Save to My Lists
Paid
Claimed

BeyondTrust Privileged Remote Access Features

What are the features of BeyondTrust Privileged Remote Access?

Functionality

  • Role-based security
  • Hide passwords

Monitoring

  • Audit Logging
  • Activity Logging

Administration

  • Policy, User, and Role Management

Reporting

  • Audit log
  • Reporting

Filter for Features

Functionality

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate.

Not enough data

Single Sign-On

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data

BYOD support

Enables users to bring-your-own-device to access company applications.

Not enough data

Password Vault

Stores credentials and passwords in a secure vault. Eliminates hard-coded passwords. Hides passwords from users.

Not enough data

Centralized management

Ensures that credentials are centrally stored (in a secure vault) and when changed, that systems remain connected.

Not enough data

Role-based security

Allows privileges based on roles, such as business unit or other factors. This feature was mentioned in 10 BeyondTrust Privileged Remote Access reviews.
92%
(Based on 10 reviews)

Live notifications

Configure which events will trigger a notification to prevent privileged access abuse in real-time.

Not enough data

Live session recording & playback

Offers live session recording and playback for compliance and auditing purposes.

Not enough data

Hide passwords

Offers the option to hide passwords when sharing with users, such as contract workers This feature was mentioned in 10 BeyondTrust Privileged Remote Access reviews.
95%
(Based on 10 reviews)

Temporary, time-limited privilege

Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.

Not enough data

Temporary, time-limited privilege

Allows for temporary privileges for a defined task or period of time, to reduce the risk of credential abuse.

Not enough data

Network Segmentation

Allows administrative control over network components, mapping, and segmentation.

Not enough data

Adaptive Access Control

Provides a risk-based approcach to determining trust within the network.

Not enough data

Access Control

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

Not enough data

Workflows

Facilitate access from initial access ticket submission through supporting chain of custody throughout the workflow for OT environments.

Not enough data

Monitoring

Audit Logging

Provides audit logs for compliance reasons. This feature was mentioned in 10 BeyondTrust Privileged Remote Access reviews.
95%
(Based on 10 reviews)

Activity Logging

As reported in 10 BeyondTrust Privileged Remote Access reviews. Monitors, records, and logs both real-time and post-event activity.
98%
(Based on 10 reviews)

Anomaly Detection

Detects abnormal user behavior to mitigate risks.

Not enough data

Administration

Policy, User, and Role Management

Creates access requirements and standards and establishes user, roles, and access rights. 10 reviewers of BeyondTrust Privileged Remote Access have provided feedback on this feature.
93%
(Based on 10 reviews)

Approval Workflows

Allows administrators to approve or reject access changes to using defined workflows.

Not enough data

Automated Provisioning

Automates provisioning and deprovisioning to reduce the amount of administrative manual work.

Not enough data

Bulk Changes

Reduces manual administrative work.

Not enough data

Centralized Management

Manages identity information from on-premise and cloud applications.

Not enough data

Self-Service Access Requests

Automatically allows access if users meet policy requirements.

Not enough data

User, Role, and Access Management

Grant access to select data, features, objects, etc. based on the users, user role, groups, etc.

Not enough data

Policy, User, and Role Management - Privileged Access Manager

Creates access requirements and standards and establishes user, roles, and access rights.

Not enough data

Network Mapping

Allows visual display of networks segmented components and their connected resources.

Not enough data

Governance

Allows users to create, edit, and relinquish user access privileges.

Not enough data

Reporting

Audit log

Creates a comprehnsive log of all activities when utilizing Privileged Access Management Software software. 10 reviewers of BeyondTrust Privileged Remote Access have provided feedback on this feature.
95%
(Based on 10 reviews)

Reporting

Based on 10 BeyondTrust Privileged Remote Access reviews. Includes reporting functionality.
97%
(Based on 10 reviews)

Reporting

Includes reporting functionality.

Not enough data

Audit Logs

Creates a comprehnsive log of all activities when utilizing accessmanagement software.

Not enough data

Activity Monitoring

Monitors user activity, documents behaviors for baselining and anomaly detection.

Not enough data

Security Frameworks

Follows industry-specific security frameworks such as IEC 62443 and NIST SP 800-82.

Not enough data

BeyondTrust Privi...