Try our new research platform with insights from 80,000+ expert users

BeyondTrust Privileged Remote Access vs Delinea Secret Server comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Oct 6, 2024
 

Categories and Ranking

BeyondTrust Privileged Remo...
Ranking in Privileged Access Management (PAM)
9th
Average Rating
8.6
Reviews Sentiment
7.3
Number of Reviews
22
Ranking in other categories
Remote Access (9th)
Delinea Secret Server
Ranking in Privileged Access Management (PAM)
2nd
Average Rating
8.0
Reviews Sentiment
7.0
Number of Reviews
51
Ranking in other categories
Enterprise Password Managers (5th)
 

Mindshare comparison

As of December 2024, in the Privileged Access Management (PAM) category, the mindshare of BeyondTrust Privileged Remote Access is 5.3%, down from 5.4% compared to the previous year. The mindshare of Delinea Secret Server is 11.4%, down from 13.3% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Privileged Access Management (PAM)
 

Q&A Highlights

AG
Aug 14, 2023
 

Featured Reviews

Sean Rall - PeerSpot reviewer
Our support team can do so much more without having to actively engage our customers, which saves us time and money
In recent days, the most valuable feature would be the Vault. Overall, the most valuable feature would be that ability to do remote support. Vault does a good job of providing visibility for domain accounts, endpoints, and local accounts associated with discovery jobs. The report tools are very robust. I know they have their report tools that you can filter through, which also give you access to the data. So, if you ever want to just do a data dump and your own analytics on it, then you could, which is really nice. We also integrate with the API for reports, which is really nice as well.
Avinash Gopu. - PeerSpot reviewer
Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools
The "App to App" feature has been most impactful. It allows secure communication between applications without requiring direct user access, which is crucial for several applications. Additionally, working in the finance department, we are heavily focused on enhancing audit reporting and compliance. So, the GRC (Governance, Risk & Compliance) capabilities of Delinea Secret Server have also been crucial for us. We implemented a custom reporting system that can automatically send reports to auditors daily, weekly, or according to your organization's needs. We also upgraded the audit role within Secret Server, allowing auditors to access and analyze the reports directly. Additionally, Secret Server provides comprehensive logging capabilities. Auditors can see what data users access, their access levels, and their activities, including check-in and check-out times. Furthermore, Secret Server helped us manage privileged, elevated access, which we call "K2K." As the lead for this project, I could identify users with the highest access levels and implement specific policies to monitor their activity on servers.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
"The scalability is excellent."
"I like all of it. You can access computers that are on a DMZ. You can access computers that are off the network and on the network. You pretty much have access to computers wherever they are. As long as they have the client on them, you can get to them. So, it is convenient, but its main feature is that you can use your smart card to elevate your privileges remotely. That's a great feature."
"The secure access must be audited live, ensuring patient data protection."
"It's a stable product. Based on the demos and interaction with it, it was stable."
"We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access."
"Based on the feedback from my colleagues who have never complained about the technical support, I would say that the product's support team is good."
"PRA stands on its own as a full solution. This is important because it reduces the need to maintain a lot of different services. Also, the integration between those services are sometimes not easy to maintain. So, having a solution like BeyondTrust Privileged Remote Access reducing our workload gives us enough time to work on our other issues. The system just runs and does what it is supposed to do."
"The tool has many models. The tool also has a good cloud version. Also, the customers need not control any components on the solution side. The product's licensing model is also good since customers can choose a price that is most useful for them. The solution also supports password management for the users in your organization."
"Its technical support is good."
"We implemented the product for our privileged identities. We have configured them in check-in/check-out rotation. Delinea Secret Server rotates the password each time a privileged identity is checked in, making the password valid only for some time."
"I have found most valuable the automatic scheduled password rotation and remote desktop monitoring. Additionally, the documentation is readily available and easy to find and the dashboard is straightforward."
"The surveillance is most valuable."
"The privileged access management module is the most reliable feature."
"The product provides a native user experience without requiring users to install additional software or agents."
"The most valuable feature is session monitoring."
 

Cons

"I would love to have a web console and the ability to use the smart card with the web console to provide remote support. If you are on a computer that doesn't have the Bomgar console, you should be able to use the web console to provide support. That's the only thing right now. A web console is nice when you're jumping into a computer, but if you need to elevate the privileges, you currently can't do it with the smart card. If they could figure that out, that would be money."
"There is no connectivity to the appliance side. There is no API, and it is just difficult for me to capture what version the device is on without going in and doing screenshots. It is a little too secure in that regard, where they don't even trust their product owner. Since a lot of hacks come from the inside, they are probably doing what they need to do out of necessity. It is just that I have to work pretty hard to produce compliance data on the box."
"Customer support used to be faster with chat options available. However, support now requires opening a ServiceNow ticket, which can be time-consuming."
"I recommend that we improve integration with other products like PasswordSafe, aiming for smoother integration."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"In terms of the ability to automate the creation of new accounts within it, it's still a bit laborious."
"They could probably integrate a wizard or something like that to add a new use case. It could be something that makes it easier to add a new use case."
"In many PAM tools, when users request a password checkout, they need to provide justification. However, in my experience across four organizations, nobody actually reads the justifications. Users can simply type anything and get the password. This becomes a risk and compliance issue. There needs to be continuous improvement in this area, focusing on problem identification and mitigation strategies."
"It is expensive compared to other solutions in this category and for what it does."
"It would be better if they had a Linux version of the secret server."
"The setup for this solution is complex. I'm not going to lie, you need a specialized system security engineer to deploy it."
"The initial setup and deployment can be cumbersome."
"Delinea Secret Server needs to improve its reporting."
"Its remote support feature needs improvement."
"This product is excellent in every way except minor details in handling extremely large environments."
 

Pricing and Cost Advice

"My client found the solution a bit expensive but considering their use case and requirements, they didn't have any other choice. As far as I know, implementation and licensing are the only costs."
"PRA's pricing is competitive."
"Though the solution was a bit expensive, the overall pricing was average."
"Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
"PRA was one of the cheapest solutions that we evaluated."
"The price is pretty expensive, but you get what you pay for and this is a great product."
"I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
"I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
"I would give the price a four on a scale from one to ten, with one being the cheapest and ten being the most expensive. We pay for the license on a yearly basis, and we paid for three years. It costs around 5000 a year."
"Secret Server is expensive when compared to the cost to some alternatives."
"In the Nigerian market, the adoption of Delinea depends largely on an organization's budget. If they have the financial capacity, they might consider Delinea as a viable option."
"They are priced quite well."
"The price of this solution is good."
"It is very expensive, and its price should be lower."
"We have an enterprise license as well as a user license and a support license."
"Pricing is comparable to competing products."
report
Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
824,053 professionals have used our research since 2012.
 

Answers from the Community

AG
Aug 14, 2023
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your...
See 2 answers
Nurlan Temirbulatov - PeerSpot reviewer
Dec 7, 2022
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years. 
DN
Aug 14, 2023
Based on your extensive list of requirements, CyberArk Privileged Access Manager appears to align well with your needs due to its comprehensive feature set, strong security controls, integration capabilities, and advanced analytics for privileged access. However, it's important to conduct in-depth evaluations, demos, and discussions with each vendor to ensure that the chosen tool meets all your specific needs and integrates seamlessly into your existing infrastructure. However, I recommend visiting the official website of Broadcom (the company that acquired Symantec's enterprise security business) or contacting their sales representatives to get the most up-to-date information about their PAM solutions, including any rebranding or changes that may have occurred. When evaluating any PAM solution, it's essential to consider factors such as security, integration capabilities, ease of use, vendor support, scalability, and alignment with your organization's specific needs and compliance requirements. It's also a good practice to request demonstrations, proofs of concept, and references from vendors to ensure that the solution meets your expectations. Remember to involve key stakeholders, such as IT, security, compliance, and management teams, in the decision-making process to ensure alignment with organizational goals and requirements.
 

Top Industries

By visitors reading reviews
Computer Software Company
19%
Financial Services Firm
11%
Manufacturing Company
10%
Government
9%
Educational Organization
38%
Computer Software Company
11%
Financial Services Firm
7%
Manufacturing Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

What do you like most about BeyondTrust Privileged Remote Access?
The product has improved remote support capabilities since it works fine.
What needs improvement with BeyondTrust Privileged Remote Access?
The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required. The product should be able to...
What is your primary use case for BeyondTrust Privileged Remote Access?
I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the solution.
Looking for recommendations and a pros/cons template for software to detect insider threats
This is an inside-out --- outside-in --- inside-in question, as an insider can be an outsider as well. There is no short answer other than a blend of a PAM tool with Behavioral Analytics and Endpo...
What do you like most about Delinea Secret Server?
The privileged access management module is the most reliable feature.
What is your experience regarding pricing and costs for Delinea Secret Server?
If you're requesting licenses or pricing, then you have to fill out a questionnaire that they try to gain insight into what your environment is like, what you're trying to discover, and what you're...
 

Also Known As

Bomgar Privileged Access
Thycotic Secret Server, Delinea Password Reset Server
 

Overview

 

Sample Customers

Horizon Beverage, Air Liquide, Gateway Bank of Florida
Secure-24, University of San Diego, International Rescue Committee, San Francisco Ballet, Perkins Coie, University of San Diego, D.S.S. Limited, Turbo's Hoet, Eclipse Computing, Cathay Bank, Stellarise, J&R Consulting
Find out what your peers are saying about BeyondTrust Privileged Remote Access vs. Delinea Secret Server and other solutions. Updated: December 2024.
824,053 professionals have used our research since 2012.