2019-11-13T05:28:00Z
Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
  • 0
  • 0

What do you like most about BeyondTrust Privileged Remote Access?

Hi Everyone,

What do you like most about BeyondTrust Privileged Remote Access?

Thanks for sharing your thoughts with the community!

12
PeerSpot user
12 Answers
Temitope Popoola - PeerSpot reviewer
Specialist, Server Administration at IHS Towers
Real User
Top 20
2022-07-18T15:10:00Z
Jul 18, 2022

One of the features that I really like about it is the ability to set a start date, time, and end date for the access. For example, you can set the access for a person from tomorrow, Monday, or Tuesday and ending on a specific period of the day or a specific date. That's really quite helpful.

Search for a product comparison
Aaron Margerum - PeerSpot reviewer
Systems Engineer at NRC
Real User
Top 10
2022-07-13T14:04:00Z
Jul 13, 2022

I like all of it. You can access computers that are on a DMZ. You can access computers that are off the network and on the network. You pretty much have access to computers wherever they are. As long as they have the client on them, you can get to them. So, it is convenient, but its main feature is that you can use your smart card to elevate your privileges remotely. That's a great feature.

PD
IT Specialist at a comms service provider with 11-50 employees
Real User
2022-07-11T15:49:00Z
Jul 11, 2022

We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access.

SteveJenovai - PeerSpot reviewer
Sr Technical Product Manager (Sr. Consultant at Computronix) at Computronix
Consultant
Top 10
2022-06-25T18:44:00Z
Jun 25, 2022

The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features.

PR
Lead consultant at Aujas cybersecurity
Real User
2022-06-20T18:26:00Z
Jun 20, 2022

When it comes to the Privileged Remote Access (PRA) solution, instead of depending on a VPN client, from Cisco or any other vendor, we can directly use this product from the internet. It is very easy to do the implementation, and it is easy for every user to access the server from outside of their organization. They can open the URL and put their name and password, and it'll do the multi-factor authentication. They can easily access the server. Prior to this solution, the users had to log into the VPN, which is not required with BeyondTrust. Now, they can use their computer over the internet.

KL
Sr Cyber Security Manager at Honeywell International Inc.
Real User
Top 20
2022-06-01T10:56:00Z
Jun 1, 2022

The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs.

Learn what your peers think about BeyondTrust Privileged Remote Access. Get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
654,218 professionals have used our research since 2012.
Lance Jones - PeerSpot reviewer
Information Technology Operations Manager at a educational organization with 5,001-10,000 employees
Real User
Top 10
2022-04-27T18:25:00Z
Apr 27, 2022

We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network.

Chase Cole - PeerSpot reviewer
Sr. Systems Administrator at Rayburn Electric
Real User
Top 20
2022-03-02T22:45:00Z
Mar 2, 2022

It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength.

SH
Cybersecurity Architect at a tech vendor with 1-10 employees
Real User
Top 5
2021-11-19T15:26:00Z
Nov 19, 2021

This product is very stable and scalable. This is an excellent platform.

Hahn Rolf - PeerSpot reviewer
CEO at MICRODYN AG
Reseller
Top 10
2021-07-02T07:55:31Z
Jul 2, 2021

The scalability is excellent.

JL
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees
Real User
Top 10
2021-02-10T18:49:11Z
Feb 10, 2021

Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe.

Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that.

it_user843969 - PeerSpot reviewer
Head of Communications at Stadt Winterthur
Real User
2019-11-13T05:28:00Z
Nov 13, 2019

The most valuable feature is that this solution can be implemented regardless of the operating system.

Related Questions
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Aug 17, 2022
Hi, We all know it's really hard to get good pricing and cost information. Please share what you can so you can help your peers.
2 out of 8 answers
Hahn Rolf - PeerSpot reviewer
CEO at MICRODYN AG
Jul 2, 2021
The pricing depends on the model you choose. You can have it as a cloud version or you can have it as an on-premise version and therefore the prices vary. The initial costs are normally a little bit higher than with other products, however, after two or three years, it's a bargain. It's just that the initial cost is a little bit higher. That said, due to the functionality it gives to your team, the return of investment comes very fast.
SH
Cybersecurity Architect at a tech vendor with 1-10 employees
Nov 19, 2021
The price is pretty expensive, but you get what you pay for and this is a great product.
it_user434868 - PeerSpot reviewer
Senior Director of Delivery at a tech services company with 51-200 employees
Jul 18, 2022
How do you or your organization use this solution? Please share with us so that your peers can learn from your experiences. Thank you!
2 out of 11 answers
it_user843969 - PeerSpot reviewer
Head of Communications at Stadt Winterthur
Nov 13, 2019
We use this solution to provide remote authentication for a support system that we are providing. We have a data center with many different products that are based on Windows, Linux, and hardware appliances.
JL
IAM Senior Solutions Architect at a tech services company with 1,001-5,000 employees
Feb 10, 2021
I have a hundred different use cases. They're all different because every customer is different. One of the top use cases is where a third-party vendor needs to internally access one of the servers or applications.
Download Free Report
Download our free BeyondTrust Privileged Remote Access Report and get advice and tips from experienced pros sharing their opinions. Updated: November 2022.
DOWNLOAD NOW
654,218 professionals have used our research since 2012.