Shell Jump gives technicians remote access to SSH-enabled or Telnet-enabled devices via a Jumpoint, allowing command line access to the remote system.
By including SSH/Telnet with its other capabilities, BeyondTrust replaces multiple software tools, letting you consolidate remote support on one solution.
While you could use tools, such as PuTTy or Terminal, for remote access to network devices, these tools make user access management difficult.
Traditional remote access tools are individually configured and have no central user access management. They do not integrate with LDAP or other methods of user validation.
BeyondTrust integrates with LDAP, Active Directory, RADIUS and Kerberos which means you can centrally control users' access privileges and require secure authentication before enabling remote access. You can also store passwords in your enterprise vault and inject credentials during remote sessions.
Shell Jump also lets you set access parameters to remote devices. With Shell Jump, you can
Each new remote access tool used creates its own silo of data that must be audited. Some tools - such as PuTTY, Terminal, RDP, VNC, etc. - have very sparse logging capabilities.
But BeyondTrust creates a detailed audit record, including video recordings, of every remote access session performed through Shell Jump. This gives managers and information security teams critical visibility into remote support activity.
Standardizing the remote support toolset also improves support rep productivity. Instead of familiarizing themselves with multiple remote support tools, technicians can use the interface they already know.
Consolidating your toolset also enables time-saving feature combinations.
Shell Jump with Scripts and Multi-System Control: Access multiple remote network devices simultaneously, then run a script that automates a standard change.
Shell Jump with Session Recording: Record steps for a network-wide change, then let incoming shifts play the video prior to rolling out the change.