BeyondTrust Endpoint Privilege Management vs BeyondTrust Remote Support comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust Endpoint Privilege Management and BeyondTrust Remote Support based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust Endpoint Privilege Management vs. BeyondTrust Remote Support Report (Updated: March 2024).
771,157 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager.""I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products.""It is straightforward. It is a good technology, and it is made to do one single thing.""The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management.""The most valuable feature is the asset discovery, which makes it very easy to locate and identify assets and pull them into the manager.""The solution's technical support is good.""I find the solution’s features like section management, password management, and analytics valuable.""I would say session management on the go is the most valuable feature. When the session is going on, you can stop the session without terminating it for justification. You can cancel it. The recording takes very little space. Those are some things which the customers are worried about when they talk about session recording."

More BeyondTrust Endpoint Privilege Management Pros →

"We like that it records the remote sessions. If a technician is logged into a user remotely to fix any problem, it records the decision.""The jump to feature function is the most valuable to us as it allows us to directly remote control customers.""This is a very secure product.""We rarely need support for anything, but when we do, they are on it and always helpful.""The seamless integration of chat, our ITSM management software, and remote viewing/control software makes for a valuable tool.""We are able to be more effectively connected to computers and servers all over the world.""This product "just works" (without fail) and is dead-easy for clients to connect with.""You can't compete with TeamViewer or any other similar products. It's completely in a class of its own."

More BeyondTrust Remote Support Pros →

Cons
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult.""They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment.""It only has limited support for Mac.""The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months.""Reports to the end user.""The program updates are very rare and the frequency is too far apart to take care of bug fixes and adding the latest features.""Its feature for establishing workflows needs improvement.""Their technical support could be more responsive and helpful."

More BeyondTrust Endpoint Privilege Management Cons →

"It lacks voice integration like the other products because they need the compression to support that large amount of concurrent sessions. We've had to sacrifice voice.""I would also like to see better support of Apple devices while using a Windows remote support console.""They need to ensure that the remote support is compatible with the other cloud solution providers, like Huawei. Currently it is only compatible with Azure, AWS and KVM.""The ability to connect mobile devices could be improved. Smartphones and tablets are becoming more prevalent throughout corporate environments. From time to time, we have problems connecting to those devices. You can't stage the application to connect without a user's input. You had to guide them through enabling permissions for the app. Then they need to enter the URL and session key. It would be great if they could streamline that process.""The screen annotation tools could be expanded. I would like to see a text/typing annotation tool.""Technical support for this region can be improved.""It is expensive. Its initial setup was also a little bit involved, but it was nothing that we couldn't eventually handle. Currently, it has the ability to share screens. Somebody having an issue with their phone can share their screen with a technician sitting at a computer. It would be nice to also be able to control phones remotely, but this could be a limitation of a phone's operating system.""It is pricey. It would be nice if it weren't so expensive because then you could afford more licenses and have more people involved, but I get it. They do have something that's unique compared to some of their competitors out on the market. It is a very robust and safe tool. If the price could come down, that'd be great."

More BeyondTrust Remote Support Cons →

Pricing and Cost Advice
  • "I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
  • "PowerBroker for a Mac client is three times the price of the Windows version."
  • "What BeyondTrust was providing was user-based licensing which was a great benefit from the client point of view. Recently, I don't know why, the licensing model has been changed, and that is the reason that they have lost a bit of their edge when it comes to the PAM, against our competition. The asset-based licensing, from the user's point of view, is not beneficial. The licensing should be based on the users. The greater the number of users, the greater will be the load and the greater the scalability problems. I presume that is why the licensing model has changed."
  • "This solution is expensive compared to its competitors."
  • "Price-wise, it is very competitive. In our area, government entities and banks don't go for the monthly payment. It is a headache even for us in terms of finance and procurement to go for monthly payments. Quarterly might be more logical and reasonable, but the minimum that we go for is one year, and sometimes, we even try to compile and give one offering for three years."
  • "Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
  • "The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
  • "It was very expensive."
  • More BeyondTrust Endpoint Privilege Management Pricing and Cost Advice →

  • "This product provides value for money."
  • "​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
  • "Pricing is reasonable for what the service is offering. If it is looked at from a purely remote control perspective then it might appear expensive, but it is the wider functionality that should be considered too."
  • "Bomgar has a very fair pricing structure."
  • "Although the upfront cost is a bit overwhelming, the appliance will pay for itself in less than two years."
  • "The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
  • "I would like to order more licenses. This would allow us to support more end users concurrently."
  • "I highly recommend using the tech team properly trained by Bomgar. This will help the tool be more useful."
  • More BeyondTrust Remote Support Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    771,157 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpoint… more »
    Top Answer:The solution's least privilege enforcement has helped us ensure access is given to only the required people.
    Top Answer:On a scale from one to ten, where one is cheap and ten is expensive, I rate the solution's pricing a seven out of ten.
    Top Answer:The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients.
    Top Answer:The local partners for BeyondTrust Remote Support are not enough in numbers. There are not enough product partners in Turkey, making it difficult for me to get assistance. The aforementioned area can… more »
    Top Answer:I can recommend the product, but it is important to note that it is expensive. Though I am not a very good expert with BeyondTrust Remote Support, I think one can get and use another product very… more »
    Ranking
    Views
    4,141
    Comparisons
    1,784
    Reviews
    10
    Average Words per Review
    643
    Rating
    7.9
    Views
    740
    Comparisons
    424
    Reviews
    6
    Average Words per Review
    554
    Rating
    8.5
    Comparisons
    Also Known As
    BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
    Bomgar Remote Support
    Learn More
    Overview

    BeyondTrust Endpoint Privilege Management enables organizations to mitigate attacks by removing excess privileges on Windows, Mac, Unix/Linux and networked devices. Remove excessive end user privileges and control applications on Windows, Mac, Unix, Linux, and networked devices without hindering end-user productivity.

    Key Solutions Include:

    -ENTERPRISE PASSWORD SECURITY

    Discover, manage and monitor all privileged accounts and SSH keys, secure privileged assets, and report on all privileged account activity in a single solution.

    -ENDPOINT LEAST PRIVILEGE

    Enforce least privilege across all Windows and Mac endpoints, gain visibility into target system vulnerabilities, and control access to privileged applications without disrupting user productivity or compromising security.

    -SERVER PRIVILEGE MANAGEMENT

    Gain control and visibility over Unix, Linux and Windows server user activity without sharing the root or administrator account.

    -A SINGLE PLATFORM FOR MANAGEMENT, POLICY, REPORTING AND THREAT ANALYTICS

    Utilize a single solution to manage PAM policies and deployment, understand vulnerability and threat analytics, and provide reporting to multiple stakeholders and complementary security systems.

    Learn more at https://www.beyondtrust.com/privilege-management

    BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.

    BeyondTrust Remote Support Features

    BeyondTrust Remote Support has many valuable key features. Some of the most useful ones include:

    • Remote access and control: IT administrators have the ability to resolve issues at light speed, improving productivity and also end-user satisfaction.
    • Efficiency and scale: With BeyondTrust Remote Support, you can manage unattended access to any system and you can also create mass installer packages.
    • Compliance: BeyondTrust Remote Support allows you to automatically monitor activity in real time, record all session activity, and produce a detailed audit log without interfering with service desk processes.
    • Team and permissions administration: By using BeyondTrust Remote Support, you can Implement security across your service desk with granular role and permissions settings.
    • Native 2FA: BeyondTrust Verify is a TOTP native 2FA capability. It can be enabled for any user and verifies the identity of users before a BeyondTrust Remote Support session is actually launched.
    • Credential injection: If users integrate with the BeyondTrust Vault or BeyondTrust Password Safe, they can directly inject credentials into systems and end servers with just one click.

    BeyondTrust Remote Support Benefits

    Some of the benefits of using BeyondTrust Remote Support include:

    • Security and privacy: BeyondTrust Remote Support gives support teams quick access to desktops and IT systems without revealing their credentials and passwords. In addition, integrating BeyondTrust Privileged Access complements and controls access to privileged user accounts to protect mission-critical IT systems.
    • Mobile support: BeyondTrust Remote Support allows IT teams to provide instant remote support to mobile device users. The solution also supports Android smartphones and tablets as well as iOS devices (iPhone, iPad, iPod Touch).
    • ServiceNow integration: BeyondTrust Remote Support offers integrated remote support and secure chat.
    • Support across multiple systems and devices: The BeyondTrust Remote Support solution can help your organization achieve reliable remote support for end users and customers using Windows, Mac, Android, iOS, or any other operating system.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BeyondTrust Remote Support users.

    A Cybersecurity Architect at a tech vendor says, “The most valuable features are the ease of deployment, performance, pre and post-sales support, the vast majority of the localization they have done and the solution provider that they support. You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.”

    An Enterprise Service Desk Systems Manager at a manufacturing company comments, "Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."

    PeerSpot user Mark B., Sr VP of Business Operations at Networking Technologies and Support, Inc., explains that he thinks the solution is “Great for delivering end-user support, good at recording sessions, and very stable.


    Sample Customers
    Aera Energy LLC, Care New England, James Madison University
    InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
    Top Industries
    REVIEWERS
    Construction Company13%
    Comms Service Provider13%
    Manufacturing Company13%
    Security Firm13%
    VISITORS READING REVIEWS
    Financial Services Firm14%
    Computer Software Company12%
    Manufacturing Company10%
    Government8%
    REVIEWERS
    Manufacturing Company16%
    Financial Services Firm12%
    Consumer Goods Company12%
    University12%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government11%
    Financial Services Firm10%
    Manufacturing Company6%
    Company Size
    REVIEWERS
    Small Business41%
    Midsize Enterprise7%
    Large Enterprise52%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise13%
    Large Enterprise67%
    REVIEWERS
    Small Business37%
    Midsize Enterprise22%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise13%
    Large Enterprise68%
    Buyer's Guide
    BeyondTrust Endpoint Privilege Management vs. BeyondTrust Remote Support
    March 2024
    Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. BeyondTrust Remote Support and other solutions. Updated: March 2024.
    771,157 professionals have used our research since 2012.

    BeyondTrust Endpoint Privilege Management is ranked 5th in Privileged Access Management (PAM) with 27 reviews while BeyondTrust Remote Support is ranked 11th in Privileged Access Management (PAM) with 32 reviews. BeyondTrust Endpoint Privilege Management is rated 8.0, while BeyondTrust Remote Support is rated 9.0. The top reviewer of BeyondTrust Endpoint Privilege Management writes "Admin rights can be granted and revoked within minutes and that is what everything comes down to, for us". On the other hand, the top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". BeyondTrust Endpoint Privilege Management is most compared with CyberArk Endpoint Privilege Manager, Cisco ISE (Identity Services Engine), CyberArk Privileged Access Manager, Delinea Secret Server and ARCON Privileged Access Management, whereas BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, F5 BIG-IP Access Policy Manager (APM) and LogMeIn Pro. See our BeyondTrust Endpoint Privilege Management vs. BeyondTrust Remote Support report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.