BeyondTrust DevOps Secrets Safe vs BeyondTrust Privileged Remote Access comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust DevOps Secrets Safe and BeyondTrust Privileged Remote Access based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust DevOps Secrets Safe vs. BeyondTrust Privileged Remote Access Report (Updated: March 2024).
771,170 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"A sophisticated and mature solution.""DevOps Secrets Safe allows you to customize a lot of rules.""The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix.""The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."

More BeyondTrust DevOps Secrets Safe Pros →

"This product is very stable and scalable. This is an excellent platform.""It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength.""The product has improved remote support capabilities since it works fine.""Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good.""I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers.""I like all of it. You can access computers that are on a DMZ. You can access computers that are off the network and on the network. You pretty much have access to computers wherever they are. As long as they have the client on them, you can get to them. So, it is convenient, but its main feature is that you can use your smart card to elevate your privileges remotely. That's a great feature.""The scalability is excellent.""We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access."

More BeyondTrust Privileged Remote Access Pros →

Cons
"The product contains some bugs.""You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate.""The support for the solution is not very good, they could improve by being quicker.""We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."

More BeyondTrust DevOps Secrets Safe Cons →

"The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon.""The solution's Vault is a nice feature. It helps to securely share a security password in teams, but it is not at the level of a password management solution. So, it is just really a vault. We were expecting to have more features to better manage passwords, but that is something that you can work around if you also have a password safe solution. I would like them to have features like password rotation or password auditing, e.g., old passwords.""Its management is through two different portals, and you can't get from one portal to the other. I have to literally open up another website and go into it a different way. There are no inner links between the two. They should interlink the actual virtual server and the appliance. In general, there should be one interface for management for admins.""Changing your password should be simplified, and there should not be a charge for it.""Multiple areas can be improved. We've seen lots of updates in the past year. They have a portal where we can submit our ideas. BeyondTrust is immediately implementing user suggestions. The UI could be more informative. Initially, there were two or three connectors, and now we have five or six. It would be nice if they added a few more connectors for third-party integration. There are multiple tools, but the clients may require more for their convenience.""Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things.""The integration of the solution with many platforms is a difficult area to manage and needs to be made easy.""The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."

More BeyondTrust Privileged Remote Access Cons →

Pricing and Cost Advice
  • "There is an annual license required to use BeyondTrust DevOps Secrets Safe."
  • More BeyondTrust DevOps Secrets Safe Pricing and Cost Advice →

  • "The price is pretty expensive, but you get what you pay for and this is a great product."
  • "I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
  • "Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
  • "My client found the solution a bit expensive but considering their use case and requirements, they didn't have any other choice. As far as I know, implementation and licensing are the only costs."
  • "I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
  • "Its price is pretty good for the features and services that it provides. It is not outrageous. I'm not aware of any additional charges or anything like that."
  • "PRA was one of the cheapest solutions that we evaluated."
  • "Though the solution was a bit expensive, the overall pricing was average."
  • More BeyondTrust Privileged Remote Access Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    771,170 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix.
    Top Answer:There are still some bugs in the solution but a lot less than there used to be. Unfortunately, CyberArk and BeyondTrust are in fierce competition. Many customers have already adopted CyberArk, but… more »
    Top Answer:My advice to those wanting to implement BeyondTrust DevOps Secrets Safe is for them to plan it very well before making a decision. If they are changing from another solution to BeyondTrust DevOps… more »
    Top Answer:The product has improved remote support capabilities since it works fine.
    Top Answer:The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required. The product should be able to… more »
    Top Answer:I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the solution.
    Ranking
    Views
    97
    Comparisons
    68
    Reviews
    1
    Average Words per Review
    524
    Rating
    8.0
    Views
    2,430
    Comparisons
    1,573
    Reviews
    16
    Average Words per Review
    1,299
    Rating
    8.4
    Comparisons
    Also Known As
    Bomgar Privileged Access
    Learn More
    Overview

    DevOps Secrets Safe is a highly scalable solution that adapts to the speed and agility required in dynamic DevOps workflows. It will help organizations limit the risk associated with substantial unmanaged privileged credentials and secrets without causing friction in highly dynamic environments such as DevOps.

    BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.

    Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.

    Features include:

    - Privileged Access Control: Enforce least privilege by giving users the right level of access.

    - Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.

    - Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.

    - Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.

    - Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.

    - Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.

    Sample Customers
    Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
    Horizon Beverage, Air Liquide, Gateway Bank of Florida
    Top Industries
    VISITORS READING REVIEWS
    Financial Services Firm45%
    Computer Software Company10%
    Healthcare Company7%
    Engineering Company6%
    REVIEWERS
    Comms Service Provider21%
    Security Firm14%
    Government14%
    Wholesaler/Distributor14%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm10%
    Government9%
    Manufacturing Company7%
    Company Size
    VISITORS READING REVIEWS
    Small Business12%
    Midsize Enterprise15%
    Large Enterprise73%
    REVIEWERS
    Small Business50%
    Midsize Enterprise15%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business21%
    Midsize Enterprise13%
    Large Enterprise66%
    Buyer's Guide
    BeyondTrust DevOps Secrets Safe vs. BeyondTrust Privileged Remote Access
    March 2024
    Find out what your peers are saying about BeyondTrust DevOps Secrets Safe vs. BeyondTrust Privileged Remote Access and other solutions. Updated: March 2024.
    771,170 professionals have used our research since 2012.

    BeyondTrust DevOps Secrets Safe is ranked 19th in Privileged Access Management (PAM) with 4 reviews while BeyondTrust Privileged Remote Access is ranked 3rd in Privileged Access Management (PAM) with 21 reviews. BeyondTrust DevOps Secrets Safe is rated 7.6, while BeyondTrust Privileged Remote Access is rated 8.6. The top reviewer of BeyondTrust DevOps Secrets Safe writes "Integrates well between AD and Unix, scalable, and easy to use". On the other hand, the top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". BeyondTrust DevOps Secrets Safe is most compared with HashiCorp Vault, BeyondTrust Password Safe, Delinea Secret Server and Azure Key Vault, whereas BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), BeyondTrust Remote Support and BeyondTrust Password Safe. See our BeyondTrust DevOps Secrets Safe vs. BeyondTrust Privileged Remote Access report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.