Software

BeyondTrust Privilege Management for Desktops

by BeyondTrust

Logo of BeyondTrust

Key Facts

  • Elevate Applications, Not Users: Maintain security, user productivity, and IT operational efficiency by enforcing least privilege across the desktop environment
  • Track and Control Applications: Protect endpoints from infection by whitelisting approved applications and checking for vulnerability status
  • Analyze User Behavior: Analyze user behavior by collecting, storing and indexing keystroke logs, session recordings and other privileged events

Categories

  • Application security
  • User (rights) management
  • Cloud (computing) security
  • Data leakage/loss prevention
  • Data protection (products and services)
  • Endpoint security
  • Identity and access management
  • Intrusion detection/prevention
  • Network monitoring
  • Interface protection and device management
  • Security management
  • Anti-virus and malware protection
  • Web application security
  • Access protection

Key Facts

  • Elevate Applications, Not Users: Maintain security, user productivity, and IT operational efficiency by enforcing least privilege across the desktop environment
  • Track and Control Applications: Protect endpoints from infection by whitelisting approved applications and checking for vulnerability status
  • Analyze User Behavior: Analyze user behavior by collecting, storing and indexing keystroke logs, session recordings and other privileged events

Categories

  • Application security
  • User (rights) management
  • Cloud (computing) security
  • Data leakage/loss prevention
  • Data protection (products and services)
  • Endpoint security
  • Identity and access management
  • Intrusion detection/prevention
  • Network monitoring
  • Interface protection and device management
  • Security management
  • Anti-virus and malware protection
  • Web application security
  • Access protection
Show More

PRODUCT DESCRIPTION

BeyondTrust Privilege Management for Desktops stops malicious attacks by enforcing least privilege on Windows and Mac systems by elevating privileges to known good applications that require them, controlling application usage, and logging and reporting on privileged activities using security tools already in place.

Show More
graphical blue background

BeyondTrust Privilege Management for Desktops

Product Expert