BeyondTrust Privileged Remote Access Features
What are the features of BeyondTrust Privileged Remote Access?
Functionality
- Role-based security
- Hide passwords
Monitoring
- Audit Logging
- Activity Logging
Administration
- Policy, User, and Role Management
Reporting
- Audit log
- Reporting
Top Rated BeyondTrust Privileged Remote Access Alternatives
BeyondTrust Privileged Remote Access Categories on G2
Filter for Features
Functionality
Multi-Factor Authentication | Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. | Not enough data | |
Single Sign-On | Provides a single access point for users to access multiple cloud products without multiple logins. | Not enough data | |
BYOD support | Enables users to bring-your-own-device to access company applications. | Not enough data | |
Password Vault | Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users. | Not enough data | |
Centralized management | Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected. | Not enough data | |
Role-based security | Allows privileges based on roles, such as business unit or other factors. This feature was mentioned in 10 BeyondTrust Privileged Remote Access reviews. | 92% (Based on 10 reviews) | |
Live notifications | Configure which events will trigger a notification to prevent privileged access abuse in real-time. | Not enough data | |
Live session recording & playback | Offers live session recording and playback for compliance and auditing purposes. | Not enough data | |
Hide passwords | Offers the option to hide passwords when sharing with users, such as contract workers This feature was mentioned in 10 BeyondTrust Privileged Remote Access reviews. | 95% (Based on 10 reviews) | |
Temporary, time-limited privilege | Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. | Not enough data | |
Temporary, time-limited privilege | Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse. | Not enough data | |
Network Segmentation | Allows administrative control over network components, mapping, and segmentation. | Not enough data | |
Adaptive Access Control | Provides a risk-based approcach to determining trust within the network. | Not enough data | |
Access Control | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data | |
Workflows | Facilitate access from initial access ticket submission through supporting chain of custody throughout the workflow for OT environments. | Not enough data |
Monitoring
Audit Logging | Provides audit logs for compliance reasons. This feature was mentioned in 10 BeyondTrust Privileged Remote Access reviews. | 95% (Based on 10 reviews) | |
Activity Logging | As reported in 10 BeyondTrust Privileged Remote Access reviews. Monitors, records, and logs both real-time and post-event activity. | 98% (Based on 10 reviews) | |
Anomaly Detection | Detects abnormal user behavior to mitigate risks. | Not enough data |
Administration
Policy, User, and Role Management | Creates access requirements and standards and establishes user, roles, and access rights. 10 reviewers of BeyondTrust Privileged Remote Access have provided feedback on this feature. | 93% (Based on 10 reviews) | |
Approval Workflows | Allows administrators to approve or reject access changes to using defined workflows. | Not enough data | |
Automated Provisioning | Automates provisioning and deprovisioning to reduce the amount of administrative manual work. | Not enough data | |
Bulk Changes | Reduces manual administrative work. | Not enough data | |
Centralized Management | Manages identity information from on-premise and cloud applications. | Not enough data | |
Self-Service Access Requests | Automatically allows access if users meet policy requirements. | Not enough data | |
User, Role, and Access Management | Grant access to select data, features, objects, etc. based on the users, user role, groups, etc. | Not enough data | |
Policy, User, and Role Management - Privileged Access Manager | Creates access requirements and standards and establishes user, roles, and access rights. | Not enough data | |
Network Mapping | Allows visual display of networks segmented components and their connected resources. | Not enough data | |
Governance | Allows users to create, edit, and relinquish user access privileges. | Not enough data |
Reporting
Audit log | Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. 10 reviewers of BeyondTrust Privileged Remote Access have provided feedback on this feature. | 95% (Based on 10 reviews) | |
Reporting | Based on 10 BeyondTrust Privileged Remote Access reviews. Includes reporting functionality. | 97% (Based on 10 reviews) | |
Reporting | Includes reporting functionality. | Not enough data | |
Audit Logs | Creates a comprehnsive log of all activities when utilizing accessmanagement software. | Not enough data | |
Activity Monitoring | Monitors user activity, documents behaviors for baselining and anomaly detection. | Not enough data | |
Security Frameworks | Follows industry-specific security frameworks such as IEC 62443 and NIST SP 800-82. | Not enough data |