Save to My Lists

BeyondTrust Privileged Remote Access Reviews & Product Details

BeyondTrust Privileged Remote Access Overview

What is BeyondTrust Privileged Remote Access?

Privileged Remote Access (PRA) eliminates the risks inherent in remote access solutions dependent on VPNs and RDP. PRA delivers seamless, just-in-time access through encrypted tunnels to IT and OT systems. Each connection is brokered by the BeyondTrust platform, ensuring a zero-trust approach that grants the least amount of privilege necessary. By providing least-privileged access on demand, you can streamline operations, while reducing your attack surface and administrative overhead. Get a Free Trial: https://www.beyondtrust.com/privileged-remote-access-trial Watch a Demo: https://www.beyondtrust.com/demos Learn more about BeyondTrust Privileged Remote Access: https://www.beyondtrust.com/products/privileged-remote-access

BeyondTrust Privileged Remote Access Details
Product Website
Languages Supported
English
Show LessShow More
Product Description

Privileged Remote Access is a unified access solution. You can provide seamless, secure access to nearly any system, from anywhere via innovative egress techniques and a single administrative console.

How do you position yourself against your competitors?

BeyondTrust has brought 20 years of IT and OT maturity to PAM. With a strong foundation, BeyondTrust has evolved Privileged Remote Access with over 140 unique, innovative features, trusted by over 2,200 customers across all major industries.


Seller Details
Company Website
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,483 Twitter followers
LinkedIn® Page
www.linkedin.com
1,595 employees on LinkedIn®
Description

BeyondTrust is the global cybersecurity leader protecting Paths to Privilege™. Our identity-centric approach goes beyond securing privileges and access, empowering organizations with the most effective solution to manage the entire identity attack surface and neutralize threats,whether from external attacks or insiders.BeyondTrust is leading the charge in transforming identity security to prevent breaches and limit the blast radius of attacks, while creating a superior customer experience and operational efficiencies. We are trusted by
20,000 customers, including 75 of the Fortune 100, and our global ecosystem of partners.


LA
Overview Provided by:

BeyondTrust Privileged Remote Access Integrations

(2)
Verified by BeyondTrust Privileged Remote Access

Recent BeyondTrust Privileged Remote Access Reviews

PS
Paulo S.Mid-Market (51-1000 emp.)
5.0 out of 5
"PRA - Next Level ZTNA"
Its the esyest solution to implement of beyondtrust, fast, reliable and secure. Can be integrated with multiples siem option for better logs monit...
MS
Magno S.Small-Business (50 or fewer emp.)
5.0 out of 5
"Have privileged access in a secure way."
Remote access through various protocols and evidence management.
Verified User
A
Verified UserSmall-Business (50 or fewer emp.)
4.5 out of 5
"Easy and Fast Privileged Remote Access"
Jumpoint that facilitates and speeds up access.

Pricing Insights

Averages based on real user reviews.

Time to Implement

2 months

Return on Investment

15 months

Average Discount

7%

Perceived Cost

$$$$$
View More Pricing Information

BeyondTrust Privileged Remote Access Media

Official Downloads

Answer a few questions to help the BeyondTrust Privileged Remote Access community
Have you used BeyondTrust Privileged Remote Access before?
Yes

39 BeyondTrust Privileged Remote Access Reviews

4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

BeyondTrust Privileged Remote Access Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
LL
Analyst Junior
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about BeyondTrust Privileged Remote Access?

Pros:

Great Auditing Capabilities: The tool provides comprehensive session logging and auditing, ensuring full visibility of privileged access.

Stable Performance: Most of the time, BeyondTrust PRA operates smoothly and reliably.

Effective Software Version: The software-based version works very well, offering a seamless experience for privileged access management. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

Cons:

Jumpoints for Linux Need Improvement: The feature does not always function properly, limiting its usability.

Web-Based SSH Performance: The web SSH client is noticeably slow and lacks essential features such as copy and paste. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

BeyondTrust Privileged Remote Access has solved the challenge of auditing employee access to critical systems. With its robust session logging and monitoring capabilities, I can now track and review all privileged access activities, ensuring security and compliance. Review collected by and hosted on G2.com.

PS
Especialista em cibersegurança
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about BeyondTrust Privileged Remote Access?

Its the esyest solution to implement of beyondtrust, fast, reliable and secure.

Can be integrated with multiples siem option for better logs monitoring.

I use multiples times a day to acess internal server without use VPN Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

The support could be better, they are lacking sometimes when it comes to correct issues. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

I don't use VPN anymore, any server i have to acess i login on the PRA console and they are one click of a button close to me. Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
AC
Mid-Market(51-1000 emp.)
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about BeyondTrust Privileged Remote Access?

What stands out most about BeyondTrust PRA is its credential injection and session management capabilities. The ability to inject credentials directly into a session—without exposing them to the end user—is a game-changer for security. It reduces the risk of credential theft, a common weak point in remote access scenarios, and ensures that even privileged users don’t have plaintext passwords floating around. Pair that with its real-time session monitoring and recording, and you’ve got a system that not only locks down access but also provides a clear audit trail. For organizations under strict compliance requirements (think SOC 2 or HIPAA), this feature set is a lifeline, offering detailed logs and forensics that can prove who did what and when. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

Some essential and basic Linux features are missing. When web jumping from a Linux proxy or what BeyondTrust calls Jumpoint, we are unable to copy and paste contents from and to the jumped server, which makes it incovenient to perform certain actions. And depending on your use case, the product might not support the protocol used, such as old HTTPS servers still running deprecated TLS versions -- as they are unsupported by the vendor, these servers might not be accessible from the product. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

Being able to properly manage high privilege credentials and be certain that access is only given to the required individuals is essential for my company. Also being able to block commands from running, monitoring the access, and having a recorded session of the user is absolutely perfect for auditing runs. Review collected by and hosted on G2.com.

Verified User in Computer Software
AC
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about BeyondTrust Privileged Remote Access?

I like the admin page how sample it is , i like the API automation that with BT , i like how secure BT is Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

i have no dislikes until now , but i have only issue with the scalling for jump RDp Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

IT solves problem with the secure access for our customers , as we are IT software company that we give support all the time to our customer , we needed a secure tool with ease of use and configurations Review collected by and hosted on G2.com.

MS
Analista de Segurança
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about BeyondTrust Privileged Remote Access?

Remote access through various protocols and evidence management. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

Use Linux as a jumpoint, due to the limitations of some resources. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

Access the solutions implemented by our customers. Review collected by and hosted on G2.com.

Verified User in Manufacturing
AM
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about BeyondTrust Privileged Remote Access?

Makes it incredibly easy to give our vendors or 3rd party's access to our internal systems. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

Honestly, at this point, there is nothing that I don't like. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

Allowing us to give our vendors/3rd party's access to our internal systems. It also allows us to do it by NOT sharing a password with them thanks to the password vault capabilities. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
Rating Updated ()
What do you like best about BeyondTrust Privileged Remote Access?

It acts as the best tool to log in and the authentication process is too secure for the users and the information about the servers will also remain secure.

It uses a separate authenticator app compared to other tools. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

The license count is less, and we need many approvals for the license increase, as the PRA has been using many users, we need more licenses that help to onboard more servers. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

It is very useful in securing the servers and also makes the users secure in logging into their servers. This acts as a gateway between the user and the server which is safe. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about BeyondTrust Privileged Remote Access?

Tool functionality when accessing multiple machines. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

Jumpoint on linux is not good.

In some accesses ir is not possible to copy and paste. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

Ease of accessing different locations without having to worry about saving passwords. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
AI
Small-Business(50 or fewer emp.)
Validated Reviewer
Verified Current User
Review source: G2 invite
Incentivized Review
What do you like best about BeyondTrust Privileged Remote Access?

Jumpoint that facilitates and speeds up access. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

Somethings about support and the difference between jump for windows and linux. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

PRA is facilitating access to customers and doing so in a secure way. Review collected by and hosted on G2.com.

JO
Cloud Infrastructure Engineer
Mid-Market(51-1000 emp.)
Validated Reviewer
Verified Current User
Review source: Thank You page
What do you like best about BeyondTrust Privileged Remote Access?

Perfect! It's easy to use, and you can see the users already connected to the device on the right side of the console of Bomgar. Review collected by and hosted on G2.com.

What do you dislike about BeyondTrust Privileged Remote Access?

I have been using Privileged Remote Access powered by Bomgar for two months and haven't encountered any issues with it. Review collected by and hosted on G2.com.

What problems is BeyondTrust Privileged Remote Access solving and how is that benefiting you?

Using BeyondTrust Privileged Remote Access to Access to private environment where there are dedicated servers are deployed which is to be migrated to our own cloud environment. Review collected by and hosted on G2.com.

BeyondTrust Privi...