Endpoint access security.
Use Cases and Deployment Scope
The company I work for provides consulting services to clients in the area of information security using technologies from our partners. We use BeyondTrust Privileged Remote Access to access the technologies that are in our clients' environments. With BeyondTrust Privileged Remote Access, BeyondTrust Privileged Remote Access solved a problem we had in accessing this information. With this change, our access is much more secure.
A empresa em que trabalho fornece serviços de consultoria para clientes na área de segurança da informação usando tecnologias de nossos parceiros. Usamos o BeyondTrust Privileged Remote Access para acessar as tecnologias que estão nos ambientes de nossos clientes. Com o BeyondTrust Privileged Remote Access, a BeyondTrust Privileged Remote Access resolveu um problema que tínhamos para acessar essas informações. Com essa mudança, nosso acesso está muito mais seguro.
Pros
- Remote access with various protocols
- Access auditing, with logs, recordings, user information.
- Remote access without the need to use a VPN.
Cons
- One way to use it is by using a machine as an access proxy, this machine being Linux, has limitations such as copy and paste and does not allow access to more than one web access.
- Improve the desktop application view.
Return on Investment
- For our type of use, the main factor is not using a VPN anymore, this makes our access more secure, with the amount of customers we have and support we provide, this was a determining factor.
Usability
Alternatives Considered
CyberArk Privileged Access Management and senhasegura
Other Software Used
senhasegura, Netskope Advanced Analytics
