Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Software

Hall 9 / Booth Number 9-326

BeyondTrust Endpoint Privilege Management

Categories

Identity and access management User (rights) management

Key Facts

  • Remove local admin rights, control root access, and enforce true least privilege seamlessly across Windows, macOS, and Linux desktops and servers.
  • Reduce your cyberattack surface and protect against malware, ransomware, and identity-based attacks.
  • Address compliance and cyber insurance requirements quickly with a single, unimpeachable audit trail of all privileged actions.

Product Description

Enforce Least Privilege and Control Applications

Endpoint Privilege Management pairs powerful least privilege management and application control capabilities, delivering fast, unmatched preventative endpoint security. Benefit from industry-best privileged access management controls across all endpoints—Windows, macOS, Linux—to condense the attack surface and enhance administration

Grant the right privilege to the right application – not user – only when needed, and create a single audit trail. Prebuilt policy templates for Windows and macOS stop attacks involving trusted apps, instantly addressing bad scripts and infected email attachments. Application control, allow-lists, and exception handling enable granular control over what users can install or run, and what applications can execute.

Extend capabilities far beyond sudo on Linux, with centralized administration, session monitoring and management, file integrity monitoring, and powerful productivity enhancement.

... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.