SecureAuth Awarded New Patents for Identity Proofing

Solution Brief

SecureAuth & BeyondTrust

BeyondTrust Privileged Access Management Solution and SecureAuth

The Challenge

Privileged accounts are essential for any IT infrastructure, which makes them a prime target for attacks. In fact, in Verizon’s 2021 Data Breach Investigations Report (DBIR), they found a 61% increase in hacking-related breaches, involving the misuse of stolen or weak credentials, over last year.

It is clear that without proper access management policies and configurations, as well as secure applications, properly privileged users, and many other security measures in place, hacking-related breaches will continue to rise within these accounts.

So how do you tackle this?  To start, authentication approaches that are limited to a username and password, or that require just a second factor, are no longer sufficient to protect your data and applications.  It is critical to look at solutions that provide you and your organization maximum protection.

The Solution

Organizations require a high level of visibility and control to reduce risk, achieve compliance objectives, and boost operational performance.  That’s why SecureAuth has partnered with BeyondTrust.

BeyondTrust Privileged Access Management Solution integrates seamlessly with SecureAuth Adaptive and Multi-Factor Authentication to ensure that only authorized users can access privileged accounts — while actually improving the authentication experience for the legitimate account owners.

Specifically, SecureAuth adds a layer of strong authentication to BeyondTrust Privileged Access Management Solution, protecting access to privileged accounts with pre-authentication risk analysis, multi-factor authentication, and continuous authentication through behavioral biometrics. At the same time, the solution provides single sign-on (SSO) to applications and resources across the enterprise, streamlining access for authorized users. It’s a win-win.

Solution Highlights

  • Seamless integration with BeyondTrust Privileged Access Management Solution to ensure that only authorized users can access privileged accounts
  • Pre-authentication risk analysis that strengthens security without burdening legitimate users
  • Support for 25+ authentication methods, including SMS and push-to- accept
  • Flexible authentication workflows for different types of users (admins, business users, contractors, etc.)
  • Enterprise-wide single sign-on (SSO)
  • Standards-based architecture that augments existing security investments
  • Self-service password reset and account unlock to reduce help desk calls

Security Benefits of SecureAuth + BeyondTrust

Adaptive access control

SecureAuth ensures secure access to the BeyondTrust solution with minimal disruption to users.

Flexible workflows

Administrators can design different authentication workflows based on the situation or environment, such as configuring less risk tolerance for sensitive data or remote access requests.

Simplified strong authentication

By extending SecureAuth’s single-sign-on authentication to the BeyondTrust solution, the solution streamlines secure access to applications and resources across the network. 30% or more of helpdesk calls are password related.

SecureAuth Netskope Flowchart
  1. A privileged user requests access to PAM-protected Target System.
  2. BeyondTrust prompts user for authentication through SecureAuth.
  3. SecureAuth authenticates user and responds to BeyondTrust.
  4. The user is able to access Target System with BeyondTrust-controlled credentials.

SecureAuth + BeyondTrust

SecureAuth and BeyondTrust together form a strong bond and provide strong identity security to Fortune 1000 customers.


Configure SecureAuth with Password Safe using RADIUS
SecureAuth Multi-factor Authentication – Quick Configuration Guide for PBPS, PBW and PBUL

Pin It on Pinterest