Enable Secure SSH, Telnet and Command Shell Remote Access

Shell Jump gives technicians remote access to SSH-enabled or Telnet-enabled devices via a Jumpoint, allowing command line access to the remote system.

By including SSH/Telnet with its other capabilities, BeyondTrust replaces multiple software tools, letting you consolidate remote support on one solution.

Centrally Manage User Access Privileges to Network Devices

Traditional remote access tools are individually configured and have no central user access management. They typically do not integrate with LDAP or other methods of user validation.

BeyondTrust Remote Support integrates with LDAP, Active Directory, RADIUS and Kerberos which means you can centrally control users' access privileges and require secure authentication before enabling remote access. You can also store passwords in your enterprise vault and inject credentials during remote sessions.

Shell Jump also lets you set access parameters to remote devices. With Shell Jump, you can

  • Allow open, limited or provisioned access to network devices
  • Allow access only to those targets/hosts that you specify
  • Manage which provisioned hosts are accessible
  • Manage private keys and host keys for provisioned SSH devices

BeyondTrust Remote Support provides detailed audit records, including video recordings, of every remote access session performed through Shell Jump. This gives managers and information security teams critical visibility into remote support activity.

Prefers reduced motion setting detected. Animations will now be reduced as a result.