{"id":19947,"date":"2026-03-28T20:57:34","date_gmt":"2026-03-28T19:57:34","guid":{"rendered":"https:\/\/www.infinigate.com\/ch\/?page_id=19947"},"modified":"2026-03-28T21:10:58","modified_gmt":"2026-03-28T20:10:58","slug":"beyondtrust-anwendungsfaelle","status":"publish","type":"page","link":"https:\/\/www.infinigate.com\/ch\/en\/beyondtrust-anwendungsfaelle\/","title":{"rendered":"BeyondTrust Use Cases"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"identity-security-insights\">\n<div class=\"wp-block-columns alignwide has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-identity-security-insights\">Identity Security Insights<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases\">Use cases<\/h2>\n\n\n\n<p><strong><strong>Product highlight<\/strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identity threat detection<\/li>\n\n\n\n<li>Faster investigation and response to security incidents<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image is-style-no-rounded-corners-no-drop-shadow\"><a href=\"https:\/\/www.beyondtrust.com\/de\/products\/identity-security-insights?wvideo=8mk0hw2o7n\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/embed-ssl.wistia.com\/deliveries\/44807ff53f1b903551803771dac85645.jpg?image_play_button_size=2x&amp;image_crop_resized=640x360&amp;image_play_button_rounded=1&amp;image_play_button_color=54bbffe0\" alt=\"\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Consistent, cross-platform transparency<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>A comprehensive overview of identities and access within the organisation enables the identification of attack vectors that were previously invisible. This provides comprehensive transparency regarding access structures and identity-based risks in complex IT environments.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Identity threat detection<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Over-privileged accounts and users, inadequate security controls and anomalous events are identified \u2013 including incidents involving multiple identities and access points. This supports the early detection of identity threats and identity-based attack scenarios.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Proactive identity management<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Recommended measures can be implemented before identity-based threats arise. Proactive identity hygiene strengthens the security of digital identities and speeds up the identification of potential risks.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Cloud Least Privilege<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Permissions in multi-cloud environments are discovered, visualised and verified via a central interface. The consistent application of the principle of least privilege reduces unnecessary access rights and enhances cloud security.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Preventing the extension of privileges<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>The granting of permissions to human and machine identities is continuously monitored, adjusted and restricted. All access is granted in accordance with the principle that identities are granted only the permissions necessary for their tasks.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Holistic ecosystem<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Privileged Access Management (PAM) solutions, including BeyondTrust integrations and connected systems, are being optimised. This creates enhanced capabilities for identity security and a powerful ecosystem for identity and access management.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"password-safe\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-password-safe\">Password Safe<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases-0\">Use cases<\/h2>\n\n\n\n<p><strong><strong>Product highlight<\/strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Smart automation<\/li>\n\n\n\n<li>Fast ROI<\/li>\n\n\n\n<li>Zero-trust enclave and architecture<\/li>\n\n\n\n<li>Powerful integrations<\/li>\n\n\n\n<li>Simplified compliance<\/li>\n\n\n\n<li>Secure business accounts for employees<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.beyondtrust.com\/de\/products\/password-safe?wvideo=tczt6zvowb\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/embed-ssl.wistia.com\/deliveries\/b432961c58a450d4325c60558c4a9178.jpg?image_play_button_size=2x&amp;image_crop_resized=960x540&amp;image_play_button_rounded=1&amp;image_play_button_color=54bbffe0\" alt=\"\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Management of login credentials, keys and secrets<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Accounts are automatically detected and integrated. Privileged passwords are stored, managed and rotated regularly to enhance security and compliance. Embedded credentials are eliminated, and employees\u2019 business passwords are securely protected.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Real-time session management<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>All activities and sessions involving privileged credentials are logged and monitored. This supports compliance with regulatory requirements as well as forensic analysis, including the collection of relevant session metadata.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Advanced auditing and forensics<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Comprehensive analyses of permissions and access credentials facilitate regulatory compliance, benchmark tracking and detailed evaluation of security-related incidents. This ensures transparent and traceable identity and access security.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"privileged-remote-access\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-privileged-remote-access\">Privileged Remote Access<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases-1\">Use cases<\/h2>\n\n\n\n<p><strong><strong>Product highlight<\/strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Consolidated access paths<\/li>\n\n\n\n<li>Simplified onboarding processes<\/li>\n\n\n\n<li>One-click cloud access<\/li>\n\n\n\n<li>Session monitoring, management and auditing<\/li>\n\n\n\n<li>Privileged password vaulting &amp; credential injection<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.beyondtrust.com\/de\/products\/privileged-remote-access?wvideo=5j03am5ybv\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/embed-ssl.wistia.com\/deliveries\/7f5d4a99d2a46180c67ac5d50a4c21f1.jpg?image_play_button_size=2x&amp;image_crop_resized=960x540&amp;image_play_button_rounded=1&amp;image_play_button_color=54bbffe0\" alt=\"\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Secure access for staff \u2013 wherever they are<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Employee security and productivity are maximised by providing login credentials and secure remote access to authorised systems. This enables secure access to company resources from various locations.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Vendor Privileged Access Management (VPAM)<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Trusted providers are granted secure and straightforward remote access to systems without the need for VPNs or known login credentials. This facilitates controlled access and enhances the security of third-party access.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Cloud infrastructure access<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Cloud developers and DevOps engineers are provided with seamless and secure connectivity. Authentication and auditability across the entire infrastructure ensure traceable access and secure management of cloud resources.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"endpoint-privilege-management\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-endpoint-privilege-management\">Endpoint Privilege Management<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases-2\">Use cases<\/h2>\n\n\n\n<p><strong><strong>Product highlight<\/strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Eligibility for cyber insurance<\/li>\n\n\n\n<li>Protection against external threats<\/li>\n\n\n\n<li>Protection against internal threats<\/li>\n\n\n\n<li>Improved operational efficiency<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"492\" src=\"https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/EPM-Main-Page-Banner.png-1024x492.avif\" alt=\"\" class=\"wp-image-19886\" srcset=\"https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/EPM-Main-Page-Banner.png-1024x492.avif 1024w, https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/EPM-Main-Page-Banner.png-300x144.avif 300w, https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/EPM-Main-Page-Banner.png-768x369.avif 768w, https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/EPM-Main-Page-Banner.png.avif 1272w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Privilege management on Windows, Mac and Linux<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Local administrator rights are removed and root access is controlled. The principle of least privilege is seamlessly implemented on desktops and servers running Windows, macOS and Linux systems to ensure consistent access control.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Reducing the attack surface<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>The attack surface for cyberattacks is reduced in order to strengthen protection against malware, ransomware and identity-based attacks. This helps to create a more secure IT environment and minimise potential security risks.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Audit and Compliance Assurance<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>A consistent, immutable audit trail of all privileged operations makes it easier to meet compliance and cyber insurance requirements. This ensures that security-related activities are documented in a traceable and compliant manner.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"entitle\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-entitle\">Entitle<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases-3\">Use cases<\/h2>\n\n\n\n<p><strong><strong>Product highlight<\/strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Winners of the SC Awards 2024<\/li>\n\n\n\n<li>Scaling just-in-time access<\/li>\n\n\n\n<li>Emergency access<\/li>\n\n\n\n<li>SIEM alerts for privileged access<\/li>\n\n\n\n<li>Improved visibility of permissions<\/li>\n\n\n\n<li>Automation of access checks<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.beyondtrust.com\/de\/products\/entitle?wvideo=wth43iuu8f\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/embed-ssl.wistia.com\/deliveries\/69dbd48254e4d3041bdc790da0b1abcc2961f356.jpg?image_play_button_size=2x&amp;image_crop_resized=960x540&amp;image_play_button_rounded=1&amp;image_play_button_color=54bbffe0\" alt=\"\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">JIT access to production and customer data<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Controlled, privileged self-service access is provided for defined periods, including ticket processing, on-call rotations and automatic revocation. This ensures that access is used only as required and helps to safeguard sensitive production and customer data.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Faster processing of access requests<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>The number of support tickets relating to access requests is reduced by up to 85% thanks to faster approvals and automated provisioning. This makes access processes more efficient and minimises administrative workload.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Automatic monitoring of user access<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Compliance reports can be produced more quickly, as incidents are automatically recorded and delegated to the relevant departments. This facilitates a transparent and traceable audit of access activities, as well as compliance with regulatory requirements.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"endpoint-privilege-management\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-endpoint-privilege-management-pasm\">Endpoint Privilege Management (PASM)<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases-4\">Use cases<\/h2>\n\n\n\n<p><strong><strong>Product highlight<\/strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Management of all privileged accounts and sessions<\/li>\n\n\n\n<li>Inventory and onboarding of all privileged accounts<\/li>\n\n\n\n<li>Secure remote access for third-party providers and employees<\/li>\n\n\n\n<li>Implementation of real-time session management<\/li>\n\n\n\n<li>Compliance with regulatory and audit requirements<\/li>\n\n\n\n<li>Simplified access to cloud infrastructures<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.beyondtrust.com\/de\/products\/supercharged-pasm-bundle?wvideo=i99icov5el\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/embed-ssl.wistia.com\/deliveries\/b5b61355bc203bb679b63f034d6de89a.jpg?image_play_button_size=2x&amp;image_crop_resized=960x540&amp;image_play_button_rounded=1&amp;image_play_button_color=54bbffe0\" alt=\"\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Privileged Account &amp; Session Management<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Accounts are automatically detected and integrated. Privileged credentials are stored and managed, whilst privileged activities are logged and monitored. Employees\u2019 business passwords are securely protected to ensure identity and access security.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Secure access for users and systems \u2013 anywhere<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>User productivity and security are maximised through credential injection and secure remote access to authorised systems. Access can be granted to both employees and authorised suppliers to enable the controlled and secure use of company resources.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Comprehensive protection against cyber threats<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Protection against cyber threats includes preventing password reuse, account hijacking, remote access risks and lateral movement, as well as other common attack vectors. This strengthens the security of the IT environment and reduces potential points of vulnerability.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"remote-support-software\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-remote-support-software\">Remote Support Software<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases-5\">Use cases<\/h2>\n\n\n\n<p><strong><strong>Product highlight<\/strong>:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Management of all privileged accounts and sessions<\/li>\n\n\n\n<li>Inventory and onboarding of all privileged accounts<\/li>\n\n\n\n<li>Secure remote access for third-party providers and employees<\/li>\n\n\n\n<li>Implementation of real-time session management<\/li>\n\n\n\n<li>Compliance with regulatory and audit requirements<\/li>\n\n\n\n<li>Simplified access to cloud infrastructures<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image\"><a href=\"https:\/\/www.beyondtrust.com\/de\/products\/remote-support?wvideo=fm5tpu9fom\" target=\"_blank\" rel=\" noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/embed-ssl.wistia.com\/deliveries\/18e22802084d7722a6199443af7e5db0.jpg?image_play_button_size=2x&amp;image_crop_resized=960x540&amp;image_play_button_rounded=1&amp;image_play_button_color=54bbffe0\" alt=\"\"\/><\/a><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Modern service delivery across the entire organisation<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>A centralised remote support solution enables support for users, devices and systems \u2013 both within and outside the network. Cross-platform support for Windows, macOS, Linux, iOS, Android and other systems ensures consistent and efficient service delivery.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Comprehensive and secure remote support<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Secure, monitored and unattended access options facilitate troubleshooting, updating and administration of servers, workstations, network devices, kiosk systems and other IT resources. All remote sessions are controlled and traceable.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Secure remote access \u2013 without a VPN<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Insecure remote access methods and potential attack vectors are minimised by a secure, VPN-free remote access tool. Every session is monitored to ensure transparency, access control and IT security in the long term.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-grey-background-color has-background is-content-justification-center is-layout-flex wp-container-core-group-is-layout-64b26803 wp-block-group-is-layout-flex\" id=\"active-directory\">\n<div class=\"wp-block-columns alignwide are-vertically-aligned-center has-white-background-color has-background wp-container-content-ebf6bc82 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"box-shadow:var(--wp--preset--shadow--natural)\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading wp-block-heading\" id=\"h-active-directory-ad-bridge\">Active Directory (AD) Bridge<\/h3>\n\n\n\n<h2 class=\"wp-block-heading is-style-border-left wp-block-heading\" id=\"h-use-cases-6\">Use cases<\/h2>\n\n\n\n<p><strong>Product highlight:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Powerful integrations<\/li>\n\n\n\n<li>Promoting Zero Trust<\/li>\n\n\n\n<li>How AD Bridge works<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"607\" src=\"https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/image-1024x607.png\" alt=\"\" class=\"wp-image-19891\" srcset=\"https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/image-1024x607.png 1024w, https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/image-300x178.png 300w, https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/image-768x455.png 768w, https:\/\/www.infinigate.com\/ch\/wp-content\/uploads\/sites\/21\/2026\/03\/image.png 1272w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull has-blue-background-color has-background is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns alignfull has-blue-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">    <section style=\"--content-grid--columns: 3;\" class=\"content-grid wp-block animate content-grid--3-columns alignfull\">\r\n        <div class=\"content-grid__inner\">\r\n            \r\n\r\n                                <h2 class=\"content-grid__heading has--heading-border\"> <\/h2>\r\n            \r\n\r\n            \r\n                    \r\n                                                    \r\n                    \r\n                                                                        <div class=\"content-grid__items\">\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Unified identity management<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>The complexity of identity management is reduced through the use of a centralised, familiar toolset. Digital identities can be managed consistently across Windows, Unix and Linux systems, resulting in uniform access control in heterogeneous IT environments.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-coral-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Auditing and Compliance<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Audit information is provided to compliance teams in a structured format, whilst group policies are managed centrally. This supports regulatory requirements and ensures that access and security policies are documented in a traceable manner.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                                            <div class=\"content-grid__item has-background has-gray-25-background-color\">\r\n                                            \r\n                                                \r\n                                        \r\n                                                                                        <h3 class=\"content-grid__item__heading\">Enhanced Unix\/Linux security<\/h3>\r\n                                        \r\n                                                                        <div class=\" content-grid__item__subheading\">\r\n                                            <p>Single Sign-On (SSO), file-sharing features and security policies are being enhanced to provide controlled access to non-Windows systems. This significantly strengthens the security of Unix and Linux infrastructures.<\/p>\n                                <\/div>\r\n                                        \r\n                                        \r\n                        <\/div>\r\n                                                    <\/div>\r\n                                    <\/div>\r\n    <\/section>\r\n\n\n\n<br>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-e1485a7b wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"http:\/\/www.infinigate.com\/ch\/en\/Hersteller\/beyondtrust\/\">Back to BeyondTrust<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Identity Security Insights Use cases Product highlight: Password Safe Use cases Product highlight: Privileged Remote Access Use cases Product highlight:&hellip;<\/p>\n","protected":false},"author":43,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"folder":[1463],"class_list":["post-19947","page","type-page","status-publish","hentry"],"acf":[],"lang":"en","translations":{"en":19947,"de":19843},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Infinigate | Switzerland","distributor_original_site_url":"https:\/\/www.infinigate.com\/ch","push-errors":false,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/pages\/19947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/comments?post=19947"}],"version-history":[{"count":2,"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/pages\/19947\/revisions"}],"predecessor-version":[{"id":19950,"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/pages\/19947\/revisions\/19950"}],"wp:attachment":[{"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/media?parent=19947"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/www.infinigate.com\/ch\/wp-json\/wp\/v2\/folder?post=19947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}