Try our new research platform with insights from 80,000+ expert users

BeyondTrust Endpoint Privilege Management vs BeyondTrust Remote Support comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

BeyondTrust Endpoint Privil...
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.0
Reviews Sentiment
6.9
Number of Reviews
30
Ranking in other categories
Anti-Malware Tools (10th)
BeyondTrust Remote Support
Ranking in Privileged Access Management (PAM)
24th
Average Rating
9.0
Reviews Sentiment
6.9
Number of Reviews
34
Ranking in other categories
Remote Access (14th)
 

Mindshare comparison

As of April 2025, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Endpoint Privilege Management is 3.9%, down from 5.4% compared to the previous year. The mindshare of BeyondTrust Remote Support is 1.1%, down from 1.2% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Featured Reviews

Prashant Uppuluri - PeerSpot reviewer
Provides critical application control and ensures security with a flexible setup process
Regarding the feedback scenario, it's a tough question as I have thoroughly gone through the entire partner portal and library of BeyondTrust, as well as BeyondTrust University. I have also interacted with support whenever a ticket is raised, ranging from P1 to P3 or P2. Most end users and partners seem happy and content with BeyondTrust. The deployment of the solution is generally easy, flexible, and scalable. However, it can be challenging in certain environments, especially regarding management. Improvements could focus on adding more AI features to automate processes that are currently manual or challenging for end users. In some cases of competition, I have noted specific use cases where the recording of sessions was an endpoint for BeyondTrust, providing an edge for higher management. The ability to view recorded live sessions of specific users is a crucial benefit.
Hahn Rolf - PeerSpot reviewer
Solution elevates team collaboration and manages remote support efficiently
For me as a user in the service desk, there is already a lot of functionality in the product. I don't have any specific ideas for improvement on that side. Some technical aspects could be improved, particularly in product management. For the end user, enhancements do not seem necessary at the moment. They could probably give the technician client a more modern interface, but the crucial factor is stable connectivity in a remote session. I see more potential for improvement on the administration side, like better transparency when a patch is installed. It would be useful for administrators to see the version and patch levels of the product easily. BeyondTrust could also enhance their quality control process before releasing a new build to ensure no new bugs are present. This is a common issue among software manufacturers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"I'm a BeyondTrust partner and I have multiple deployments, four or five banks right now. The features that give us quite an edge compared to what our competitors are offering - like IBM or Thycotic - are the Session Management, that is quite a big one; also the recording of keystrokes. In addition, there is the password vaulting and state-of-the-art Password Management, which I haven't seen in other products."
"What I liked about this solution is that it can also integrate for tracking malicious use or sending analytics to a host that can process them. I don't know if CyberArk, Centrify, or Thycotic can do that. The analytics was something the client really wanted, and they already had BeyondTrust. It is very scalable. The agent on the workstation is very thin, and the processing power required on a server is nothing out of the ordinary. It is also very stable and easy to deploy."
"It's relatively straightforward to set up, especially if you are deploying to the cloud."
"The asset discovery feature is the solution's most valuable aspect. It's very easy to pull assets into the database of the solution manager."
"The notable aspect is its ability to capture the application's behavior comprehensively and this thorough analysis is crucial for effective policy management."
"I find the comprehensive Privilege Access Management features valuable, including automation, and the ability to integrate with applications and the Windows operating system."
"It is straightforward. It is a good technology, and it is made to do one single thing."
"The solution's least privilege enforcement has helped us ensure access is given to only the required people."
"The most valuable feature of BeyondTrust Remote Support is the ability to control screens remotely."
"Remote Support 16.2 introduced Web Interface for Representative Console.with same functions as Desktop Console."
"We are able to be more effectively connected to computers and servers all over the world."
"Solution has a good UI."
"The integrated chat service with quick elevation to a full control support session has increased our service desk efficiency."
"We have the ability to securely assist users remotely with a stable product, which allows for reporting capabilities, SAML authentication, and ServiceNow integration."
"Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."
"Bomgar has allowed our service desk (based in India) and our other support personnel based in the US to seamlessly support our users worldwide."
 

Cons

"Its feature for establishing workflows needs improvement."
"The weaknesses are related to the effort required to migrate from existing technologies or having no Privilege Access Management (PAM) at all to adopting technologies like BeyondTrust. It involves changes in processes and can take a significant amount of time, typically six to twelve months."
"It only has limited support for Mac."
"The initial setup was very difficult. Even if you are an expert in EPM, it is still very difficult."
"The other area to improve is that they rely on MS SQL servers only. You cannot have any other database behind them. They have to be on MS SQL. If they can do something about these issues, this would be a better alternative for some customers."
"What's bothering me, which is true of all of them, is that sometimes, the error codes that come up don't necessarily get reflected in the searches within their support sites or they're out of date. I would rather search by an error code than type in the text and search for it by text because the error code means that it is programmatic, and it is known. It might not be desired, but it at least is not unexpected. If you don't have an error code, you just get an anomalous error, and if it is lengthy, it can be difficult to search and find the specific instance you're looking for. This is something I would like all of them to improve. BeyondTrust, CyberArk, Centrify, and Thycotic could do some improvements in staying up to date and actually allowing you to search based on the product version. They are assuming that everybody is on their way to release. They put out a new release, but it is not reflected on the support site, which makes no sense to me, especially when they revamp all the error codes. They all have been guilty of this in some way."
"They are doing good for now, but they should start to consider tight integration with Mac solutions. There should be more integration with Mac. There should be Active Directory (AD) Bridging. Thycotic and Centrify have it currently because they merged and joined forces, and it was a feature available in Centrify. So, basically, they joined forces to create a kind of perfect product. If you have a hybrid or mixed environment with Windows and Mac, your Active Directory can only manage or enforce policies on Windows, but what about your Mac devices? How do you control them? So, AD Bridging will act as a bridge to bring all your Mac devices into your Active Directory. This way you have full control over your entire environment."
"There is room for improvement in having the solution align more with standards. We're always shoehorning the product into the standards. It's not that it doesn't work for standards, it does. But Quick Start Policies are pretty close to what we need. The vendor needs to keep looking at GDPR, 27001, and 27701. That's why our clients buy the product."
"Some technical aspects could be improved, particularly in product management."
"The solution currently is not stable and we gave a road map of our expectations two or three days ago."
"This product has a lot of features that we do not currently use, so there may be some things that cause bloat and confusion."
"There were a few employee devices that failed during the initial deployment, which required a second deployment."
"It needs better Linux support. We have had issues with Ubuntu specifically."
"I would also like to see better support of Apple devices while using a Windows remote support console."
"The screen annotation tools could be expanded. I would like to see a text/typing annotation tool."
"iOS interactive support would be a cool addition. Right now it's a non-interactive view."
 

Pricing and Cost Advice

"It is relatively more cost-effective compared to the competing product."
"The product’s licensing is different for Windows, Linux, and Mac. The tool’s licensing is yearly."
"I'm sure everyone should have the cluster environment, which means more expensive, anyway, cheaper than the other solutions."
"It was very expensive."
"This solution is expensive compared to its competitors."
"The solution's pricing is high."
"Its pricing and licensing are okay. We were in the perpetual model when it was on-prem, and now, with the SaaS service, we have a subscription model. As a customer, I would always like to see a lower price, but it seems to be priced at the right model currently, and we are trying to get the maximum benefits out of it."
"PowerBroker for a Mac client is three times the price of the Windows version."
"The solution is subscription-based and depends on the number of admin users."
"The cost currently according to the client is a bit high for them."
"I would like to order more licenses. This would allow us to support more end users concurrently."
"Bomgar has a very fair pricing structure."
"For a smaller customer, the cloud solution costs around $2300 per user per year."
"It is pretty pricey. It is not cheap. The licensing structure is not cheap. The tool is not cheap, but in the long run, it is well worth it. It is probably one of the best on the market because it is just so easy to use and easy to deploy. It gave us the ability to see what everybody was doing. It held people accountable. It gave us the accountability that we needed."
"This product provides value for money."
"The setup is complex. Purchase the remote implementation service and make them slow down and work with you."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
845,849 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
18%
Computer Software Company
14%
Manufacturing Company
9%
Government
8%
Computer Software Company
18%
Financial Services Firm
13%
Manufacturing Company
10%
Government
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about BeyondTrust Endpoint Privilege Management?
The solution's least privilege enforcement has helped us ensure access is given to only the required people.
What is your experience regarding pricing and costs for BeyondTrust Endpoint Privilege Management?
Setup costs vary depending on the scenario. Sometimes we win orders, and other times we lose due to partner preferences or deal scenarios. Customers may negotiate on price, understanding that quali...
What do you like most about BeyondTrust Remote Support?
The most valuable feature of the solution concerns our company's main use case, which is for connection to our remote clients.
What needs improvement with BeyondTrust Remote Support?
For me as a user in the service desk, there is already a lot of functionality in the product. I don't have any specific ideas for improvement on that side. Some technical aspects could be improved,...
What advice do you have for others considering BeyondTrust Remote Support?
If used properly by a service desk agent, the cost of the tool is justified. The price reflects the tool's capabilities. I would rate the product ten out of ten. Overall, I give it a rating of ten ...
 

Also Known As

BeyondTrust PowerBroker, BeyondTrust Endpoint Privilege Management for Windows, BeyondTrust Endpoint Privilege Management for Mac, BeyondTrust Endpoint Privilege Management for Linux, BeyondTrust Endpoint Privilege Management for Unix, Avecto Defendpoint
Bomgar Remote Support
 

Overview

 

Sample Customers

Aera Energy LLC, Care New England, James Madison University
InterContinental Hotels Group, Williams-Sonoma Inc., eBay, Carbonite, Computer Sciences Corporation
Find out what your peers are saying about BeyondTrust Endpoint Privilege Management vs. BeyondTrust Remote Support and other solutions. Updated: March 2025.
845,849 professionals have used our research since 2012.