39 BeyondTrust Privileged Remote Access Reviews
Pros:
Great Auditing Capabilities: The tool provides comprehensive session logging and auditing, ensuring full visibility of privileged access.
Stable Performance: Most of the time, BeyondTrust PRA operates smoothly and reliably.
Effective Software Version: The software-based version works very well, offering a seamless experience for privileged access management. Review collected by and hosted on G2.com.
Cons:
Jumpoints for Linux Need Improvement: The feature does not always function properly, limiting its usability.
Web-Based SSH Performance: The web SSH client is noticeably slow and lacks essential features such as copy and paste. Review collected by and hosted on G2.com.
Its the esyest solution to implement of beyondtrust, fast, reliable and secure.
Can be integrated with multiples siem option for better logs monitoring.
I use multiples times a day to acess internal server without use VPN Review collected by and hosted on G2.com.
The support could be better, they are lacking sometimes when it comes to correct issues. Review collected by and hosted on G2.com.
What stands out most about BeyondTrust PRA is its credential injection and session management capabilities. The ability to inject credentials directly into a session—without exposing them to the end user—is a game-changer for security. It reduces the risk of credential theft, a common weak point in remote access scenarios, and ensures that even privileged users don’t have plaintext passwords floating around. Pair that with its real-time session monitoring and recording, and you’ve got a system that not only locks down access but also provides a clear audit trail. For organizations under strict compliance requirements (think SOC 2 or HIPAA), this feature set is a lifeline, offering detailed logs and forensics that can prove who did what and when. Review collected by and hosted on G2.com.
Some essential and basic Linux features are missing. When web jumping from a Linux proxy or what BeyondTrust calls Jumpoint, we are unable to copy and paste contents from and to the jumped server, which makes it incovenient to perform certain actions. And depending on your use case, the product might not support the protocol used, such as old HTTPS servers still running deprecated TLS versions -- as they are unsupported by the vendor, these servers might not be accessible from the product. Review collected by and hosted on G2.com.
I like the admin page how sample it is , i like the API automation that with BT , i like how secure BT is Review collected by and hosted on G2.com.
i have no dislikes until now , but i have only issue with the scalling for jump RDp Review collected by and hosted on G2.com.
Remote access through various protocols and evidence management. Review collected by and hosted on G2.com.
Use Linux as a jumpoint, due to the limitations of some resources. Review collected by and hosted on G2.com.
Makes it incredibly easy to give our vendors or 3rd party's access to our internal systems. Review collected by and hosted on G2.com.
Honestly, at this point, there is nothing that I don't like. Review collected by and hosted on G2.com.
It acts as the best tool to log in and the authentication process is too secure for the users and the information about the servers will also remain secure.
It uses a separate authenticator app compared to other tools. Review collected by and hosted on G2.com.
The license count is less, and we need many approvals for the license increase, as the PRA has been using many users, we need more licenses that help to onboard more servers. Review collected by and hosted on G2.com.
Tool functionality when accessing multiple machines. Review collected by and hosted on G2.com.
Jumpoint on linux is not good.
In some accesses ir is not possible to copy and paste. Review collected by and hosted on G2.com.
Jumpoint that facilitates and speeds up access. Review collected by and hosted on G2.com.
Somethings about support and the difference between jump for windows and linux. Review collected by and hosted on G2.com.
Perfect! It's easy to use, and you can see the users already connected to the device on the right side of the console of Bomgar. Review collected by and hosted on G2.com.
I have been using Privileged Remote Access powered by Bomgar for two months and haven't encountered any issues with it. Review collected by and hosted on G2.com.