
Overview
Secure Every Identity Across Every Environment - human, machine, AI agent - across every computing environment
In a world of compromised identities, stolen passwords, and unauthorized access, the "trust but verify" approach is no longer a sustainable security practice. Cloud adoption, increased software automation, the proliferation of non-human / machine accounts, and the use of disparate systems to manage identities are contributing to a sprawl of identities, and the challenge of visualizing and controlling these identities is leaving organizations vulnerable to identity-based attacks that exploit hidden attack paths. In order to protect your organization, you need to gain control of all privileged identities and access so you can defend the hidden attack path into your network.
BeyondTrust is the only identity security platform that allows you to detect threats across your entire identity estate and respond by controlling privileges, access, credentials, and secrets.
- Identity Security Insights - Gain a centralized view of identities, accounts, entitlements, and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. See Resources below for a no cost Security Risk Assessment
- Password Safe - Manage privileged passwords, accounts, credentials, secrets, and sessions for people and machines, ensuring complete control and security, all while enabling zero trust. - Privileged Remote Access - Extend privileged access security best practices beyond the perimeter by granularly controlling, managing, and auditing remote privileged access for employees, vendors, developers, and cloud ops engineers.
- Remote Support - Supercharge your service desk with secure access and support for any device, any system, from anywhere - including Windows, macOS, Linux, Android, & iOS. See Resources below for a Free Trial.
- Endpoint Privilege Management for Windows and Mac - Remove local admin rights, enforce least privilege dynamically across Windows and macOS, prevent malware and phishing attacks, and control applications without compromising productivity
- Endpoint Privilege Management for Linux - Control root access and enforce least privilege on Linux systems by replacing sudo with a centrally managed and audited privilege management solution.
Empower your business with identity and access security from BeyondTrust. Our integrated platform delivers fast time to value with solutions that are simple to deploy, and with a superior user experience. Our products are optimized for cloud and hybrid environments, and seamlessly integrate with your current environment.
For more information contact us at https://www.beyondtrust.com/sem/aws-marketplace for a custom configuration, product SKU, or private offer.
Highlights
- Simple to deploy with fast time-to-value
- Protects users, AI agents, machine identities, secrets, devices, and access across all modern and traditional environments
- Provides advanced discovery, intelligence, and deep contextual analytics to reduce identity risk, proactively detect threats, and combat attacks across your entire infrastructure
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/36 months |
|---|---|---|
1,000 Managed Assets | Privilege Mgmt Cloud for Win/MAC Subscription | $76,000.00 |
500 Managed Assets | Password Safe Cloud Subscription | $113,000.00 |
10 Concurrent Users | Remote Support Cloud Subscription | $69,180.00 |
100 Managed Assets | Privileged Remote Access Cloud Subscription | $65,900.00 |
1,000 Personnel | Identity Security Insights Cloud Subscription | $115,000.00 |
50 Named Users | Entitle - Just in Time Access and Permissions Management | $92,300.00 |
100 PMCWS Managed Assets | Privileged Mgmt Cloud for Win Server Subscription | $29,600.00 |
250 PASM Managed Assets | Total PASM Cloud Subscription | $155,250.00 |
250 PMCLD Managed Assets | Privileged Mgmt Cloud for Unix/Linux Desktop Subscription | $27,000.00 |
50 PMCLS Managed Assets | Privileged Mgmt Cloud for Unix/Linux Server Subscription | $17,500.00 |
Vendor refund policy
All orders are final and all fees and other amounts you pay are non-refundable.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Support
Vendor support
Customer success and satisfaction are the primary goals of BeyondTrust, and we are committed to providing world-class products and exceptional Technical Support services to our customers. Our mission is to deliver consistent, timely, and professional support that meets the needs of customers of all sizes on a global scale. mysupport@beyondtrust.com
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.


Standard contract
Customer reviews
Secure access monitoring has strengthened compliance controls but pricing still needs improvement
What is our primary use case?
Compliance and regulations are primary use cases. Customers want to have control for all administrators and mainly want to control user and administrator access across all systems. These are a few main use cases.
How has it helped my organization?
BeyondTrust Remote Support mainly supports us in selling to customers and gives us the chance to become more familiar with the solution.
The pre-recording feature is mainly for customers to identify anything suspicious and gather evidence for user access. This is one of the main advantages we are selling to our customers.
What is most valuable?
Session monitoring is valuable for users to record whatever actions administrators perform within the system. Management can easily understand the working level and ensure that no suspicious activities occur.
Just-in-time access is another feature that lets vendors or outsiders have certain access during a specified period of time. This helps ensure secure access for users who have third-party vendors involved.
BeyondTrust Remote Support can be integrated with ITSM for ticketing creation and SIEM integration as well.
What needs improvement?
Pricing needs to be changed as this is a very expensive solution. Compared to other brands, this solution is pricey.
Feature-wise, BeyondTrust Remote Support is one of the better solutions compared to others because it offers multiple deployment methods. However, the main con is the pricing. My customers have budget constraints, so pricing is a pain point for them.
For how long have I used the solution?
Three years.
What do I think about the stability of the solution?
The proof of concept is quite straightforward and easier to configure. BeyondTrust Remote Support provides a really good guide to follow.
What do I think about the scalability of the solution?
Scaling is expensive, and the requirements of customers who deploy are quite large with significant specifications. Customers must control their own resources to meet the specification requirements of the master server.
How are customer service and support?
During the proof of concept, BeyondTrust Remote Support principal has been helpful when we have issues. They provide advice and knowledge base resources for us to reference.
Which solution did I use previously and why did I switch?
My company is a system integrator that sells solutions to our customers.
How was the initial setup?
The customer prepares the environment for installation. Deployments have been done on Azure and Alibaba Cloud .
Which other solutions did I evaluate?
We work with multiple solutions. One of them is MasterSAM.
What other advice do I have?
I have been selling privileged access management based on my past experience. So far, the solution is quite good and I cannot think of features that would be missing. The overall review rating for this solution is seven out of ten.