Security in BeyondTrust Privileged Remote Access (On-Premises)

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

BeyondTrust Overview

BeyondTrust connects and protects people and technology with leading secure access solutions that strengthen security while increasing productivity. BeyondTrust Privileged Remote Access lets you control access to critical systems without hindering the work privileged users need to perform. You can define how users connect, monitor sessions in real time, and record every session for a detailed audit trail.

BeyondTrust Privileged Remote Access integrates with external user directories, such as LDAP, for secure user management. BeyondTrust also integrates with leading systems management and identity management solutions and includes an API for deeper integration.

BeyondTrust enables remote access to multiple operating systems, including Windows, Mac, various Linux distributions, and mobile operating systems. BeyondTrust also enables remote control of various kinds of systems, including laptops, desktops, servers, kiosks, point-of-sale systems, smartphones, and network devices.

BeyondTrust can work over internal and extended networks, or it can be internet-accessible. BeyondTrust mediates connections between users and remote systems, allowing file downloads/uploads, remote control of desktops, and access to system information and diagnostics, the command line, and the registry editor.