Story image

BeyondTrust updates remote access solution

09 May 2019

BeyondTrust, a global provider of privileged access management (PAM), today announced the release of Privileged Remote Access 19.1, formerly Bomgar Privileged Access.

Privileged Remote Access provides control over privileged remote access giving legitimate users the specific access without giving them a VPN. 

The new release introduces capabilities for integrating with third-party solutions to simplify workflows and increase security, as well as additional deployment options. 

In addition, the release features new design elements.

 BeyondTrust Privileged Remote Access provides visibility and control over third-party vendor access, as well as internal remote access, enabling organisations to extend access to important assets without compromising security. 

With Privileged Remote Access as part of a complete PAM solution, users can automate vendor provisioning/de-provisioning, while adding a layer of advanced credential security and fine-grained access management in one leading PAM solution.

Version 19.1 includes the following enhancements:

  • Additional Deployment Options - The appliance is now available on Amazon Web Services (AWS). For customers with an initiative to move to the cloud, the new AWS deployment option provides increased flexibility.
     
  • Password Injection with Password Safe - Enables users to use privileged passwords without ever seeing or knowing them, providing an integrated approach to secure third-party vendor access.
     
  • macOs Mojave Support:  The macOS Representative Console and Customer Client now fully support macOS Mojave, including changes to the new security requirements of Mojave.
     
  • Atlas Cluster Technology designed for large-scale geographical deployments - With Atlas, customers use a single site across multiple appliances, referred to as nodes, in a cluster. Atlas enables administrators to manage multiple appliances across the globe from one place.
     
  • Access Console Enhancements - Enhancements to the Access Console improve usability, such as remembering the last security provider used for login, saving column layout changes and adding a new field indicating the last time a computer was rebooted.

“The number of privileged users and accounts is growing exponentially, and credentials are often being granted or shared in uncontrolled ways without any audit trail,” says BeyondTrust product management director Tal Guest. 

“In addition, most organisations lack visibility into what their vendors are doing when they access their network, despite the increasing risks of cyber-attacks related to third-party access. With Privileged Remote Access, organisations can control vendor access via granular, role-based session parameters, manage and secure insider access and audit privileged user activity to meet audit and compliance requirements.”

Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
SEGA turns to Palo Alto Networks for cybersecurity protection
When one of the world’s largest video game pioneers wanted to strengthen its IT defences against cyber threats, it started with firewalls and real-time threat intelligence from Palo Alto Networks.
Forrester names Trend Micro Leader in email security
TrendMicro earned the highest score for technology leadership, deployment options and cloud integration.
LogRhythm releases cloud-based SIEM solution
LogRhythm Cloud provides the same feature set and user experience as its on-prem experience.
One Identity named Leader in PAM and IAM by KuppingerCole
KuppingerCole lead analyst Anmol Singh evaluated the strengths and weaknesses of 20 solution providers in the PAM market for the report.
Healthcare environments difficult to secure - Forescout
The convergence of IT, Internet of Things (IoT) and operational technology (OT) makes it more difficult for the healthcare industry to manage a wide array of hard-to-control network security risks.