BeyondTrust Privileged Remote Access enables security professionals
to control, monitor, and manage access to critical systems by privileged users
and third-party vendors (e.g. authorized employees, contractors, etc). BeyondTrust's approach is designed to allow companies to quickly gain
control of system access and protect themselves against cyberattacks without
requiring time-consuming process changes. Features for secure access, vault credentials, and audit…
N/A
Dashlane Password Manager
Score 9.1 out of 10
N/A
Dashlane is a credential manager that secures every credential, every user, and every employee device to proactively protect against breaches. Brands worldwide can use Dashlane to stay ahead of evolving threats.
BeyondTrust Privileged Remote Access is well suited to grand monitored privileged access to resources. It works in a proxy mode so end-users don't have direct access to servers. This can help prevent attacks on servers from users' machines since all the traffic to the servers goes through the Privileged Remote Access server which performs auth according to the policies. In cases where direct access to the servers/service from the end-user's machine is required, it is a little bit complicated to set up that kind of connection using protocol tunneling.
Dashlane Password Manager works really well for situations where we need to share access to client portals or government filing sites, since multiple people can log in without ever seeing the actual password and we can cut off access right away when it’s no longer needed. It is also great for onboarding and offboarding since new hires or interns can get the logins they need quickly and we don’t have to pass around spreadsheets. Another strong use case is meeting compliance expectations because it shows clients we are serious about security and password hygiene. Where it’s less useful is in environments that already use single sign-on since that already centralizes access and makes Dashlane Password Manager feel redundant. It can also be a little frustrating if you rely heavily on mobile since the autofill doesn’t always work smoothly across different apps.
One way to use it is by using a machine as an access proxy, this machine being Linux, has limitations such as copy and paste and does not allow access to more than one web access.
Search is lacking. The desktop app had better features
I can no longer find needed features. Such as the option to only use a password on a specific subdomain. this is important because I have hundreds of subdomains for testing client software builds before releasing to their domain.
The Mobile app and Browser Extension are not synced. I have several Secure Notes and Passwords that I cannot find anywhere in my mobile app, but can find without issues in the extension.
This review was originally written partially in Portuguese and those parts have been translated into English using a third-party translation tool. While we strive for accuracy, some nuances or meanings may not be perfectly captured.
Dashlane Password Manager is great for the price. Some feature sets of competitors are lacking, but I'm happy with what we get for the spend. We are a small enough company that I can walk people through the steps, and it isn't something that comes up enough to complain about. Password generation, storage and use are all great.
We've had no issues with Dashlane. I can't speak to their customer service because I have not personally needed to contact them. I guess that speaks about their product if we've not had any issues to reach out about. Great for supporting data/information on multiple platforms that are shared among team members.
Dashlane’s customer support is often rated higher, providing more responsive and helpful assistance. LastPass has a slightly steeper learning curve than Dashlane, but it offers more flexibility with user permissions, which can benefit teams. Dashlane includes unlimited passkey support and a clean breach history, while LastPass is more accommodating for smaller teams.
Improve security by improving the management of external remote access
Help us meet Remote Access Compliance Requirements by creating audit trails, session forensics, and giving access monitoring and reporting data
Simplify employee access and workflows by giving employees the exact amount of privileged access to systems and applications they need, without hindering productivity or overwhelming the service desk