We performed a comparison between BeyondTrust Privileged Remote Access and Delinea Secret Server based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features."
"We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access."
"We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network."
"Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good."
"This product is very stable and scalable. This is an excellent platform."
"One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."
"I like all of it. You can access computers that are on a DMZ. You can access computers that are off the network and on the network. You pretty much have access to computers wherever they are. As long as they have the client on them, you can get to them. So, it is convenient, but its main feature is that you can use your smart card to elevate your privileges remotely. That's a great feature."
"The privileged remote access platform is able to track and record everything that happens within a session."
"The most valuable feature is session monitoring."
"The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications."
"The discovery engine is really robust and flexible. It had some session management features that are better compared to some other vendors. Overall the GUI is very good and straightforward to operate compared to other solutions. For example, CyberArk and Hitachi tend to be hard to navigate."
"I like that it is Windows-based. It is good that primarily, it is not an appliance. Some of the other applications in the space, such as a Quest Software CPAM or a Safeguard, are appliances, so you can't deploy the ends of them. With Thycotic, you can either install your Temporal Protection module physically in the VM host, or you can use BouncyCastle for high-security module capabilities."
"Its technical support is good."
"The privileged access management, which is the Safe Access Model is the most valuable feature."
"One valuable feature is that it will support a dedicated database. Delinea provides multiple features, like reporting and remote password changes."
"The solution is good."
"Its management is through two different portals, and you can't get from one portal to the other. I have to literally open up another website and go into it a different way. There are no inner links between the two. They should interlink the actual virtual server and the appliance. In general, there should be one interface for management for admins."
"There is no connectivity to the appliance side. There is no API, and it is just difficult for me to capture what version the device is on without going in and doing screenshots. It is a little too secure in that regard, where they don't even trust their product owner. Since a lot of hacks come from the inside, they are probably doing what they need to do out of necessity. It is just that I have to work pretty hard to produce compliance data on the box."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"Multiple areas can be improved. We've seen lots of updates in the past year. They have a portal where we can submit our ideas. BeyondTrust is immediately implementing user suggestions. The UI could be more informative. Initially, there were two or three connectors, and now we have five or six. It would be nice if they added a few more connectors for third-party integration. There are multiple tools, but the clients may require more for their convenience."
"Changing your password should be simplified, and there should not be a charge for it."
"The integration client, backup solution, and SSO setup and provisioning could be improved. There isn't any documented or supported user provisioning currently, which slows down the processes of onboarding and assigning permissions. I would like to see this improved soon."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"The price is pretty expensive."
"In terms of what could be improved, the whole thing with distributed engines, et cetera, is a little bit tricky."
"We faced some upgrade issues, especially during the management and administration parts. I found it less straightforward than on many other platforms, even outside password managers."
"The tool should integrate additional features like OCR."
"They could improve the container platform and SPO."
"This product is excellent in every way except minor details in handling extremely large environments."
"One of the things that we want is to be able to do some of the management of it using APIs."
"In many PAM tools, when users request a password checkout, they need to provide justification. However, in my experience across four organizations, nobody actually reads the justifications. Users can simply type anything and get the password. This becomes a risk and compliance issue. There needs to be continuous improvement in this area, focusing on problem identification and mitigation strategies."
"I formerly used only one service: the remote server. For example, I connected to the Active Directory user and the computer's console. But now, I need to do a remote connection to the domain controller. Maybe it only connects to that tool, the Active Directory users, and the computer management console, but not to the domain controller. Another thing Delinea could add is multi-factor authentication."
More BeyondTrust Privileged Remote Access Pricing and Cost Advice →
BeyondTrust Privileged Remote Access is ranked 3rd in Privileged Access Management (PAM) with 21 reviews while Delinea Secret Server is ranked 2nd in Privileged Access Management (PAM) with 47 reviews. BeyondTrust Privileged Remote Access is rated 8.6, while Delinea Secret Server is rated 8.2. The top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". On the other hand, the top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, BeyondTrust Remote Support, BeyondTrust Password Safe, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service) and Microsoft Remote Desktop Services, whereas Delinea Secret Server is most compared with CyberArk Privileged Access Manager, Azure Key Vault, HashiCorp Vault, IBM Security Secret Server and ManageEngine PAM360. See our BeyondTrust Privileged Remote Access vs. Delinea Secret Server report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years.