Endpoint access security.
Use Cases and Deployment Scope
The company I work for provides consulting services to clients in the area of information security using technologies from our partners. We use BeyondTrust Privileged Remote Access to access the technologies that are in our clients' environments. With BeyondTrust Privileged Remote Access, BeyondTrust Privileged Remote Access solved a problem we had in accessing this information. With this change, our access is much more secure.
A empresa em que trabalho fornece serviços de consultoria para clientes na área de segurança da informação usando tecnologias de nossos parceiros. Usamos o BeyondTrust Privileged Remote Access para acessar as tecnologias que estão nos ambientes de nossos clientes. Com o BeyondTrust Privileged Remote Access, a BeyondTrust Privileged Remote Access resolveu um problema que tínhamos para acessar essas informações. Com essa mudança, nosso acesso está muito mais seguro.
Pros
- Remote access with various protocols
- Access auditing, with logs, recordings, user information.
- Remote access without the need to use a VPN.
Cons
- One way to use it is by using a machine as an access proxy, this machine being Linux, has limitations such as copy and paste and does not allow access to more than one web access.
- Improve the desktop application view.
Likelihood to Recommend
For remote access in all forms, being fully adopted, for remote support cases it is also an excellent and suitable form of use.
Para acesso remoto de todas as formas, sendo totalmente adotado, para casos de suporte remoto também é uma forma excelente e adequada de uso.
