BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access Reviews

Do you work for this company? Learn how we help vendors

Reviews
(1-1 of 1)

Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Review Source
Bomgar Privileged Access allows us to provide remote access to our servers to an external employee in a controlled manner. Bomgar is very easy to use and very efficient.
  • It's comprehensive, intelligent and easy to use.
  • It has lots of features i.e. it allows special commands to be used whereas the other programs don't allow them.
  • This tool is effective in allowing you to access all your applications through a single sign-on page.
  • Actively manage the ongoing operational use of network devices, hardware, and application access via Secure App.
  • Bomgar Privileged Access deploys on-premises via a hardened physical or virtual appliance, or through the Bomgar Secure Cloud.
  • The menu system is a bit dated.
  • Sometimes the application takes a little longer than expected to load.
  • It has a somewhat clunky interface and some areas can accidentally be clicked causing issues due to no pop-up warning.
The Password Manager function is the main area that this solution provides tremendous benefit for me. It allows me to manage multiple passwords for different applications in a single sign-on environment.

BeyondTrust Privileged Remote Access Scorecard Summary

Feature Scorecard Summary

Identity Management (5)
76%
7.6
ID-Management Access Control (1)
50%
5.0
ID Management Single-Sign On (SSO) (1)
90%
9.0
Multi-Factor Authentication (1)
80%
8.0
Password Management (1)
90%
9.0
ID Management Workflow Automation (1)
70%
7.0

What is BeyondTrust Privileged Remote Access?

BeyondTrust Privileged Remote Access enables security professionals to control, monitor, and manage access to critical systems by privileged users and third-party vendors. BeyondTrust says their unique approach allows companies to quickly gain control of system access and protect themselves against cyberattacks without requiring time-consuming process changes.

BeyondTrust Privileged Remote Access Features

  • Supported: Secure Remote Access
  • Supported: Session Forensics
  • Supported: Cloud Access Control
  • Supported: Defense-In-Depth
  • Supported: Authorization and Notification
  • Supported: Mobile and Web Consoles
  • Supported: Credentials & Keys

BeyondTrust Privileged Remote Access Competitors

BeyondTrust Privileged Remote Access Pricing

BeyondTrust Privileged Remote Access Technical Details

Deployment TypesOn-premise
Operating SystemsWindows, Linux, Mac
Mobile ApplicationApple iOS, Android