BeyondTrust Professional Services deliver best practices and a cost-effective path to a successful PowerBroker for Windows and PowerBroker for Mac implementations. Professional Services security engineers partner with customers on installation, configuration, and knowledge transfer. Our services are available in tiered packages to meet your architectural and business requirements.
Professional Services Packages – Which Is Right for Me?
Selecting the right professional services package helps to ensure a positive business outcome. Our packages are designed to fit your preferred deployment technology and project scope. We’ll help you determine which tier will work best for you.
- Tier 1: Least privilege management
- Tier 2: Tier 1 + centralized reporting and event logging
- Tier 3: Tier 2 + distributed components and additional modules
- Tier 4: Tier 3 + customized locations and messaging
|Tier 1 (5 days)||Tier 2 (10 days)||Tier 3 (15 days)||Tier 4 (>15 days)|
|Professional Services Criteria|
|Install PowerBroker for Desktops client using AD or McAfee ePO policy||♦||♦||♦||♦|
|Install BeyondInsight® as a UVM Appliance||♦||♦||♦||♦|
|Install BeyondInsight as software (for Tier 1 – least privilege only, one policy source, and server hardening is optional)||♦||♦||♦||♦|
|Create rules based on BeyondInsight events for ePO, AD or Central Policy (for Tier 1 – select one)||♦||♦||♦||♦|
|Implement policy that contains risk compliance rules||♦||♦||♦|
|Configure remote event collectors||♦||♦|
|Assist with load balancers for event collectors||♦||♦|
|Implement policy that contains file integrity, session and event monitoring rules||♦||♦|
|Rule requirements with strict privileges or custom tokens to include application control (whitelisting or blacklisting policies)||♦||♦|
|Custom dialogs, localization, or multifactor support||♦|
|Professional Services Tasks|
|Configure ADMX and policy settings||♦||♦||♦||♦|
|Create deployment packages using MSIs||♦||♦||♦||♦|
|Create policies based on rule library||♦||♦||♦||♦|
|Create custom user and/or computer rules||♦||♦||♦|
|Configure item-level targeting per rule/collection||♦||♦||♦|
|Create risk compliance rules||♦||♦||♦|
|Create file integrity, session monitoring and Windows event log monitoring rules||♦||♦|
|Create custom dialogs, localization, and/or connect MFA||♦|
|Training and Knowledge Transfer|
|Provide knowledge transfer for daily maintenance of PowerBroker for Desktops||♦||♦||♦||♦|
|Provide online virtual-based training to prepare for the implementation||♦||♦||♦||♦|
|Provide onsite classroom-based training to supplement the implementation||optional|
Read the complete Data Sheet!