New Infrastructure Access capabilities in Privilege Remote Access enable developers, cloup ops engineers, and technical staff to securely access critical resources
BeyondTrust releases BeyondTrust Privileged Remote Access and Password Safe and the availability of both products in a new bundle with value pricing. These releases introduce new, expanded capabilities for developers, cloud ops and other technical staff to secure and manage access to critical systems in a way that doesn’t sacrifice ease of use or efficiency.
Traditional Privilege Access Management (PAM) tools have not kept up with cloud use cases and often require developers and cloud ops engineers to use legacy connection methods like VPNs and actively contribute to the use of shadow IT.
BeyondTrust’s robust infrastructure access capabilities are designed for today’s modern cloud-native environments. These releases advance our capabilities beyond traditional PAM and address all seven tenets of zero trust.
Privileged Remote Access Enables Secure Infrastructure Access
BeyondTrust Privileged Remote Access provides frictionless, just-in-time, just-enough-access to critical systems — without requiring a VPN. Privileged Remote Access users will benefit from enhanced infrastructure access capabilities that improve productivity and simplify compliance in the most challenging and complex environments, which include:
- Enabling admins to granularly define who has access to what and when, and easily integrate Privileged Remote Access with an IDP for dynamic roles-based access
- Allowing users to leverage familiar tools and workflows, like Putty and Azure Data Studio, to securely conduct work
- Direct tunneling to the SQL protocol and connecting to this tunnel with the admin’s tool of choice; this enables least privilege with very granular access to specific infrastructure, cloud applications or even controlling the specific permissions in those apps or systems
- Injecting credentials for connections from Password Safe to streamline the user’s workflow and protect abuse of privileges
- Allowing tools like Terraform to spin up and down ephemeral cloud infrastructure and automatically grant and revoke access through a collection of BeyondTrust’s pre-built scripts
- Creating a consolidated audit trail of developer and cloud ops activity, in addition to IT admin and vendor activity, eliminating multi-source log issues
DevOps Secrets in Password Safe
BeyondTrust Password Safe now includes secrets management capabilities. This capability enables secrets as well as passwords, certificates, keys, tokens, etc. to be stored and managed in Password Safe, expanding the ability to secure critical infrastructure and DevOps environments in the cloud. Centralizing secrets and credential vaulting within Password Safe allows organizations to leverage one powerful, integrated solution, in contrast to vendors who only offer a standalone secrets vault or require several tools to manage privileged accounts and secrets. This new feature enables:
- Combined management of privileged passwords, SSH keys, team passwords, secrets used in CI/CD pipeline and runtime environments
- Leveraging Password Safe full-featured GUI for faster secrets management use case adoption
- Integration with Kubernetes without the need of developer expertise
- Simplified storage of certificates, API Keys, tokens, etc., within a secure and audited vault
- Full API support, file upload/download, and secrets management
- Reporting of all secrets and team passwords transactions, complete auditing and reporting of secrets and groups.
New Value Bundle: Password Safe and Privileged Remote Access
With these two releases, BeyondTrust is also offering a value-packed bundle that includes the industry-leading credential management capabilities of Password Safe (privileged accounts management, comprehensive discovery and onboarding, privileged task automation) and the best-in-class session management of Privileged Remote Access (privileged access control, infrastructure access management). This is the most comprehensive Privileged Account and Session Management (PASM) solution in the market, at a value price accessible to organizations of all sizes.
“Increasingly, organizations are working to maximize the productivity and effectiveness of developers and cloud ops, while reducing network complexity, shrinking attack surfaces, and stopping shadow IT,” said Sam Elliott, SVP, Product Management at BeyondTrust. “With the enhanced infrastructure access capabilities of Privileged Remote Access, the inclusion of secrets management in Password Safe, and the combined access of both products in one supercharged bundle, IT teams now have more tools at their disposal to support the unique needs (frictionless, agile work) of technical staff while taking huge steps to reduce the risk in their cloud environments, meet compliance requirements and keep them on their zero trust path.”