Try our new research platform with insights from 80,000+ expert users

BeyondTrust Privileged Remote Access vs CyberArk Privileged Access Manager comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Customer Service

No sentiment score available
Sentiment score
6.8
CyberArk Privileged Access Manager's support is efficient and knowledgeable, but response times and communication can vary, especially with outsourcing.
 

Room For Improvement

No sentiment score available
Sentiment score
6.7
Enhancements sought include user-friendliness, integration, automation, reporting, customization, API support, cost efficiency, deployment, documentation, and updates.
 

Scalability Issues

No sentiment score available
Sentiment score
7.1
CyberArk Privileged Access Manager offers seamless and flexible scalability for organizations, though licensing challenges may occur.
 

Setup Cost

No sentiment score available
Sentiment score
5.0
CyberArk Privileged Access Manager is costly but offers high value and comprehensive security, with subscription models benefiting larger installations.
 

Stability Issues

No sentiment score available
Sentiment score
7.8
CyberArk Privileged Access Manager is stable, with occasional bugs, but upgrades and redundancy features improve reliability and performance.
 

Valuable Features

No sentiment score available
Sentiment score
8.5
CyberArk Privileged Access Manager enhances security with automatic password rotation, session monitoring, and supports large-scale, compliant deployments.
 

Categories and Ranking

BeyondTrust Privileged Remo...
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
21
Ranking in other categories
Remote Access (9th)
CyberArk Privileged Access ...
Ranking in Privileged Access Management (PAM)
1st
Average Rating
8.6
Reviews Sentiment
7.1
Number of Reviews
193
Ranking in other categories
User Activity Monitoring (1st), Enterprise Password Managers (2nd), Mainframe Security (3rd), Operational Technology (OT) Security (3rd)
 

Mindshare comparison

As of November 2024, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Privileged Remote Access is 5.2%, down from 5.6% compared to the previous year. The mindshare of CyberArk Privileged Access Manager is 21.2%, down from 24.0% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Q&A Highlights

AG
Aug 14, 2023
 

Featured Reviews

Sean Rall - PeerSpot reviewer
Our support team can do so much more without having to actively engage our customers, which saves us time and money
In recent days, the most valuable feature would be the Vault. Overall, the most valuable feature would be that ability to do remote support. Vault does a good job of providing visibility for domain accounts, endpoints, and local accounts associated with discovery jobs. The report tools are very robust. I know they have their report tools that you can filter through, which also give you access to the data. So, if you ever want to just do a data dump and your own analytics on it, then you could, which is really nice. We also integrate with the API for reports, which is really nice as well.
SatishIyer - PeerSpot reviewer
Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product.
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Answers from the Community

AG
Aug 14, 2023
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your...
See 2 answers
Nurlan Temirbulatov - PeerSpot reviewer
Dec 7, 2022
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years. 
DN
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your specific needs and integrates seamlessly into your existing infrastructure. However, I recommend visiting the official website of Broadcom (the company that acquired Symantec's enterprise security business) or contacting their sales representatives to get the most up-to-date information about their PAM solutions, including any rebranding or changes that may have occurred. When evaluating any PAM solution, it's essential to consider factors such as security, integration capabilities, ease of use, vendor support, scalability, and alignment with your organization's specific needs and compliance requirements. It's also a good practice to request demonstrations, proofs of concept, and references from vendors to ensure that the solution meets your expectations. Remember to involve key stakeholders, such as IT, security, compliance, and management teams, in the decision-making process to ensure alignment with organizational goals and requirements.
 

Top Industries

By visitors reading reviews
Computer Software Company
18%
Financial Services Firm
12%
Manufacturing Company
9%
Government
8%
Educational Organization
31%
Financial Services Firm
13%
Computer Software Company
11%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about BeyondTrust Privileged Remote Access?
The product has improved remote support capabilities since it works fine.
What needs improvement with BeyondTrust Privileged Remote Access?
The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required. The product should be able to...
What is your primary use case for BeyondTrust Privileged Remote Access?
I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the solution.
How does Sailpoint IdentityIQ compare with CyberArk PAM?
We evaluated Sailpoint IdentityIQ before ultimately choosing CyberArk. Sailpoint Identity Platform is a solution to manage risks in cloud enterprise environments. It automates and streamlines the m...
What do you like most about CyberArk Privileged Access Manager?
The most valuable features of the solution are control and analytics.
What is your experience regarding pricing and costs for CyberArk Privileged Access Manager?
CyberArk Privileged Access Manager comes at a high cost. But the solution is worth its price.
 

Also Known As

Bomgar Privileged Access
CyberArk Privileged Access Security, CyberArk Enterprise Password Vault
 

Overview

 

Sample Customers

Horizon Beverage, Air Liquide, Gateway Bank of Florida
Rockwell Automation
Find out what your peers are saying about BeyondTrust Privileged Remote Access vs. CyberArk Privileged Access Manager and other solutions. Updated: October 2024.
816,406 professionals have used our research since 2012.