BeyondTrust Released BeyondTrust Privileged Remote Access 

BeyondTrust-Released-BeyondTrust-Privileged-Remote-Access

BeyondTrust, a provider of intelligent identity and access security, announced the release of BeyondTrust Privileged Remote Access 22.2.

Windows Service Accounts can be a significant challenge for IT security to manage due to these accounts’ pervasive and interconnected nature. BeyondTrust Privileged Remote Access 22.2 builds upon BeyondTrust’s robust discovery capabilities with the rotation (and restart) of Windows Service Accounts, adding significant convenience and security gains to these critical IT components.

In addition, enhanced integration between Privileged Remote Access and BeyondTrust Password Safe now allows users to search for and remotely access Password Safe managed RDP and shell systems.  This integration makes it easier and more secure for administrators to align users with the credentials needed to access managed systems.

Allowing third-party remote access comes with many potential security risks. Vendors authorised to access the network and applications might not adhere to the organisation’s same level of security protocols. They might use weak or default passwords, or share a single set of credentials among multiple individuals. VPN is another risky practice for extending access to third parties, as they are a target for hackers to compromise the supply chain.

BeyondTrust Privileged Remote Access 22.2 includes a number of new features and enhancements, including the following:

  • Windows Service Account Rotation — Privileged Remote Access allows these highly interconnected credentials to be vaulted and makes rotation possible, greatly increasing an organisation’s security posture.
  • Group Policy API — Group Policy permissions are now able to be set via a new API reducing an organisation’s administrative burden and eliminating human error.
  • Syslog Access from Appliance UI — Syslog reports can now be downloaded directly from the Appliance.

“Reducing an organisation’s cybersecurity risk profile on company-owned assets is complicated enough, but when you have users accessing the network from random devices where you have no visibility, it adds a whole other level of complexity,” said Tal Guest, Director of Product Management at BeyondTrust. “This new version enables our customers to expand their reach of Zero Trust security practices even further into their business.”