Try our new research platform with insights from 80,000+ expert users

BeyondTrust Privileged Remote Access vs One Identity Privileged Access Suite for Unix comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Privileged Remo...
Ranking in Privileged Access Management (PAM)
13th
Average Rating
8.6
Reviews Sentiment
6.4
Number of Reviews
24
Ranking in other categories
Remote Access (15th)
One Identity Privileged Acc...
Ranking in Privileged Access Management (PAM)
33rd
Average Rating
7.6
Number of Reviews
3
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of August 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Privileged Remote Access is 4.3%, down from 4.5% compared to the previous year. The mindshare of One Identity Privileged Access Suite for Unix is 0.5%, up from 0.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Hahn Rolf - PeerSpot reviewer
Securely manage high-privilege remote access with granular configurations
I recommend that we improve integration with other products like PasswordSafe, aiming for smoother integration. Better alignment between products would enhance manageability from a single point. Additionally, BeyondTrust should focus on automating the update process to reduce unnecessary ticket creation. Improved quality control for non-English language versions is needed to avoid translation and layout errors.
Hicham Barnoussi - PeerSpot reviewer
A reliable solution with great password and session management
The setup process depends on the environment of the customer. It's not dependent on the solution. For customers with normal use cases and scenarios, it's a straightforward implementation, but for a customer with more than one environment, they may have BeyondTrust in one environment and Safeguard in another one. When they want to consolidate later, there may be complications. It depends on the devices and assets they would like to have under their PAM solution. The standard time for implementation is four weeks. I rate the setup an eight out of ten. There needs to be a dedicated resource for maintenance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature."
"We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network."
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good."
"I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers."
"More organizations are moving towards cloud infrastructure with BeyondTrust Privileged Remote Access."
"The scalability is excellent."
"The privileged remote access platform is able to track and record everything that happens within a session."
"The most valuable features are session and password management."
"Privileged Access Suite's best feature is it's straightforward to use."
"The most valuable feature of this solution is that it is easy to use."
 

Cons

"The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon."
"They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"The price is pretty expensive."
"Multiple areas can be improved. We've seen lots of updates in the past year. They have a portal where we can submit our ideas. BeyondTrust is immediately implementing user suggestions. The UI could be more informative. Initially, there were two or three connectors, and now we have five or six. It would be nice if they added a few more connectors for third-party integration. There are multiple tools, but the clients may require more for their convenience."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required."
"With the current scenario of BeyondTrust Privileged Remote Access, some analytics should come with an AI/ML base and highlight if someone is doing something risky during access."
"Product management should be improved."
"Privileged Access Suite's interface could be better."
"There is a new trend of not having any privileged users or accounts."
 

Pricing and Cost Advice

"PRA was one of the cheapest solutions that we evaluated."
"The price is pretty expensive, but you get what you pay for and this is a great product."
"Though the solution was a bit expensive, the overall pricing was average."
"PRA's pricing is competitive."
"I rate the product's pricing a four on a scale of one to ten, where one is high, and ten is low. It is an expensive product."
"Its price is pretty good for the features and services that it provides. It is not outrageous. I'm not aware of any additional charges or anything like that."
"Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
"I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
Information not available
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
865,384 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
17%
Manufacturing Company
11%
Financial Services Firm
9%
Government
8%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
 

Questions from the Community

What do you like most about BeyondTrust Privileged Remote Access?
The product has improved remote support capabilities since it works fine.
What needs improvement with BeyondTrust Privileged Remote Access?
Improving technical support for BeyondTrust Privileged Remote Access is essential. When I communicate with technical support for BeyondTrust Privileged Remote Access, the response time is very slow.
What is your primary use case for BeyondTrust Privileged Remote Access?
When we are using BeyondTrust Privileged Remote Access with FortiGate or some Cisco third-party products, we collaborate with both vendors, take the requirement, and follow up with the technical te...
Ask a question
Earn 20 points
 

Also Known As

Bomgar Privileged Access
No data available
 

Overview

 

Sample Customers

Horizon Beverage, Air Liquide, Gateway Bank of Florida
University of East Anglia, nForce Secure, dunnhumby
Find out what your peers are saying about BeyondTrust Privileged Remote Access vs. One Identity Privileged Access Suite for Unix and other solutions. Updated: July 2025.
865,384 professionals have used our research since 2012.