We performed a comparison between BeyondTrust Privileged Remote Access and Delinea Secret Server based on real PeerSpot user reviews.
Find out in this report how the two Privileged Access Management (PAM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The project goal was to allow staff to run applications with admin privileges without being admins, which was the product's most important feature."
"This product is very stable and scalable. This is an excellent platform."
"Its security, simplicity, and ease of deployment and maintenance are the most valuable. It is FIPS compliant, so it goes through severe penetration testing every one year or two years. They have to maintain this compliance. It is very safe. Customers have been using it in the last eight years because of the simplicity of getting it deployed quickly. Most of the people using the solution had been hacked already, so they needed it quickly. As compared to the other solutions in the market, it can be turned on in production very quickly. You don't really need to have a server. It can be deployed very rapidly on VMware or Hyper-V, and you don't need to do an installation. It is a kind of an all-included package that you just deploy in a VM environment. It is basically a VM that is specifically built for a customer. The way the PRA data solutions work is that you need to build them for each customer because of being hard-coded with their SSL certificate, their web page name, and all that."
"We like the integration with Active Directory. It allows us to discover the endpoints and user accounts that need protection. It's a good way of securing our privileged access."
"It is a real fortress. Its security is very strong. Multi-factor came as a feature out-of-the-box, which was big for us. That helps us meet another compliance requirement. It enforces encryption. Nobody can see what we are doing in our remote system if they happen to be listening for unencrypted traffic. That is its biggest strength."
"The most valuable feature is that this solution can be implemented regardless of the operating system."
"The visibility of the solution's Vault works as it is supposed to: out-of-the-box for domain accounts, endpoints, and local accounts associated with discovery jobs."
"The scalability is excellent."
"Provides us with the ability to control access [to secrets] by groups."
"We implemented the product for our privileged identities. We have configured them in check-in/check-out rotation. Delinea Secret Server rotates the password each time a privileged identity is checked in, making the password valid only for some time."
"Delinea's network integration is the most useful. For example, I use a Check Point firewall connect to SmartConsole, so I need to do a lot of configuration in Delinea Secret Server. Native integration with Check Point is valuable. You can also go download whatever API you need from the cloud, whether you're using Check Point, Palo Alto, etc. Enriched discovery is another good feature. If you are dealing with several kinds of systems, you can see which system requires privileged access to my network."
"The tool has many models. The tool also has a good cloud version. Also, the customers need not control any components on the solution side. The product's licensing model is also good since customers can choose a price that is most useful for them. The solution also supports password management for the users in your organization."
"It works for us."
"One valuable feature is that it will support a dedicated database. Delinea provides multiple features, like reporting and remote password changes."
"I find it really easy and computer confident, and the experience with the product is really good. Additionally, customizations are easy."
"It is a stable solution."
"The solution is very flexible, which is a plus, but I would say the implementation requires someone with knowledge and experience, as it can be easy to get lost in all the details. The implementation process could be streamlined and simplified. Though the complexity of the solution provides greater flexibility, it requires a lot of time to understand it fully."
"One of our gaps or pain points is having multi-factor authentication at the endpoint and using the PRA password injection from BeyondTrust, which does not work in our environment. We can only have MFA at the login of BeyondTrust to check out the password. Therefore, we can't meet our security requirements of having it on the endpoint."
"The solution's Vault is a nice feature. It helps to securely share a security password in teams, but it is not at the level of a password management solution. So, it is just really a vault. We were expecting to have more features to better manage passwords, but that is something that you can work around if you also have a password safe solution. I would like them to have features like password rotation or password auditing, e.g., old passwords."
"At the moment, I don't see any major problems with it. If anything, they can just change the look and feel of the login screen because it looks too simple to me. It does not have so much information. When you get to the login screen of the solution, you should have more information. We also have BeyondTrust Remote Support, and the login page looks similar to BeyondTrust Privilege Remote Access. I would love to see more rich information on the login screen or landing page so that rather than having a regular sign-in screen or page where you just provide a username and password and get into the solution, you should have more insight into what the solution does. I've mentioned this to them every time I have had an opportunity."
"The price is pretty expensive."
"It would be very nice if it has an enterprise vault. Currently, it can interact with Password Safe, which is a separate solution and equivalent to Thycotic Secret Server. Instead of having Password Safe as a separate entity, they should combine it with BeyondTrust Privileged Remote Access. They have done it in some way, but it is not an enterprise tech solution."
"When doing protocol panel jumps, the tool does not restrict what is recorded on the user's computer."
"Its access process for third-party vendors needs to be simplified."
"One of the things that we want is to be able to do some of the management of it using APIs."
"In terms of what could be improved, the whole thing with distributed engines, et cetera, is a little bit tricky."
"I'd prefer a better commercial model that includes partners and options for consulting around it. Where I've worked with my customers, we've only been able to use their professional services, and that has been a risk and constraint."
"The challenge for me with Delinea is that I may not be able to pitch it to an account with a low budget for PAM."
"What needs improvement? The product can be improved by reducing the number of updates provided."
"The tool should integrate additional features like OCR."
"I would like to see improvement with the integration with Azure Active Directory. This would mean that we can have support on multiple platforms such as Windows, Linux, and Mac."
"Delinea Secret Server can improve by extending the monitoring policies and making the performance better."
More BeyondTrust Privileged Remote Access Pricing and Cost Advice →
BeyondTrust Privileged Remote Access is ranked 3rd in Privileged Access Management (PAM) with 21 reviews while Delinea Secret Server is ranked 2nd in Privileged Access Management (PAM) with 47 reviews. BeyondTrust Privileged Remote Access is rated 8.6, while Delinea Secret Server is rated 8.2. The top reviewer of BeyondTrust Privileged Remote Access writes "Our support team can do so much more without having to actively engage our customers, which saves us time and money". On the other hand, the top reviewer of Delinea Secret Server writes "Effective for password rotation policies triggered by audit requirements, it helps maintain compliance standards and seamless integration with third-party tools ". BeyondTrust Privileged Remote Access is most compared with CyberArk Privileged Access Manager, WALLIX Bastion, Citrix DaaS (formerly Citrix Virtual Apps and Desktops service), BeyondTrust Remote Support and ARCON Privileged Access Management, whereas Delinea Secret Server is most compared with CyberArk Privileged Access Manager, Azure Key Vault, HashiCorp Vault, IBM Security Secret Server and ManageEngine PAM360. See our BeyondTrust Privileged Remote Access vs. Delinea Secret Server report.
See our list of best Privileged Access Management (PAM) vendors.
We monitor all Privileged Access Management (PAM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Hello Avinash, it all depends on the timeline and urgency of the project. If you need to deploy a PAM tool that focuses on standing privileges, stopping lateral movement, and incorporating Zero Standing Privileges as part of Zero Trust, then please consider looking at Remediant. I've worked for BeyondTrust and have gone up against the other big players such as Delinea, Centrify, CyberArk, and HashiCorp. They more or less all offer similar solutions, but looking at your current requirements, Remediant really excels in delivering a simple, yet very effective tool in a matter of days and weeks, not months and years.