BeyondTrust Product Comparison Guide Comparison Guide
13/28/2019
BeyondTrust Product Comparison GuideThank you for your interest in BeyondTrust and for downloading this free guide! We've taken a just-the-facts approach make it easier to compare BeyondTrust's software to other products.
A bit of historyWe created the first version of this guide as an RFP response for a prospective customer. Over the years, we've added questions and concerns from more customers.
Evaluating product alternatives
If you look below, you'll se a tab for "Remote Support" and another for "Privileged Access". Simply go to the appropriate tab and enter then information you discover about the other solutions you're evaluating.
What if you like another product better?
You may find another product that suits your needs better than BeyondTrust. Great! We hope this evaluation template has helped make that process easier. Keep us in mind should your needs change.
What if BeyondTrust fits your needs?We'd appreciate it you'd let us know. Simply reach out to [email protected] or call us at 877-596-3065.
What if you're still not sure?
We have a number of ways for you to see our products in action. You could join a live demo or test a full evaluation of our products in your environment. Simply reach out to [email protected] or call us at 877-596-3065.
BeyondTrust Product Comparison Guide Remote Support
23/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTESPLATFORMSPCs & Servers
Windows YesRep console, customer client, & admin dashboard
Mac YesRep console, customer client, & admin dashboard
Linux Yes
Rep Console & Admin Dashboard:SLED, RedHat, Ubuntu;Customer Client:SLED, RedHat, Ubuntu, Fedora, headless
Chromebook Limited Web Rep Console
Mobile Devices
iOS Yes
Rep console, admin dashboard, & customer client; Mobile App SDK
Android YesRep console & customer client; Mobile App SDK
BlackBerry Yes Customer client onlyWindows 10 No
Other Devices
Network devices
Can reps send commands to routers and switches without controlling a desktop? Yes
POS
Can reps access POS systems and kiosks that lack native internet access? Yes
Windows POSReady 7; Android POS
Android POS
Can reps access unattended Android POS systems and kiosks? Yes
BeyondTrust Product Comparison Guide Remote Support
33/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Virtual machines
Can the solution connect to systems running in a virtual environment? Yes VMware, Citrix XenDesktop
SECURITYArchitecture
Deployment
How is the solution deployed? What are the security implications?
Appliance, Virtual Appliance, Cloud
All environments isolated to single client. No instances of the software shared between customers.
Encryption
Does the solution use industry-standard encryption? Yes 256-bit AES
Firewall compatible
Is the solution compatible with standard firewall configuration? Yes No port forwarding required
3rd Party Tested
Has the solution been tested and/or certified by a reputable third party? Yes
Trustwave, Symantec, FIPS 140-2 Level 2 in process
Access Privileges
Granular permission management
Can administrators assign or deny privileges according to support tier? Yes
50+ configurable permissions
Two factor authenticationDoes the solution enable multi-factor authentication? Yes
Native; BeyondTrust Verify; RADIUS
Smart card authentication
Can reps and end systems be authenticated via smart card? Yes CAC, etc
Touch
Can reps open the rep console using touch technology? Yes iOS only
End user control
Can end users take back control and terminate sessions at any time? Yes
BeyondTrust Product Comparison Guide Remote Support
43/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Privacy screen
Can the end user's screen be blacked out to hide sensitive information? Yes
Application sharing
Can end users restrict access to specific applications? Yes
Credential injection
Can credentials be injected into the user account or endpoint without the technician seeing them? Yes
BeyondTrust Vault, Lieberman RED, Thycotic Secret Server
Audit Trail
Session recording
Can administrators view video recordings of each session? Yes
Session recording feature controlled by administrator
Session activity log
Can administrators view logs of the actions taken during each session? Yes
Chat transcript
Can administrators view transcripts of chats between reps and end users? Yes
INTEGRATIONPre-built integrations
ITSMAre pre-built integrations with ITSM tools offered? Yes
BMC, SNOW, Dell KACE, Hornbill, HP, iSupport, AutoTask, SunView, TOPdesk, Cherwell, EasyVista, CA, Freshservice, Heat, ISILOG, Symantec, SysAid
CRMAre pre-built integrations with CRM tools offered? Yes
Salesforce.com; MS Dynamics
BeyondTrust Product Comparison Guide Remote Support
53/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Custom integrationsAre tools offered for custom integrations? Yes
API, Mobile SDK, Windows File System plugin, SQL plugin
Branding & customizationAre product interfaces brandable or customizable? Yes
Web Portal, Customer Client, Icons, Dialogues
WEB-ENABLEDSession Initiation
Clientless
Does the solution enable on-demand sessions without pre-installation of a client? Yes
Web Rep Console
Does the solution offer a rep console that can be accessed via browser without additional download? Yes
ChatCan reps chat with end users? Yes
Canned messagesCan reps use standardized greetings and messages? Yes
Click-to-Chat
Can end users initiate chat without downloading an applet? Yes
Co-browse
Can the rep view the end user's browser activity outside of a standard screensharing session? Yes
One-click customer client
Can customer clients be pinned to end users' taskbars for easy initiation? Yes
SMS
Can sessions with mobile devices be initiated via SMS text message? Yes
BeyondTrust Product Comparison Guide Remote Support
63/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Isolated LAN
Can the solution function within networks that are not directly connected to the internet? Yes
Compatible with DoD SIPRNet, etc
View & Control
Multi-system control
Can reps troubleshoot multiple systems from a single interface? Yes
Multi-monitor support
Can reps view multiple monitors on the remote computer? Yes
File Transfer
Can reps transfer files/directories to and from the remote system? Yes
Unattended Systems
Clientless access within LAN/WAN
Can unattended systems within the rep's network be accessed without a pre-installed client? Yes
Access policies can be fine-tuned by administrators
Remote/mobile
Can reps access systems on a network on which they have no admin privileges? Yes
Requires pre-installed Jump Client; Access policies can be fine-tuned by administrators
vPro
Can reps gain provide support below the OS level on vPro-enabled systems? Yes
Wake-on-LAN
Can reps wake up sleeping systems within the company network? Yes
Requires pre-installed Jump Client
RDP & SSH integration
Can reps run RDP and SSH sessions using the solution's architecture and interface? Yes
BeyondTrust Product Comparison Guide Remote Support
73/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Deep Troubleshooting
System diagnosticsCan reps view a snapshot of the end user's system info? Yes
Running processes, event logs, installed software, etc
System & registry actions
Can reps edit an end user's registry and perform other system tasks outside of a screensharing session? Yes
Edit registry, kill process, uninstall program, etc
Command shellCan command prompts be sent during a session? Yes
Canned scriptsCan common scripts be centrally stored? Yes
Run as Admin
Can session privileges be elevated to that of an administrator? Yes
Reboot
Can reps reboot a remote system and automatically reconnect? Yes
COLLABORATIONRep/Rep
Team chatCan reps and admins chat with each other? Yes
Enables chat both inside and outside of a shared session
Session sharing & transfer
Can reps share control with and/or transfer a session to other reps? Yes
Sponsored escalation
Can higher-tier reps temporarily escalate privileges for lower-tier reps? Yes
Intelligent help requests
Can reps broadcast requests for assistance based on skillset or other parameters? Yes
Rep/End User
BeyondTrust Product Comparison Guide Remote Support
83/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Reverse screen sharingCan reps show their screens or give control to clients? Yes
PresentationCan reps give presentations to multiple attendees? Yes Up to 25 attendees
Mobile camera
Can reps access the camera of an end user's mobile device? Yes
Audio and/or video
Is the technician able to communicate w/ the end user via voice or video? No
LanguagesDoes the solution support multiple languages? Yes
Chinese, Dutch, French, German, Italian, Japanese, Spanish, Portuguese, Swedish, Turkish
MANAGEABILITYSession Reports
Session reports
What kinds of information can administrators view in session logs?
Duration, IP, System Info, Files Transferred, Chat Transcript, Admin Activity, Exit Surveys, etc
Reports can be downloaded as CSV or XML files
Analytics
Can support metrics (resolution time, escalation rate, etc) be reported and analyzed? Yes Additional purchase
Rep Management
Admin dashboard
Can admins monitor and manage active sessions in real-time? Yes
Join, transfer, & end active sessions; Monitor reps' full screens
Group policies
Can reps be assigned privileges and portals via group policy? Yes
BeyondTrust Product Comparison Guide Remote Support
93/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Security providers
Can external security providers be used to authenticate reps? Yes
LDAP (incl. Active Directory), RADIUS, Kerberos, SAML
End User Management
Queues
Can end users request support by entering a general or issue-specific queue? Yes
Auto-routing
Can incoming sessions be routed automatically based on configurable parameters? Yes
Availability, Issue Type, Skillset, etc
Embedded app supportCan end users join a queue directly from mobile apps? Yes Via Mobile SDK
Vendor Management
Session privileges
Can vendors be assigned unique user accounts and session privileges? Yes
Privileges can be assigned invidually or via group policy
CollaborationCan technicians share active sessions with vendors? Yes
Audit trail
Are vendor actions recorded to ensure compliance with company policy? Yes
Rep invite
Can reps without accounts be invited to share support sessions on an ad hoc basis? Yes
High Availability
Can the hardware be configured for high availability? Yes
CORPORATE INFOTCO
BeyondTrust Product Comparison Guide Remote Support
103/28/2019
Remote Support Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
License type
How is the product licensed? Does the licensing structure enable effective scaling? Concurrent User
Each rep can login to available licenses with a unique user account
Initial costWhat is included in the initial cost of the product?
Appliance + Licenses (appliance & VA); Licenses (cloud)
Ongoing costWhat are the recurring costs of the product?
Maintenance (appliance & VA); Licenses (cloud)
Services
Training & certification
Does the solution provider offer certified training options for technicians and administrators? Yes
Integration & customization
Does the solution provider aid in the customization of the solution and integration with other support tools? Yes
Implementation
Does the solution provider aid in installing and configuring the solution? Yes
Optimization
Does the solution provider help the support team follow IT best practices? Yes
BeyondTrust Product Comparison Guide Privileged Access
113/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTESUSER/SOLUTION MANAGEMENTArchitecture
Deployment
How is the solution deployed? What are the security implications?
Appliance, Virtual Appliance, Cloud
All environments isolated to single client. No instances of the software shared between customers.
Encryption
Does the solution use industry-standard encryption? Yes 256-bit AES
Firewall compatible
Is the solution compatible with standard firewall configuration? Yes No port forwarding required
Isolated LAN
Can the solution function within networks that are not directly connected to the internet? Yes
Compatible with DoD SIPRNet, etc
3rd Party Tested
Has the solution been tested and/or certified by a reputable third party? Yes Trustwave, Symantec
Group policies
Can users be assigned privileges and portals via group policy? Yes
Authentication
LDAP
Can user accounts by tied to Active Directory or other LDAP profiles? Yes
50+ configurable permissions
Two factor authenticationDoes the solution enable two-factor authentication? Yes Basic Native 2FA
RADIUSDoes the solution enable authentication via RADIUS? Yes
BeyondTrust Product Comparison Guide Privileged Access
123/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
TOTP
Does the solution enable integration with TOTP authentication tools? Yes BeyondTrust Verify, etc
Smart card authentication
Can users and end systems be authenticated via smart card (CAC)? Yes CAC, etc
Touch
Can users open the Access console using touch technology? Yes iOS only
Single Sign-OnDoes the solution enable Single Sign-On? Yes SAML, Kerberos
Initiation Security
Web-based Access Console
Does the solution offer a user console that can be accessed via browser without additional download? Yes
IP filtering
Can users be approved/rejected based on IP address? Yes
Authorization workflow
Can users be required to go through strict workflows before authorization? Yes
Hardware/software mgmt
Mass deploymentCan endpoint clients be deployed en masse? Yes MSI, etc
Syslog
Does the solution enable the sending of syslog reports to administrators? Yes
BeyondTrust Product Comparison Guide Privileged Access
133/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
High Availability
Can the hardware be configured for high availability? Yes
PRIVILEGED SESSION MANAGEMENTPlatformsPCs & Servers
Windows YesAccess console, endpoint client, & admin dashboard
Mac YesAccess console, endpoint client, & admin dashboard
Linux Yes
Access Console & Admin Dashboard: SLED, RedHat, Ubuntu; Endpoint Client: SLED, RedHat, Ubuntu, Fedora, headless
Chromebook Limited Web Access consoleMobile Consoles
iOS YesAndroid YesBlackBerry NoWindows 10 No
Other Devices
Network devices
Can users connect directly and send commands to routers and switches? Yes
POS
Can users access POS systems and kiosks that lack native internet access? Yes
Windows POSReady 7; Android POS
BeyondTrust Product Comparison Guide Privileged Access
143/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Virtual & Cloud machines
Can the solution connect to systems running in virtual or cloud environments? Yes
VMware, Citrix XenDesktop, etc
Privileges
Granular permissionsCan privileges be restricted based on user role? Yes
Application whitelist/blacklist
Can use of various applications be allowed/disallowed to specific users? Yes
Application-level elevation
Can users gain elevated access privileges at the application level? No
Command filtering
Can administrators disallow specific commands on a per user basis? No
SUDO
Can users utilize the SUDO command via the solution's architecture? Yes
Connection Methods
Protocol tunneling
Can users run 3rd party applications through the solution's architecture? Yes
ScreensharingCan users view and control the endpoint's screen? Yes
Built-in proprietary software, RDP, VNC
Command prompt
Does the solution enable users to send command prompts to the endpoint? Yes
Built-in command shell, SSH
BeyondTrust Product Comparison Guide Privileged Access
153/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Direct connection without VPN
Does the solution enable connection to endpoints without the requirement of VPN access? Yes No port forwarding required
Audit Trail
Session recording
Can administrators view video recordings of each session? Yes Searchable metadata
Session reports
Can administrators view logs of the actions taken during each session? Yes
System info & IP YesDuration YesUser actions Yes
Monitoring
Access scheduling
Can user sessions be restricted to a pre-defined schedule? Yes
User screen monitoring
Can administrators view users' screens during access sessions? Yes
Activity alertsCan administrators receive alerts about user activity? Yes
Analytics
Does the solution perform behavioral analytics to determine security risks? No
Ad hoc authorization
Can sessions be approved/rejected on an individual case-by-case basis? Yes
BeyondTrust Product Comparison Guide Privileged Access
163/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Terminate session
Can user sessions be terminated by administrators? Yes
Session timeoutCan settings be configured to handle idle sessions? Yes
Endpoint port analysis Yes
PRIVILEGED IDENTITY MANAGEMENTPlatforms & EnvironmentsPCs & Servers
Windows YesAccess console, endpoint client, & admin dashboard
Mac YesAccess console, endpoint client, & admin dashboard
Linux Yes
Access console & Admin Dashboard: SLED, RedHat, Ubuntu; Endpoint Client: SLED, RedHat, Ubuntu, Fedora, headless
Mobile Access ConsolesiOS LimitedAndroid LimitedBlackBerry NoWindows 10 No
Other Devices
Network devices
Can users connect directly and send commands to routers and switches? Yes
POS
Can users access POS systems and kiosks that lack native internet access? Yes
Windows POSReady 7; Android POS
BeyondTrust Product Comparison Guide Privileged Access
173/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Virtual & Cloud machines
Can the solution connect to systems running in virtual or cloud environments? Yes
VMware, Citrix XenDesktop, etc
DirectoriesLDAP YesOracle YesNovell Yes
DatabasesSQL YesOracle YesSybase Yes
Automation
Granular permissionsCan privileges be restricted based on user role? Yes
Credential rotation
Does the solution automatically rotate credentials such as passwords and SSH keys? Yes No SSH key rotation
Service account rotation
Does the solution automatically rotate service account credentials? Yes
Password generator
Does the solution automatically generate passwords according to configured integrity settings? Yes
Security & Auditing
BeyondTrust Product Comparison Guide Privileged Access
183/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Credential checkin/checkout
Can credentials be checked in and out by users to keep a record of who is in possession? Yes
Credential injection
Can credentials be injected into the user account or endpoint without the user seeing them? Yes
BeyondTrust Vault, Lieberman RED, Thycotic Secret Server
Break glass
Can protocols be put in place to secure access to root passwords in "break glass" events? Yes
Password integrity verification
Can the solution regulate the integrity of passwords used? Yes
Password historyCan previously used passwords be viewed? Yes
Reset & retrieval notification
Can administrators be alerted each time a password is reset or retrieved by a user? Yes
Miscellaneous
AAPM
Does the solution enable the elimination of hard-coded passwords in applications? Yes
SAPM
Does the solution enable differentiation between users of shared passwords? Yes Limited
SSH key management
Can the solution store, inject, and manage SSH keys? Yes Does not enable rotation
BeyondTrust Product Comparison Guide Privileged Access
193/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
Autodiscovery
Does the solution automatically scan for privileged credentials? Yes
INTEGRATIONPre-built integrations
ITSMAre pre-built integrations with ITSM tools offered? Yes ServiceNow, Splunk
SIEMAre pre-built integrations with SIEM tools offered? Yes HP Arcsight
Password Vault
Does the solution offer integrations w/ 3rd party password vaults? Yes
Lieberman Software, Thycotic
Custom integrationsAre tools offered for custom integrations? Yes
API, Windows File System plugin, SQL plugin
CustomizationAre product interfaces brandable or customizable? Yes Web Portal, Dialogues
IN-SESSION TOOLSView & Control
Screensharing
Can users view and/or control the endpoint's screen? Yes Via built-in software or RDP
Multi-system control
Can users connect to multiple endpoints from a single interface? Yes
Multi-monitor support
Can users view multiple monitors on the remote computer? Yes
Wake-on-LAN
Can users wake up sleeping systems within the company network? Yes
Requires pre-installed Jump Client
BeyondTrust Product Comparison Guide Privileged Access
203/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTES
File Transfer
Can users transfer files/directories to and from the remote system? Yes
Collaboration
User/admin chatCan users and admins chat with each other? Yes
Enables chat both inside and outside of a shared session
Session sharing
Can users share control of a session w/ other users or admins? Yes
Troubleshooting
System diagnostics
Can users view a snapshot of the end user's system info? Yes
Running processes, event logs, installed software, etc
System & registry actions
Can users edit an end user's registry and perform other system tasks outside of a screensharing session? Yes
Edit registry, kill process, uninstall program, etc
Command shellCan command prompts be sent during a session? Yes
Via built-in command shell or SSH
Canned scriptsCan common scripts be centrally stored? Yes
Run as Admin
Can session privileges be elevated to that of an administrator? Yes
Reboot
Can users reboot a remote system and automatically reconnect? Yes
CORPORATE INFO
BeyondTrust Product Comparison Guide Privileged Access
213/28/2019
Privileged Access Management Solution Comparison MatrixThe information provided for BeyondTrust is accurate as of March 2017. Email [email protected] for a customized RFP.
DESCRIPTION BOMGAR RESPONSE BOMGAR NOTES VENDOR #2 RESPONSE VENDOR #2 NOTESTCO
License type
How is the product licensed? Does the licensing structure enable effective scaling? Per endpoint
Initial costWhat is included in the initial cost of the product?
Appliance + Licenses (appliance & VA); Licenses (cloud)
Ongoing costWhat are the recurring costs of the product?
Maintenance (appliance & VA); Licenses (cloud)
Services
Training & certification
Does the solution provider offer certified training options for users and administrators? Yes
Integration & customization
Does the solution provider aid in the customization of the solution and integration with other support tools? Yes
Implementation
Does the solution provider aid in installing and configuring the solution? Yes
Optimization
Does the solution provider help users follow IT best practices? Yes