PROFESSIONAL
SERVICES
Privileged Remote Access Implementation Packages
Contents
Implementation Plan Overview ................................................................................................. 2
Tier 1 Implementation Package (Approximately 1 day) ......................................................... 4
Tier 1 Recommended Architecture ........................................................................................ 4
Tier 2 Implementation Package (Approximately 2 days) ....................................................... 7
Tier 2 Recommended Architecture ........................................................................................ 7
Tier 3 Implementation Package (Approximately 5 days) ....................................................... 9
Tier 3 Recommended Architecture ........................................................................................ 9
Tier 4 Implementation Package (Custom) ............................................................................. 11
ABOUT BEYONDTRUST ..................................................................................................... 12
Implementation Plan Overview
BeyondTrust® offers four (4) professional services package options for Privileged
Remote Access. Our packages are designed to fit your preferred deployment technology
and project scope. Summarized below are the steps required for each services tier to
achieve a successful deployment outcome. We’ll help you determine which tier will work
best for you.
• Tier 1: Single On-Premise Appliance or CLOUD deployment + LDAP Integration
for User Authentication
• Tier 2: Two On-Premise Appliances in Active/Passive failover or CLOUD
deployment + LDAP and/or Two-Factor, SAML, Kerberos, RADIUS or Smartcard
Integration for User Authentication
• Tier 3: Up to Six Appliances including Active/Passive failover pairs or CLOUD
deployment + LDAP and/or Two-Factor, SAML, Kerberos, RADIUS or Smartcard
Integration for User Authentication
• Tier 4: More than Six Appliances including Active/Passive failover pairs or
CLOUD deployment + LDAP and/or Two-Factor, SAML, Kerberos, RADIUS or
Smartcard Integration for User Authentication
Tier 1
(~1 days) Tier 2
(~2 days) Tier 3
(~5 days) Tier 4
(Custom)
Appliance Deployment
Cloud ⚫ ⚫ ⚫ ⚫
On-Premise, 1 appliance ⚫ ⚫ ⚫ ⚫
On-Premise, 2 appliances ⚫ ⚫ ⚫
On-Premise, 3-6 appliances ⚫ ⚫
Failover Configured and Tested ⚫ ⚫ ⚫
Atlas Configured and Tested ⚫ ⚫
Other ⚫
User Authentication
Local ⚫ ⚫ ⚫ ⚫
LDAP, Active Directory, or SAML ⚫ ⚫ ⚫ ⚫
Two-Factor, Kerberos, RADIUS, or Smart Card ⚫ ⚫ ⚫
Other ⚫
Tier 1
(1 days) Tier 2
(2 days) Tier 3
(5 days) Tier 4 (SOW)
Technical Use Cases
Integration Client Setup (session/recording archival and automated config backup)
⚫ ⚫ ⚫ ⚫
Vault Credential Injection (5 Endpoints and 5 Credentials)
⚫ ⚫ ⚫
Teams/Vendors Configured
Teams or Vendors configured Up to 5 Up to 10 Up to 15 ⚫
Client Deployment
Access Consoles Manually Deployed 5 5 5 ⚫
Access Console Mass Deployment Advised ⚫ ⚫ ⚫ ⚫
Endpoints Manually Deployed 5 per
team/vendor 5 per
team/vendor 5 per
team/vendor ⚫
Endpoint Mass Deployment Advised ⚫ ⚫ ⚫ ⚫
Tier 1 Implementation Package (Approximately 1 day)
Single On-Premise Appliance or CLOUD deployment + LDAP Integration for User
Authentication. Typical deployment timeframe: One (1) business day.
Tier 1 Recommended Architecture
Virtual or Physical Appliance Architecture
Cloud Architecture
Tier 2 Implementation Package (Approximately 2 days)
Two (2) On-Premise Appliances in Active/Passive failover or CLOUD deployment +
LDAP and/or Two-Factor, SAML, Kerberos, RADIUS or Smartcard Integration for User
Authentication. Typical deployment timeframe: Two (2) business days.
Tier 2 Recommended Architecture
Virtual or physical appliance
Cloud
Tier 3 Implementation Package (Approximately 5 days)
Up to Six (6) Appliances including Active/Passive failover pairs or CLOUD deployment
+ LDAP and/or Two-Factor, SAML, Kerberos, RADIUS or Smartcard Integration for
User Authentication. Typical deployment timeframe: Five (5) business days.
Tier 3 Recommended Architecture
Virtual or physical appliance
Cloud
Tier 4 Implementation Package (Custom)
More than Six (6) Appliances including Active/Passive failover pairs or CLOUD
deployment + LDAP and/or Two-Factor, SAML, Kerberos, RADIUS or Smartcard
Integration for User Authentication.
Architecture and scope of a Tier 4 Implementation will be defined in an agreed
Statement of Work.
ABOUT BEYONDTRUST
BeyondTrust is the worldwide leader in Privileged Access Management, offering the
most seamless approach to preventing data breaches related to stolen credentials,
misused privileges, and compromised remote access.
Our extensible platform empowers organizations to easily scale privilege security as
threats evolve across endpoint, server, cloud, DevOps, and network device
environments. BeyondTrust unifies the industry’s broadest set of privileged access
capabilities with centralized management, reporting, and analytics, enabling leaders to
take decisive and informed actions to defeat attackers. Our holistic platform stands out
for its flexible design that simplifies integrations, enhances user productivity, and
maximizes IT and security investments.
BeyondTrust gives organizations the visibility and control they need to reduce risk,
achieve compliance objectives, and boost operational performance. We are trusted by
20,000 customers, including half of the Fortune 100, and a global partner network.
Learn more at www.beyondtrust.com.