The document discusses challenges around privileged access management and how BeyondTrust solutions address these challenges. It notes that 62% of companies do not adequately track privileged access, 9 out of 10 vulnerabilities are associated with excessive admin rights, and 81% of breaches start with stolen or weak passwords. The attack surface is expanding as companies adopt technologies like cloud, IoT, and DevOps. BeyondTrust provides visibility and control over all privileged accounts and users across various use cases like protecting passwords, eliminating embedded passwords, removing admin privileges, controlling application usage, reducing third party risk, and supporting users while meeting compliance requirements.
1. Retos actuales e innovación sobre el
control de accesos privilegiados
Sinue Botello
Regional Sales Manager
BeyondTrust
#ProtectionPeru2019
2. 62%
of companies aren’t adequately
tracking privileged access 4
9 OUT OF 10
vulnerabilities are associated
with excess admin rights 1
81%
of breaches start with either
stolen and / or weak passwords2
Unmanaged Privileges and Accounts Lead To
Breaches
80%
of breaches are the result of
privileged account abuse or misuse.3
4. Close The Gaps With Visibility and Control Over All
Privileged Accounts, Users, and Access
• All privileged accounts are controlled and
managed from a single platform
• Granular, flexible remote access enables
access to only the required resources
• Resource access is managed intelligently
with aggregated data
• Full visibility of all privileged account
activity including session recordings
• User experience that empowers individuals
AFTER SCENARIOS
• Unmanaged privileged credentials
• Uncontrolled or “all or nothing”
third party and insider access
• Unable to validate privileged
security compliance requirements
• Lack of consolidated reporting and
visibility
• Impeded user productivity
BEFORE SCENARIOS
#ProtectionPeru2019
5. The BeyondTrust Advantage
• MOST COMPREHENSIVE USE CASE
COVERAGE
• Leading PAM portfolio based on
30+ year history of innovation
• Aggressive roadmap to PAM
maturity & next-gen capabilities
• Global Development organization
and continuous investment in
evolving and expanding solutions
FLEXIBLE, INTEGRATED PLATFORM
• Provides visibility and control over
all privileged accounts and users
• Fast time to value with lower cost to
purchase, implement, and manage
full portfolio
• Central management with data,
workflows and common functions
shared across solutions
CUSTOMER-FIRST ORGANIZATION
• Proven partner trusted by 20,000
global customers
• Extensive partner network
• Flexible licensing and deployment
models
• Global 24/7 Support & Services
organization, with robust resources
for training and support
#ProtectionPeru2019
6. • PROTECT PASSWORDS AND CREDENTIALS
• ELIMINATE EMBEDDED PASSWORDS IN APPS
• REMOVE ADMIN PRIVILEGES FROM USERS AND SYSTEMS
• CONTROL APPLICATION USAGE
• REDUCE RISK FROM THIRD PARTY ACCESS
• SUPPORT USERS, DESKTOPS, AND DEVICES
• MEET COMPLIANCE MANDATES
Use Cases