Call a Specialist Today! 800-886-5369

Managed Service Providers
Privilege and Vulnerability Management Solutions for MSPs


 

Overview:

According to Forrester Research, 80% of security breaches involve privileged credentials, so it’s never been more important for your customers to apply discipline and accountability over privileged accounts and users. However, there have been no true MSP-enabled solutions for privileged access management, leaving a gap in coverage for MSPs to offer their customers to reduce inside risks. Until now.

Deliver Privileged Access Management and Vulnerability Management as a Service

The BeyondTrust Managed Service Provider (MSP) Program enables partners using a cloud-based services model (in their datacenter or via a third-party cloud provider, such as Amazon Web Services) to design and architect BeyondTrust privileged access management and vulnerability management solutions as a service.

With the BeyondTrust MSP program, partners can deliver the following solutions as services:

  • Enterprise Password Management
  • Enterprise Session Management & Recording
  • Secure SSH Key Management
  • Secure Application Password Management
  • Privilege Management for Desktops
  • Privilege Management for Servers
  • Core Infrastructure Privilege Management
  • Enterprise Vulnerability Scanning

With this integrated offering, MSP partners have a foundation to profitably grow their security services.

Highlights:


Audit & Report Privileges


Audit & Report Privileges

Record and replay any privileged activity, including mouse actions, keystrokes and user interface screen captures, across network and cloud environments.

Cycle Passwords


Cycle Passwords

Deliver automatic, active password management, rotation and reconciliation for most platforms, including cloud.

Secure Third-Party Access


Secure Third-Party Access

Support clearly defined access levels, secure connection gateways, proxied access, and auditing and recording of the third-party sessions.

Secure Privilege Elevation


Secure Privilege Elevation

Eliminate the risk of having privileged credentials available to anyone and provide a managed service for auditing all applications requiring privileged access.

Secure Network Management


Secure Network Management

Deliver control over all privileged accounts, such as local & shared administrative accounts; application, service, and database accounts; SSH keys and devices; and cloud and social media accounts.

Find & Fix Vulnerabilities


Find & Fix Vulnerabilities

With managed services providing automated vulnerability assessment and remediation, IT and security staff can shift their focus to more strategic projects.

Features and Benefits:

Key Features

  • Anytime, Anywhere Secure Access
    Deliver access across all devices and environments including traditional and virtual desktops, servers, databases, infrastructure, applications, internet of things (IoT), notebooks, tablets, and laptops. With managed services for privileged access, an administrator or a contractor can authenticate against select assets remotely – or on premise – with full session recording and keystroke logging, control via workflow and granular access restrictions.
  • Auditing and Reporting on Privileged Activity
    Record and replay any privileged activity, including mouse actions, keystrokes and user interface screen captures, across network and cloud environments. Activity can be uniquely attributed to individual users, even when shared accounts are being used.
  • Cycle Employee and Third-Party Passwords
    Achieve automatic, active password management, rotation and reconciliation for most platforms, including cloud-based platforms. This closes password security gaps across heterogeneous environments. Password changes can be performed with or without local agent technology to manage complex and roaming environments.
  • Secure Third-Party Access
    Support clearly defined access levels, secure connection gateways, proxied access, and auditing and recording of the third-party sessions.
  • Secure Privilege Elevation
    Eliminate the risk of having privileged credentials available to anyone and have a managed service provide auditing for any and all applications that need privileged access. This lowers the risk from hacking techniques like Pass-the-Hash that steal administrative credentials and allows a trusted independent party (the MSP) to monitor and report on all privileged access regardless of platform.
  • Secure Network Management Devices
    Bullet-proof client infrastructures with complete control and auditing of privileged accounts, such as shared administrative accounts, application accounts, local administrative accounts, service accounts, database accounts, cloud and social media accounts, devices, and SSH keys.
  • Vulnerability Assessment and Remediation
    With managed services providing vulnerability assessments and remediation, information technology (IT) and security staff can spend more time on projects and less time on the never-ending process of vulnerability assessment, reporting, and patch mitigation.

Program Benefits

  • Grow Footprint and Revenue
    Deliver value-added services in privileged access and vulnerability management to current and new clients.
  • Gain a Central View of Insider Threats
    Use a single web-based management console to centrally manage the portfolio of privilege and vulnerability offerings.
  • Deliver Integrated Services
    Integrate privilege and vulnerability solutions with leading IAM, SIEM, GRC, and systems management tools.
  • Scale to Meet Even the Largest Environments
    Maintain a flexible single instance or multi-tenant deployment to match the scale and demands of a diverse customer base.
  • Improve Flexibility to Support Complex Customers
    Support physical, virtual, cloud, and SaaS applications from a single (or multiple) MSP installed environment.

How It Works:

Secure, Anytime, Anywhere Access to Privilege and Vulnerability Management

Our privilege and vulnerability management solution is designed to be implemented in a datacenter, or in the cloud, to provide MSP clients with secure and cost-effective asset and user management. Managed service providers can maintain flexible single instances or multi-tenant deployments to scale and support large, complex environments. The BeyondTrust MSP solution also comes complete with a centralized interface to manage clients by organization, schedule reporting for clients, and generate licensing reports for billing and receiving.

The BeyondTrust MSP solution enables management and reporting across multiple applications, cloud instances, and clients.

The BeyondTrust MSP solution enables management and reporting across multiple applications, cloud instances, and clients.

Documentation:

Download the BeyondTrust Managed Service Provider Program Datasheet (.PDF)