Endpoint access security.
Use Cases and Deployment Scope
A empresa em que trabalho fornece serviços de consultoria para clientes na área de segurança da informação usando tecnologias de nossos parceiros. Usamos o BeyondTrust Privileged Remote Access para acessar as tecnologias que estão nos ambientes de nossos clientes. Com o BeyondTrust Privileged Remote Access, a BeyondTrust Privileged Remote Access resolveu um problema que tínhamos para acessar essas informações. Com essa mudança, nosso acesso está muito mais seguro.
Pros
- Remote access with various protocols
- Access auditing, with logs, recordings, user information.
- Remote access without the need to use a VPN.
Cons
- One way to use it is by using a machine as an access proxy, this machine being Linux, has limitations such as copy and paste and does not allow access to more than one web access.
- Improve the desktop application view.
Return on Investment
- For our type of use, the main factor is not using a VPN anymore, this makes our access more secure, with the amount of customers we have and support we provide, this was a determining factor.
