No more typing reviews! Try our Samantha, our new voice AI agent.

BeyondTrust Privileged Remote Access vs Transmit Security comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Microsoft Intune
Sponsored
Ranking in Remote Access
2nd
Average Rating
8.2
Reviews Sentiment
6.6
Number of Reviews
336
Ranking in other categories
Configuration Management (2nd), Enterprise Mobility Management (EMM) (1st), Unified Endpoint Management (UEM) (1st), Microsoft Security Suite (1st)
BeyondTrust Privileged Remo...
Ranking in Remote Access
16th
Average Rating
8.6
Reviews Sentiment
6.4
Number of Reviews
24
Ranking in other categories
Privileged Access Management (PAM) (12th)
Transmit Security
Ranking in Remote Access
26th
Average Rating
7.8
Reviews Sentiment
6.3
Number of Reviews
4
Ranking in other categories
Identity Management (IM) (24th), Access Management (20th), Passwordless Authentication (5th), Customer Identity and Access Management (CIAM) (11th)
 

Mindshare comparison

As of March 2026, in the Remote Access category, the mindshare of Microsoft Intune is 9.2%, down from 10.7% compared to the previous year. The mindshare of BeyondTrust Privileged Remote Access is 2.4%, down from 2.9% compared to the previous year. The mindshare of Transmit Security is 0.1%, up from 0.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Remote Access Mindshare Distribution
ProductMindshare (%)
Microsoft Intune9.2%
BeyondTrust Privileged Remote Access2.4%
Transmit Security0.1%
Other88.3%
Remote Access
 

Featured Reviews

AkashKamble - PeerSpot reviewer
Sr MacOS specialist engineer at Cyber24
Enables management of multiple operating systems with a single license
The best feature is that it's a Microsoft product, so if anything goes wrong, we get quick support for anything required. Remote system functionality allows us to sit anywhere and take control of any device via remote management. We can enhance security for clients' laptops with built-in Microsoft Defender, which is available with the Microsoft Intune license. We use it for reporting purposes through endpoint analytics. When pushing scripting, there are two types available: remediation script and reservation script. Through endpoint analytics, you can push defender policies to clients. It helps with reporting, inventory updates, and monitoring tenant status health.
AK
Lead Engg. Information Assurance at ACPL Systems Pvt Ltd
Strong security with room for enhancements in AI analytics
We integrate with our Active Directory regarding the role-based access controls in BeyondTrust Privileged Remote Access.I have not yet utilized the endpoint least privilege management feature in BeyondTrust Privileged Remote Access. There is a ready integration guide available for BeyondTrust Privileged Remote Access, so there are no major issues. All API integration is available to integrate with. More organizations are moving towards cloud infrastructure with BeyondTrust Privileged Remote Access. They are choosing this because they do not want to manage their on-premises and other hardware infrastructure. As we are not working with other vendors, I would rate BeyondTrust Privileged Remote Access a 10 out of 10.
reviewer2804310 - PeerSpot reviewer
Lead Software Engineer at a financial services firm with 10,001+ employees
Journey orchestration has improved fraud prevention but still needs shared rules and better usability
The main improvement needed is that with the tool, you have to build rules for each and every application. There is no common place where you can write the rules and use that rule for all your applications, which is missing. This is a big feature that is missing compared to the other products in the market. Additionally, the SDKs, Journey Player, and other components are not business-friendly, so you really have to be technical to get into it and do those things. A non-technical person would find it really hard to implement and learn things inside Transmit Security. Even though it requires less coding, you still have to have some technical people in your team to really write the rules and integrate those rules into your application.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"The most valuable feature is that we can manage workstations or Android devices remotely without needing the device to be connected to our local network."
"Mobile device management is most valuable."
"Most people prefer to use Intune if they want to implement conditional access policies to restrict customer Exchange Online or Exchange user formats emails until their devices comply."
"By using Microsoft Intune we can control which websites the users can go to and it provides a secure environment for our employees using their laptops that are having access from home. We have installed Intune to control the user's environment minimizing the chances of any hacking."
"The best thing about Intune for the customers is simply that it's included in the different plans of Microsoft 365."
"Intune provides full visibility into all active mobile device users. If their devices are noncompliant with our security policies, I have the flexibility to update them remotely."
"It is quite policy-enabled, so you can build pretty much any policy to manage remote endpoints."
"Microsoft Intune has never crashed for me; it always works without fail."
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful."
"The privileged remote access platform is able to track and record everything that happens within a session."
"It is expensive, however, in the grand scheme of things for us, since we are 24/7 and haven't had any downtime in the last three years, it is an easy check to write every year and it definitely pays for itself."
"The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features."
"We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network."
"Its security, simplicity, and ease of deployment and maintenance are the most valuable."
"The secure access must be audited live, ensuring patient data protection."
"Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authentication code to multiple exposure or two-factor authentication (MFA) is seamless."
"Transmit Security has positively impacted my organization by improving the development of workflows in order to help the user experience."
"Transmit Security has played a major role for our organization, especially in the authentication areas."
"Transmit Security has impacted my organization positively because it is reassuring to know that we are building on top of a trusted tool, and we do not rely on developers that could make mistakes, and because it is an authentication platform, that could be detrimental."
 

Cons

"The technical support from Microsoft is not good, they take a long time to respond to a case and they do not update you on what is happening on a case."
"Also, Microsoft Intune relies heavily on its fellow products in the suite."
"I have faced stability issues with Microsoft Intune plenty of times, but I think it's part of the process."
"Microsoft Intune has a latency response time issue. The latency has room for improvement."
"There is always a noise when you are going to manage any endpoint devices, and noise is definitely there with this solution."
"Intune should improve its software inventory to provide better metering of which software is used throughout the company. This is especially needed for reporting third-party software solutions."
"It needs incorporation of Knox, ZeroTouch, etc."
"I cannot think of any particular features which I consider to be most valuable."
"Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things."
"It would be very nice if it has an enterprise vault."
"Customer support used to be faster with chat options available. However, support now requires opening a ServiceNow ticket, which can be time-consuming."
"At the moment, I don't see any major problems with it. If anything, they can just change the look and feel of the login screen because it looks too simple to me."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"Its access process for third-party vendors needs to be simplified."
"The SaaS offering isn't particularly scalable; the more endpoints we added, the more sluggish the tool became."
"We have not seen ROI when it comes to PRA."
"The main improvement needed is that with the tool, you have to build rules for each and every application."
"Pricing is an area where Transmit Security could improve. The pricing needs to be more competitive."
"The customer support varies, but overall, we are satisfied."
"The scalability of Transmit Security is a little bit tricky. It is not easy to scale and depends on the complexity of my workflows and how many users I am going to support."
 

Pricing and Cost Advice

"For organizations that are a Microsoft shop, the pricing is compelling."
"I liked the tool's pricing until P2 came into effect. I am unsure about the current value versus the cost of the new licensing model."
"The pricing is good because customers are not complaining about it."
"The tool is cheaper than our company's other MDM tools."
"The product is relatively pricey, but considering its benefits, I'd say it's fair. The benefits outweigh the expensive licensing fees, especially for large organizations, but medium-sized and smaller businesses may be unable to afford it."
"Microsoft Intune is more expensive than other solutions, but it offers a wider range of features and control."
"Intune is moderately expensive. You can get the license bundled with Office 365 E3 or E5 licenses. The E5s are a bit expensive, but you get some cheaper solutions with Intune."
"It comes as a bundle, so you do not really know what the prices are. Microsoft does not break it down to the user cost for us. It is just bundled with our E5 license."
"I rate the product's pricing a four on a scale of one to ten, where one is high, and ten is low. It is an expensive product."
"The price is pretty expensive, but you get what you pay for and this is a great product."
"Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
"I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
"PRA's pricing is competitive."
"PRA was one of the cheapest solutions that we evaluated."
"Though the solution was a bit expensive, the overall pricing was average."
"I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
Information not available
report
Use our free recommendation engine to learn which Remote Access solutions are best for your needs.
885,311 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
10%
Computer Software Company
9%
Financial Services Firm
9%
Government
8%
Manufacturing Company
16%
Financial Services Firm
8%
Government
8%
Computer Software Company
7%
Financial Services Firm
30%
Manufacturing Company
8%
Construction Company
8%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business124
Midsize Enterprise54
Large Enterprise167
By reviewers
Company SizeCount
Small Business12
Midsize Enterprise4
Large Enterprise7
No data available
 

Questions from the Community

How does Microsoft Intune compare with VMware Workspace One?
Microsoft Intune is a great tool for managing a mobile device fleet while keeping access control. The solution makes ...
What are the pros and cons of Microsoft Intune?
Microsoft Intune is a great configuration management tool and has a lot of good things going for it. Here are some of...
How does Google Cloud Identity compare with Microsoft Intune?
Microsoft Intune offers not only an easy-to-deploy data protection and productivity management solution, but also ...
What needs improvement with BeyondTrust Privileged Remote Access?
Improving technical support for BeyondTrust Privileged Remote Access is essential. When I communicate with technical ...
What is your primary use case for BeyondTrust Privileged Remote Access?
When we are using BeyondTrust Privileged Remote Access with FortiGate or some Cisco third-party products, we collabor...
What advice do you have for others considering BeyondTrust Privileged Remote Access?
I have not utilized the endpoint least privilege management feature in BeyondTrust Privileged Remote Access as I have...
What do you like most about Transmit Security?
Transmit interface is flexible and user-friendly, which is important for our workload. Switching from one authenticat...
What is your experience regarding pricing and costs for Transmit Security?
I have heard that pricing, setup costs, and licensing for Transmit Security are a little bit expensive, but I am not ...
What needs improvement with Transmit Security?
I think Transmit Security can be improved by creating features that would allow the replacing of other companies such...
 

Also Known As

Intune, MS Intune, Microsoft Endpoint Manager
Bomgar Privileged Access
BindID, FlexID, WorkID
 

Overview

 

Sample Customers

Mitchells and Buzzers, Callaway
Horizon Beverage, Air Liquide, Gateway Bank of Florida
Mitgate, Telepass, Metro Bank, Santander
Find out what your peers are saying about BeyondTrust Privileged Remote Access vs. Transmit Security and other solutions. Updated: March 2026.
885,311 professionals have used our research since 2012.