With the BeyondTrust Appliance for remote support, every support session generates a detailed audit trail, including a full video recording of all remote support activity. By investing in the BeyondTrust Appliance, you eliminate the monthly fees of software-as-a-service, lowering total cost of ownership over time.

Virtual Appliance B Series 400 Hardened Appliance B Series 300 Hardened Appliance B Series 200 Hardened Appliance
CAPACITY Defined by Virtual Infrastructure Up to 1200 concurrent technicians Up to 300 concurrent technicians Up to 20 concurrent technicians
SPECIFICATIONS
  • Defined by Virtual Infrastructure
  • Failover capable
  • Dual processors
  • Dual power supplies
  • RAID 6 – Six solid state drives, supports the loss of up to two drives without losing data
  • Drive failure notification
  • Failover capable
  • Single processor
  • Dual power supplies
  • RAID 1 and RAID 6 – Two solid state drives and four SAS drives
  • Drive failure notification
  • Failover capable
  • Single processor
  • Single power supplies
  • Single hard drive
  • Failover capable
AUTHENTICATION LDAP, SAML, RADIUS, Kerberos, Native 2FA LDAP, SAML, RADIUS, Kerberos, Native 2FA LDAP, SAML, RADIUS, Kerberos, Native 2FA LDAP, SAML, RADIUS, Kerberos, Native 2FA
INTEGRATION
  • ITSM and CRM Tools
  • SIEM Tools
  • Credential Injection
  • API and SDK for Custom Integrations
  • Database Integration and API Extraction Tool
  • Syslog Server Integration
  • Microsoft SQL Server
  • ITSM and CRM Tools
  • SIEM Tools
  • Credential Injection
  • API and SDK for Custom Integrations
  • Database Integration and API Extraction Tool
  • Syslog Server Integration
  • Microsoft SQL Server
  • ITSM and CRM Tools
  • SIEM Tools
  • Credential Injection
  • API and SDK for Custom Integrations
  • Database Integration and API Extraction Tool
  • Syslog Server Integration
  • Microsoft SQL Server
  • ITSM and CRM Tools
  • SIEM Tools
  • Credential Injection
  • API and SDK for Custom Integrations
  • Database Integration and API Extraction Tool
  • Syslog Server Integration
  • Microsoft SQL Server
JUMP CLIENTS Up to 100,000 Jump Clients [ 1] [Depends on Virtual Infrastructure] Up to 70,000 Active Jump Clients [ 1] Up to 10,000 Active Jump Clients [ 1] Up to 1,000 Active Jump Clients [ 1]
DEPLOYMENT
  • Amazon AWS
  • VMWare vCenter 5.0+
  • Microsoft Hyper-V 2012 R2+
  • Microsoft Azure Resource Manager
  • 1U rack-mountable server 1.68 x 18.97 x 26.89 in., 45 lbs.
  • Compatible with Atlas Deployments
  • 1U rack-mountable server 1.68 x 18.97 x 26.89 in., 45 lbs.
  • Compatible with Atlas Deployments
  • 1U rack-mountable server 1.68 x 18.97 x 26.89 in., 45 lbs.
  • Not Compatible with Atlas Deployments
  1. Based on utilization - this number may vary

Firewalls are designed to block incoming traffic. That is why traditional remote desktop protocols and tools (RDP, VNC, pcAnywhere, etc.) require firewall configuration changes in order to work over the internet. BeyondTrust does not require changes to your firewall because both the remote computer and the technician offering remote support connect to BeyondTrust through outbound connections.

If the remote computer can connect to the internet, support reps can connect to it through BeyondTrust without the use of VPN. In the case of closed networks, a single internet-connected BeyondTrust node can enable an off-network remote technician to connect to network devices and desktops that are not themselves connected to the internet.

BeyondTrust connects support reps with remote desktops, servers, laptops and network devices wherever they are. Support reps can see the screen, control the mouse and work as if physically in front of the remote desktop, speeding time to resolution. BeyondTrust can even let you gain remote control of computers not connected to the internet.

Support reps can use BeyondTrust to support remote iPad, iPhone, Android, BlackBerry and Windows Mobile devices. And BeyondTrust lets technicians control remote desktops from their iPad, iPhone or Android tablet.

BeyondTrust logs and records every session, and all session traffic is guarded by SSL encryption. Plus, the BeyondTrust Appliance resides in your network, under the trusted security measures you already have in place. After most support sessions BeyondTrust uninstalls, leaving no footprint on the remote desktop.

Prefers reduced motion setting detected. Animations will now be reduced as a result.