BeyondTrust Privileged Remote Access 21.1 speeds vendor onboarding


Share

BeyondTrust has announced new capabilities within BeyondTrust Privileged Remote Access 21.1 to control, manage, and audit remote privileged access by authorized employees, contractors, suppliers and vendors, without compromising security or requiring a virtual private network (VPN). The new version introduces features that speeds vendor onboarding, enables secure access to Raspberry Pi based devices, and extends RDP capabilities.

Using BeyondTrust Privileged Remote Access, organizations can reduce the attack surface and drive productivity in several important ways:

  • Enforce a policy of least privilege by giving users just the right level of access to devices and networks
  • Enable individual accountability for shared accounts
  • Define the endpoints users can access and when to whitelist and blacklist applications
  • Eliminate the need to configure and install a VPN on the personal devices of vendors and remote workers
  • Protect privileged credentials

“Remote access, particularly by third-party vendors, is often the weakest link in network security,” said Dan DeRosa, Chief Product Officer at BeyondTrust. “VPNs generally provide broad, often excessive, access to network resources. With BeyondTrust Privileged Remote Access, administrators eliminate ‘all or nothing’ remote access and can require that all connections go through a single access pathway, reducing the attack surface and creating an audit trail to meet compliance requirements.”

Vendors accessing an organization’s network and applications often don’t adhere to its security protocols. The new vendor onboarding feature within Privileged Remote Access not only streamlines the process, but also give organizations more control of remote access activity by third parties. Additionally, administrators are empowered to delegate management of vendor and internal users to a trusted vendor administrator or internal user.

BeyondTrust Privileged Remote Access also now enables Raspberry Pi secure access so that privileged users can connect to more types of unattended systems, perform administrative actions, and limit who can manage these devices. Raspberry Pi is a standard for a series of small, single-board computers that some organizations use because of their affordability, modularity, and open design.

Version 21.1 introduces new functionality of Bring Your Own Tools (BYOT) specifically for RDP Jump Items. This new setting, available for Desktop Access Console users, enables RDP Jump Items to include existing native RDP functionality, expanding Jump Item capabilities and improve the user experience while creating an audit trail and session recordings.


Leave a reply