Try our new research platform with insights from 80,000+ expert users
BeyondTrust Privileged Remote Access Logo

BeyondTrust Privileged Remote Access pros and cons

Vendor: BeyondTrust
4.3 out of 5

Pros & Cons summary

Buyer's Guide

Get pricing advice, tips, use cases and valuable features from real users of this product.
Get the report

Prominent pros & cons

PROS

BeyondTrust Privileged Remote Access offers robust security with features like multi-factor authentication and encryption, meeting compliance requirements.
The ease of deployment and maintenance across different operating systems enhances user convenience and speed in setup.
Its integration with Active Directory allows efficient discovery and protection of endpoints and user accounts, bolstering security management.
BeyondTrust Privileged Remote Access facilitates remote access without needing a VPN by allowing secure server access via the internet, which simplifies user onboarding.
With a track record of stability and reliability, the platform reduces the need for multiple services and is supported by effective technical assistance.

CONS

Changing the password should be simplified, and there should not be a charge for it.
Its management is through two different portals without interlinking, making the process inconvenient for admins who must switch between them.
Multi-factor authentication is limited to the login of BeyondTrust, hindering its implementation at the endpoint level.
The integration of BeyondTrust with various platforms is challenging and requires simplification.
Customer support has slowed, transitioning from chat options to ServiceNow tickets, increasing resolution times.
 

BeyondTrust Privileged Remote Access Pros review quotes

it_user843969 - PeerSpot reviewer
Head of Communications at Stadt Winterthur
Nov 13, 2019
The most valuable feature is that this solution can be implemented regardless of the operating system.
reviewer1419198 - PeerSpot reviewer
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees
Feb 10, 2021
Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that.
Hahn Rolf - PeerSpot reviewer
CEO at MICRODYN AG
Jul 2, 2021
The scalability is excellent.
Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
reviewer1037646 - PeerSpot reviewer
Cybersecurity Architect at a tech vendor with 1-10 employees
Nov 19, 2021
This product is very stable and scalable. This is an excellent platform.
Chase Cole - PeerSpot reviewer
Sr. Systems Administrator at Rayburn Country Electric Cooperative, Inc.
Mar 2, 2022
It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength.
Lance Jones - PeerSpot reviewer
Information Technology Operations Manager at a educational organization with 5,001-10,000 employees
Apr 27, 2022
We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network.
reviewer1873317 - PeerSpot reviewer
Sr Cyber Security Manager at Honeywell International Inc.
Jun 1, 2022
The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs.
SteveJenovai - PeerSpot reviewer
Sr Technical Product Manager (Sr. Consultant at Computronix) at Computronix
Jun 25, 2022
The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features.
reviewer1895658 - PeerSpot reviewer
It Manager
Jun 26, 2022
The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature.
reviewer1909812 - PeerSpot reviewer
IT Specialist at a comms service provider with 11-50 employees
Jul 11, 2022
We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access.
 

BeyondTrust Privileged Remote Access Cons review quotes

it_user843969 - PeerSpot reviewer
Head of Communications at Stadt Winterthur
Nov 13, 2019
Changing your password should be simplified, and there should not be a charge for it.
reviewer1419198 - PeerSpot reviewer
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees
Feb 10, 2021
It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution.
Hahn Rolf - PeerSpot reviewer
CEO at MICRODYN AG
Jul 2, 2021
They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case.
Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,259 professionals have used our research since 2012.
reviewer1037646 - PeerSpot reviewer
Cybersecurity Architect at a tech vendor with 1-10 employees
Nov 19, 2021
The price is pretty expensive.
Chase Cole - PeerSpot reviewer
Sr. Systems Administrator at Rayburn Country Electric Cooperative, Inc.
Mar 2, 2022
There is no connectivity to the appliance side. There is no API, and it is just difficult for me to capture what version the device is on without going in and doing screenshots. It is a little too secure in that regard, where they don't even trust their product owner. Since a lot of hacks come from the inside, they are probably doing what they need to do out of necessity. It is just that I have to work pretty hard to produce compliance data on the box.
Lance Jones - PeerSpot reviewer
Information Technology Operations Manager at a educational organization with 5,001-10,000 employees
Apr 27, 2022
Its management is through two different portals, and you can't get from one portal to the other. I have to literally open up another website and go into it a different way. There are no inner links between the two. They should interlink the actual virtual server and the appliance. In general, there should be one interface for management for admins.
reviewer1873317 - PeerSpot reviewer
Sr Cyber Security Manager at Honeywell International Inc.
Jun 1, 2022
One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint.
SteveJenovai - PeerSpot reviewer
Sr Technical Product Manager (Sr. Consultant at Computronix) at Computronix
Jun 25, 2022
In terms of the ability to automate the creation of new accounts within it, it's still a bit laborious.
reviewer1895658 - PeerSpot reviewer
It Manager
Jun 26, 2022
The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully.
reviewer1909812 - PeerSpot reviewer
IT Specialist at a comms service provider with 11-50 employees
Jul 11, 2022
The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon.