Listing Thumbnail

    BeyondTrust

     Info
    Deployed on AWS
    Free Trial
    AWS Free Tier
    Identity security platform that detects threats and protects all identities, access, and endpoints.
    4.6

    Overview

    In a world of compromised identities, stolen passwords, and unauthorized access, the "trust but verify" approach is no longer a sustainable security practice. Cloud adoption, increased software automation, the proliferation of non-human / machine accounts, the new work-from-anywhere paradigm, and the use of disparate systems to manage identities are contributing to a sprawl of identities, and the challenge of visualizing and controlling these identities is leaving organizations particularly vulnerable to identity-based attacks that exploit hidden attack paths. In order to protect your organization, you need to gain control of all privileged identities and access so you can defend the hidden attack path into your network.

    BeyondTrust is the only identity security platform that allows you to detect threats across your entire identity estate and respond by controlling privileges, access, credentials, and secrets.

    • Identity Security Insights - Gain a centralized view of identities, accounts, entitlements, and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.
    • Password Safe - Manage privileged passwords, accounts, credentials, secrets, and sessions for people and machines, ensuring complete control and security, all while enabling zero trust. - Privileged Remote Access - Extend privileged access security best practices beyond the perimeter by granularly controlling, managing, and auditing remote privileged access for employees, vendors, developers, and cloud ops engineers.
    • Remote Support - Supercharge your service desk with secure access and support for any device, any system, from anywhere - including Windows, macOS, Linux, Android, & iOS.
    • Privilege Management for Windows and Mac - Remove local admin rights, enforce least privilege dynamically across Windows and macOS, prevent malware and phishing attacks, and control applications without compromising productivity
    • Privilege Management for Unix and Linux - Achieve compliance, establish least privilege and zero trust, and prevent and minimize security breaches without hurting productivity- Cloud Privilege Broker - Gain cross-cloud visibility of entitlements, ensure access is from only trusted sources, detect account permission anomalies, and leverage guidance to right-size privileges. Attacks on privileged identities and access are relentless, and the stakes are higher than ever. The evolving threat landscape is creating a new urgency to achieving cybersecurity goals. Empower your business with identity and access security from BeyondTrust. Our integrated platform delivers fast time to value with solutions that are simple to deploy, and with a superior user experience. Our products are optimized for cloud and hybrid environments, and seamlessly integrate with your current environment.

    For more information contact us at https://www.beyondtrust.com/sem/aws-marketplace  for a custom configuration, product SKU, or private offer.

    Highlights

    • Simple to deploy with fast time to value
    • Protects user and machine identities, secrets, devices, and access across all modern and traditional environments
    • Provides advanced discovery, intelligence, and deep contextual analytics to reduce identity risk, proactively detect threats, and combat attacks across your entire infrastructure

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    36-month contract (6)

     Info
    Dimension
    Description
    Cost/36 months
    1,000 Managed Assets
    Privilege Mgmt Cloud for Win/MAC Subscription
    $98,690.00
    500 Managed Assets
    Password Safe Cloud Subscription
    $95,510.00
    10 Concurrent Users
    Remote Support Cloud Subscription
    $72,427.00
    250 Managed Assets
    Privileged Remote Access
    $152,813.00
    3,000 Personnel
    Identity Security Insights
    $219,660.00
    300 Named Users
    Entitle - Just in Time Access and Permissions Management
    $200,567.00

    Vendor refund policy

    All orders are final and all fees and other amounts you pay are non-refundable.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Customer success and satisfaction are the primary goals of BeyondTrust, and we are committed to providing world-class products and exceptional Technical Support services to our customers. Our mission is to deliver consistent, timely, and professional support that meets the needs of customers of all sizes on a global scale. mysupport@beyondtrust.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By JumpCloud, Inc.

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Applications
    Top
    10
    In Application Servers

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Centralized Identity and Access Visibility
    Provides centralized view of identities, accounts, entitlements, and privileged access across IT estate with threat detection from compromised identities and privileged access misuse
    Privileged Credential Management
    Manages privileged passwords, accounts, credentials, secrets, and sessions for both human and machine identities with zero trust enforcement
    Least Privilege Enforcement
    Enforces least privilege access dynamically across Windows, macOS, Unix, and Linux endpoints while preventing malware, phishing attacks, and controlling applications
    Cross-Cloud Entitlement Visibility
    Provides cross-cloud visibility of entitlements, detects account permission anomalies, and identifies access from untrusted sources with privilege right-sizing guidance
    Granular Remote Access Control
    Enables granular control, management, and auditing of remote privileged access for employees, vendors, developers, and cloud operations engineers across multiple device types and operating systems
    Single Sign-On (SSO)
    Automatically synchronizes users across multiple directories to enable one-click access to corporate applications on-premises and in the cloud with enforced security policies and self-service password reset capabilities.
    Multi-Factor Authentication (MFA)
    Supports multiple authentication methods including passwordless authentication, passkeys, one-time passcodes, push notifications, biometric data, and security keys with real-time reporting and monitoring of authentication events.
    Adaptive Authentication
    Delivers multi-layer, context-aware and risk-based protection to minimize common attacks and enforce contextual access security policies based on user behavior and risk assessment.
    Identity Lifecycle Management
    Provides role-based user provisioning engine with granular access permissions, least-privileged access controls, and automated user account provisioning across applications and AWS services.
    Directory Integration
    Acts as a secure cloud-based directory with integration capabilities for Active Directory, LDAP, G Suite and other external directories, plus pre-built connectors with thousands of third-party web applications and AWS services including AWS IAM, AWS SSO, Amazon Cognito, and Amazon EventBridge.
    Cloud Directory Identity Management
    Centralize access across all identities with integrations to AWS Identity Center, Google Workspace, Microsoft 365, Active Directory, HRIS platforms, and network infrastructure resources
    Single Sign-On and Multi-Factor Authentication
    Frictionless, secure access to AWS resources and over 900 pre-built applications with automated user provisioning to Amazon IAM Identity Center and group-based permissions
    Cross-Operating System Server and Device Management
    Deploy, manage, and remotely assist AWS servers and corporate devices across Windows, macOS, iOS, Linux, AWS Linux AMIs, and Android from a single cloud platform
    Passwordless and Conditional Access
    Enable phishing-resistant access with passwordless SSO, password management, and conditional access controls to ensure only specific users on trusted devices and networks can access AWS resources
    Unified Platform with Zero Trust Capabilities
    Combine cloud directory identity management, access management, and cross-OS server and device management with enhanced IAM and device management controls to support Zero Trust security goals

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    318 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    80%
    17%
    3%
    0%
    0%
    0 AWS reviews
    |
    318 external reviews
    External reviews are from G2  and PeerSpot .
    Sam S.

    Consistent, Polished, and Easy to Integrate

    Reviewed on Jan 26, 2026
    Review provided by G2
    What do you like best about the product?
    It’s a consistent, polished product that works reliably whenever I need it. It was also straightforward to integrate and easy to administer.
    What do you dislike about the product?
    From time to time, I need to log in to administer and update an appliance that Beyond Trust is hosting for us. I’d prefer that they handle the administration and manage the updates for this appliance themselves, without requiring my involvement.
    What problems is the product solving and how is that benefiting you?
    Remote access for a highly mobile, nationwide user base.
    Firdavs S.

    Secure and Versatile Remote Support, But Pricey

    Reviewed on Jan 24, 2026
    Review provided by G2
    What do you like best about the product?
    I like the strong security that BeyondTrust Remote Support offers, as it's important for keeping our data and systems accessible only to authorized users. I also appreciate the cross-platform support, which allows the software to work on desktops, laptops, and mobile devices. This feature is very good and useful for IT teams like mine. Additionally, the initial setup was pretty easy, and the interface is user-friendly, making it quite simple to get used to.
    What do you dislike about the product?
    I find the cost and the complexity of BeyondTrust Remote Support to be a pretty big problem for me. The interface might be a bit complicated and the price seems to be more expensive than simpler tools like TeamViewer or AnyDesk.
    What problems is the product solving and how is that benefiting you?
    I use BeyondTrust Remote Support to connect to devices in my IT team, control screens remotely, and eliminate the need for physical presence.
    Jonathan C.

    Effortless Remote Support with Top-Notch Security

    Reviewed on Jan 13, 2026
    Review provided by G2
    What do you like best about the product?
    What I like most about BeyondTrust Remote Support is how easy it makes helping people quickly without being in the same place. The biggest upsides are its strong security and reliable remote access, which let me solve problems faster and with less downtime.
    What do you dislike about the product?
    The least helpful thing about BeyondTrust is that it can feel confusing at first and takes time to learn. Sometimes it also feels slower than expected, which can be frustrating when you are trying to fix a problem quickly.
    What problems is the product solving and how is that benefiting you?
    BeyondTrust Remote Support solves the problem of not being able to help someone in person when their computer is having issues. It benefits me by saving time, letting me fix problems faster, and helping people get back to work without long delays.
    Josh G.

    Feature-Rich, User-Friendly, and Outstanding Support

    Reviewed on Dec 10, 2025
    Review provided by G2
    What do you like best about the product?
    The product is feature rich and easy to use. The onboarding team was super helpful and support is great.
    What do you dislike about the product?
    There is no option to sort endpoints by logged in end user. You can manually enter the user as a comment on the endpoint which is sortable but that takes some time to do and manually updating is tedious.
    What problems is the product solving and how is that benefiting you?
    This product makes it very easy to remotely support end users on premise or working remotely. There is a web based console or a fat client console so using the product from my work computer or another machine I don't normally use while on call is very simple. There is also a mobile app for quick access in a pinch. I'm able to help end users whenever they need it wherever I am.
    Nathan L.

    Effortless Remote Access for Clients

    Reviewed on Dec 09, 2025
    Review provided by G2
    What do you like best about the product?
    Easy access to remote clients without needing their interaction
    What do you dislike about the product?
    loss of mouse and keyboard mistakes on Macs
    What problems is the product solving and how is that benefiting you?
    People needing help with Zoom cannot use Zoom to fix Zoom!!! Also, we need to control remote computers with no one present. Thanks for asking!
    View all reviews