Compare Akeyless Identity Security Platform and BeyondTrust Privileged Remote Access

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Star Rating
(89)4.6 out of 5
Market Segments
Enterprise (52.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Akeyless Identity Security Platform
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Star Rating
(62)4.5 out of 5
Market Segments
Mid-Market (54.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about BeyondTrust Privileged Remote Access
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that BeyondTrust Privileged Remote Access excels in providing a seamless user experience, particularly highlighting its security features and the approval process for access. Users appreciate the ability to control privileged access without complicating the workflow, allowing them to grant access precisely where needed.
  • Users say that Akeyless Identity Security Platform stands out for its efficient password management and role-based approach. Reviewers find it easy to save secrets and value the platform's cost-effectiveness, which addresses many of their previous challenges in managing software licenses.
  • According to verified reviews, BeyondTrust has a higher overall G2 Score, indicating greater user satisfaction. Users frequently mention the facility to configure appliances and the recording of user sessions as key benefits that enhance their operational efficiency.
  • Reviewers mention that while Akeyless offers strong support and a user-friendly interface, it has fewer recent reviews compared to BeyondTrust, which may suggest a less active user base. This could impact the reliability of feedback regarding its current performance.
  • Users highlight that BeyondTrust's implementation process is quick and intuitive, making it easier for teams to onboard and start using the product effectively. This contrasts with Akeyless, where some users have expressed a desire for more streamlined setup processes.
  • G2 reviewers note that Akeyless provides robust multi-factor authentication and centralized management features, which are highly valued in enterprise environments. However, BeyondTrust matches this with strong centralized management capabilities, making both products competitive in this area.
Pricing
Entry-Level Pricing
Akeyless Identity Security Platform
No pricing available
BeyondTrust Privileged Remote Access
No pricing available
Free Trial
Akeyless Identity Security Platform
Free Trial is available
BeyondTrust Privileged Remote Access
Free Trial is available
Ratings
Meets Requirements
8.9
65
9.2
47
Ease of Use
9.0
65
8.9
49
Ease of Setup
8.3
54
8.4
44
Ease of Admin
8.7
42
8.7
37
Quality of Support
9.3
58
8.5
45
Has the product been a good partner in doing business?
9.7
41
9.4
36
Product Direction (% positive)
9.6
60
9.2
46
Features by Category
Encryption Key ManagementHide 10 FeaturesShow 10 Features
9.1
26
Not enough data
Functionality
9.2
22
Not enough data
9.2
17
Not enough data
9.2
21
Not enough data
Availability
8.8
20
Not enough data
9.3
21
Not enough data
9.4
18
Not enough data
9.4
21
Not enough data
Administration
8.8
20
Not enough data
9.4
18
Not enough data
8.9
22
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
9.0
21
8.8
32
Administration
8.9
19
9.1
27
8.5
10
8.9
26
9.0
16
8.3
23
8.4
15
8.0
23
9.2
17
9.1
24
9.2
14
8.0
24
Functionality
9.9
13
9.3
27
9.8
17
8.9
27
9.8
11
8.8
27
9.0
16
8.5
25
9.5
17
9.4
27
9.4
19
8.9
28
8.6
12
8.3
22
9.3
9
9.6
27
9.4
17
9.5
27
9.3
16
8.6
26
Monitoring
8.6
16
9.3
28
8.6
18
9.3
28
8.8
10
6.8
21
Reporting
8.2
17
8.9
28
8.3
15
8.9
27
Certificate Lifecycle Management (CLM)Hide 9 FeaturesShow 9 Features
9.9
9
Not enough data
Functionality
10.0
5
Not enough data
10.0
5
Not enough data
10.0
5
Not enough data
9.7
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
10.0
6
Not enough data
9.3
5
Not enough data
10.0
6
Not enough data
OT Secure Remote AccessHide 13 FeaturesShow 13 Features
Not enough data
8.9
23
Administration
Not enough data
9.3
21
Not enough data
9.4
21
Not enough data
7.6
19
Not enough data
8.6
19
Functionality
Not enough data
8.8
20
Not enough data
8.8
17
Not enough data
8.8
17
Not enough data
9.7
21
Not enough data
8.1
12
Reporting
Not enough data
8.9
21
Not enough data
9.4
21
Not enough data
9.4
20
Not enough data
9.2
13
Secrets Management ToolsHide 3 FeaturesShow 3 Features
8.2
31
Not enough data
Functionality
7.5
26
Not enough data
8.5
26
Not enough data
8.6
26
Not enough data
Non-Human Identity Management (NHIM) SolutionsHide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Lifecycle & Provisioning - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Access, Authentication & Authorization - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Visibility, Governance & Compliance - Non-Human Identity Management (NHIM) Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
8.6
29
Not enough data
Usability & Access
9.3
28
Not enough data
8.1
25
Not enough data
7.3
18
Not enough data
8.6
22
Not enough data
8.8
26
Not enough data
Security Measures
9.0
22
Not enough data
9.3
23
Not enough data
Feature Not Available
Not enough data
Storage
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Categories
Categories
Shared Categories
Akeyless Identity Security Platform
Akeyless Identity Security Platform
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Akeyless Identity Security Platform and BeyondTrust Privileged Remote Access are categorized as Privileged Access Management (PAM)
Unique Categories
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access is categorized as OT Secure Remote Access
Reviews
Reviewers' Company Size
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Small-Business(50 or fewer emp.)
20.2%
Mid-Market(51-1000 emp.)
27.4%
Enterprise(> 1000 emp.)
52.4%
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Small-Business(50 or fewer emp.)
11.9%
Mid-Market(51-1000 emp.)
54.2%
Enterprise(> 1000 emp.)
33.9%
Reviewers' Industry
Akeyless Identity Security Platform
Akeyless Identity Security Platform
Information Technology and Services
15.7%
Computer Software
14.5%
Financial Services
9.6%
Marketing and Advertising
9.6%
Insurance
8.4%
Other
42.2%
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Information Technology and Services
15.3%
Computer & Network Security
10.2%
Computer Software
6.8%
Education Management
6.8%
Manufacturing
5.1%
Other
55.9%
Alternatives
Akeyless Identity Security Platform
Akeyless Identity Security Platform Alternatives
IBM Vault (formerly HashiCorp Vault)
IBM Vault (formerly HashiCorp Vault)
Add IBM Vault (formerly HashiCorp Vault)
1Password
1Password
Add 1Password
Keeper Password Manager
Keeper Password Manager
Add Keeper Password Manager
Egnyte
Egnyte
Add Egnyte
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access Alternatives
CyberArk Privileged Access Manager
CyberArk Privileged Access...
Add CyberArk Privileged Access Manager
Delinea Secret Server
Delinea Secret Server
Add Delinea Secret Server
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
JumpCloud
JumpCloud
Add JumpCloud
Discussions
Akeyless Identity Security Platform
Akeyless Identity Security Platform Discussions
Monty the Mongoose crying
Akeyless Identity Security Platform has no discussions with answers
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access Discussions
Monty the Mongoose crying
BeyondTrust Privileged Remote Access has no discussions with answers