A feature in the full BeyondTrust Privileged Remote Access solution, Cloud Vault is part of a complete Privileged Access Management platform. Together, managing privileged sessions, passwords, and vendor access becomes centralized and highly secure.

Cloud Vault eliminates the need for privileged users to remember or share credentials for the systems they need to access. Cloud Vault stores those credentials securely, retrieves those credentials, and then injects them directly into a session.

  • Discover, manage, and rotate privileged credentials for Windows platforms and seamlessly inject those credentials on-demand, whenever they are needed.
  • Safely store, retrieve and inject any username, password, or SSH key combination associated with users (local or domain shared administrators, a user’s personal admin account, etc.) or shared admin accounts.
  • Increase security and reduce the risk of cyberattacks by consolidating the tracking, approval, and auditing of accounts by creating a single access pathway.

BeyondTrust offers more environmental segmentation than is available with traditional software-as-a-service (SaaS) deployments. Each BeyondTrust Cloud instance is a single-tenant virtual appliance. Your data remains totally separate from other cloud customers, and you control how your instance is used based on your requirements.

All BeyondTrust Cloud data centers in use have achieved ISO/IEC 27001 certification of its information security management systems. Additionally, all data centers have completed the following examinations: SOC II Type 1, SSAE 16, SOC 1 Type II, and SOC 2 Type II.

BeyondTrust Cloud Vault can also be used to manage access for web-based consoles, including for IaaS servers, hypervisor environments, and web-based configuration interfaces for core network infrastructure.

BeyondTrust enables centralized management of multiple remote protocols: RDP, SSH, Telnet, and our patented Jump Technology. Both the Access Console for privileged users and the endpoint application run seamlessly across operating systems: Windows, macOS, Linux, network devices, and others.

Each remote session produces detailed, searchable logs and video recordings. The solution deploys without weakening your perimeter or opening holes in firewalls. Plus, all session data is guarded by SSL encryption.

Create a comprehensive, automated audit trail of all user activity, complete with video recordings, logs, and session forensics. Easily generate reports to prove compliance.

Prefers reduced motion setting detected. Animations will now be reduced as a result.