Try our new research platform with insights from 80,000+ expert users

BeyondTrust DevOps Secrets Safe vs Teleport comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust DevOps Secrets ...
Ranking in Privileged Access Management (PAM)
41st
Average Rating
7.6
Reviews Sentiment
6.6
Number of Reviews
4
Ranking in other categories
Enterprise Password Managers (26th), Secrets Management Tools (7th)
Teleport
Ranking in Privileged Access Management (PAM)
13th
Average Rating
8.6
Reviews Sentiment
5.0
Number of Reviews
3
Ranking in other categories
Identity and Access Management as a Service (IDaaS) (IAMaaS) (19th)
 

Mindshare comparison

As of January 2026, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust DevOps Secrets Safe is 1.1%, up from 0.2% compared to the previous year. The mindshare of Teleport is 3.3%, up from 2.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM) Market Share Distribution
ProductMarket Share (%)
Teleport3.3%
BeyondTrust DevOps Secrets Safe1.1%
Other95.6%
Privileged Access Management (PAM)
 

Featured Reviews

YB
Contractor at a financial services firm with 5,001-10,000 employees
Integrates well between AD and Unix, scalable, and easy to use
BeyondTrust DevOps Secrets Safe stability in the AD Bridge has been not good, we have had many issues. I recently received a new version a few weeks ago and it looks like they solved most of the problems. Some of the issues we had, lasted a very long time until they found a solution.
PradeepKumar15 - PeerSpot reviewer
Test lead at a outsourcing company with 5,001-10,000 employees
Automation has improved uptime and manages hundreds of uplinked TV channels reliably
With the help of Teleport, we are managing many channels. I find it easy to manage how to uplink the channels, and we are automating many things in our setups. We have an MCR, an automatic NMS, and a data center. We have managed it well to make life easier for my employees and colleagues. Teleport has helped us minimize incidents and maintain our uplinking time and uptime. Our organization's uptime is 99.90%, which is almost 100%. With Teleport, we can achieve this uptime by using the best equipment and best automation systems, such as alarms. We have applied DataMiner, Barco systems for alarming, and DataMiner for managing the RF things. We have applied many systems in Teleport.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"DevOps Secrets Safe allows you to customize a lot of rules."
"The local administrator can manage all the user's logins in one, simple, straight-away account access. Additionally, the solution is user-friendly."
"A sophisticated and mature solution."
"The most valuable features of BeyondTrust DevOps Secrets Safe are the ease of use and the API is very nice. Additionally, the interface is very good between AD and Unix."
"Teleport has helped us minimize incidents and maintain our uplinking time and uptime, and our organization's uptime is 99.90%, which is almost 100%."
"Teleport has replaced earlier methods like a bastion server or a jump server, which required connecting to physical servers."
"I would definitely advise others looking into using Teleport to try it out if they are seeking a tunneling or proxying solution to streamline obtaining access without dealing with DNS or SSH, as it is straightforward to install, can be tested in various environments, and is a truly exceptional product that is easy to use."
"I recommend it for its straightforward setup and strong security features."
 

Cons

"We had some issues with the solution and once we contacted support they eventually solved the problem. They could improve their response time."
"The support for the solution is not very good, they could improve by being quicker."
"The product contains some bugs."
"You need to improvise many of the customized rules, which can lead to some errors. BeyondTrust should reduce the error rate."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"I cannot download or share session recordings directly with others, which would be useful for documentation or reviews."
"Teleport is simple to use, but sometimes it requires extra research for more unique tasks, which slightly detracts from its overall quality."
"Managing 700 to 800 services is not easy."
 

Pricing and Cost Advice

"There is an annual license required to use BeyondTrust DevOps Secrets Safe."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
14%
Comms Service Provider
14%
Financial Services Firm
12%
University
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

Ask a question
Earn 20 points
What needs improvement with Teleport?
I cannot download or share session recordings directly with others, which would be useful for documentation or reviews. Additionally, while the backend worker can be upgraded, there is a limitation...
What is your primary use case for Teleport?
I use Teleport to replace the normal authentication mechanism as part of a zero-trust architecture. It is particularly useful because, in a remote environment, I cannot trust any devices. I can sha...
What advice do you have for others considering Teleport?
I rate Teleport nine out of ten. Security-wise, it is very secure and easy to use for remote access. I recommend it for its straightforward setup and strong security features.
 

Overview

 

Sample Customers

Starbucks, Ebay, CSC, RBC, Williams-Sonoma, Carbonite
Information Not Available
Find out what your peers are saying about CyberArk, One Identity, Delinea and others in Privileged Access Management (PAM). Updated: January 2026.
881,082 professionals have used our research since 2012.