Categories:

#21

BeyondTrust is ranked #21 in the Help Desk CRM Software product directory based on the latest available data collected by SelectHub. Compare the leaders with our In-Depth Report.

BeyondTrust Pricing

Based on our most recent analysis, BeyondTrust pricing starts at $75,000 (Annually, Quote-based).

Price
$
$
$
$
$
i
Starting From
$75,000
Pricing Model
Annually, Quote-based
Free Trial
Yes, Request for Free

Training Resources

BeyondTrust is supported with the following types of training:

Documentation
In Person
Live Online
Videos
Webinars

Support

The following support services are available for BeyondTrust:

Email
Phone
Chat
FAQ
Forum
Help Desk
Knowledge Base
Tickets
Training
24/7 Live Support

BeyondTrust Benefits and Insights

Why use BeyondTrust?

Key differentiators & advantages of BeyondTrust

  • Enhanced Security: BeyondTrust minimizes the risk of unauthorized access by enforcing strict identity verification protocols.
  • Compliance Assurance: The software helps organizations meet regulatory requirements such as GDPR and HIPAA by maintaining detailed access logs and audit trails.
  • Operational Efficiency: Automating identity and access management tasks reduces the administrative burden on IT staff, allowing them to focus on more strategic initiatives.
  • Risk Mitigation: By providing real-time monitoring and alerts for suspicious activities, BeyondTrust helps in proactively addressing potential security threats.
  • Scalability: The platform can easily scale to accommodate growing organizations, ensuring that identity management remains effective as the user base expands.
  • Improved User Experience: Single sign-on (SSO) and self-service password reset features enhance user convenience and reduce downtime.
  • Cost Savings: Reducing the need for manual oversight and minimizing security breaches can lead to significant cost savings over time.
  • Granular Access Control: BeyondTrust allows for precise control over who has access to what resources, ensuring that users only have the permissions they need.
  • Integration Capabilities: The software seamlessly integrates with existing IT infrastructure, including cloud services and on-premises applications, ensuring a cohesive security strategy.
  • Enhanced Visibility: Comprehensive reporting and analytics provide insights into user behavior and access patterns, aiding in better decision-making.

Industry Expertise

BeyondTrust is a popular choice for organizations in various industries, including finance, government, healthcare, law enforcement, manufacturing, and education. It's particularly well-suited for businesses that need to meet strict compliance regulations, protect against cyberattacks, and manage privileged access across their IT infrastructure.

BeyondTrust Reviews

Average customer reviews & user sentiment summary for BeyondTrust:

User satisfaction level icon: excellent

2024 reviews

92%

of users would recommend this product

Synopsis of User Ratings and Reviews

Based on an aggregate of BeyondTrust reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.

Pros

  • Strong Security Features: BeyondTrust offers robust security features, including least privilege access, secure remote access, and threat detection and response.
  • Positive Customer Reviews: BeyondTrust consistently receives positive feedback for its customer service, responsiveness, and frequency of communications and updates.
  • Market Leader: BeyondTrust is recognized as a leader in the Forrester Wave™ for Privileged Identity Management, demonstrating its comprehensive security capabilities.
  • Streamlined Remote Support: BeyondTrust's Remote Support product receives high praise for its user-friendliness, reliability, and robust features, enabling efficient and effective remote assistance.

Cons

  • High Costs: BeyondTrust products are often purchased separately, leading to potentially high overall costs. This pricing model can be a significant barrier for smaller businesses with limited budgets.
  • Complex Implementation: Implementing BeyondTrust may require coordination across multiple teams and systems, making it a potentially complicated and time-consuming process.
  • Integration Challenges: BeyondTrust may not integrate seamlessly with all tools and applications, potentially requiring additional customization or workarounds to achieve desired functionality.

Researcher's Summary:

Can BeyondTrust be trusted to go above and beyond for your organization's security needs? Recent user reviews suggest a resounding "yes," particularly for those seeking to bolster their identity and access management (IAM) and privileged access management (PAM) strategies. Users consistently praise BeyondTrust's comprehensive approach to security, highlighting its robust features and integration capabilities as major strengths. For instance, its Password Safe feature receives high marks for simplifying credential management and automating access policy enforcement, a godsend for organizations grappling with security complexities.

However, the platform isn't without its criticisms. Some users express frustration with the à la carte pricing model, finding that purchasing products separately inflates costs. This "nickel and diming" approach can be a sticking point, especially for budget-conscious organizations. Despite this drawback, BeyondTrust's focus on zero trust principles and its ability to integrate with leading IGA solutions like SailPoint make it a powerful contender in the IAM/PAM space. Its strength lies in providing a holistic view of access rights, automating privilege attestation, and ensuring users operate on a least-privilege basis. This makes BeyondTrust a perfect fit for organizations, particularly those with sprawling IT infrastructures, looking to batten down the hatches and fortify their security posture against the ever-evolving threat landscape.

Key Features

  • Improved Access and Session Management: Reduce the chance of misuse and breaches with capabilities of credential management. 
    • Password-safe: Safeguard, control, monitor and record access to privileged accounts through automated password and session management. Send alerts for unauthorized or suspicious access. 
      • Automated Discovery: Scan, identify and profile all assets and applications with accounts auto-onboarding. 
      • Privileged Session Management: Manage and monitor sessions for forensics and compliance.  
      • App Specific Password Management: Control scripts, files, codes and embedded keys to safeguard critical systems. 
      • SSH Key Management: Utilize SSH keys for improved accountability, security and control over Unix and Linux systems.  
      • Adaptive Access Control: Screen access requests and assess legitimacy in terms of day, date, time and location of users when access is attempted. 
      • Threat Analytics: Monitor user behavior and asset characteristics to identify suspicious changes.
    • DevOps Secret Safe: Lower the risk of breach and exposure, and enhance the application delivery process by enforcing a systemized administration solution. 
      • Centralized Secret Management: Secure the privileged credentials for applications and tools in a centralized location. 
      • Enterprise-Class Availability and Performance: Limit downtime risks and boost performance and availability in small and large enterprises. 
      • Recordkeeping and Automated Audit: Keep an eye on users with system accessibility by creating and managing an audit trail of secret operations.  
      • REST API-First Approach and CLI Tools: Get the advantage of API interaction while enabling agility and velocity for DevOps teams via development workflows and a Command Line Interface (CLI) tool. 
      • Integrations: Explore classic and unique integrations to secure and manage secrets used by DevOps tools and applications while accessing identity repositories to ensure proper authentication. 
  • Endpoint Privilege Management: Enable Mac, Unix, Windows, network devices and Linux without compromising productivity. 
    • Mac and Windows: Prevent malware and ransomware attacks on Windows and Mac operating systems while eliminating service desk burden. 
      • QuickStart Templates: Quickly implement privilege policies for every role across Windows and Mac. 
      • Application Protection and Control: Prevent attacks and trojan horses involving infected email attachments, dire scripts and applications. Control installing and other user activities by delegating application control to IT. 
      • Open Integrations Framework: Use PowerShell scripts to automate workflows, build integrations with tools like ITSM and create custom behaviors. 
      • Password-less Operations: Manage administrative operations without requiring privileged credentials. 
    • Linux and Unix: Control access, achieve compliance and reduce the chance of destructive breaches via solutions that help manage privileges. 
      • Audit and Governance: Analyze user behavior by collecting, storing and indexing session recordings, keystroke logs and events. 
      • Fine Grained Least Privilege: Manage privileged access for standard users on Linux and Unix through policy controls.  
      • Remote System App Control: Allow users to run commands and conduct remote sessions without logging in as a root or admin. 
      • Access Policy: Decide on privilege elevation by analyzing data such as day, time, location, application or asset vulnerability. 
      • Integrity Monitoring: Report and audit changes in policy applications, data files and systems. 
      • Threat Reporting and Analytics: Compare user behavior against security intelligence and asset vulnerability data. 
      • Active Directory Bridge: Access single sign-on capabilities, Microsoft Active Directory authentication and Group Policy configuration on Linux and Unix systems. 
  • Secure Remote Access: Centrally secure and manage remote access for vendors and service desks.  
    • Remote Support: Offer fast assistance from any location to any device via remote control and screen-sharing. Manage thousands of systems securely through automation. Integrate with SIEM, ITSM and CRM or create custom integrations. 
      • Customizations: Maintain standards and establish trust by customizing support experiences.
      • Terms and Permission Administration: Manage team roles, users and session permission settings.
    • Privilege Remote Access: Eliminate the chance of “privilege creep” and protect business' OT environments. Offer secure access to workstations, web applications and cloud infrastructure to remote workers. Protect privileged credentials, such as cloud storage, SSH keys and social media accounts, via a built-in vault with management, discovery, monitoring, rotating and auditing capabilities. 

Limitations

At the time of this review, these are the limitations according to user feedback:

  •  Dated look and feel.
  •  Limited integration capabilities. 

Suite Support

mail_outlineEmail: Not available.
phonePhone: Not available.
schoolTraining: Not available.
local_offerTickets: Fill out a form on the vendor’s contact page.
Your review has been submitted
and should be visible within 24 hours.
Your review

Rate the product