One access platform to rule them all
BeyondTrust has released the latest updates to Privileged Remote Access (PRA), the secure access solution for all technical systems in any organization. Privileged Remote Access creates identity-secure, just-in-time access for organizations to all technical resources anywhere on the network, while eliminating the need for virtual private networks (VPNs) and known credentials.
Version 24.1 brings a host of new features and capabilities designed for total VPN replacement and elevation of the Kubernetes environment with the assurance of just-in-time security and efficiency. In this release, Privileged Remote Access builds upon these market-leading functionalities (and effectively creates one platform to rule them all) by introducing Kubernetes Proxy and Network Tunneling.
This blog introduces a few of these new capabilities and explains how they are empowering our customers to bring identity security to every critical system, not just their Kubernetes environments.
What’s new with Privileged Remote Access 24.1?
There’s no more need for organizations to set up old-school VPNs or to handle a messy patchwork-web of solutions just to give their users access to their systems. Privileged Remote Access now covers access to all your systems and devices anywhere on the network in one access platform with the introduction of Kubernetes Proxy and Network Tunneling.
Introducing Kubernetes Proxy
Managing Kubernetes environments is notoriously difficult. Even smaller organizations have found that their Kubernetes environments can quickly become increasingly complex to deploy, manage, and control. To add another layer of complexity, securely managing Kubernetes environments presents its own set of challenges. Privileged Remote Access Kubernetes Proxy allows organizations to elevate their Kubernetes environments while maintaining robust, just-in-time security:
- Every Kubernetes access cluster can be managed in one place – Users can now securely control access to all their Kubernetes clusters through Privileged Remote Access, whether hosted in the cloud, on-prem, or both. This means users can fully proxy and log all CLI commands for managing their Kubernetes clusters, without having to jump between tools to manage access to all their different endpoints.
- All `kubectl` CLI commands for managing K8s can be fully proxied – Users gain a complete, just-in-time, secure access experience that even includes initiating shell sessions with the SSH capabilities Privileged Remote Access provides--including our short-lived certificates. Short-lived SSH certificates ensure another level of security for your credentials. Even if the certificates are compromised, they quickly expire , rendering them unusable by malicious actors.
- Every secure access capability available in Privileged Remote Access is now available for your Kubernetes environments – This includes automatic video recordings of every access session added to your session logs, even when users connect to ephemeral endpoints. With Privileged Remote Access to consolidate access management and secure best practices, managing your Kubernetes environment becomes painless.
New from BeyondTrust: Network Tunneling
Privileged Remote Access 24.1 leverages its brand-new capability, Network Tunneling, to better secure your operational technology (OT) and IT environments by securing every kind of access for all Privileged Remote Access users:
- One way to connect to all your servers and endpoints – This new capability was built to help address IT/OT convergence challenges by extending Privileged Remote Access’s industry-leading, identity-secure access to all systems, from a remote office desk to cloud IT, to the edges of your factory floors.
- Support for OT and IoT use cases – Privilege Remote Access is now able to solve for operational technology (OT) and Internet of Things (IoT) use cases built on programmable logic controller (PLC) devices, as well as anything relying on User Datagram Protocols (UDP), while maintaining the familiarity of point-to-point controls that resemble a VPN.
Network Tunneling provides one more way to connect to everything you need with Privileged Remote Access. Users will still get to enjoy the full set of Privileged Remote Access capabilities with Network Tunneling, like our world-class session monitoring and auditing for all access sessions.
Network Tunneling is an advanced feature of Privileged Remote Access and is toggled off by default. Customers who want to begin using it can contact support to toggle it on.
Next Steps
The newest features, capabilities, and enhancements introduced with Privileged Remote Access 24.1 extend a proven level of identity-secure access more broadly across all of your cloud and on-prem deployments and to all your systems, including OT and IoT.
Increase your organization’s ability to operate efficiently, elevate your just-in-time security posture, and solve your need to replace your traditional total VPN technology with Privileged Remote Access 24.1.
Already a customer? - Here’s how to get started with the new release.
Ready to extend robust identity security to every critical system? Click here to access a free trial, or contact us today to learn more!
Emily Wang, Product Marketing Manager
Emily Wang is a Product Marketing Manager at BeyondTrust for Privileged Remote Access and Remote Support. Prior to joining BeyondTrust, she worked in a variety of product marketing and product management roles at Visa, as well as fintech and software startups. In these roles, she owned the go-to-market strategy for products such as tap-to-pay and the simplification of buying insurance online. Emily is passionate about making technical concepts accessible to all and is enthusiastic about demystifying cybersecurity.