Compare BeyondTrust Privileged Remote Access and Ping Identity

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Star Rating
(58)4.5 out of 5
Market Segments
Mid-Market (50.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about BeyondTrust Privileged Remote Access
Ping Identity
Ping Identity
Star Rating
(111)4.4 out of 5
Market Segments
Enterprise (70.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
$3 Per User Per Month
Learn more about Ping Identity
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that BeyondTrust Privileged Remote Access excels in providing a seamless user experience, particularly highlighting its ability to offer tight control over privileged access without complicating the process. Users appreciate features like the security approval process and the recording of user sessions, which enhance both security and usability.
  • Users say that BeyondTrust's implementation process is notably quick and intuitive, with many praising the facility to configure appliances and deploy the product effectively. This contrasts with Ping Identity, which, while offering a robust suite of identity solutions, may not match the same level of ease in setup as reported by users.
  • Reviewers mention that BeyondTrust has a higher overall satisfaction score compared to Ping Identity, reflecting a more favorable user experience. The feedback indicates that BeyondTrust's product direction and support quality are particularly strong, with users feeling well-supported in their business needs.
  • According to verified reviews, Ping Identity is recognized for its adaptability and customer-centric approach, with users noting that the product keeps pace with needs and integrates well with other vendors. However, it faces challenges in user satisfaction compared to BeyondTrust, particularly in areas like ease of use and admin capabilities.
  • Users highlight that BeyondTrust's focus on mid-market solutions allows it to cater effectively to its user base, providing tailored features that resonate well with their specific needs. In contrast, Ping Identity's primary focus on enterprise solutions may not address the requirements of smaller organizations as effectively.
  • Reviewers appreciate the multiple solutions offered by Ping Identity for SaaS, such as Ping Federate and Ping Access, which provide flexibility. However, they also express a desire for improvements in overall user experience, indicating that while the features are valuable, the execution may not be as user-friendly as that of BeyondTrust.
Pricing
Entry-Level Pricing
BeyondTrust Privileged Remote Access
No pricing available
Ping Identity
Cloud MFA & SSO
$3
Per User Per Month
Learn more about Ping Identity
Free Trial
BeyondTrust Privileged Remote Access
Free Trial is available
Ping Identity
Free Trial is available
Ratings
Meets Requirements
9.3
45
9.0
76
Ease of Use
9.0
45
8.7
78
Ease of Setup
8.5
40
8.3
53
Ease of Admin
8.7
36
8.3
51
Quality of Support
8.6
43
8.5
70
Has the product been a good partner in doing business?
9.4
35
8.6
49
Product Direction (% positive)
9.2
44
8.3
74
Features by Category
Not enough data
8.7
41
Authentication Options
Not enough data
9.1
35
Not enough data
9.1
32
Not enough data
8.9
31
Not enough data
9.1
33
Not enough data
9.0
31
Not enough data
9.4
27
Access Control Types
Not enough data
8.6
22
Not enough data
8.9
28
Not enough data
8.7
25
Not enough data
8.5
17
Not enough data
9.0
17
Administration
Not enough data
8.9
29
Not enough data
8.7
21
Not enough data
8.2
28
Not enough data
8.5
31
Not enough data
8.1
15
Platform
Not enough data
9.4
27
Not enough data
8.8
25
Not enough data
8.8
31
Not enough data
8.6
25
Not enough data
7.3
22
Not enough data
8.1
27
Not enough data
8.8
23
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
8.2
20
Authentication type
Not enough data
8.5
8
|
Verified
Not enough data
8.0
5
|
Verified
Not enough data
8.9
12
|
Verified
Not enough data
8.1
7
|
Verified
Not enough data
9.1
13
|
Verified
Not enough data
7.9
8
|
Verified
Not enough data
8.7
14
|
Verified
Not enough data
8.3
8
|
Verified
Functionality
Not enough data
7.7
10
Not enough data
Not enough data
Implementation
Not enough data
7.8
16
|
Verified
Not enough data
7.2
10
|
Verified
Not enough data
7.9
11
Risk-Based Authentication (RBA)Hide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
8.7
5
Not enough data
Not enough data
Not enough data
Not enough data
Privileged Access Management (PAM)Hide 21 FeaturesShow 21 Features
8.9
31
Not enough data
Administration
9.2
26
Not enough data
9.0
25
Not enough data
8.4
22
Not enough data
8.1
22
Not enough data
9.2
23
Not enough data
8.0
23
Not enough data
Functionality
9.4
25
Not enough data
9.3
25
Not enough data
9.1
25
Not enough data
8.6
24
Not enough data
9.5
25
Not enough data
9.0
27
Not enough data
8.3
21
Not enough data
9.7
26
Not enough data
9.6
26
Not enough data
8.7
25
Not enough data
Monitoring
9.4
27
Not enough data
9.4
27
Not enough data
6.8
20
Not enough data
Reporting
9.0
27
Not enough data
9.0
26
Not enough data
Customer Identity and Access Management (CIAM)Hide 15 FeaturesShow 15 Features
Not enough data
8.9
9
Functionality
Not enough data
8.6
7
|
Verified
Not enough data
9.4
9
|
Verified
Not enough data
9.0
8
|
Verified
Not enough data
8.6
7
|
Verified
Not enough data
Not enough data
Not enough data
Not enough data
AI Authentication Risk Management - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Biometric & Behavioral Analysis - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
AI Context-Aware Security Controls - Customer Identity and Access Management (CIAM)
Not enough data
Not enough data
Not enough data
Not enough data
Passwordless AuthenticationHide 4 FeaturesShow 4 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity and Access Management (IAM)Hide 18 FeaturesShow 18 Features
Not enough data
8.3
21
Functionality
Not enough data
7.5
10
Not enough data
8.3
8
Not enough data
8.8
14
Not enough data
8.2
16
Not enough data
8.9
18
Not enough data
8.3
16
Type
Not enough data
9.1
11
Not enough data
8.1
16
Reporting
Not enough data
8.3
12
Not enough data
7.4
14
Not enough data
Not enough data
Not enough data
Not enough data
Authentication & Authorization - Identity and Access Management (IAM)
Not enough data
Not enough data
Administration & Governance - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI - Identity and Access Management (IAM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
OT Secure Remote AccessHide 13 FeaturesShow 13 Features
8.9
23
Not enough data
Administration
9.3
21
Not enough data
9.4
21
Not enough data
7.6
19
Not enough data
8.6
19
Not enough data
Functionality
8.8
20
Not enough data
8.8
17
Not enough data
8.8
17
Not enough data
9.7
21
Not enough data
8.1
12
Not enough data
Reporting
8.9
21
Not enough data
9.4
21
Not enough data
9.4
20
Not enough data
9.2
13
Not enough data
Categories
Categories
Shared Categories
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Ping Identity
Ping Identity
BeyondTrust Privileged Remote Access and Ping Identity are categorized as Privileged Access Management (PAM)
Reviews
Reviewers' Company Size
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Small-Business(50 or fewer emp.)
12.7%
Mid-Market(51-1000 emp.)
50.9%
Enterprise(> 1000 emp.)
36.4%
Ping Identity
Ping Identity
Small-Business(50 or fewer emp.)
3.8%
Mid-Market(51-1000 emp.)
25.7%
Enterprise(> 1000 emp.)
70.5%
Reviewers' Industry
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access
Information Technology and Services
16.4%
Computer & Network Security
10.9%
Computer Software
7.3%
Manufacturing
5.5%
Education Management
5.5%
Other
54.5%
Ping Identity
Ping Identity
Information Technology and Services
13.6%
Computer Software
9.7%
Hospital & Health Care
7.8%
Insurance
7.8%
Retail
5.8%
Other
55.3%
Alternatives
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access Alternatives
CyberArk Privileged Access Manager
CyberArk Privileged Access...
Add CyberArk Privileged Access Manager
Delinea Secret Server
Delinea Secret Server
Add Delinea Secret Server
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
JumpCloud
JumpCloud
Add JumpCloud
Ping Identity
Ping Identity Alternatives
Microsoft Entra ID
Microsoft Entra ID
Add Microsoft Entra ID
Cisco Duo
Cisco Duo
Add Cisco Duo
OneLogin
OneLogin
Add OneLogin
Auth0
Auth0
Add Auth0
Discussions
BeyondTrust Privileged Remote Access
BeyondTrust Privileged Remote Access Discussions
Monty the Mongoose crying
BeyondTrust Privileged Remote Access has no discussions with answers
Ping Identity
Ping Identity Discussions
Monty the Mongoose crying
Ping Identity has no discussions with answers