Secured Remote Access Solution
February 17, 2022

Secured Remote Access Solution

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with BeyondTrust Privileged Remote Access

BeyondTrust Privileged Remote Access has replaced our VPN solution for vendors and external users/partners. It allows us to grant secure remote access to specific resources in our internal networks to those external partners. It supports many types of applications and has a good granularity in terms of the types of privileges you can allow.
  • RDP Jump
  • Shell Jump
  • Web Jump
  • Protocol Tunnel Jump
  • VNC Jump
  • Ability to have a list of allowed hosts who are allowed to remote on some specific resources
  • Improve the colors display on best quality mode (highest image resolution)
  • Match the web access console experience to the desktop client access console experience. The desktop client version of the access console offers a smooth experience while the web version shows some limitations.
  • DRP Jump
  • Web Jump
  • Vault
  • Improve security by improving the management of external remote access
  • Help us meet Remote Access Compliance Requirements by creating audit trails, session forensics, and giving access monitoring and reporting data
  • Simplify employee access and workflows by giving employees the exact amount of privileged access to systems and applications they need, without hindering productivity or overwhelming the service desk

Do you think BeyondTrust Privileged Remote Access delivers good value for the price?

Yes

Are you happy with BeyondTrust Privileged Remote Access's feature set?

Yes

Did BeyondTrust Privileged Remote Access live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of BeyondTrust Privileged Remote Access go as expected?

Yes

Would you buy BeyondTrust Privileged Remote Access again?

Yes

BeyondTrust Privileged Remote Access is well suited to grand monitored privileged access to resources. It works in a proxy mode so end-users don't have direct access to servers. This can help prevent attacks on servers from users' machines since all the traffic to the servers goes through the Privileged Remote Access server which performs auth according to the policies. In cases where direct access to the servers/service from the end-user's machine is required, it is a little bit complicated to set up that kind of connection using protocol tunneling.