2
According to Forrester Research, 80% of security breaches involve privileged credentials, so it’s never been more important for your customers to apply discipline and accountability over privileged accounts and users. However, there have been no true MSP-enabled solutions for privileged access management, leaving a gap in coverage for MSPs to offer their customers to reduce inside risks. Until now. Deliver Privileged Access Management and Vulnerability Management as a Service The BeyondTrust Managed Service Provider (MSP) Program enables partners using a cloud-based services model (whether located in their datacenter or a third-party cloud provider) to design and architect BeyondTrust privileged access management and vulnerability management solutions as a service. With the BeyondTrust MSP program, partners can deliver the following solutions as services: y Enterprise Password Management y Enterprise Session Management & Recording y Secure SSH Key Management y Secure Application Password Management y Privilege Management for Desktops y Privilege Management for Servers y Core Infrastructure Privilege Management y Enterprise Vulnerability Scanning With this integrated offering, MSP partners have a foundation to profitably grow their security services. Managed Service Provider Program For Privilege and Vulnerability Management Program Benefits GROW FOOTPRINT AND REVENUE Deliver value-added services in privileged access and vulnerability management to current and new clients. GAIN A CENTRAL VIEW OF INSIDER THREATS Use a single web-based management console to centrally manage the portfolio of privilege and vulnerability offerings. DELIVER INTEGRATED SERVICES Integrate privilege and vulnerability solutions with leading IAM, SIEM, GRC, and systems management tools. SCALE TO MEET EVEN THE LARGEST ENVIRONMENTS Maintain a flexible single instance or multi-tenant deployment to match the scale and demands of a diverse customer base. IMPROVE FLEXIBILITY TO SUPPORT COMPLEX CUSTOMERS Support physical, virtual, cloud, and SaaS applications from a single (or multiple) MSP installed environment. BeyondTrust solutions are available through Amazon Web Services, Microsoft Azure or Google Cloud. The BeyondTrust MSP Platform enables management and reporting across multiple applications, cloud instances and clients.

For Privilege and Vulnerability Management · Deliver Privileged Access Management and Vulnerability Management as a Service The BeyondTrust Managed Service Provider (MSP) Program

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: For Privilege and Vulnerability Management · Deliver Privileged Access Management and Vulnerability Management as a Service The BeyondTrust Managed Service Provider (MSP) Program

According to Forrester Research, 80% of security breaches involve privileged credentials, so it’s never been more important for your customers to apply discipline and accountability over privileged accounts and users. However, there have been no true MSP-enabled solutions for privileged access management, leaving a gap in coverage for MSPs to offer their customers to reduce inside risks. Until now.

Deliver Privileged Access Management and Vulnerability Management as a Service The BeyondTrust Managed Service Provider (MSP) Program enables partners using a cloud-based services model (whether located in their datacenter or a third-party cloud provider) to design and architect BeyondTrust privileged access management and vulnerability management solutions as a service. With the BeyondTrust MSP program, partners can deliver the following solutions as services:

y Enterprise Password Management

y Enterprise Session Management & Recording

y Secure SSH Key Management

y Secure Application Password Management

y Privilege Management for Desktops

y Privilege Management for Servers

y Core Infrastructure Privilege Management

y Enterprise Vulnerability Scanning

With this integrated offering, MSP partners have a foundation to profitably grow their security services.

Managed Service Provider ProgramFor Privilege and Vulnerability Management

Program Benefits

GROW FOOTPRINT AND REVENUE

Deliver value-added services in privileged access and vulnerability management to current and new clients.

GAIN A CENTRAL VIEW OF INSIDER THREATS

Use a single web-based management console to centrally manage the portfolio of privilege and vulnerability offerings.

DELIVER INTEGRATED SERVICES

Integrate privilege and vulnerability solutions with leading IAM, SIEM, GRC, and systems management tools.

SCALE TO MEET EVEN THE LARGEST ENVIRONMENTS

Maintain a flexible single instance or multi-tenant deployment to match the scale and demands of a diverse customer base.

IMPROVE FLEXIBILITY TO SUPPORT COMPLEX CUSTOMERS

Support physical, virtual, cloud, and SaaS applications from a single (or multiple) MSP installed environment. BeyondTrust solutions are available through Amazon Web Services, Microsoft Azure or Google Cloud.

The BeyondTrust MSP Platform enables management and reporting across multiple applications, cloud instances and clients.

Page 2: For Privilege and Vulnerability Management · Deliver Privileged Access Management and Vulnerability Management as a Service The BeyondTrust Managed Service Provider (MSP) Program

Managed Service Provider Key Features

ANYTIME, ANYWHERE SECURE ACCESS

Deliver access across all devices and environments including traditional and virtual desktops, servers, databases, infrastructure, applications, internet of things (IoT), notebooks, tablets, and laptops. With managed services for privileged access, an administrator or a contractor can authenticate against select assets remotely – or on premise – with full session recording and keystroke logging, control via workflow and granular access restrictions.

AUDITING AND REPORTING ON PRIVILEGED ACTIVITY

Record and replay any privileged activity, including mouse actions, keystrokes and user interface screen captures, across network and cloud environments. Activity can be uniquely attributed to individual users, even when shared accounts are being used.

CYCLE EMPLOYEE AND THIRD-PARTY PASSWORDS

Achieve automatic, active password management, rotation and reconciliation for most platforms, including cloud-based platforms. This closes password security gaps across heterogeneous environments. Password changes can be performed with or without local agent technology to manage complex and roaming environments.

SECURE THIRD-PARTY ACCESS

Support clearly defined access levels, secure connection gateways, proxied access, and auditing and recording of the third-party sessions.

SECURE PRIVILEGE ELEVATION

Eliminate the risk of having privileged credentials available to anyone and have a managed service provide auditing for any and all applications that need privileged access. This lowers the risk from hacking techniques like Pass-the-Hash that steal administrative credentials and allows a trusted independent party (the MSP) to monitor and report on all privileged access regardless of platform.

SECURE NETWORK MANAGEMENT DEVICES

Bullet-proof client infrastructures with complete control and auditing of privileged accounts, such as shared administrative accounts, application accounts, local administrative accounts, service accounts, database accounts, cloud and social media accounts, devices, and SSH keys.

VULNERABILITY ASSESSMENT AND REMEDIATION

With managed services providing vulnerability assessments and remediation, information technology (IT) and security staff can spend more time on projects and less time on the never-ending process of vulnerability assessment, reporting, and patch mitigation.

GET STARTED

For information on how BeyondTrust can help your MSP with being first to market with privileged access management, become a certified MSP partner by registering at www.beyondtrust.com/MSP.

If you’re a current partner, email [email protected] or visit the Partner Portal for information.

CONTACT

North America [email protected]

[email protected]

APAC [email protected]

[email protected]

CONNECT

Twitter: @beyondtrustFacebook.com/beyondtrustLinkedin.com/company/beyondtrustwww.beyondtrust.com

© 2017 BeyondTrust Corporation. All rights reserved. BeyondTrust, BeyondInsight and PowerBroker are trademarks or registered trademarks of BeyondTrust in the United States and other countries. Microsoft, Windows, and other marks are the trademarks of their respective owners. July 2017

About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity.

BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.