Listing Thumbnail

    BeyondTrust

     Info
    Deployed on AWS
    Identity security platform that detects threats and protects all identities, access, and endpoints.
    4.6

    Overview

    In a world of compromised identities, stolen passwords, and unauthorized access, the "trust but verify" approach is no longer a sustainable security practice. Cloud adoption, increased software automation, the proliferation of non-human / machine accounts, the new work-from-anywhere paradigm, and the use of disparate systems to manage identities are contributing to a sprawl of identities, and the challenge of visualizing and controlling these identities is leaving organizations particularly vulnerable to identity-based attacks that exploit hidden attack paths. In order to protect your organization, you need to gain control of all privileged identities and access so you can defend the hidden attack path into your network.

    BeyondTrust is the only identity security platform that allows you to detect threats across your entire identity estate and respond by controlling privileges, access, credentials, and secrets.

    • Identity Security Insights - Gain a centralized view of identities, accounts, entitlements, and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse. See Resources below for a no cost Security Risk Assessment
    • Password Safe - Manage privileged passwords, accounts, credentials, secrets, and sessions for people and machines, ensuring complete control and security, all while enabling zero trust. - Privileged Remote Access - Extend privileged access security best practices beyond the perimeter by granularly controlling, managing, and auditing remote privileged access for employees, vendors, developers, and cloud ops engineers.
    • Remote Support - Supercharge your service desk with secure access and support for any device, any system, from anywhere - including Windows, macOS, Linux, Android, & iOS. See Resources below for a Free Trial.
    • Privilege Management for Windows and Mac - Remove local admin rights, enforce least privilege dynamically across Windows and macOS, prevent malware and phishing attacks, and control applications without compromising productivity
    • Privilege Management for Unix and Linux - Achieve compliance, establish least privilege and zero trust, and prevent and minimize security breaches without hurting productivity- Cloud Privilege Broker - Gain cross-cloud visibility of entitlements, ensure access is from only trusted sources, detect account permission anomalies, and leverage guidance to right-size privileges. Attacks on privileged identities and access are relentless, and the stakes are higher than ever. The evolving threat landscape is creating a new urgency to achieving cybersecurity goals. Empower your business with identity and access security from BeyondTrust. Our integrated platform delivers fast time to value with solutions that are simple to deploy, and with a superior user experience. Our products are optimized for cloud and hybrid environments, and seamlessly integrate with your current environment.

    For more information contact us at https://www.beyondtrust.com/sem/aws-marketplace  for a custom configuration, product SKU, or private offer.

    Highlights

    • Simple to deploy with fast time to value
    • Protects user and machine identities, secrets, devices, and access across all modern and traditional environments
    • Provides advanced discovery, intelligence, and deep contextual analytics to reduce identity risk, proactively detect threats, and combat attacks across your entire infrastructure

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    36-month contract (6)

     Info
    Dimension
    Description
    Cost/36 months
    1,000 Managed Assets
    Privilege Mgmt Cloud for Win/MAC Subscription
    $98,690.00
    500 Managed Assets
    Password Safe Cloud Subscription
    $95,510.00
    10 Concurrent Users
    Remote Support Cloud Subscription
    $72,427.00
    100 Managed Assets
    Privileged Remote Access Cloud Subscription
    $152,813.00
    3,000 Personnel
    Identity Security Insights
    $219,660.00
    300 Named Users
    Entitle - Just in Time Access and Permissions Management
    $200,567.00

    Vendor refund policy

    All orders are final and all fees and other amounts you pay are non-refundable.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    Customer success and satisfaction are the primary goals of BeyondTrust, and we are committed to providing world-class products and exceptional Technical Support services to our customers. Our mission is to deliver consistent, timely, and professional support that meets the needs of customers of all sizes on a global scale. mysupport@beyondtrust.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By JumpCloud, Inc.

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Applications
    Top
    10
    In Application Servers

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Centralized Identity and Access Visibility
    Provides centralized view of identities, accounts, entitlements, and privileged access across IT estate with threat detection capabilities for compromised identities and privileged access misuse
    Privileged Credential Management
    Manages privileged passwords, accounts, credentials, secrets, and sessions for both human and machine identities with complete control and security enforcement
    Least Privilege Enforcement
    Enforces least privilege access dynamically across Windows, macOS, Unix, and Linux environments while preventing malware, phishing attacks, and controlling application execution
    Cross-Cloud Entitlement Visibility
    Delivers cross-cloud visibility of entitlements, detects account permission anomalies, and ensures access originates only from trusted sources with privilege right-sizing guidance
    Granular Remote Access Control
    Provides granular control, management, and auditing of remote privileged access for employees, vendors, developers, and cloud operations engineers with support for multiple device types and operating systems
    Single Sign-On (SSO)
    Automatically synchronizes users across multiple directories to enable one-click access to corporate applications on-premises and in the cloud with enforced security policies and self-service password reset capabilities.
    Multi-Factor Authentication (MFA)
    Supports multiple authentication methods including passwordless authentication, passkeys, one-time passcodes, push notifications, biometric data, and security keys with real-time reporting and monitoring of authentication events.
    Adaptive Authentication
    Delivers multi-layer, context-aware and risk-based protection to minimize common attacks and enforce contextual access security policies based on user behavior and risk assessment.
    Identity Lifecycle Management
    Provides role-based user provisioning engine with granular access permissions, least-privileged access controls, and automated user account provisioning across applications and AWS services.
    Directory Integration
    Acts as a secure cloud-based directory with integration capabilities for Active Directory, LDAP, G Suite and other external directories, plus pre-built connectors with thousands of third-party web applications and AWS services including AWS IAM, AWS SSO, Amazon Cognito, and Amazon EventBridge.
    Cloud Directory Identity Management
    Centralize access across all identities with integrations to AWS Identity Center, Google Workspace, Microsoft 365, Active Directory, HRIS platforms, and network infrastructure resources
    Single Sign-On and Multi-Factor Authentication
    Frictionless, secure access to AWS resources and over 900 pre-built applications with automated user provisioning to Amazon IAM Identity Center and group-based permissions
    Cross-Operating System Server and Device Management
    Deploy, manage, and remotely assist AWS servers and corporate devices across Windows, macOS, iOS, Linux, AWS Linux AMIs, and Android from a single cloud platform
    Passwordless and Conditional Access
    Enable phishing-resistant access with passwordless SSO, password management, and conditional access controls to ensure only specific users on trusted devices and networks can access AWS resources
    Unified Platform with Zero Trust Capabilities
    Combine cloud directory identity management, access management, and cross-OS server and device management with enhanced IAM and device management controls to support Zero Trust security goals

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    4.6
    329 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    79%
    18%
    3%
    0%
    0%
    3 AWS reviews
    |
    326 external reviews
    External reviews are from G2  and PeerSpot .
    David G.

    Remote Support

    Reviewed on Apr 08, 2026
    Review provided by G2
    What do you like best about the product?
    I like the easy connection with users, the event logging, and the session storage of BeyondTrust Remote Support. Session storage is particularly useful for the client process in case of issues with deleted files or unauthorized changes.
    What do you dislike about the product?
    advance the application's permissions process
    What problems is the product solving and how is that benefiting you?
    I use BeyondTrust Remote Support for nationwide printing support, connecting remotely to install drivers and resolve configurations such as IP changes. Its session storage helps us manage issues with deleted files or unauthorized changes.
    Construction

    Powerful Shell Access and File Transfers, but UI and Documentation Need an Update

    Reviewed on Apr 02, 2026
    Review provided by G2
    What do you like best about the product?
    I like the functionality that lets me connect and work behind the scenes directly in the shell, or transfer files without having to take over someone else’s mouse and keyboard. I also appreciate being able to have the API handle jump client group joins.
    What do you dislike about the product?
    The UI feels a bit dated and stale. The documentation also leaves a lot to be desired, especially when you’re standing it up or trying to implement new features. Performance is generally pretty good, but it does hitch at times, and the lack of AI functionality within remote support is disappointing.
    What problems is the product solving and how is that benefiting you?
    It lets me connect to end users remotely and help them get their computers fixed and running again.
    Carlos M.

    Secure, Seamless Cross-Platform Support with Excellent Compliance Auditing

    Reviewed on Mar 17, 2026
    Review provided by G2
    What do you like best about the product?
    What I like best is the platform's security and its ability to provide seamless support across different operating systems without requiring a VPN. The session recording and audit trails are exceptional for maintaining compliance and security standards.
    What do you dislike about the product?
    The administrative interface can be somewhat complex to navigate initially, and the pricing model might be a bit steep for smaller organizations. Occasionally, the representative console can feel a bit heavy on system resources during multiple concurrent sessions.
    What problems is the product solving and how is that benefiting you?
    It solves the challenge of supporting remote employees and external vendors securely. It benefits me by providing a reliable, high-performance remote desktop experience that works even through strict firewalls, significantly reducing the time spent on troubleshooting.
    Sodi Aldemar B.

    Powerful Remote Support with Minor Connectivity Issues

    Reviewed on Mar 02, 2026
    Review provided by G2
    What do you like best about the product?
    I like that I can remotely access laptops, desktops (both Windows and MACs), and cellphones. It's helpful that when I remote into any device and have the right admin access, I can do almost everything. I also appreciate being able to use GUI or PowerShell commands, which allows me to see almost everything if the session isn't cut.
    What do you dislike about the product?
    There are some bugs at the moment to elevate the session or post-connection if the device is off for a couple of minutes. I would like a reconnect option using the same session, meaning if the connection is lost, it's necessary to create a new session. It would be nice to have a reconnection button. Also, it's difficult because it is integrated with multiple devices.
    What problems is the product solving and how is that benefiting you?
    I use BeyondTrust Remote Support to help remote users fix issues with laptops, tablets, and cellphones. It allows me to access and manage these devices using GUI or PowerShell, ensuring comprehensive support.
    Dwayne Johnson

    Remote support has transformed how my team resolves global user issues quickly and securely

    Reviewed on Feb 28, 2026
    Review from a verified AWS customer

    What is our primary use case?

    BeyondTrust Remote Support  is my primary remote support service that I use to help troubleshoot and fix issues with our users. This product is used by my entire IT department and helps with immediate or rapid support from our team to our end users.

    A specific example of how I use BeyondTrust Remote Support  to troubleshoot or fix issues is that it has been an invaluable tool for supporting our end users, especially while working remotely. We do not always have time to leave our desks to travel across the remote areas where our users or employees are located. Being able to remote into a machine as tickets arrive has saved us time on our support calls and cost.

    I use BeyondTrust Remote Support to connect remotely to our client computers. This allows us to further troubleshoot issues before sending tickets to an onsite technician when it is needed.

    What is most valuable?

    The best features BeyondTrust Remote Support offers are that it allows us to take control of a computer remotely using a website. Users can access the website from anywhere. We are able to elevate rights and use admin credentials if needed through BeyondTrust Remote Support. File sharing is great, and desktop and screen sharing are also available. You can use it to screen share on multiple platforms. The amount of information that you can collect from a customer computer without even screen sharing is immense and helps to troubleshoot when there is a problem.

    Elevating rights and using admin credentials has helped my team by making it easy to contact a user, ask for their machine asset tag, and then quickly and securely remote into their PC. Because we are able to have this capability, we can deploy this solution across our organization, and it works very well.

    BeyondTrust Remote Support should be recognized for offering security and user confirmation for accepting screen share, which is great. Chat and file sharing are also available. Latency is minimal, and the performance is always high.

    BeyondTrust Remote Support has positively impacted my organization in that for troubleshooting computers of our clients or users we can work from our offices or our own convenient place. This has saved us a lot of time and cost, with approximately thirty to forty percent of our time being saved. The directory listing all of our computers that have the Jump client loaded, showing both online and offline computers, is one of the best features for our remote support. You can support people on personal computers via the web interface portal without the need for agent software to be pre-installed. It also allows other programs to run in the background while running the program itself.

    What needs improvement?

    BeyondTrust Remote Support can be improved in that using this tool when a system is infected with malware is challenging. If you leave it open long enough without actively using it, an annoying pop-up appears.

    The user interface of BeyondTrust Remote Support is a bit clunky and could be polished.

    If BeyondTrust Remote Support could implement ticketing, that would be fantastic and greatly beneficial. However, I cannot think of much else to improve as they do a good job of updating as they see fit.

    For how long have I used the solution?

    I have been using BeyondTrust Remote Support for the past six years.

    What do I think about the stability of the solution?

    BeyondTrust Remote Support is stable, as the uptime is high and the performance is powerful.

    What do I think about the scalability of the solution?

    BeyondTrust Remote Support is highly scalable. It can handle my organization's growth and assist other organizations in growing as well.

    How are customer service and support?

    Customer support from BeyondTrust Remote Support is very responsive and helpful twenty-four hours a day, seven days a week.

    I would rate the customer support of BeyondTrust Remote Support an eight out of ten.

    Which solution did I use previously and why did I switch?

    Before using BeyondTrust Remote Support, I previously used Microsoft System Center  Service Manager.

    How was the initial setup?

    My experience with pricing, setup cost, and licensing for BeyondTrust Remote Support is that it is cost-effective. BeyondTrust Remote Support is a very cost-effective and affordable tool.

    What was our ROI?

    We have seen a return on investment with BeyondTrust Remote Support as we are able to support our clients and users globally. We have such a large business that we needed a tool that would enable us to help people in all aspects of life, and BeyondTrust Remote Support has accomplished that. Our phone technicians are able to better help people when they call in, especially our clients, and provide more time for our building technicians to do their work.

    Which other solutions did I evaluate?

    Before choosing BeyondTrust Remote Support, I evaluated other options such as Cherwell Service Management  and ServiceNow .

    What other advice do I have?

    The advice I would give to others looking into using BeyondTrust Remote Support is that if you are looking for a great remote support tool, then look no further. BeyondTrust Remote Support is the best tool because it makes it very easy to troubleshoot. It is easy and reliable, and if you need to remote into another device, it is easy and provides you with powerful options while working with a customer.

    BeyondTrust Remote Support is a great tool that we use in our service desk to remote users all across the world. We have over ten thousand employees, one thousand employees locally, but thousands more than ten thousand worldwide. This has been a perfect tool to reach out to them, especially when they have issues. I would rate this product an eight out of ten.

    View all reviews