TrustRadius: an HG Insights company

BeyondTrust Privileged Remote Access

Score8.8 out of 10

31 Reviews and Ratings

What is BeyondTrust Privileged Remote Access?

BeyondTrust Privileged Remote Access enables security professionals to control, monitor, and manage access to critical systems by privileged users and third-party vendors (e.g. authorized employees, contractors, etc). BeyondTrust's approach is designed to allow companies to quickly gain control of system access and protect themselves against cyberattacks without requiring time-consuming process changes.

Features for secure access, vault credentials, and audit sessions:

  • Secure Remote Access - Connection and from anywhere to critical IT systems, cloud applications, and OT systems—no VPN required.
  • Session Management - With full visibility and control over all actions, permissions, and more, in every privileged session. Ensures compliance is easily met with granular details of every session automatically recorded and logged.
  • Privileged Access Control - Enforces least privilege and just-in-time access by giving users the exact level of remote access they need — and only for the finite moments needed.
  • Flexible Consoles & Tools - Maintains secure workflows with familiar tools like Putty or Azure Data Studio and increase coverage by initiating access via mobile or web consoles.
  • Streamlined Authentication - Drives productivity and system protection with MFA, passwordless authentication, and SAML authentication optimized for smooth onboarding and access.
  • Compliance & Session Auditing - Access sessions are SOC 2 compliance-ready with audit trails, forensics, and advanced analytics using detailed session data – available in real-time or post-session.

And in accordance with zero trust tenets and principles, Privileged Remote Access helps organizations to ensure all access is appropriate, right-sized, managed, and documented across the enterprise. The solution enables just-in-time access for insiders, third-party vendors, and OT systems alike by applying granular least privilege access controls.

Privileged Remote Access can be leveraged to harden remote access pathways, prevent unwanted lateral movement, and implement application-level microsegmentation to prevent users from accessing resources for which they are not authorized.

Access sessions are managed within a centralized platform for both access control and session management. Control and monitor sessions via a secure agent, or standard protocols for RDP, VNC, HTTPS, SSH and SQL connections. Admins gain full oversight of remote session activity. They can define what endpoints users can access, schedule when they can access them, whitelist/blacklist applications during sessions, and capture detailed session data for real-time or post-session review.

These capabilities help to satisfy internal and external compliance requirements with comprehensive audit trails, session forensics, and the ability to view session recordings firsthand. Attestation reports to prove compliance are always just a few clicks away.

Top Performing Features

  • Over-the-Internet remote session

    Establish secure remote connection with computers outside the network firewall.

    Category average: 9.4

  • Remote management of servers & workstations

    Server reboot, start/stop services & processes, clear logs, manage disks, shares, etc. without having to initiate remote control.

    Category average: 8.4

  • Remote Active Directory® management

    Remotely unlock user accounts, reset passwords, manage Organizational Units, edit Group Policy, etc.

    Category average: 6.7

Areas for Improvement

  • Screen sharing

    Allows participants to share their computer screens with others in the meeting, enabling collaborative work and presentations.

    Category average: 9.3

  • Instant message

    Ability for administrator to communicate via instant message with remote user.

    Category average: 7.3

  • Initiate remote control from mobile

    Mobile application for remote controlling computers from mobile device (iOS, Android)

    Category average: 7.6

Endpoint access security.

Use Cases and Deployment Scope

The company I work for provides consulting services to clients in the area of ​​information security using technologies from our partners. We use BeyondTrust Privileged Remote Access to access the technologies that are in our clients' environments. With BeyondTrust Privileged Remote Access, BeyondTrust Privileged Remote Access solved a problem we had in accessing this information. With this change, our access is much more secure.

A empresa em que trabalho fornece serviços de consultoria para clientes na área de segurança da informação usando tecnologias de nossos parceiros. Usamos o BeyondTrust Privileged Remote Access para acessar as tecnologias que estão nos ambientes de nossos clientes. Com o BeyondTrust Privileged Remote Access, a BeyondTrust Privileged Remote Access resolveu um problema que tínhamos para acessar essas informações. Com essa mudança, nosso acesso está muito mais seguro.

Pros

  • Remote access with various protocols
  • Access auditing, with logs, recordings, user information.
  • Remote access without the need to use a VPN.

Cons

  • One way to use it is by using a machine as an access proxy, this machine being Linux, has limitations such as copy and paste and does not allow access to more than one web access.
  • Improve the desktop application view.

Return on Investment

  • For our type of use, the main factor is not using a VPN anymore, this makes our access more secure, with the amount of customers we have and support we provide, this was a determining factor.

Usability

Alternatives Considered

CyberArk Privileged Access Management and senhasegura

Other Software Used

senhasegura, Netskope Advanced Analytics

A simple to use solution for Secure Remote Access

Use Cases and Deployment Scope

BeyondTrust Privileged Remote Access provides a secure method for users to access applications and infrastructure as well as our administrators. The web based jumps are very useful to present application UIs removing the need for jump boxes, decreasing costs and administration.

Pros

  • Remote RDP
  • Secure outbound initiated access
  • Web Jumps

Cons

  • Update releases that break things can take months to resolve

Return on Investment

  • Allows our users to work remotely or from home
  • Increase productivity by enabling users to work from anywhere
  • Satisfies IT Security requirements for a secure remote access solution

Usability

Other Software Used

Cerberus FTP Server

Secured Remote Access Solution

Use Cases and Deployment Scope

BeyondTrust Privileged Remote Access has replaced our VPN solution for vendors and external users/partners. It allows us to grant secure remote access to specific resources in our internal networks to those external partners. It supports many types of applications and has a good granularity in terms of the types of privileges you can allow.

Pros

  • RDP Jump
  • Shell Jump
  • Web Jump
  • Protocol Tunnel Jump
  • VNC Jump

Cons

  • Ability to have a list of allowed hosts who are allowed to remote on some specific resources
  • Improve the colors display on best quality mode (highest image resolution)
  • Match the web access console experience to the desktop client access console experience. The desktop client version of the access console offers a smooth experience while the web version shows some limitations.

Most Important Features

  • DRP Jump
  • Web Jump
  • Vault

Return on Investment

  • Improve security by improving the management of external remote access
  • Help us meet Remote Access Compliance Requirements by creating audit trails, session forensics, and giving access monitoring and reporting data
  • Simplify employee access and workflows by giving employees the exact amount of privileged access to systems and applications they need, without hindering productivity or overwhelming the service desk

Other Software Used

BeyondTrust Password Safe, Nessus, Lansweeper

BeyondTrust Remote Support Tool

Use Cases and Deployment Scope

Our organization uses BeyondTrust Privileged

Access Management Suite as a Security Bastion to secure, manage, and audit remote

privileged access to customers' infrastructures. It allows remote assist sessions to be logged and optionally be monitored in real-time and recorded for a

detailed audit trail. It is very helpful in our ISO27001 strategy.

Pros

  • Audit and secure remote privileged access
  • Manage roles and accesses
  • Centralized console to connect to any protocl

Cons

  • Localization of the user interface

Most Important Features

  • 2FA
  • RBAC console
  • Secured protocols and credential store

Return on Investment

  • Unify support tools and credentials
  • Simplify remote sessions

New to Beyond Trust PRA, be we like it a lot!

Pros

  • simple interface for users
  • good technical resources available to speak with
  • training

Cons

  • questionnaire from technician for installation was difficult to follow
  • after purchase of a product, an initial audio discussion with an Engineer would be great for better understanding the installation phase
  • provide plans for on-premise and cloud strategies in different documents

Most Important Features

  • security
  • ease of use
  • simplicity

Return on Investment

  • saves time
  • less set up for 3rd party vendor
  • simple

Other Software Used

SolarWinds Dameware Remote Everywhere (DRE), Lansweeper, ManageEngine Desktop Central