BeyondTrust Privileged Remote Access Reviews

11 Ratings
<a href='' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 8.8 out of 100

Do you work for this company? Manage this listing

Overall Rating

Reviewer's Company Size

Last Updated

By Topic




Job Type


Reviews (1-1 of 1)

Anonymous | TrustRadius Reviewer
January 18, 2019

Bomgar Privileged Access Management - A Great Tool

Score 8 out of 10
Vetted Review
Verified User
Review Source
Bomgar Privileged Access allows us to provide remote access to our servers to an external employee in a controlled manner. Bomgar is very easy to use and very efficient.
  • It's comprehensive, intelligent and easy to use.
  • It has lots of features i.e. it allows special commands to be used whereas the other programs don't allow them.
  • This tool is effective in allowing you to access all your applications through a single sign-on page.
  • Actively manage the ongoing operational use of network devices, hardware, and application access via Secure App.
  • Bomgar Privileged Access deploys on-premises via a hardened physical or virtual appliance, or through the Bomgar Secure Cloud.
  • The menu system is a bit dated.
  • Sometimes the application takes a little longer than expected to load.
  • It has a somewhat clunky interface and some areas can accidentally be clicked causing issues due to no pop-up warning.
The Password Manager function is the main area that this solution provides tremendous benefit for me. It allows me to manage multiple passwords for different applications in a single sign-on environment.
Read this authenticated review

BeyondTrust Privileged Remote Access Scorecard Summary

Feature Scorecard Summary

ID-Management Access Control (1)
ID Management Single-Sign On (SSO) (1)
Multi-Factor Authentication (1)
Password Management (1)
ID Management Workflow Automation (1)

About BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access enables security professionals to control, monitor, and manage access to critical systems by privileged users and third-party vendors. BeyondTrust says their unique approach allows companies to quickly gain control of system access and protect themselves against cyberattacks without requiring time-consuming process changes.
Categories:  Identity Management

BeyondTrust Privileged Remote Access Features

Has featureSecure Remote Access
Has featureSession Forensics
Has featureCloud Access Control
Has featureDefense-In-Depth
Has featureAuthorization and Notification
Has featureMobile and Web Consoles
Has featureCredentials & Keys

BeyondTrust Privileged Remote Access Competitors

BeyondTrust Privileged Remote Access Technical Details

Deployment Types:On-premise
Operating Systems: Windows, Linux, Mac
Mobile Application:Apple iOS, Android