Citrix DaaS and BeyondTrust Privileged Remote Access are leading solutions in the virtualization and remote access domains, respectively. Citrix DaaS is generally favored for its user-centric approach and broader feature set, whereas BeyondTrust is noted for its superior security features.
Features: Citrix DaaS offers comprehensive virtualization capabilities, enhanced remote access, and seamless user experience. BeyondTrust provides robust security, superior access control, and integration with various security tools. Citrix DaaS stands out due to its extensive functionality and user-friendliness.
Room for Improvement: Citrix DaaS could benefit from more flexible pricing models, enhanced security protocols, and additional security enhancements. BeyondTrust could improve its setup process, offer better documentation, and enhance ease of use.
Ease of Deployment and Customer Service: Citrix DaaS is straightforward to deploy and supported by excellent customer service, making integration smooth. BeyondTrust, while secure, poses more challenges during setup, though its support is responsive.
Pricing and ROI: Citrix DaaS offers good ROI with its extensive features and scalable pricing. BeyondTrust’s higher pricing is justified by superior security features but has a longer payback period. Citrix users find a balance of cost and value, while BeyondTrust users feel their investment is worthwhile due to heightened security, despite the steeper price.
If my organization has sensitive data we don't want to leak, deploying the policies can present technical challenges and potential loopholes.
Autopilot allows bulk enrollment of devices, making it easy for end users, even those without technical expertise, to use their devices immediately.
Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.
In an increasingly mobile workforce, Microsoft Intune keeps your sensitive data safe while on the move. Microsoft Intune makes it possible for your team members to work anywhere using their mobile devices. Microsoft Intune provides both the flexibility and the control needed for securing all your data on the cloud, no matter where the device with the data is located.
Microsoft Intune Device Management Key Features
With Microsoft Intune Device Management you can:
Mobile Application Management
Mobile application management in Intune is designed to protect your organization’s data at the application level.
With Microsoft Intune Application Management you can:
As part of Microsoft's Enterprise Mobility + Security (EMS) suite, Intune integrates with Microsoft Entra ID for access control and with Azure Information Protection for data protection. It also integrates with Microsoft 365 Applications.
Reviews from Real Users
Microsoft Intune stands out among its competitors for a number of reasons. Two major ones are its ability to secure all devices under its management and the flexibility that the solution offers its users.
A computing services manager notes, "Its security is most valuable. It gives us a way to secure devices, not only those that are steady. We do have a few tablets and other devices, and it is a way for us to secure these devices and manage them. We know they're out there and what's their status. We can manage their life cycle and verify that they're updated properly."
The head of IT engineering at a financial services company writes, "The one feature we find most useful is the Mobile Application Manager. There are two types: we have the complete MDM and the Mobile Application Manager (MAM). We don't give our users phones, it is their own personal phone, and we need to allow them to have access to the company details on their phone. We need to create a balance between their own personal data and the company data. We deploy the Mobile Application Manager for them so that we won't be able to interfere with their own personal data."
BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.
Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.
Features include:
- Privileged Access Control: Enforce least privilege by giving users the right level of access.
- Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.
- Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.
- Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.
- Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.
- Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.
Enable secure, flexible work with the leader in virtual apps and desktops
Deliver desktop as a service (DaaS) from any cloud or datacenter
Get started with Citrix DaaS (formerly Citrix Virtual Apps and Desktops service) in minutes to provide a familiar, high-performance digital workspace experience to your users. We’ll manage the infrastructure and security. You focus on your business.
We monitor all Remote Access reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.