Remote Support
Overview
BeyondTrust understands that encryption alone is not enough to secure remote support. Customers deploy the BeyondTrust appliance on premises, behind their own firewall and security measures, and control physical access to the appliance, ensuring no unauthorized party gains access to sensitive data or systems. BeyondTrust’s unique appliance-based design ensures remote support security from beginning to end.
Centralized Appliance
The BeyondTrust appliance is deployed within your own network, giving you complete, centralized control over all remote support activity. Data is routed and stored centrally over standard ports, enabling effective auditing.
Strong Cryptography
In addition to using SSL data encryption, BeyondTrust is the only remote support provider to offer a solution that’s been fully FIPS (Federal Information Processing Standards Publications) 140-2 Level 2 validated for both software and hardware elements.
Authentication
BeyondTrust seamlessly integrates with your existing identity management and authentication methods (e.g. LDAP, Active Directory, RADIUS, Kerberos), allowing users to login with secure directory credentials, as well as smart or CAC cards. BeyondTrust administrators can apply permissions and password policies on the group or individual level.