Privileged Remote Access Cloud Frequently Asked Questions

Implement Privileged Remote Access

What Hosting Regions Are Available for the Solution?

  • Commercial
    • Asia-Pacific (Singapore)
    • Australia (Sydney)
    • South America East
    • Canada
    • Europe (Germany)
    • United Kingdom (London)
    • India West
    • United States (Central)
    • United States (East)
    • United States (West)
  • Government:
    • United States Gov (East)
    • United States Gov (West)

What Cloud Provider is Leveraged to Deliver the Privileged Remote Access Solution?

The solution is hosted within a single tenant EC2 instance in Amazon Web Services. This environment is audited under the requirements for SOC 2 Type 2 and ISO 27001.

Upgrades, Uptime, and Downtime

What is BeyondTrust’s Service Level Agreement (SLA) for Solution Availability?

BeyondTrust’s Availability SLA shall be ninety-nine and nine-tenths percent (99.9%) during a calendar month.

Are Upgrades or System Changes Installed During Off-Peak Hours or in a Manner That Will Not Impact Business Operations?

Yes. When notified of an upcoming upgrade, BeyondTrust Technical Support can schedule the upgrade within your change window, if preferred.

Vulnerability and Penetration Testing

Does the Solution Undergo Frequent Vulnerability and Penetration Testing?

Yes. BeyondTrust performs regular, internal vulnerability scanning and penetration testing on all product solutions. Also, BeyondTrust contracts with third-party vendors to perform periodic penetration tests on the platform to identify risks and remediation that help secure the solution.

Can I Perform My Own Penetration Testing Against the Solution?

Yes. You must notify BeyondTrust in advance of any test by submitting a request using the BeyondTrust Online Support Portal and completing a penetration testing agreement. This activity can be performed only once per calendar year.

Data and Access

Does the Solution Support Role-Based Access for End Users and System Administrators?

Yes. This is a core component of the solution that can be configured and managed.

Who Can Access My Data?

Access to cloud services by BeyondTrust employees is protected by authentication and authorization mechanisms, and BeyondTrust has implemented an access control authentication approach based on need to know and separation of duties.

Get More Information

For more information about these topics, please see the Cloud Service Guide.