System Requirements & Information Integrity
BeyondTrust helps organizations meet the requirements for system/information integrity through an internal component check. In case of failure, the system can fail open or closed to isolate a security incident or not disrupt business continuity. All system information in transit is encrypted and verified before logged and inserted into its database. To that end, BeyondTrust’s privileged access management platform, when deployed as an appliance, provides:
Native malicious code protection via application control, least privilege, file integrity monitoring, and antivirus.
Comprehensive application and operating system monitoring to determine faults and potential indicators of compromise.
Automatic diagnostic reporting to determine the solutions health.
Validation of all communications and input to verify integrity of receive information.
Automatic error handling and data recovery.
Configurable data retention and sanitization policies.