ARCON Privileged Access Management vs BeyondTrust Privileged Remote Access comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between ARCON Privileged Access Management and BeyondTrust Privileged Remote Access based on real PeerSpot user reviews.

Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
787,033 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"It was very easy for us to move this application and database from on-premise to cloud, as well as configure new things, such as load balancing. The product is very compatible.""One of the main benefits we've experienced is that Arcon helps us manage all our team's tasks and provides recording capabilities.""The video logs help us to identify any misuse of privileged accounts.""Previously, we had to go through some effort to change the credentials of our devices. The process was subject to human error... For things like managing credentials, some kind of register had to be maintained. With the Password Vault of ARCON, all these processes are automated. The credentials are changed, as per the schedule. The information is encrypted, kept in our vault, and sent to all the email addresses within the ARCON solution itself.""The product's deployment phase was easy.""Video and audio logs are there for any activities that the privileged admin carries out.""That dashboard is okay.""One standout feature of ARCON is its ability to resolve lagging issues, especially noticeable in Linux environments."

More ARCON Privileged Access Management Pros →

"The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature.""I like the enterprise credential manager. It's a connector that sits in PRA and tests the credentials for the end user with a process that will clean the password. This is one of PRA's primary features and simplifies user onboarding. There aren't many restrictions or complications. We can add the user while only opening one port, which is more than enough to access the PRA server. Every organization requires only four critical servers out of a hundred and some 50 production servers.""The security provided by PRA when it comes to access for remote and privileged users has been outstanding. It has met all of our objectives, everything from password rotation to securing and allowing us to clamp down access to the auditing and monitoring features.""The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs.""Its initial setup process is straightforward.""It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength.""We can truly elevate our admin rights while we're in there to fully take control of a system and manage it as if it was sitting right here on our desk. Most of the organization has gone to remote work or work from home. With that being the case, this solution allows us to be able to still work with our end-users, even though they're not always sitting on our network.""The scalability is excellent."

More BeyondTrust Privileged Remote Access Pros →

Cons
"Sometimes it gets stuck between servers and I would like to see this improved in the future.""The usability should be expanded to other browsers like Chrome and Firefox.""Initially, there were some issues with .NET applications in Windows 10 systems.""It should be browser-agnostic and, frankly, it is working well on Internet Explorer. It should work on popular browsers like Mozilla and Firefox.""The deployment process is a bit complex because no document is available.""For the in-house built applications, they need to provide good, solid access through their portal.""If an ID gets locked, the tool cannot unlock it, making it an area where improvements are required.""Anti-bridging should be built into product."

More ARCON Privileged Access Management Cons →

"One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint.""It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution.""The solution's Vault is a nice feature. It helps to securely share a security password in teams, but it is not at the level of a password management solution. So, it is just really a vault. We were expecting to have more features to better manage passwords, but that is something that you can work around if you also have a password safe solution. I would like them to have features like password rotation or password auditing, e.g., old passwords.""Its management is through two different portals, and you can't get from one portal to the other. I have to literally open up another website and go into it a different way. There are no inner links between the two. They should interlink the actual virtual server and the appliance. In general, there should be one interface for management for admins.""When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer.""Some of the capabilities in the solution were not as available or not as outstanding as CyberArk. We had to manage whatever little was available for us, especially its recording capabilities, logs, and a number of things.""The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required.""Its access process for third-party vendors needs to be simplified."

More BeyondTrust Privileged Remote Access Cons →

Pricing and Cost Advice
  • "Pricing is low and licensing is flexible."
  • "Pricing is reasonable."
  • "ARCON is a will give you all the features in a very cost-effective solution. Pricing and licensing is very good compared to other players in the market."
  • "The product is available with competitive pricing. Licensing is not complex. We calculated the license requirements by counting the number of admins and the number of devices which were going to integrate with it."
  • "The pricing and licensing model is very economical."
  • "Pricing and licensing are good, very aggressive."
  • "I am not in a position to give any financials, but whatever we have paid, it is value for money. Their licensing model is good. They have been flexible for us."
  • "The product's pricing is good value. Go for user-based licensing, without any limit on the target servers."
  • More ARCON Privileged Access Management Pricing and Cost Advice →

  • "The price is pretty expensive, but you get what you pay for and this is a great product."
  • "I wish it was a little bit cheaper, but when a product is as solid as this, I understand what the cost does. It helps them to make sure it stays that way. If you want a reliable, solid product, you're going to pay more."
  • "Don't get into a situation where you are licensing per desktop or per person until you fully understand the licensing."
  • "My client found the solution a bit expensive but considering their use case and requirements, they didn't have any other choice. As far as I know, implementation and licensing are the only costs."
  • "I wasn't directly involved in the licensing and pricing, but I can say that PRA is licensed per endpoint added to the Vault. I would advise users to take frequent exports of their license usage package; it's a simple feature that provides a spreadsheet of every machine in the Vault. This helps to cut down on duplicate licenses, which can happen by adding the same endpoint using an IP address and a fully qualified domain name, for instance. The implementation is an additional cost, and they offer several tiers, so the price varies. There are also some optional add-ons, so I would advise people to research the product well and find out precisely what they need regarding features. The Advanced Web Access add-on provides some required functionality when interfacing with websites; that's one to consider."
  • "Its price is pretty good for the features and services that it provides. It is not outrageous. I'm not aware of any additional charges or anything like that."
  • "PRA was one of the cheapest solutions that we evaluated."
  • "Though the solution was a bit expensive, the overall pricing was average."
  • More BeyondTrust Privileged Remote Access Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Privileged Access Management (PAM) solutions are best for your needs.
    787,033 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Some options are required in the tool, especially to help in scenarios where if a user's ID gets locked, that person cannot unlock the ID from ARCON Privileged Access Management. Even the technical… more »
    Top Answer:The product has improved remote support capabilities since it works fine.
    Top Answer:The issue I found with the product revolves around the fact that RDP and SSH sessions take too much time, making it an area of concern where improvements are required. The product should be able to… more »
    Top Answer:I use the tool in my lab. I am involved in the product's testing phase in my lab, where I am trying to check out the solution.
    Ranking
    Views
    3,495
    Comparisons
    1,308
    Reviews
    10
    Average Words per Review
    373
    Rating
    7.7
    Views
    2,405
    Comparisons
    1,551
    Reviews
    15
    Average Words per Review
    1,269
    Rating
    8.3
    Comparisons
    Also Known As
    ARCON ARCOS, ARCON PAM
    Bomgar Privileged Access
    Learn More
    Overview

    ARCON PAM is a full blown Privileged Access Management solution. It has a robust password vaulting technology that comes with AES- 256 Database encryption. Dual Factor Authentication, 4Eye Authentication functionalities and Granular Access Control enables an enterprise to block any unauthorized access attempt to critical information assets. All access is based on “Need to know” and “Need to do” basis. It has the largest connector stack. Its Single Sign On enables seamless access to a host of devices with just a single click.

    The Solution enables an enterprise to monitor and analyze advanced threats in a real time. It has the best-in-class real-time threat analytics. It provides comprehensive audit trails and session recordings to ensure that all activities are tracked and these logs are encrypted and separately stored creating a legal hold.

    Further, it has a highly scalable architecture that easily integrates with Third Party SIEM Solutions. It also supports cloud environment.

    ARCON PAM is full-functionality solution at the most optimum pricing. More than 250 global enterprises spanning wide-ranging industries such as Banking, Financial Services and Insurance (BFSI), Government Organizations, Media, Health Care, and Fintech have deployed ARCON PAM as of today.

    While the company continues to be a leader in India and the Middle East, it has gained a solid traction in Africa and APAC market thanks to its well-distributed global channel network and strong industry reputation it enjoys in the cyber security domain.

    BeyondTrust Privileged Remote Access (formerly Bomgar Privileged Access) lets you secure, manage, and audit vendor and internal remote privileged access without a VPN.

    Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling your organization to extend access to important assets, but without compromising security.

    Features include:

    - Privileged Access Control: Enforce least privilege by giving users the right level of access.

    - Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.

    - Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.

    - Integrate with Password Management: Inject credentials directly into servers and systems with just one click, so users never need to know or see plain text credentials.

    - Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.

    - Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or post- session review, and provide attestation reports to prove compliance.

    Sample Customers
    RAK Bank, AXIS Bank, Reliance Capital, Kotak Life Insurance, MTS
    Horizon Beverage, Air Liquide, Gateway Bank of Florida
    Top Industries
    REVIEWERS
    Financial Services Firm52%
    Healthcare Company9%
    Computer Software Company9%
    Construction Company4%
    VISITORS READING REVIEWS
    Educational Organization61%
    Computer Software Company9%
    Financial Services Firm4%
    Retailer3%
    REVIEWERS
    Comms Service Provider21%
    Government14%
    Wholesaler/Distributor14%
    Computer Software Company14%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Financial Services Firm10%
    Government9%
    Manufacturing Company7%
    Company Size
    REVIEWERS
    Small Business25%
    Midsize Enterprise28%
    Large Enterprise47%
    VISITORS READING REVIEWS
    Small Business10%
    Midsize Enterprise65%
    Large Enterprise25%
    REVIEWERS
    Small Business50%
    Midsize Enterprise15%
    Large Enterprise35%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise13%
    Large Enterprise65%
    Buyer's Guide
    ARCON Privileged Access Management vs. BeyondTrust Privileged Remote Access
    May 2024
    Find out what your peers are saying about ARCON Privileged Access Management vs. BeyondTrust Privileged Remote Access and other solutions. Updated: May 2024.
    787,033 professionals have used our research since 2012.

    ARCON Privileged Access Management is ranked 8th in Privileged Access Management (PAM) with 32 reviews while BeyondTrust Privileged Remote Access is ranked 3rd in Privileged Access Management (PAM) with 21 reviews. ARCON Privileged Access Management is rated 7.8, while BeyondTrust Privileged Remote Access is rated 8.6. The top reviewer of ARCON Privileged Access Management writes "Offers good session monitoring and recording features". On the other hand, the top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". ARCON Privileged Access Management is most compared with CyberArk Privileged Access Manager, Cisco ISE (Identity Services Engine), ManageEngine PAM360, BeyondTrust Endpoint Privilege Management and Sectona Privileged Access Management, whereas BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), BeyondTrust Remote Support and Microsoft Remote Desktop Services. See our ARCON Privileged Access Management vs. BeyondTrust Privileged Remote Access report.

    See our list of best Privileged Access Management (PAM) vendors.

    We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.