Vendor Remote Access with Secure Controls

Your IT infrastructure requires support from numerous technology vendors.

In a large company, hundreds or even thousands of vendor technicians may periodically require remote access to application servers, network devices, or user’s desktops.

BeyondTrust’s Embassy feature both enables and secures remote vendor access to your BeyondTrust environment. Get the support you need. Compromise nothing on security.

Quote Image

We wanted to ensure vendors would have access to the systems without a lot of difficulty. But at the same time, we wanted the ability to control and monitor the access. BeyondTrust Embassy feature allows us to do that.

Stephen Hey | Manager of Technology Infrastructure and Security, 9/11 Memorial

Empower Your Vendors. Stay In Control.

9/11 Memorial uses BeyondTrust to control vendor remote access

Support from vendors is necessary to keep your infrastructure functioning properly. But unmanaged remote access threatens security and undermines your regulatory compliance efforts. Do you have to sacrifice security to get support?

Unfortunately, most remote access solutions for vendors

But BeyondTrust empowers vendors to perform systems management or customer support. You control everything, from what systems they can access to what permissions they have once connected. Plus, reports and videos let you see every action they take.

Route Support Issues to Vendors

Request remote assistance from other reps, teams or vendors

BeyondTrust’s Embassy feature lets you automatically route support requests to vendors. You can set up a vendor as one of your support tiers. Or you can automatically route issues related to a vendor’s application to that specific vendor’s support team.

Simply create issues and assign them to an Embassy. Whenever an end user selects that issue from the front end survey of your public support portal, he or she will be directed to that Embassy support queue.

You can even use Equilibrium to define assignment rules for Embassy. With Equilibrium, you can algorithmically assign issues to vendor technicians based on availability or skill.

Enable Remote Access for Vendors with Jump Technology™

Enable Remote Access for Vendors with Jump Technology
Enable Remote Access for Vendors with Jump Technology

Jump Technology is made up of Jump Clients and Jumpoints. Support organizations can use Embassies to manage and report on vendors’ access to Jump Clients and Jumpoints at a very granular level.

With Jump Clients, vendors can access remote desktops, laptops, POS systems, kiosks and servers, regardless of network location.

Giving vendors access to Jumpoints lets them support Windows systems on remote networks without a pre-installed client. You can also enable vendors to use capabilities that require Jumpoints, such as:

  • Integrated Remote Desktop Protocol (RDP)
  • Integrated Intel® vPro™ Support
  • Shell Jump (SSH/Telnet)

A Secure Solution for Vendor Remote Access

Most companies have no organized management around vendor access and require that policies be written to attempt to control it. With Embassy, internal security policies can require vendors to access corporate assets through BeyondTrust.

With BeyondTrust’s Embassy feature, you have a secure, auditable, multi-platform solution for vendor remote access. You can create an Embassy for each and every vendor relationship and control granularly what systems and privileges each vendor can or cannot access.

Embassy gives you over fifty different access privileges for the vendors utilizing your BeyondTrust environment. Create an Embassy, define the privileges for every vendor that enters your network through that Embassy, then add users. You can add Embassy users individually or use security providers, such as LDAP, RADIUS, or Kerberos servers.

Embassy enables managed vendor remote access to your corporate network

Audit Vendors' Remote Access Activity on Your Network

BeyondTrust logs every action a vendor takes on your corporate network. You can run reports detailing chat transcripts, the number of files transferred and the permissions requested and granted. Reports can be viewed online or downloaded into a CSV file, easily transferrable to Excel.

You can also use session recording to save videos of remote access sessions involving vendors. Session recording videos include annotations showing who was in control of the mouse and keyboard at any given point during the session. Record videos of support sessions, command shell sessions and presentation sessions involving vendors.