Skip to main content

Remote access control, password and key management, session logging

BeyondTrust Password Safe enables password and privileged account key management, as well as access control and session recording using high-privilege accounts. Integration with a wide range of target systems allows for comprehensive protection of infrastructure, including server systems, network devices, and databases.

Functions and capabilities

Automatic account detection and management.

The built-in scanning engine in the solution enables the detection, identification, and profiling of all resources. Dynamic categorization allows for the automatic addition of accounts and resources under the system’s control, streamlining the management process.

Secure management of SSH keys

The system enables automatic rotation of SSH keys according to a defined schedule and utilizes these credentials for secure user login to Unix/Linux systems without requiring user interaction with the key.

Password management between applications

Thanks to its advanced API, the solution allows for the elimination of hardcoded or embedded credentials and replaces them with references to the Password Safe system.

Improved management of privileged sessions

Live session monitoring enables real-time control, allowing administrators to block suspicious activities without terminating sessions. Archiving session recordings, along with session metadata, facilitates convenient verification of subcontractors’ and administrators’ actions.

Adaptive access control

Simple access inference mechanisms and flexible access policies allow for precise determination of the required workflow for a given request.

Leader according to Gartner.

BeyondTrust Password Safe is recognized as a leader in the Gartner® Magic Quadrant™ for Privileged Access Management.

Benefits

Total visibility

Ensure that privileged accounts are consistently identified and automatically included in the management process.

Critical Infrastructure Protection

Watch live and record sessions using privileged accounts to gain visibility into the activities performed by administrators and service providers.

Password and key security

Automatically manage passwords and keys for privileged accounts. Grant access to privileged sessions without revealing critical credentials.

Features

  • Role-based access control.
  • Multiple access policies based on user permissions levels.
  • Integration with AD and LDAP directory services.
  • Support for application sessions using terminal services.
  • Access to RDP and SSH sessions using standard tools like PuTTy and MSTSC.
  • Hardened virtual appliance solution with components compliant with FIPS 140-2, AES256 encryption, and HTTPS/SSLV3 communication.
  • Built-in high availability in Active/Passive or Active/Active models.
  • Fast and secure deployment process with minimal  interfaces configuration.