Listing Thumbnail

    BeyondTrust

     Info
    Deployed on AWS
    Free Trial
    Identity security platform that detects threats and protects all identities, access, and endpoints.

    Overview

    In a world of compromised identities, stolen passwords, and unauthorized access, the "trust but verify" approach is no longer a sustainable security practice. Cloud adoption, increased software automation, the proliferation of non-human / machine accounts, the new work-from-anywhere paradigm, and the use of disparate systems to manage identities are contributing to a sprawl of identities, and the challenge of visualizing and controlling these identities is leaving organizations particularly vulnerable to identity-based attacks that exploit hidden attack paths. In order to protect your organization, you need to gain control of all privileged identities and access so you can defend the hidden attack path into your network.

    BeyondTrust is the only identity security platform that allows you to detect threats across your entire identity estate and respond by controlling privileges, access, credentials, and secrets.

    • Identity Security Insights - Gain a centralized view of identities, accounts, entitlements, and privileged access across your IT estate and detect threats resulting from compromised identities and privileged access misuse.
    • Password Safe - Manage privileged passwords, accounts, credentials, secrets, and sessions for people and machines, ensuring complete control and security, all while enabling zero trust. - Privileged Remote Access - Extend privileged access security best practices beyond the perimeter by granularly controlling, managing, and auditing remote privileged access for employees, vendors, developers, and cloud ops engineers.
    • Remote Support - Supercharge your service desk with secure access and support for any device, any system, from anywhere - including Windows, macOS, Linux, Android, & iOS.
    • Privilege Management for Windows and Mac - Remove local admin rights, enforce least privilege dynamically across Windows and macOS, prevent malware and phishing attacks, and control applications without compromising productivity
    • Privilege Management for Unix and Linux - Achieve compliance, establish least privilege and zero trust, and prevent and minimize security breaches without hurting productivity- Cloud Privilege Broker - Gain cross-cloud visibility of entitlements, ensure access is from only trusted sources, detect account permission anomalies, and leverage guidance to right-size privileges. Attacks on privileged identities and access are relentless, and the stakes are higher than ever. The evolving threat landscape is creating a new urgency to achieving cybersecurity goals. Empower your business with identity and access security from BeyondTrust. Our integrated platform delivers fast time to value with solutions that are simple to deploy, and with a superior user experience. Our products are optimized for cloud and hybrid environments, and seamlessly integrate with your current environment.

    For more information contact us at https://www.beyondtrust.com/sem/aws-marketplace  for a custom configuration, product SKU, or private offer.

    Highlights

    • Simple to deploy with fast time to value
    • Protects user and machine identities, secrets, devices, and access across all modern and traditional environments
    • Provides advanced discovery, intelligence, and deep contextual analytics to reduce identity risk, proactively detect threats, and combat attacks across your entire infrastructure

    Details

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free according to the free trial terms set by the vendor.
    Pricing is based on the duration and terms of your contract with the vendor. This entitles you to a specified quantity of use for the contract duration. If you choose not to renew or replace your contract before it ends, access to these entitlements will expire.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    36-month contract (6)

     Info
    Dimension
    Description
    Cost/36 months
    1,000 Managed Assets
    Privilege Mgmt Cloud for Win/MAC Subscription
    $98,690.00
    500 Managed Assets
    Password Safe Cloud Subscription
    $95,510.00
    10 Concurrent Users
    Remote Support Cloud Subscription
    $72,427.00
    250 Managed Assets
    Privileged Remote Access
    $152,813.00
    3,000 Personnel
    Identity Security Insights
    $219,660.00
    300 Named Users
    Entitle - Just in Time Access and Permissions Management
    $200,567.00

    Vendor refund policy

    All orders are final and all fees and other amounts you pay are non-refundable.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Resources

    Vendor resources

    Support

    Vendor support

    Customer success and satisfaction are the primary goals of BeyondTrust, and we are committed to providing world-class products and exceptional Technical Support services to our customers. Our mission is to deliver consistent, timely, and professional support that meets the needs of customers of all sizes on a global scale. mysupport@beyondtrust.com 

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly
    By BeyondTrust Corporation
    By JumpCloud, Inc.

    Accolades

     Info
    Top
    10
    In Financial Services
    Top
    100
    In Applications
    Top
    10
    In Application Servers

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    8 reviews
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Identity Threat Detection
    Advanced discovery and intelligence system for detecting identity-based threats across infrastructure
    Privileged Access Management
    Comprehensive control and management of privileged passwords, accounts, credentials, and sessions for human and machine identities
    Remote Access Security
    Granular control, management, and auditing of privileged remote access for employees, vendors, developers, and cloud operations engineers
    Endpoint Privilege Control
    Dynamic least privilege enforcement across Windows, macOS, Linux, and mobile platforms to prevent malware and unauthorized access
    Cloud Entitlement Management
    Cross-cloud visibility of access permissions, detection of account permission anomalies, and guidance for privilege optimization
    Single Sign-On (SSO)
    Supports automatic user synchronization across multiple directories with one-click access to corporate applications across on-premises and cloud environments
    Multi-Factor Authentication
    Provides diverse authentication methods including passwordless, passkeys, one-time passcodes, push notifications, biometric data, and security keys with real-time reporting capabilities
    Identity Lifecycle Management
    Enables role-based user provisioning with least-privileged access controls and automated user management workflows
    Cloud Directory Services
    Offers secure cloud-based directory management with web interface for managing users, authentication policies, and access controls
    Security Integration
    Supports pre-built authentication connectors with third-party web applications and integrations with cloud infrastructure platforms like AWS IAM, AWS SSO, Amazon Cognito, and Amazon EventBridge
    Identity Management
    Centralized cloud directory platform supporting cross-platform identity management across multiple operating systems and infrastructure resources
    Single Sign-On
    Passwordless authentication with multi-factor authentication supporting over 900 pre-built applications and integration with major identity providers
    Device Management
    Cross-OS server and device management capabilities for Windows, macOS, iOS, Linux, AWS Linux AMIs, and Android platforms
    Access Control
    Group-based permissions and conditional access controls for securing resource access across different infrastructure environments
    Platform Integration
    Native integrations with AWS Identity Center, Google Workspace, Microsoft 365, Active Directory, and HRIS platforms for comprehensive identity ecosystem management

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 AWS reviews
    |
    304 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Food Production

    Reliable and efficient remote support solution

    Reviewed on Sep 03, 2025
    Review provided by G2
    What do you like best about the product?
    The most helpful things about BTRS are the ease of set-up and use. It's supported by different OS and multiple engineers can work together in one session. The fact that the sessions are encrypted, audited, logged and more is perfect for our ISO office. The tool itself is reliable and stable.
    What do you dislike about the product?
    Currently no major issues were experienced. The GUI feels sometimes a bit outdated.
    What problems is the product solving and how is that benefiting you?
    It solves the need for a solution where our engineers can control and manage devices remotely in (critical) support cases.
    Consulting

    Honest opinion on Beyond trust

    Reviewed on Aug 27, 2025
    Review provided by G2
    What do you like best about the product?
    What I like best about BeyondTrust Remote Support is how quickly I can connect to a user’s system without them struggling to install or configure anything. It feels secure, smooth, and saves a lot of time when resolving issues.
    What do you dislike about the product?
    What I dislike about BeyondTrust Remote Support is that the interface can feel a bit outdated and sometimes the connection speed depends heavily on the user’s network. It works well overall but it could be more modern and consistent.
    What problems is the product solving and how is that benefiting you?
    BeyondTrust Remote Support solves the problem of physically needing to be at a user’s desk or relying on long calls to guide them. It lets me access their system directly, fix issues faster, and reduce downtime. This saves effort for both me and the user while improving overall productivity.
    Justin G.

    Absolutely love Remote Support

    Reviewed on Aug 21, 2025
    Review provided by G2
    What do you like best about the product?
    Extremely easy to use, very versatile, works with pretty much every device or kind of computer, tablet, or phone that we need to support, and very, very reliable
    What do you dislike about the product?
    Very proprietary and can be difficult to get help with using this product because it's not universally supported
    What problems is the product solving and how is that benefiting you?
    We have to support faculty staff, and students all around the world, and so having a unified tool that allows us to support our customers anywhere anytime is essential to our operations
    Jeffrey G.

    Amazing Platform

    Reviewed on Aug 21, 2025
    Review provided by G2
    What do you like best about the product?
    As the administrator and user, this is amazing product that does everything that our organization needs. Was easy implementation and has many useful features.
    What do you dislike about the product?
    What is there to dislike, this is an amazing platform.
    What problems is the product solving and how is that benefiting you?
    Allow for remote unattended and attend remote support with a secure platform.
    Information Technology and Services

    BeyondTrust Remote Support beyond Reliable.

    Reviewed on Aug 19, 2025
    Review provided by G2
    What do you like best about the product?
    Sessions are fully encrypted (TLS 1.2+), with extensive logging, video capture, and audit trails. Works across Windows, macOS, Linux, iOS, Android, ChromeOS, and even network devices and kiosks. Multiple technicians can join a session (“session sharing” / “shadowing”) to solve complex issues faster.
    What do you dislike about the product?
    Some users note that the agent/client can be heavy on system resources, especially on older machines.
    What problems is the product solving and how is that benefiting you?
    I use BeyondTrust Remote Support to quickly and securely assist remote employees. For example, when a manager couldn’t connect to the VPN, I launched a secure session, fixed the issue, and restored access within minutes. It’s helped me resolve problems faster, maintain compliance, and keep users productive from anywhere
    View all reviews