BeyondTrust Password Safe External Presentation
BeyondTrust Password Safe External Presentation
BeyondTrust Password Safe External Presentation
of all breaches are due of organizations have Average time it took Average cost of breach
to compromised experienced a data to identify & contain
credentials breach breaches
©BeyondTrust 2022 | 3
Gain visibility of Admin account privileges
and DevOps secrets across the estate
©BeyondTrust 2022 | 4
Use Cases
Discover All Accounts
• Discover all accounts across the estate
• Leverage automation to bring under management
©BeyondTrust 2022 | 5
Privileged Remote Access
Manage and audit employee and
vendor remote access
©BeyondTrust 2023 | 6
Password Safe
Discover & Onboard All Accounts | Secure Privileged Credentials | Monitor Privileged Activity
Scan, identify, and profile all Centrally store & manage Seamlessly establish
assets with automated passwords and SSH keys. sessions and document
onboarding of privileged Rotate credentials privileged activity without
accounts. automatically. killing productivity.
Store and retrieve secrets.
©BeyondTrust 2022 | 7
• Integration Flexibility – Integrate with a
variety of systems and orchestrate enterprise-
wide PAM with an extensive API, SDK, and other
Key
tools at no additional cost.
Deployment
& Licensing Virtual Appliance
Options
Cloud
IaaS
©BeyondTrust 2022 | 12
Product Demo
Password Safe
©BeyondTrust 2022 | 13
1
4
Reduced Deployment
and Maintenance
High Availability Costs
(No ProServ for
Upgrades)
©BeyondTrust 2022 | 14
Outcomes with Password Safe
LESS RISK MORE EFFICIENCY
©BeyondTrust 2022 | 15
Validation
Password Safe
©BeyondTrust 2022 | 16
PAM Market Leader
PAM Magic Quadrant 2022 PIM Wave 2020
Leadership
Compass
for PAM
2023
BeyondTrust #3
©BeyondTrust 2022 | 17
Wynn Resorts Enforces Least Privilege and
Effectively Manages Passwords
INDUSTRY CHALLENGE
Hospitality, Tourism, Gambling With multiple verticals — gaming, hospitality, and more — represented across
Wynn, the organization needed flexible solutions that could protect the many
different parts of the business, while allowing employees to securely do their
PRODUCTS jobs.
Remote Support, Password Safe,
Privilege Management for Windows
OUTCOME
"We were looking for solutions that not
only provided ease of use and ease of BeyondTrust enabled Wynn to optimize privileged access management
management, which we found in the (PAM) across the diverse business, enforce least privilege (to minimize
BeyondTrust solution(s), but the risk from phishing and other end user exploits), and manage
integration of the multitudes of different privileged passwords according to best practices.
solutions that BeyondTrust provides gave
us the ability to integrate
seamlessly throughout those
different solutions.”
DAVID TYBURSKI, CISO
©BeyondTrust 2022 | 18
University of Utah is Leveraging Just-in-Time
Privileged Access Management to Mitigate Risk and
Achieve Full Visibility
CHALLENGE
INDUSTRY The University of Utah is home to many diverse user populations - just think of
all the attributes, roles and access needed for undergrad and graduate
Higher Education
students, faculty, university hospitals and healthcare systems, and more. In
addition, many university users belong to more than one of these populations.
PRODUCTS This complex network requires a complete Privileged Access Management
(PAM) solution that protects and manages the many different types of
Privileged Remote Access & Password Safe privileged accounts within the Higher Ed system, while meeting the
compliance requirements that come with the institution's hospital status.
OUTCOME
"BeyondTrust gives us a level The University of Utah implemented a Just-in-Time Privileged Access
of control and capability that we never Management (JIT PAM) model to enforce true “least privilege”, in conjunction
had before...I would have started on with Password Safe. As a result, the team truly understands privileged access
this project much sooner had I know at the university and has been able to mitigate internal and external threats,
how painless BeyondTrust has made provision accounts quickly, increase productivity, and achieve full visibility and
it." security of their robust environment of users.
CHRIS STUCKER, ASSOCIATE IAM
DIRECTOR
©BeyondTrust 2022 | 19
Thank
You beyondtrust.com
Appendix
©BeyondTrust 2022 | 21
Why Password Safe?
• Accelerate time to value with automated discovery and
onboarding of ALL privileged accounts
DevSecOps IT Operations Service Desk Security Mgrs Compliance Compliance Cloud / IT Operations
Engineers OT Admins Support Centers IT Operations Security Admins Security Site Reliability Engineers
IT Admins MSPs Desktop/Server Admins Developers
Compliance Admins
Key Benefits
©BeyondTrust 2022 | 23
Privileged Access
Discovery
©BeyondTrust 2022 | 24
Privileged Access Discovery App
Securely reveal privileged accounts and credentials in your
environment in minutes—for free. No installation
necessary.
Uncover privileged accounts and credentials
©BeyondTrust 2022 | 25
Cloud Deployment
Architecture
©BeyondTrust 2022 | 26
Password Safe Cloud Architecture
HTTPS |
443
©BeyondTrust 2022 | 27
Use Cases
Deep Dive
©BeyondTrust 2022 | 28
Discover and Bring All Privileged
Accounts Under Management
The Problem Password Safe Discovery Engine is deployed
Unmanaged privileged accounts are a threat vector
that can result in a data breach. Most organizations
don’t know the extent of privileged account sprawl in
their networks All privileged accounts are discovered
The Benefits
Automatically and continuously locating all privileged
Privileged credentials are stored in Password Safe
accounts in a network means none will be left
unmanaged
©BeyondTrust 2022 | 29
Secrets vault included with
Password Safe
The Problem Password Safe with secrets safe is deployed
Unmanaged and shared secrets used in cloud and
infrastructure development and deployment are a threat
vector that can result in a data breach. Organizations
maintain a fast pace of spinning up both static and Unified environment for secrets and Team Passwords
ephemeral environments that have access to critical
resources and data.
Often SecOps are unaware of new apps and their reach.
Upload tokens, API keys, certificates with access rules
The Benefits
Quickly secures secrets (tokens, API keys, certificates)
Auto-authenticate using Kubernetes sidecar
in an encrypted vault. Supports integration with
Kubernetes without requiring Kubernetes development
expertise.
©BeyondTrust 2022 | 30
Monitor Privileged Sessions For
Security & Compliance
PASSWORD SAFE
The Problem
Organizations have limited visibility into privileged
access to critical systems or data
Forensic analysis is difficult without the ability to easily
search, locate and review suspicious privileged activity
To meet compliance companies must monitor access
to systems that contain sensitive and regulated data
The Benefits
Monitor privileged session activity in real time. Pause or
terminate the session if suspicious activity is detected
Generate reports to prove regulatory compliance with
detailed audit trail and video recordings
©BeyondTrust 2022 | 31
Manage Disconnected Accounts
The Benefits
Change administrative passwords on offline systems Zero-Trust on Endpoint - Least privilege policies
automatically, mitigate pass-the-hash attacks and meet can be built utilizing EPM policy Editor
regulatory compliance requirements.
©BeyondTrust 2022 | 32
Store Cloud Admin Credentials
The Benefits
Full visibility and control of privileged accounts for hosted User accesses cloud hosted application
cloud apps
Organization can detect, alert and respond to suspicious
activity through the automatic correlation of vulnerability
data, asset characteristics and privileged user behavior.
Password is checked-in
©BeyondTrust 2022 | 33
Extra Validation
©BeyondTrust 2022 | 34
“BeyondTrust’s PAM offering is notable for its account discovery, logging and reporting
capabilities, and for its analytics, which includes an extensive number of preconfigured
templates and dashboards. Privileged governance and administration is above
average.”
©BeyondTrust 2022 | 35