We performed a comparison between BeyondTrust Remote Support and CyberArk Privileged Access Manager based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."We rarely need support for anything, but when we do, they are on it and always helpful."
"Remote Support 16.2 introduced Web Interface for Representative Console.with same functions as Desktop Console."
"The remote reboot feature is particularly valuable for rebooting terminal servers that have power controls disabled."
"The solution has been very stable. We haven't had issues at all. It doesn't crash or freeze. There aren't bugs or glitches either."
"The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients."
"We are able to be more effectively connected to computers and servers all over the world."
"This product has drastically improved the speed and ease at which we provide client support from our Solutions Centre (service desk)."
"Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."
"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach."
"There are no issues with scalability. Our clients are very happy to use the product."
"The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically."
"CyberArk Privileged Access Manager is stable."
"It is scalable."
"It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab."
"The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used)."
"It enables companies to automate password management on target systems gaining a more secure access management approach."
"It lacks voice integration like the other products because they need the compression to support that large amount of concurrent sessions. We've had to sacrifice voice."
"Lacks some kind of voice communication option."
"There were a few employee devices that failed during the initial deployment, which required a second deployment."
"The Remote support solution based on Bomgar has physical appliances deployed and leveraged to serve our multiple customers. Aging appliances are going RMA now and then."
"We sometimes have trouble accessing servers because of credentialing and multifactor authentication issues with PAM."
"The screen annotation tools could be expanded. I would like to see a text/typing annotation tool."
"The chat needs to improve. We need to enable set hours for chat support which are separate from the remote support assistance."
"There are not enough product partners in Turkey, making it difficult for me to get assistance."
"There is a bit of a learning curve, but it's a pretty complex solution."
"Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up."
"The tool’s pricing and scalability can be better."
"The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots."
"CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift."
"They need to provide better training for the System Integrator."
"The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow."
"The support services could act faster when people reach out to resolve issues."
More CyberArk Privileged Access Manager Pricing and Cost Advice →
BeyondTrust Remote Support is ranked 11th in Privileged Access Management (PAM) with 32 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. BeyondTrust Remote Support is rated 9.0, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, F5 BIG-IP Access Policy Manager (APM) and LogMeIn Pro, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard. See our BeyondTrust Remote Support vs. CyberArk Privileged Access Manager report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.