No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust DevOps Secrets Safe vs BeyondTrust Privileged Remote Access comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Privileged Access Management (PAM)
39th
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
Enterprise Password Managers (24th), Secrets Management Tools (7th)
BeyondTrust Privileged Remo...
Ranking in Privileged Access Management (PAM)
12th
Average Rating
8.6
Reviews Sentiment
6.4
Number of Reviews
24
Ranking in other categories
Remote Access (16th)
 

Mindshare comparison

As of March 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust DevOps Secrets Safe is 1.1%, up from 0.2% compared to the previous year. The mindshare of BeyondTrust Privileged Remote Access is 3.0%, down from 5.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Mindshare Distribution
ProductMindshare (%)
BeyondTrust Privileged Remote Access3.0%
BeyondTrust DevOps Secrets Safe1.1%
Other95.9%
Privileged Access Management (PAM)
 

Featured Reviews

YB
Contractor at a financial services firm with 5,001-10,000 employees
Integrates well between AD and Unix, scalable, and easy to use
BeyondTrust DevOps Secrets Safe stability in the AD Bridge has been not good, we have had many issues. I recently received a new version a few weeks ago and it looks like they solved most of the problems. Some of the issues we had, lasted a very long time until they found a solution.
AK
Lead Engg. Information Assurance at ACPL Systems Pvt Ltd
Strong security with room for enhancements in AI analytics
We integrate with our Active Directory regarding the role-based access controls in BeyondTrust Privileged Remote Access.I have not yet utilized the endpoint least privilege management feature in BeyondTrust Privileged Remote Access. There is a ready integration guide available for BeyondTrust Privileged Remote Access, so there are no major issues. All API integration is available to integrate with. More organizations are moving towards cloud infrastructure with BeyondTrust Privileged Remote Access. They are choosing this because they do not want to manage their on-premises and other hardware infrastructure. As we are not working with other vendors, I would rate BeyondTrust Privileged Remote Access a 10 out of 10.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"BeyondTrust DevOps Secrets Safe has made companies a lot safer."
"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"Secrets Safe is highly scalable without interruptions to the current infrastructure."
"A sophisticated and mature solution."
"The local administrator can manage all the user's logins in one, simple, straight-away account access, and the solution is user-friendly."
"They've done a great job implementing all possible features; it's the best tool there is and no competitors come close to the level of sophistication and maturity of the product."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"DevOps Secrets Safe allows you to customize a lot of rules."
"It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength."
"The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs."
"It is a great tool, and everything has improved over here."
"When it comes to the Privileged Remote Access (PRA) solution, instead of depending on a VPN client, from Cisco or any other vendor, we can directly use this product from the internet. It is very easy to do the implementation, and it is easy for every user to access the server from outside of their organization. They can open the URL and put their name and password, and it'll do the multi-factor authentication. They can easily access the server. Prior to this solution, the users had to log into the VPN, which is not required with BeyondTrust. Now, they can use their computer over the internet."
"It has put us at the forefront when it comes to security, auditing, and meeting SOX requirements."
"PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do."
"PRA stands on its own as a full solution, reducing the need to maintain a lot of different services and giving us enough time to work on our other issues because the system just runs and does what it is supposed to do."
"I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers."
 

Cons

"The support for the solution is not very good, they could improve by being quicker."
"BeyondTrust DevOps Secrets Safe stability in the AD Bridge has been not good, we have had many issues."
"The product contains some bugs."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The support for the solution is not very good, they could improve by being quicker."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"The solution is relatively stable, but not all bugs have been fixed."
"Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things."
"We have not seen ROI when it comes to PRA."
"In terms of the ability to automate the creation of new accounts within it, it's still a bit laborious."
"In terms of the ability to automate the creation of new accounts within it, it's still a bit laborious."
"With the current scenario of BeyondTrust Privileged Remote Access, some analytics should come with an AI/ML base and highlight if someone is doing something risky during access."
"It would be very nice if it has an enterprise vault."
"The price is pretty expensive."
"Its management is through two different portals, and you can't get from one portal to the other. I have to literally open up another website and go into it a different way. There are no inner links between the two. They should interlink the actual virtual server and the appliance. In general, there should be one interface for management for admins."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
"Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
"The price is pretty expensive, but you get what you pay for and this is a great product."
"PRA's pricing is competitive."
"I rate the product's pricing a four on a scale of one to ten, where one is high, and ten is low. It is an expensive product."
"PRA was one of the cheapest solutions that we evaluated."
"I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
"My client found the solution a bit expensive but considering their use case and requirements, they didn't have any other choice. As far as I know, implementation and licensing are the only costs."
"Its price is pretty good for the features and services that it provides. It is not outrageous. I'm not aware of any additional charges or anything like that."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
36%
Comms Service Provider
11%
Government
8%
Computer Software Company
6%
Manufacturing Company
16%
Financial Services Firm
8%
Government
8%
Computer Software Company
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise4
Large Enterprise7
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with BeyondTrust Privileged Remote Access?
Improving technical support for BeyondTrust Privileged Remote Access is essential. When I communicate with technical support for BeyondTrust Privileged Remote Access, the response time is very slow.
What is your primary use case for BeyondTrust Privileged Remote Access?
When we are using BeyondTrust Privileged Remote Access with FortiGate or some Cisco third-party products, we collaborate with both vendors, take the requirement, and follow up with the technical te...
What advice do you have for others considering BeyondTrust Privileged Remote Access?
I have not utilized the endpoint least privilege management feature in BeyondTrust Privileged Remote Access as I have only been using it for eight or nine months. I am not working with other produc...
 

Also Known As

No data available
Bomgar Privileged Access
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
Horizon Beverage, Air Liquide, Gateway Bank of Florida
Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. BeyondTrust Privileged Remote Access and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.