BeyondTrust Remote Support and BeyondTrust Password Safe compete in the IT support and password management categories respectively. User data suggests BeyondTrust Password Safe holds an advantage in security features despite its higher cost, whereas BeyondTrust Remote Support is favored for affordability and reliability in IT support tasks.
Features: BeyondTrust Remote Support integrates seamlessly and supports various devices and operating systems, enhancing remote troubleshooting. It also offers reliable day-to-day IT support interactions. Meanwhile, BeyondTrust Password Safe provides robust control and auditing for password management, securing user credentials effectively and supporting comprehensive security protocols.
Room for Improvement: BeyondTrust Remote Support could improve reporting capabilities, enhance intuitive access permissions, and refine user interface elements. BeyondTrust Password Safe users suggest better integration with third-party applications, a more efficient update process, and additional customization options for user-specific needs.
Ease of Deployment and Customer Service: BeyondTrust Remote Support offers smooth deployment with minimal issues and receives praise for its customer service. Although the setup for BeyondTrust Password Safe involves a steeper learning curve, it provides responsive support once deployed, allowing users to get accustomed quickly to its functionalities.
Pricing and ROI: BeyondTrust Remote Support is perceived as cost-effective with a strong ROI due to its efficiency in troubleshooting tasks. BeyondTrust Password Safe, although requiring a higher initial investment, delivers substantial value by effectively securing sensitive credentials, which many users consider worth the expense.
Beyond Trust Password Safe is an automated solution that combines password and privileged session management into a single platform. Password Safe delivers secure access control, auditing, alerting, recording, and monitoring.
This free and open-source password manager supports Windows and Linux, and some ports are available for other platforms as well. Their proprietary algorithm, Twofish, is considered highly secure, with the advantage that it is not affiliated with NIST. The Twofish algorithm secures the data while keys are delivered using SHA-256 authentication.
The application is easy to use, and you can download the Windows app from several sites. Additionally, the application is available in 14 languages.
Beyond Trust Password Safe Key Features
What can you do with Password Safe?
Beyond Trust Password Safe Benefits
Reviews from Real Users
A PAM Architect at a tech services company says, "BeyondTrust Password Safe's features that I have found most valuable are really those that are knitted in. That is their Smart Rules and Smart Groups, where you design your administration model so you create your AD groups and your asset groups, and configure Password Safe."
An I.S. Architect at a insurance company mentions that "Session recording, password rotation, and password vaulting are the most valuable features."
"One of the most valuable features is that this is a product designed with enterprises in mind," adds a Cybersecurity Architect at a tech vendor.
BeyondTrust Remote Support is software built to help organizations gain access to and support nearly any remote computer or mobile device with a single solution. BeyondTrust Remote Support works across Windows, Mac, and Linux and gives you access and control whether a device is on or off the network.
BeyondTrust Remote Support Features
BeyondTrust Remote Support has many valuable key features. Some of the most useful ones include:
BeyondTrust Remote Support Benefits
Some of the benefits of using BeyondTrust Remote Support include:
Reviews from Real Users
Below are some reviews and helpful feedback written by BeyondTrust Remote Support users.
A Cybersecurity Architect at a tech vendor says, “The most valuable features are the ease of deployment, performance, pre and post-sales support, the vast majority of the localization they have done and the solution provider that they support. You can't compete with TeamViewer or any other similar products. It's completely in a class of its own.”
An Enterprise Service Desk Systems Manager at a manufacturing company comments, "Screen sharing, in general, is pretty important for a service desk. Another thing that I have found to be very helpful is that you can also do screen sharing on a cell phone. When people have an issue with their cell phone, it is ordinarily very difficult to troubleshoot the issue. With BeyondTrust Remote Support, you can share the cell phone screen, and somebody can take a look at it remotely. I am not sure if other competing solutions offer this feature. It is pretty user-friendly. It is also good performance-wise."
PeerSpot user Mark B., Sr VP of Business Operations at Networking Technologies and Support, Inc., explains that he thinks the solution is “Great for delivering end-user support, good at recording sessions, and very stable.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.