BeyondTrust Remote Support vs CyberArk Privileged Access Manager comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between BeyondTrust Remote Support and CyberArk Privileged Access Manager based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed BeyondTrust Remote Support vs. CyberArk Privileged Access Manager Report (Updated: March 2024).
769,789 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"We rarely need support for anything, but when we do, they are on it and always helpful.""Remote Support 16.2 introduced Web Interface for Representative Console.with same functions as Desktop Console.""The remote reboot feature is particularly valuable for rebooting terminal servers that have power controls disabled.""The solution has been very stable. We haven't had issues at all. It doesn't crash or freeze. There aren't bugs or glitches either.""The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients.""We are able to be more effectively connected to computers and servers all over the world.""This product has drastically improved the speed and ease at which we provide client support from our Solutions Centre (service desk).""Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."

More BeyondTrust Remote Support Pros →

"The automatic change of the password and Privileged Session Manager (PSM) are the most valuable features. With Privileged Session Manager, you can control the password management in a centralized way. You can activate these features in a session; the session isolation and recording. You apply the full intermediation principle. So, you must pass through CyberArk PAM to get access to the target system. You don't need to know the password, and everything that you do is registered and auditable. In this case, no one gets to touch the password directly. Also, you can implement detection and response behavior in case of a breach.""There are no issues with scalability. Our clients are very happy to use the product.""The users have the ability to rotate passwords on a daily basis with a Reconcile Account. Or, if they want to do one-time password checkouts, we can manage those, check in, check out. I like the flexibility of the changing of the password, specifically.""CyberArk Privileged Access Manager is stable.""It is scalable.""It is one of the best solutions in the market. Ever since I started using this solution, there has not been any compromise when it comes to our lab.""The key aspects of privileged access management are being able rotate passwords, make sure someone is accountable, and tie it back to a user (when the system is being used).""It enables companies to automate password management on target systems gaining a more secure access management approach."

More CyberArk Privileged Access Manager Pros →

Cons
"It lacks voice integration like the other products because they need the compression to support that large amount of concurrent sessions. We've had to sacrifice voice.""Lacks some kind of voice communication option.""There were a few employee devices that failed during the initial deployment, which required a second deployment.""The Remote support solution based on Bomgar has physical appliances deployed and leveraged to serve our multiple customers. Aging appliances are going RMA now and then.""We sometimes have trouble accessing servers because of credentialing and multifactor authentication issues with PAM.""The screen annotation tools could be expanded. I would like to see a text/typing annotation tool.""The chat needs to improve. We need to enable set hours for chat support which are separate from the remote support assistance.""There are not enough product partners in Turkey, making it difficult for me to get assistance."

More BeyondTrust Remote Support Cons →

"There is a bit of a learning curve, but it's a pretty complex solution.""Our DevOps team is looking in the direction of cloud, because we are not in it today. We are hoping to build it with Conjur from the ground up.""The tool’s pricing and scalability can be better.""The product documentation has to be more precise in certain aspects with explanations for functionality limitations along with reference material or screenshots.""CyberArk Privileged Access Manager could improve the integration docking, it should have more layers. For example, integration with OpenShift.""They need to provide better training for the System Integrator.""The admin interface of the Password Vault Web Access (PVWA) is moving from an old style (the classic interface) to a new style (the v10 interface) and unfortunately, this process is quite slow.""The support services could act faster when people reach out to resolve issues."

More CyberArk Privileged Access Manager Cons →

Pricing and Cost Advice
  • "This product provides value for money."
  • "​The product maintenance and licensing costs are on the higher end, so I would carefully review how many licenses you need. The concurrent license model is helpful in this manner.​"
  • "Pricing is reasonable for what the service is offering. If it is looked at from a purely remote control perspective then it might appear expensive, but it is the wider functionality that should be considered too."
  • "Bomgar has a very fair pricing structure."
  • "Although the upfront cost is a bit overwhelming, the appliance will pay for itself in less than two years."
  • "The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
  • "I would like to order more licenses. This would allow us to support more end users concurrently."
  • "I highly recommend using the tech team properly trained by Bomgar. This will help the tool be more useful."
  • More BeyondTrust Remote Support Pricing and Cost Advice →

  • "Pricing and licensing depend on the environment."
  • "It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain."
  • "It can be an expensive product."
  • "Cost efficiency is the number one thing that can be improved in my mind. This would change lots of companies minds on purchasing the product."
  • "The cost is high compared to other products."
  • "CyberArk provides all the features bundled. This is compared to other vendors who provide them as a different license for each functionality."
  • "Our risk is definitely significantly lower. Also, our resources are low."
  • "If you are looking at implementing this solution, buy the training and go to it."
  • More CyberArk Privileged Access Manager Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    769,789 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients.
    Top Answer:The local partners for BeyondTrust Remote Support are not enough in numbers. There are not enough product partners in Turkey, making it difficult for me to get assistance. The aforementioned area can… more »
    Top Answer:I can recommend the product, but it is important to note that it is expensive. Though I am not a very good expert with BeyondTrust Remote Support, I think one can get and use another product very… more »
    Top Answer:We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the… more »
    Top Answer:The product is expensive. I rate the product’s pricing a seven out of ten, where one is cheap and ten is expensive.
    Ranking
    Views
    740
    Comparisons
    424
    Reviews
    6
    Average Words per Review
    554
    Rating
    8.5
    Views
    10,944
    Comparisons
    6,238
    Reviews
    33
    Average Words per Review
    626
    Rating
    8.9
    Comparisons
    Also Known As
    Bomgar Remote Support
    CyberArk Privileged Access Security
    Learn More
    Overview

    BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.

    BeyondTrust Remote Support Features

    BeyondTrust Remote Support has many valuable key features. Some of the most useful ones include:

    • Remote access and control: IT administrators have the ability to resolve issues at light speed, improving productivity and also end-user satisfaction.
    • Efficiency and scale: With BeyondTrust Remote Support, you can manage unattended access to any system and you can also create mass installer packages.
    • Compliance: BeyondTrust Remote Support allows you to automatically monitor activity in real time, record all session activity, and produce a detailed audit log without interfering with service desk processes.
    • Team and permissions administration: By using BeyondTrust Remote Support, you can Implement security across your service desk with granular role and permissions settings.
    • Native 2FA: BeyondTrust Verify is a TOTP native 2FA capability. It can be enabled for any user and verifies the identity of users before a BeyondTrust Remote Support session is actually launched.
    • Credential injection: If users integrate with the BeyondTrust Vault or BeyondTrust Password Safe, they can directly inject credentials into systems and end servers with just one click.

    BeyondTrust Remote Support Benefits

    Some of the benefits of using BeyondTrust Remote Support include:

    • Security and privacy: BeyondTrust Remote Support gives support teams quick access to desktops and IT systems without revealing their credentials and passwords. In addition, integrating BeyondTrust Privileged Access complements and controls access to privileged user accounts to protect mission-critical IT systems.
    • Mobile support: BeyondTrust Remote Support allows IT teams to provide instant remote support to mobile device users. The solution also supports Android smartphones and tablets as well as iOS devices (iPhone, iPad, iPod Touch).
    • ServiceNow integration: BeyondTrust Remote Support offers integrated remote support and secure chat.
    • Support across multiple systems and devices: The BeyondTrust Remote Support solution can help your organization achieve reliable remote support for end users and customers using Windows, Mac, Android, iOS, or any other operating system.

    Reviews from Real Users

    Below are some reviews and helpful feedback written by BeyondTrust Remote Support users.

    A Cybersecurity Architect at a tech vendor says, “The most valuable features are the ease of deployment, performance, pre and post-sales support, the vast majority of the localization they have done and the solution provider that they support. You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.”

    An Enterprise Service Desk Systems Manager at a manufacturing company comments, "Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."

    PeerSpot user Mark B., Sr VP of Business Operations at Networking Technologies and Support, Inc., explains that he thinks the solution is “Great for delivering end-user support, good at recording sessions, and very stable.


    CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.

    CyberArk Privileged Access Manager possesses a simplified and unified user interface. Users are able to manage the solution from one place. The UI allows users to view and manage all of the information and controls that administrators need to be able to easily access. Very often, management UIs do not have all of the controls and information streamlined in a single location. This platform provides a level of visibility that ensures users will be able to view all of their system’s most critical information at any time that they wish.

    Benefits of CyberArk Privileged Access Manager

    Some of CyberArk Privileged Access Manager’s benefits include:

    • The ability to manage IDs and permissions across a cloud environment. In a world where being able to work remotely is becoming increasingly important, CyberArk Privileged Access Manager is a very valuable tool. Administrators do not need to worry about infrastructure security when they are away from the office. They can assign and manage security credentials from anywhere in the world.
    • The ability to manage the program from a single centralized UI. CyberArk Privileged Access Manager’s UI contains all of the system controls and information. Users now have the ability to view and use all of their system’s most critical information and controls from one place.
    • The ability to automate user management tasks. Administrators can save valuable time by assigning certain management tasks to be fulfilled by the system itself. Users can now reserve their time for tasks that are most pressing. It can also allow for the system to simplify the management process by having the platform perform the most complex functions.

    Reviews from Real Users

    CyberArk Privileged Access Manager’s software stands out among its competitors for one very fundamental reason. CyberArk Privileged Access Manager is an all-in-one solution. Users are given the ability to accomplish with a single platform what might usually only be accomplished with multiple solutions.

    PeerSpot users note the truly all-in-one nature of this solution. Mateusz K., IT Manager at a financial services firm, wrote, "It improves security in our company. We have more than 10,000 accounts that we manage in CyberArk. We use these accounts for SQLs, Windows Server, and Unix. Therefore, keeping these passwords up-to-date in another solution or software would be impossible. Now, we have some sort of a platform to manage passwords, distribute the inflow, and manage IT teams as well as making regular changes to it according to the internal security policies in our bank."

    Hichem T.-B., CDO & Co-Founder at ELYTIK, noted that “This is a complete solution that can detect cyber attacks well. I have found the proxy features most valuable for fast password web access.”

    Sample Customers
    InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
    Rockwell Automation
    Top Industries
    REVIEWERS
    Manufacturing Company16%
    Financial Services Firm12%
    Consumer Goods Company12%
    University12%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Government11%
    Financial Services Firm10%
    Manufacturing Company6%
    REVIEWERS
    Financial Services Firm23%
    Insurance Company13%
    Computer Software Company13%
    Healthcare Company9%
    VISITORS READING REVIEWS
    Educational Organization30%
    Computer Software Company12%
    Financial Services Firm10%
    Manufacturing Company5%
    Company Size
    REVIEWERS
    Small Business37%
    Midsize Enterprise22%
    Large Enterprise41%
    VISITORS READING REVIEWS
    Small Business19%
    Midsize Enterprise13%
    Large Enterprise68%
    REVIEWERS
    Small Business21%
    Midsize Enterprise13%
    Large Enterprise66%
    VISITORS READING REVIEWS
    Small Business15%
    Midsize Enterprise38%
    Large Enterprise48%
    Buyer's Guide
    BeyondTrust Remote Support vs. CyberArk Privileged Access Manager
    March 2024
    Find out what your peers are saying about BeyondTrust Remote Support vs. CyberArk Privileged Access Manager and other solutions. Updated: March 2024.
    769,789 professionals have used our research since 2012.

    BeyondTrust Remote Support is ranked 11th in Privileged Access Management (PAM) with 32 reviews while CyberArk Privileged Access Manager is ranked 1st in Privileged Access Management (PAM) with 142 reviews. BeyondTrust Remote Support is rated 9.0, while CyberArk Privileged Access Manager is rated 8.8. The top reviewer of BeyondTrust Remote Support writes "A robust, secure, and complete solution for quickly providing support and monitoring what's going on". On the other hand, the top reviewer of CyberArk Privileged Access Manager writes "Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK". BeyondTrust Remote Support is most compared with Microsoft Remote Desktop Services, TeamViewer, BeyondTrust Privileged Remote Access, F5 BIG-IP Access Policy Manager (APM) and LogMeIn Pro, whereas CyberArk Privileged Access Manager is most compared with Cisco ISE (Identity Services Engine), Microsoft Entra ID, Delinea Secret Server, WALLIX Bastion and One Identity Safeguard. See our BeyondTrust Remote Support vs. CyberArk Privileged Access Manager report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.