Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

Hotel Privileged Access – Where Access Control Takes Top Priority

March 21, 2017

  • Blog
  • Archive

Many of you will be able to relate to the experience of staying in a hotel. You approach the front desk where you are greeted and asked for identification so you can be checked in the hotel. The front desk agent confirms the length of your stay and any requests you have made for your room and reminds you that check out is at 11am. The agent programs a keycard for you that will give you access to your room and any common areas for the duration of your stay. However, you can’t use this card to access other guest rooms or staff areas – just your room and the common areas necessary to your stay.

Infographics

The Hotel of Privileged Access

Webcasts

Securing Privileged Access “Inside the Perimeter”

In addition to guest key cards, every staff member has a card as well. Housekeeping may have access to guest rooms, while catering and banquet staff have access to the kitchens and meeting rooms, and managers may have access to everything. If there is a contractor coming in to the hotel for repairs or maintenance, they will also be granted a temporary key card that will allow them to get where they need to do their job.

 Hotels operate in this manner to keep its guests, staff members and the property safe. Setting granular permissions for everyone present (at any given time) helps ensure everyone is where they are permitted to be.

Let’s relate that picture to managing privileged access, where organizations can broker secure access to company networks and systems for privileged users and vendors. Using Bomgar Privileged Access, companies broker secure connections to critical systems and networks by applying granular access, similarly to how hotel access is managed. Assign and limit access parameters for privileged users and vendors as if you were programming a key card for them.

By taking advantage of Bomgar Privileged Access, organizations can manage, control and monitor privileged accounts and credentials. For example, senior users (the hotel’s general manager, or his enterprise counterpart—the SysAdmin) should have more access than junior employees (i.e., hotel kitchen staff or tier 1 support reps). To protect against security threats, companies must grant just the access these and other groups need to do their jobs—and no more. By utilizing more than perimeter security to oversee every entrance, an organization can protect its network from unwanted visitors. We compare this in greater detail in “The Hotel of Privileged Access”.

To learn more about securing privileged accounts and privileged access, this webinar offers a closer look into privileged access management and how it can counter the weaknesses in traditional perimeter security technology.

Casey Piquette

Content Marketing Specialist

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.