The summary of ‘How BeyondTrust Privileged Remote Access Works’

This summary of the video was created by an AI. It might contain some inaccuracies.

00:00:0000:15:26

The video introduces BeyondTrust Privileged Remote Access as part of a comprehensive Privileged Access Management platform, providing secure remote access for internal administrators and third-party vendors. It emphasizes secure, audited, and screen-recorded sessions through features like jump clients and jump points, eliminating the need for VPNs and ensuring controlled access to specified endpoints. The solution integrates with various authentication methods and can be deployed physically or virtually, with compatibility across different operating systems and devices. Additionally, it facilitates collaboration by enabling organizations to invite external parties while monitoring interactions and providing detailed reporting. The system also seamlessly integrates with password management solutions, existing security investments, and hybrid environments, helping organizations maintain compliance and secure access to critical systems effectively.

00:00:00

In this segment of the video, BeyondTrust Privileged Remote Access is discussed as part of the Privileged Access Management platform, enabling secure remote access for internal administrators and third-party vendors. The solution offers a secure way for internal administrators to access systems, facilitates bringing contractors and vendors into organizations safely without the need for VPNs, provides centralized control over remote access sessions, and offers complete visibility through screen recordings and session forensics. The appliance-based solution can be deployed physically or virtually using VMware, Microsoft Hyper-V, Azure, or Amazon AWS, and a SAS version is available through BeyondTrust Cloud. Users log in to the product with outbound connections, eliminating the need for firewall changes. Authentication methods include local accounts, TOTP for two-factor authentication, and integration with Active Directory, LDAP, saml, or RADIUS. Group policies ensure controlled access to specified endpoints, and features like jump clients provide various ways to access endpoints efficiently.

00:03:00

In this segment of the video, the speaker discusses the effectiveness of using jump clients and jump points for privileged remote access. Jump clients send outbound heartbeats to the appliance for software updates and connection requests. Privileged users initiate a connection request that opens a TLS encrypted session between the jump client and the appliance. Similarly, jump points act as conduits for remote access to systems on a known network, enabling single-node access to multiple systems without pre-installing software on each computer. Both methods allow for secure, audited, and screen-recorded sessions stored in a tamper-proof manner on the appliance. Additionally, privileged remote access eliminates the need for users to remember or share credentials, as passwords can be stored securely on the appliance vault or integrated with a password management solution like Beyond Trust Password Safe for credential injection capabilities. The access console can be downloaded for technicians on various operating systems and mobile devices for flexibility in accessing endpoints securely.

00:06:00

In this segment of the video, the web console running within a browser is highlighted as a tool that eliminates the need for installing new applications. Users can perform various functions in the FAQ client through the web console. When logging into privileged remote access, users can view and access endpoints based on group policies, apply session and jump policies for security customization, and require approvals before accessing certain endpoints. The system sends notifications for access requests, and users must provide justifications. Access to endpoints may require credentials stored in a vault or external password safe. This process enhances user access management by implementing workflows and policies.

00:09:00

In this segment of the video, the speaker demonstrates using BeyondTrust to access a Linux server via a jump point proxy. The software allows for secure and monitored remote connections, with features like credential injection to log in without knowing the credentials. They also showcase functionalities such as file transfers, command shell emulation, system information viewing, event viewer, registry access, and multi-session management. Additionally, the video highlights the use of web jump for accessing web-based administrative interfaces securely. All actions performed are recorded and audited for security purposes.

00:12:00

In this segment of the video, the narrator discusses how privileged remote access can enable collaboration by allowing organizations to invite experts, vendors, or partners to resolve issues. Users can provide specific access levels to external parties and monitor their interactions in real-time. Sessions can be recorded and audited, with reporting available through the appliance interface, including session reports, summary reports, and session forensics. The access permissions for reporting can be delegated selectively, ensuring that users only see relevant information without access to everything else. Additionally, video recordings of sessions have a small storage footprint, making it easier to retain data for longer periods. Privileged remote access is highlighted as a tool for managing access to critical systems effectively.

00:15:00

In this segment, the video discusses a system that seamlessly integrates with password management, leverages existing security investments, and is compatible with hybrid environments. It allows users to access systems from mobile devices or browsers, logs and records every session, and helps in meeting compliance requirements.

Scroll to Top