BeyondTrust Privilege Management For Desktops

Simplified Least Privilege And Application Control For Windows And Mac

Partners / Technology Partners / BeyondTrust / Privilege Management For Desktops >

Granular Application Control
Reduce the risk of improper application usage by providing flexible, risk-based policies to enforce lease privilege.

Flexible Policy Management Options
Deploy and manage policies leveraging existing security and operational investments such as Group Policy or McAfee ePO.

Quick Start
Deliver fast time-to-value and minimize business disruption with built-in policies for immediate out-of-the-box deployments.

BeyondTrust Privilege Management for Desktops elevates privileges to known good applications that require them, controls application usage, and logs and reports on privileged activities using security tools already in place.

Features and Capabilities

  • Least Privilege Enforcement: Elevate privileges to applications for standard users on Windows or Mac through fine-grained policy-based controls, providing just enough access to complete a task.
  • Seamless Application Control: Deliver trust-based application whitelisting with a flexible policy engine to set broad rules. Tailored options enable organizations to choose automatic approval for advanced users – protected by full audit trails – or utilize challenge-response codes. Application whitelisting rules can be applied based on software origin as well.
  • Vulnerability-based Application Management: Leverage vulnerability data from BeyondTrust Enterprise Vulnerability Management to provide run-time intelligence on the risk of applications targeted for privilege elevation, allowing only secure applications to be executed.
  • Complete Auditing and Reporting: Provide a single, unimpeachable audit trail of all user activity that speeds forensics and simplifies compliance.
  • Privileged Threat Analytics: Correlate user behavior against asset vulnerability data and security intelligence from best-of-breed security solutions to provide an overall picture of end-user risk.
  • Integrations with the Security Ecosystem: Built-in connectors to a host of third-party solutions, including help desk applications, vulnerability management scanners, and SIEM tools, ensure that organizations realize a return on their security investments.

Granular Application Control
Reduce the risk of improper application usage by providing flexible, risk-based policies to enforce lease privilege.

Flexible Policy Management Options
Deploy and manage policies leveraging existing security and operational investments such as Group Policy or McAfee ePO.

Quick Start
Deliver fast time-to-value and minimize business disruption with built-in policies for immediate out-of-the-box deployments.

BeyondTrust Privilege Management for Desktops elevates privileges to known good applications that require them, controls application usage, and logs and reports on privileged activities using security tools already in place.

Features and Capabilities

  • Least Privilege Enforcement: Elevate privileges to applications for standard users on Windows or Mac through fine-grained policy-based controls, providing just enough access to complete a task.
  • Seamless Application Control: Deliver trust-based application whitelisting with a flexible policy engine to set broad rules. Tailored options enable organizations to choose automatic approval for advanced users – protected by full audit trails – or utilize challenge-response codes. Application whitelisting rules can be applied based on software origin as well.
  • Vulnerability-based Application Management: Leverage vulnerability data from BeyondTrust Enterprise Vulnerability Management to provide run-time intelligence on the risk of applications targeted for privilege elevation, allowing only secure applications to be executed.
  • Complete Auditing and Reporting: Provide a single, unimpeachable audit trail of all user activity that speeds forensics and simplifies compliance.
  • Privileged Threat Analytics: Correlate user behavior against asset vulnerability data and security intelligence from best-of-breed security solutions to provide an overall picture of end-user risk.
  • Integrations with the Security Ecosystem: Built-in connectors to a host of third-party solutions, including help desk applications, vulnerability management scanners, and SIEM tools, ensure that organizations realize a return on their security investments.

Multiple Deployment Options
With multiple options available to update rules – from GPOs and Web Services to McAfee ePolicy Orchestrator – BeyondTrust secures desktops without bogging down the help desk.

“[BeyondTrust] does the job for us in enforcing least privilege across our endpoints. The product has great controls and integration into Group Policy.”
IT ARCHITECT,
RUSSELL INVESTMENTS

BUSINESS BENEFITS

  • Elevates privileges to applications, maintaining user productivity without compromising security.
  • Tracks and controls applications, protecting endpoints from compromise.
  • Logs, audits, and reports on user activities, simplifying the process to prove compliance.
  • Integrates with other security tools, improving administrator productivity and simplifying use.
  • Easy to deploy, with minimal configuration.
  • Works seamlessly with the operating system, providing a transparent and intuitive experience to the user.
  • Supports a broad range of apps, tasks, and scripts, and provides break-glass options for power users.

Download Request for
BeyondTrust Privilege Management for Desktops Datasheet

Please enter your details to sign up to our mailing list and the download will be emailed to you shortly.

Download Request for
Votiro Secure File Gateway for Email

Please enter your details to sign up to our mailing list and the download will be emailed to you shortly.

Our website uses cookies to provide a better user experience, improve our services and our website’s functionality. By continuing to use our website, you consent to the use of cookies and agree to our Privacy Policy and Terms of Service.