EPM for Windows and Mac FAQ
Cloud provider
What cloud provider is leveraged to deliver the Endpoint Privilege Management solution?
The solution is hosted in a single-tenant instance in Microsoft Azure. This environment is audited under the requirements for SOC 2 Type 2 and ISO 27001.
Upgrades, uptime, and downtime
What is BeyondTrust’s service level agreement (SLA) for solution availability?
BeyondTrust’s Availability SLA shall be ninety-nine and nine-tenths percent (99.9%) during a calendar month.
Are upgrades or system changes installed during off-peak hours or in a manner that will not impact business operations?
Yes, you can reference the BeyondTrust Cloud Service Guide for more detailed information.
Vulnerability and penetration testing
Does the solution undergo frequent vulnerability and penetration testing?
Yes, BeyondTrust performs regular, internal vulnerability scanning and penetration testing on all product solutions. Also, BeyondTrust contracts with third-party vendors to perform periodic penetration tests on the platform to identify risks and remediation that help secure the solution.
Can I perform my own penetration testing against the solution?
Yes, you must notify BeyondTrust in advance of any test by submitting a request using the BeyondTrust Online Support Portal and completing a penetration testing agreement. This activity can be performed only once per calendar year.
Data and access
Does the solution support role-based access for end users and system administrators?
Yes, this is a core component of the solution that can be configured and managed.
Who can I access my data?
Access to cloud services by BeyondTrust employees is protected by authentication and authorization mechanisms, and BeyondTrust has implemented an access control authentication approach based on the need to know and separation of duties.
Updated 3 days ago