PowerBroker for Virtualization and Cloud

Protect your virtual assets – those in the your own datacenter as well as those in the cloud – from attacks and misuses related to privileges.

Virtual Assets Require Real Security

PowerBroker Virtualization provides a dedicated solution for delegating root tasks and authorization in virtualized datacenter environments without ever disclosing the highly sensitive root password. PowerBroker adapts to the increasing scale and complexity of rapidly changing virtual and cloud environments, allowing for secure and efficient deployment and expansion within any IT infrastructure.

PowerBroker highly flexible policy language enables enterprises to dictate permissions for users down to the most granular level, extending to any command executable on guest operating systems as well as hypervisor hosts.

PowerBroker for Virtualization and Cloud UI
Frost & Sullivan
“ Frost & Sullivan’s opinion, few security products have been able to address the unique threats presented by these technologies and practices. BeyondTrust provides the requisite security functionality to ensure that customers can safely embrace these new technologies” Frost & Sullivan

Virtual Asset Security Lifecycle

Endpoint Security Lifecycle - Discover

Key Benefits

  • Accurate baseline for all follow-on assessment activities
  • Target identification for least-privilege or other server projects such as consolidation or virtualization
  • Creation of Smart Groups for regular assessments, risk prioritization and reporting on your virtual and/or cloud assets

Key BeyondTrust Capabilities

  • Provides complete inventory of virtual server assets (approved and rogue)
  • Cataloging of full system information (OS, device, applications, services, ports etc.)
  • Discovery of local users, groups and privilege data across distributed server environment
Endpoint Security Lifecycle - Assessment

Key Benefits

  • Proactive identification of vulnerabilities, misconfigurations and policy violations
  • Threat assessments on servers operating system, applications and configurations
  • Custom audits/assessments allow for identification of non-standard assets, software or configurations

Key BeyondTrust Capabilities

  • Accurate, actionable data helps drive proper remediation actions, accelerating risk reduction
  • Risk scoring streamlines the classification of most at-risk devices
  • Intuitive trending data for easy analysis, enabling better security strategy decisions
Enterprise Security Lifecycle - Comply

Key Benefits

  • "Operational GPS" directs IT to which actions provide the most risk-reduction benefits
  • Automated reporting on compliance efforts creates consistency and accountability, while driving down costs
  • Enterprise policy management and reporting

Key BeyondTrust Capabilities

  • Least Privilege implementation across the enterprise
  • Active Directory bridging across the enterprise
  • Robust database auditing
  • Non-Microsoft application patching
Endpoint Security Lifecycle - Optimize

Key Benefits

  • Receive an immediate ‘state of the union’ with regards to your virtual server or private cloud deployment through Risk Scoring
  • Greater efficiency via enterprise-centric capabilities such as role based access, internal auditing, ticketing, and integration with existing infrastructure investments

Key BeyondTrust Capabilities

  • Centralized management, reporting and logging
  • Role based policy, alert and reporting management
  • Virtual Vulnerability Scans on elevated commands and applications


Securely Delegate

Securely delegate privileges and authorization without disclosing the root password in virtualized datacenter or private cloud environments

Control User Activity

Control user activity flexibly and efficiently through fined-grained policies that can invoke virtually any action through scripting, from initiating an email approval workflow to validating a help desk ticket

Broker Permissions

Broker permissions transparently across the entire virtualized environment, ensuring user productivity without sacrificing security or compliance

Real-Time Tracking

Log all session activity down to the keystroke level to comply with internal and external controls mandates

Why BeyondTrust for Server Security

  • Quickly meet access/authorization regulations as described in SOX, HIPAA, GLBA, PCI DSS, FDCC and FISMA
  • Time-stamped logs for every administrative, user-level, and application activity ensures that no suspicious activity within a virtualized environment goes unnoticed
  • Preventive command-level control combined with comprehensive logging and reporting provide the necessary tools and capabilities for adhering to even the most stringent regulatory mandates
  • Supports 30 encryption methods for policies, logs, and network traffic, assuring compatibility within virtually any IT infrastructure
  • Centralized log data facilitates controlled access to session activity information
  • Centralized policy store allows for a single control point for managing user privileges
  • Supports flexible integration scenarios with Active Directory and other directory services, from basic authentication enablement to storage and lookup of PowerBroker policy data
Server Security

Related Products

To learn more about our products for securing your environment, select a product area below:

PowerBroker Identity Services

Quickly and easily integrate your Linux and Unix servers into your Active Directory Infrastructure

PowerBroker Servers Enterprise

Combine the power of our Linux/Unix root delegation and our AD bridging for an enterprise approach to server compliance

PowerBroker Password Safe

Automate Password Management for Increased Security across your entire dynamic infrastructure


  • PowerBroker for Virtualization and Cloud Policy Editor
  • PowerBroker for Virtualization and Cloud Event Log
  • PowerBroker for Virtualization and Cloud Key Stroke Log
  • PowerBroker for Virtualization and Cloud Policy