BeyondTrust Privileged Remote Access provides control over vendor, contractor and administrator access to critical IT infrastructure, while allowing for privileged session recording.
Features and options
Access control
Implementation of the principle of least privilege by regulating and limiting the level of access to critical resources.
Registration of sessions
Control and logging of sessions using standard connection protocols (RDP, VNC, HTTP/S and SSH), ensures secure use of privileged accounts.
Reducing the attack surface
By consolidating tracking, approval, and auditing of privileged account usage, as well as creating a single access pathway.
Password management
Automatic credential injection directly into privileged sessions ensures the separation of users from passwords.
Audit
Tracking audit trails, analyzing privileged sessions, and other reporting features that gather data on access in real-time or after the sessions have ended streamline the compliance management process.
Remote access without VPN
Preparing the system to operate in the DMZ allows granting access to the required resources without the need to connect foreign computers to the infrastructure.
Benefits
Contractor control
Restrict contractors with granular, role-based access policies to specific systems using defined session parameters.
Control of administrators
Manage and regulate administrators’ access to specific systems without reducing their productivity.
Audit
Audit actions related to the use of privileged accounts and ensure compliance with security guidelines within your organization.
Features
- Granting access only to specific systems.
- Enhancing security by eliminating access to the entire infrastructure.
- Providing access without the need for VPN, separating external computers from the network infrastructure.
- Verifying vendor access to resources.
- Session logging and metadata recording.
- Ensuring compliance with standards and internal guidelines.
- Eliminating excessive access without compromising productivity.