Beyondtrust Privilege Remote Access.PNG




BeyondTrust Privileged Remote Access Overview

BeyondTrust connects and protects people and technology with leading secure access solutions that strengthen security while increasing productivity. BeyondTrust Privileged Remote Access lets you control access to critical systems without hindering the work privileged users need to perform. You can define how users connect, monitor sessions in real time, and record every session for a detailed audit trail.

BeyondTrust Privileged Remote Access integrates with external user directories, such as LDAP, for secure user management. BeyondTrust also integrates with leading systems management and identity management solutions and includes an API for deeper integration.

BeyondTrust enables remote access to multiple operating systems, including Windows, Mac, various Linux distributions, and mobile operating systems. BeyondTrust also enables remote control of various kinds of systems, including laptops, desktops, servers, kiosks, point-of-sale systems, smartphones, and network devices.

BeyondTrust can work over internal and extended networks, or it can be internet accessible. BeyondTrust mediates connections between users and remote systems, allowing file downloads/uploads, remote control of desktops, and access to system information and diagnostics, the command line, and the registry editor.

Business Benefits

  • Enable granular access to specific systems, improving security and eliminating “all or nothing” access to vendors or internal resources.

  • Centrally secure and audit vendor access across a variety of environments and meet compliance mandates.

  • Eliminate unnecessary privileges—without impacting the user’s ability to perform their role.

  • Flexible deployment choice from on-premises and private cloud

Key Features and Capabilities

Privileged Access Control: Enforce least privilege by giving users the right level of access.

Monitor Sessions: Control and monitor sessions using standard protocols for RDP, VNC, HTTP/S, and SSH connections.

Reduce the Attack Surface: Reduce attacks by consolidating the tracking, approval, and auditing of privileged accounts in one place and by creating a single access pathway.

Vault Privileged Passwords: Discover, manage and rotate privileged credentials for Windows platforms and seamlessly inject those credential on-demand, only when they are needed. Users never need to know or see plain text credentials.

Mobile & Web Consoles: Use mobile apps or web-based consoles anytime, anywhere.

Audit & Compliance: Create audit trails, session forensics, and other reporting features by capturing detailed session data in real-time or after session review and provide attestation reports to prove compliance.

Streamline Privileged Session Management: Standardize to a more secure and complete privileged session management solution that controls the access to and from any platform in any environment and eliminate inefficient workflows related to manual check-in and check-out of credentials.