Unmatched Control Over Remote Access

Give legitimate users the access they need to be productive, while keeping attackers out.

Secure and Control Privileged Remote Access for Insiders and Vendors

Quote Image

"Establishing controls around privileged access continues to be a focus of attention for organizations and auditors. IAM and security leaders must be prepared to secure, manage and monitor privileged accounts and access."

Felix Gaehtgens and Anmol Singh, Gartner Market Guide for Privileged Access Management 27 May 2015

Highlighted Features

How Does Privileged Remote Access Work?

Privileged Remote Access enables security professionals to control, monitor, and manage privileged access to critical systems.

Secure and Inject Privileged Credentials

Privileged Remote Access eliminates the need for privileged users to remember or share credentials for the systems they need to access. Passwords can be stored in the on-appliance vault. Or you can integrate PRA with BeyondTrust Password Safe or another Password Management Solution.

This password component enables our credential injection capabilities. Instead of requiring privileged users to know usernames and passwords for each endpoint, we can store those credentials securely. And then, using API functionality, we can retrieve those credentials and inject them directly into a session.

This means you don’t need to expose credentials, giving you more control and flexibility around those accounts

Integrate with Identity Management, Change Management, and SIEM Solutions

The Privileged Remote Access API allows you to seamlessly integrate privileged access with your existing workflows for identity, change, and event management. Integrate with password management tools to enable automatic password injection. Leverage existing SIEM solutions to track session data and configuration changes Integrate with change management and ITSM solutions. Manage permissions and authentication with AD, LDAPS, RADIUS, Kerberos.

Secure and Manage Access to the Cloud

Most organizations use a mix traditional computing, private and public cloud infrastructure to run their critical systems. Privileged Remote Access gives you the ability to centrally secure and manage access across all of your environments, even sensitive systems in the Cloud.