Listing Thumbnail

    BeyondTrust

     Info
    Deployed on AWS
    Identity security platform that detects threats and protects all identities, access, and endpoints.
    4.6

    Overview

    Secure Every Identity Across Every Environment - human, machine, AI agent - across every computing environment

    In a world of compromised identities, stolen passwords, and unauthorized access, the "trust but verify" approach is no longer a sustainable security practice. Cloud adoption, increased software automation, the proliferation of non-human / machine accounts, and the use of disparate systems to manage identities are contributing to a sprawl of identities, and the challenge of visualizing and controlling these identities is leaving organizations vulnerable to identity-based attacks that exploit hidden attack paths. In order to protect your organization, you need to gain control of all privileged identities and access so you can defend the hidden attack path into your network.

    BeyondTrust is the only identity security platform that allows you to detect threats across your entire identity estate and respond by controlling privileges, access, credentials, and secrets.

    • Identity Security Insights - Gain a centralized view of identities, accounts, entitlements, and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. See Resources below for a no cost Security Risk Assessment
    • Password Safe - Manage privileged passwords, accounts, credentials, secrets, and sessions for people and machines, ensuring complete control and security, all while enabling zero trust. - Privileged Remote Access - Extend privileged access security best practices beyond the perimeter by granularly controlling, managing, and auditing remote privileged access for employees, vendors, developers, and cloud ops engineers.
    • Remote Support - Supercharge your service desk with secure access and support for any device, any system, from anywhere - including Windows, macOS, Linux, Android, & iOS. See Resources below for a Free Trial.
    • Endpoint Privilege Management for Windows and Mac - Remove local admin rights, enforce least privilege dynamically across Windows and macOS, prevent malware and phishing attacks, and control applications without compromising productivity
    • Endpoint Privilege Management for Linux - Control root access and enforce least privilege on Linux systems by replacing sudo with a centrally managed and audited privilege management solution.

    Empower your business with identity and access security from BeyondTrust. Our integrated platform delivers fast time to value with solutions that are simple to deploy, and with a superior user experience. Our products are optimized for cloud and hybrid environments, and seamlessly integrate with your current environment.

    For more information contact us at https://www.beyondtrust.com/sem/aws-marketplace  for a custom configuration, product SKU, or private offer.

    Highlights

    • Simple to deploy with fast time-to-value
    • Protects users, AI agents, machine identities, secrets, devices, and access across all modern and traditional environments
    • Provides advanced discovery, intelligence, and deep contextual analytics to reduce identity risk, proactively detect threats, and combat attacks across your entire infrastructure

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    36-month contract (10)

     Info
    Dimension
    Description
    Cost/36 months
    1,000 Managed Assets
    Privilege Mgmt Cloud for Win/MAC Subscription
    $76,000.00
    500 Managed Assets
    Password Safe Cloud Subscription
    $113,000.00
    10 Concurrent Users
    Remote Support Cloud Subscription
    $69,180.00
    100 Managed Assets
    Privileged Remote Access Cloud Subscription
    $65,900.00
    1,000 Personnel
    Identity Security Insights Cloud Subscription
    $115,000.00
    50 Named Users
    Entitle - Just in Time Access and Permissions Management
    $92,300.00
    100 PMCWS Managed Assets
    Privileged Mgmt Cloud for Win Server Subscription
    $29,600.00
    250 PASM Managed Assets
    Total PASM Cloud Subscription
    $155,250.00
    250 PMCLD Managed Assets
    Privileged Mgmt Cloud for Unix/Linux Desktop Subscription
    $27,000.00
    50 PMCLS Managed Assets
    Privileged Mgmt Cloud for Unix/Linux Server Subscription
    $17,500.00

    Vendor refund policy

    All orders are final and all fees and other amounts you pay are non-refundable.

    How can we make this page better?

    Tell us how we can improve this page, or report an issue with this product.
    Tell us how we can improve this page, or report an issue with this product.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Customer success and satisfaction are the primary goals of BeyondTrust, and we are committed to providing world-class products and exceptional Technical Support services to our customers. Our mission is to deliver consistent, timely, and professional support that meets the needs of customers of all sizes on a global scale. mysupport@beyondtrust.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By JumpCloud, Inc.

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Applications
    Top
    10
    In Application Servers

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Centralized Identity and Access Visibility
    Provides centralized view of identities, accounts, entitlements, and privileged access across IT estate with threat detection capabilities for compromised identities and privileged access misuse
    Privileged Credential Management
    Manages privileged passwords, accounts, credentials, secrets, and sessions for human and machine identities with complete control and security enforcement
    Privileged Remote Access Control
    Enables granular control, management, and auditing of remote privileged access for employees, vendors, developers, and cloud operations engineers with zero trust enforcement
    Endpoint Privilege Management
    Enforces least privilege on Windows, macOS, and Linux systems by removing local admin rights, replacing sudo with centrally managed solutions, and preventing malware and phishing attacks
    Threat Detection and Analytics
    Delivers advanced discovery, intelligence, and deep contextual analytics to detect threats across entire identity estate and identify hidden attack paths
    Single Sign-On (SSO)
    Automatically synchronizes users across multiple directories to enable one-click access to corporate applications on-premises and in the cloud with enforced security policies and self-service password reset capabilities.
    Multi-Factor Authentication (MFA)
    Supports multiple authentication methods including passwordless authentication, passkeys, one-time passcodes, push notifications, biometric data, and security keys with real-time reporting and monitoring of authentication events.
    Adaptive Authentication
    Delivers multi-layer, context-aware and risk-based protection to minimize common attacks and enforce contextual access security policies based on user behavior and risk assessment.
    Identity Lifecycle Management
    Provides role-based user provisioning engine with granular access permissions, least-privileged access controls, and automated user account provisioning across applications and AWS services.
    Directory Integration
    Acts as a secure cloud-based directory with integration capabilities for Active Directory, LDAP, G Suite and other external directories, plus pre-built connectors with thousands of third-party web applications and AWS services including AWS IAM, AWS SSO, Amazon Cognito, and Amazon EventBridge.
    Cloud Directory Identity Management
    Centralize access across all identities with integrations to AWS Identity Center, Google Workspace, Microsoft 365, Active Directory, HRIS platforms, and network infrastructure resources
    Single Sign-On and Multi-Factor Authentication
    Frictionless, secure access to AWS resources and over 900 pre-built applications with automated user provisioning to Amazon IAM Identity Center and group-based permissions
    Cross-Operating System Server and Device Management
    Deploy, manage, and remotely assist AWS servers and corporate devices across Windows, macOS, iOS, Linux, AWS Linux AMIs, and Android from a single cloud platform
    Passwordless and Conditional Access
    Enable phishing-resistant access with passwordless SSO, password management, and conditional access controls to ensure only specific users on trusted devices and networks can access AWS resources
    Unified Platform with Zero Trust Capabilities
    Combine cloud directory identity management, access management, and cross-OS server and device management with enhanced IAM and device management controls to support Zero Trust security goals

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    333 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    78%
    18%
    3%
    0%
    0%
    3 AWS reviews
    |
    330 external reviews
    External reviews are from G2  and PeerSpot .
    AlanChan7

    Secure access monitoring has strengthened compliance controls but pricing still needs improvement

    Reviewed on May 05, 2026
    Review provided by PeerSpot

    What is our primary use case?

    Compliance and regulations are primary use cases. Customers want to have control for all administrators and mainly want to control user and administrator access across all systems. These are a few main use cases.

    How has it helped my organization?

    BeyondTrust Remote Support  mainly supports us in selling to customers and gives us the chance to become more familiar with the solution.

    The pre-recording feature is mainly for customers to identify anything suspicious and gather evidence for user access. This is one of the main advantages we are selling to our customers.

    What is most valuable?

    Session monitoring is valuable for users to record whatever actions administrators perform within the system. Management can easily understand the working level and ensure that no suspicious activities occur.

    Just-in-time access is another feature that lets vendors or outsiders have certain access during a specified period of time. This helps ensure secure access for users who have third-party vendors involved.

    BeyondTrust Remote Support  can be integrated with ITSM  for ticketing creation and SIEM  integration as well.

    What needs improvement?

    Pricing needs to be changed as this is a very expensive solution. Compared to other brands, this solution is pricey.

    Feature-wise, BeyondTrust Remote Support is one of the better solutions compared to others because it offers multiple deployment methods. However, the main con is the pricing. My customers have budget constraints, so pricing is a pain point for them.

    For how long have I used the solution?

    Three years.

    What do I think about the stability of the solution?

    The proof of concept is quite straightforward and easier to configure. BeyondTrust Remote Support provides a really good guide to follow.

    What do I think about the scalability of the solution?

    Scaling is expensive, and the requirements of customers who deploy are quite large with significant specifications. Customers must control their own resources to meet the specification requirements of the master server.

    How are customer service and support?

    During the proof of concept, BeyondTrust Remote Support principal has been helpful when we have issues. They provide advice and knowledge base resources for us to reference.

    Which solution did I use previously and why did I switch?

    My company is a system integrator that sells solutions to our customers.

    How was the initial setup?

    The customer prepares the environment for installation. Deployments have been done on Azure  and Alibaba Cloud .

    Which other solutions did I evaluate?

    We work with multiple solutions. One of them is MasterSAM.

    What other advice do I have?

    I have been selling privileged access management based on my past experience. So far, the solution is quite good and I cannot think of features that would be missing. The overall review rating for this solution is seven out of ten.

    Pablo G.

    Centralized Access to Client VMs with an Intuitive UI/UX

    Reviewed on Apr 29, 2026
    Review provided by G2
    What do you like best about the product?
    I can jump to all aor clients VMs in a centralized way with a very intuitive UI/UX.
    What do you dislike about the product?
    It can be quite difficult to configure the first time.
    What problems is the product solving and how is that benefiting you?
    Access all our clients VMs on a centralized interface.
    Industrial Automation

    Reliable Firewall-Friendly Access, But Hard to Justify the High Cost

    Reviewed on Apr 29, 2026
    Review provided by G2
    What do you like best about the product?
    It works through firewalls without requiring complex VPN setups, which makes it easy to access remote systems reliably across different networks.
    What do you dislike about the product?
    It’s significantly more expensive than many consumer or mid-market remote support tools.
    What problems is the product solving and how is that benefiting you?
    A lot of remote access tools are insecure. They often require open firewall ports or end up exposing plain-text passwords to technicians, which creates a huge attack surface for hackers.
    Chris G.

    Consistent Remote Support solution but upgrades could be challenging

    Reviewed on Apr 28, 2026
    Review provided by G2
    What do you like best about the product?
    The remote support app worked well and provided a consistent experience to both end user and the technician
    What do you dislike about the product?
    There was a time of increased security vulnerabilities and challenges to upgrade which were a risk
    What problems is the product solving and how is that benefiting you?
    We needed to support a variety of workstations both managed and unmanaged by our organization
    Alejandro A.

    Robust Security and Seamless Cross-Platform Remote Support

    Reviewed on Apr 28, 2026
    Review provided by G2
    What do you like best about the product?
    The best thing about BeyondTrust Remote Support is its robust security and seamless connectivity across multiple platforms without needing a VPN. I love how it handles privilege elevation and credential injection, making complex troubleshooting feel incredibly smooth and professional. The automated session recording and detailed audit logs also provide great peace of mind for compliance and internal tracking.
    What do you dislike about the product?
    The interface can feel a bit dated and overwhelming at first, especially for new technicians who have to navigate through deep sub-menus. The licensing cost is significantly higher than other remote desktop tools, which makes it hard to justify for smaller IT teams. Additionally, the mobile app experience isn't as fluid as the desktop version, sometimes lagging during critical troubleshooting sessions.
    What problems is the product solving and how is that benefiting you?
    BeyondTrust Remote Support solves the challenge of securely accessing unattended servers and employee devices across different networks without a VPN. This benefits me by drastically reducing troubleshooting time and allowing me to provide instant support to remote users regardless of their location. Additionally, the centralized audit logs and credential injection ensure that we maintain high security standards and compliance without slowing down our workflow.
    View all reviews