hardwarecheck_1920x1080
    gi-kl-2158919442-1920x600

    BeyondTrust

    In a connected world, controlled and traceable access to IT systems is critical for protection, compliance and comprehensive data protection at all times. With BeyondTrust from Atoria, you get a reliable and powerful platform for privileged remote access with full control and maximum visibility.

    Why BeyondTrust?

    We combine technological expertise with personal service and ensure that your security solutions run smoothly. You receive direct support, full transparency and the certainty that your IT is optimally protected at all times.

    gi-kl-2205659855-1920x600
    IL-Security-security-alt1

    Proven, safe and stable solution

    Successfully in use for years, also within the Proalpha Group.

    IL workflow management

    Direct access for Atoria support & consultants

    Fast and efficient problem solving without waiting for internal contacts.

    IL-key-digital-key-digital

    Secure remote access

    Access is controlled, logged and without risk to the customer network.

    IL-protection-from-tampering-protection-against-tampering

    No additional hardware or VPN/RDP/SSH required

    Simple and secure access without complex technical requirements.

    The architecture

    Connection via HTTPS (TLS-secured)
    • Communication is exclusively encrypted via HTTPS.
    Use of modern encryption standards
    • only supports TLS 1.2 or higher
    • Older protocols such as SSLv3 and TLS 1.0 / 1.1 are deactivated for security reasons.
    Communication via defined, dedicated ports
    • Only specific ports are used - no insecure or open channels.

    Firewall share

    • Destination IP address: 3.122.54.170
    • Target hostname: atoria-software.beyondtrustcloud.com
    • Protocol: HTTPS
    • Port: TCP 443 (standard TLS-secured web traffic)

    Note: Please make sure that both the IP address and the DNS hostname are reachable and that outgoing traffic is allowed via port 443.

    Firewall release
    IR-protection-against-manipulation-Protection-against-manipulation

    Expert knowledge at the highest level

    Our experience in physical security and IT security makes us the ideal partner. With dormakaba, PCS and datafox, we offer solutions that are precisely tailored to your requirements.

    IR-security-control-center-with-video-surveillance-security-control-center-video-surveillance

    Individual analysis of your systems

    We check your security infrastructure down to the last detail. In doing so, we identify weak points and opportunities for optimization in order to improve your security standards in the long term.

    IR-Consulting-Consultation

    Independent and transparent advice

    Our recommendations are based exclusively on your needs. We work across all manufacturers and always in your best interests.

    Typhoon

    "The solutions are a great help for us. They have made our processes more efficient, more transparent and our building systems safer"

    Simone Konrad, Human Resources, Taifun-Tofu GmbH

    Make an appointment

    Are you planning to introduce or expand one of our solutions? With over 35 years of experience in the field of human capital management, we will be happy to answer your questions and provide you with individual advice. Simply make an appointment with us!

    The procedure

    How to book and activate BeyondTrust with Atoria:
    Free service "BeyondTrust setup"
    - Simple booking via our customer portal: my.atoria-software.com
    Provision of the individual Jumpoint
    - After booking, Atoria will provide you with a Jumpoint tailored to your system.
    Installation of the Jumpoint
    - The Jumpoint is provided for installation.
    - Installation is usually completed within a few minutes.
    Connection test and feedback
    - You test the connection locally (telnet).
    - You then inform Atoria so that we can also carry out a function test.

    Frequently asked questions

    Yes, it is possible to exchange small amounts of data via the shared clipboard.

    Yes, all Atoria users authenticate themselves with MFA (e.g. password + app or token) before access is granted.

    Every session is documented: It is possible to trace which user established or terminated a connection and when.

    Yes, you can see whether a session is already open in the BeyondTrust interface.

    There are no costs for customers.

    Yes.
    - Server location in Germany

    - Regular security updates

    - ISO/IEC 27001, SOC 1 & SOC 2 certifications

    BeyondTrust supports Windows, Linux, Android and iOS
    - for both target systems and access devices.

    Yes, another user, e.g. a customer employee or a colleague, can be invited ad hoc from an ongoing BeyondTrust session.

    Several endpoints can be defined per customer - or one endpoint on a jump server from which you can connect to other servers via RDP.