dashlane
Dashlane
Score 9.2 out of 10
Medium-sized Companies
mRemoteNG
mRemoteNG
Score 9.7 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
Enterprises
Remote Desktop Services
Remote Desktop Services
Score 9.0 out of 10
RSA Access Manager (Discontinued)
RSA Access Manager (Discontinued)
Score 10.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
BeyondTrust Privileged Remote AccessCyberArk Workforce Identity
Likelihood to Recommend
7.9
(4 ratings)
9.0
(43 ratings)
Likelihood to Renew
-
(0 ratings)
10.0
(2 ratings)
Support Rating
-
(0 ratings)
9.0
(4 ratings)
User Testimonials
BeyondTrust Privileged Remote AccessCyberArk Workforce Identity
Likelihood to Recommend
BeyondTrust
BeyondTrust Privileged Remote Access is well suited to grand monitored privileged access to resources. It works in a proxy mode so end-users don't have direct access to servers. This can help prevent attacks on servers from users' machines since all the traffic to the servers goes through the Privileged Remote Access server which performs auth according to the policies. In cases where direct access to the servers/service from the end-user's machine is required, it is a little bit complicated to set up that kind of connection using protocol tunneling.
Read full review
Cyberark
Centrify is a great solution for anyone looking to start using Office 365. It is also a great solution for anyone wanting to provide their users with an SSO solution using OAUTH, Federation, or SAML for any hosted service. If you are looking to use Centrify for MDM but you aren't using a hosted/hybrid email solution such as Office 365, there are better on-premise options that should be explored.
Read full review
Pros
BeyondTrust
  • It's comprehensive, intelligent and easy to use.
  • It has lots of features i.e. it allows special commands to be used whereas the other programs don't allow them.
  • This tool is effective in allowing you to access all your applications through a single sign-on page.
  • Actively manage the ongoing operational use of network devices, hardware, and application access via Secure App.
  • Bomgar Privileged Access deploys on-premises via a hardened physical or virtual appliance, or through the Bomgar Secure Cloud.
Read full review
Cyberark
  • User provisioning is accurate, effective, and fully customizable.
  • Custom configuration of applications for SSO and provisioning is easy using fully customizable scripts to address your exact need.
  • The user interface is clean and easy to navigate.
  • Support is helpful and prompt.
Read full review
Cons
BeyondTrust
  • questionnaire from technician for installation was difficult to follow
  • after purchase of a product, an initial audio discussion with an Engineer would be great for better understanding the installation phase
  • provide plans for on-premise and cloud strategies in different documents
Read full review
Cyberark
  • Occasionally, I get logged out of Gmail, sometimes in the middle of an email. I'm not sure why it happens, but I think it has something to do with timing out. Which is strange because I'm on email all day. Not sure why.
Read full review
Likelihood to Renew
BeyondTrust
No answers on this topic
Cyberark
Centrify is central to creating efficiency and safety for our clients and internally. To remove it would cause a massive disturbance in the lives of our employees and our clients.
Read full review
Support Rating
BeyondTrust
No answers on this topic
Cyberark
The support staff thus far has been very helpful. At times I feel they are driving the process forward without my intervention or constant reminder, which is nice to have in a company for a change. Most support seems to be a hassle but so far Centrify appears to treat your project as their own project.
Read full review
Alternatives Considered
BeyondTrust
  • More secure
  • Firewall compatible
  • Privacy screen
  • Application sharing
  • Session recording
Read full review
Cyberark
Centrify offered us more for our money by being more than just an SSO platform. There were several other features included such as MDM and MFA. This started other initiatives for us and felt the other solutions we evaluated would not have been able to provide.
Read full review
Return on Investment
BeyondTrust
  • Improve security by improving the management of external remote access
  • Help us meet Remote Access Compliance Requirements by creating audit trails, session forensics, and giving access monitoring and reporting data
  • Simplify employee access and workflows by giving employees the exact amount of privileged access to systems and applications they need, without hindering productivity or overwhelming the service desk
Read full review
Cyberark
  • CyberArk Workforce Identity provides secure access to on-premises and cloud applications. The platform is highly scalable and works well for companies of any size.
  • I can classify and label data. Also keep track of activity in shared applications and data, to know exactly who accesses each of the files.
Read full review
ScreenShots

CyberArk Workforce Identity Screenshots

Screenshot of Admin PortalScreenshot of Identity LoginScreenshot of SWS PortalScreenshot of UBA PortalScreenshot of User Portal