- As a global leader in Privileged Access Management (PAM), BeyondTrust is working with 20,000 clients, including more than half of the Fortune 100 companies.
BeyondTrust Universal Privilege Management (UPM) is a solution that protects the entire universe of privileges across organizations.
- The BeyondTrust Solution
- Analyze and interoperate assets, analyze vulnerabilities, write reports based on analysis, implement and manage centralized policy
-
- PRIVILEGED PASSWORD
MANAGEMENT
- Analyze assets, manage asset accounts, record activities and monitor every privileged account and session
Server, Network, DB, App.
-
- ENDPOINT PRIVILEGE
MANAGEMENT
- Eliminate manager privileges and grant temporary access depending on each user policy
Server, Network, DB, App.
-
- SECURE REMOTE
MANAGEMENT
- Enable users to securely log into internal systems without VPN or internal privileged accounts
Server, Network, DB, App.
The BeyondTrust Solution Key Advantages
- PRIVILEGED PASSWORD
MANAGEMENT
-
- Automatic asset analysis
automated registration of privileged account/differentiation between assets and applications
- Adaptive access control
timely control of access policy based on flexible workflow
rules
- App-to-App password management
embedded key controls for scripts, files and codes to maximize
its defense against backdoor attacks
- Analyze privilege-related risks
take actions, give warnings and send reports about suspicious
or malicious activities
- Secure SSH key management
use SSH keys for Unix and Linux systems
- Strong management of privileged sessions
record and monitor sessions, compliance, audit forensic
- ENDPOINT PRIVILEGE
MANAGEMENT
-
- Eliminate manager privileges
provide the least privilege/compliance
- Control applications/commands
block unauthorized applications/commands based on the
White list policy
- Solutions for various OS
Windows, Mac, Linux, AIX, HPUS and Solaris
- Defend against cyber attacks
fundamentally blocks attacks, including fishing, malware and ransomware
- Segmented policy-based control
elevate privileges depending on rules and needs by segmenting privileges
- AD Bridge
interoperate and manage Mac, Unix and Linux with a group
policy management of AD
- PRIVILEGE REMOTE
ACCESS
-
- Secure remote access
stronger user authentication based on 2FA authentication and secure system access without VPN
- Audit & Compliance & Forensic
monitor and record every session in real-time, meeting requirements for compliance
- Eliminate insecure connection
Ordinary protocols, such as RAP and Telnet, can be replaced
with encrypted Jump Client
It is possible to combine with existing security solutions, such as SIEM
- Credentials and least privileges and - by issuing credentials
it does not expose pass codes and prevents data leakages by granting the least privileges
- Mobile & Web Consoles
provides maximum flexibility by enabling access through mobile devices or web browsers in addition to separate consoles
- Work across Hybrid Environments
support various platforms, including on-premise, cloud and hybrid systems