Newsletters




Leostream Debuts Privileged Remote Access for Monitoring Third-Party Access Risks


Leostream Corporation, creator of the world-leading Leostream Remote Desktop Access Platform, is unveiling Leostream Privileged Remote Access, a new service for managing and securing enterprise resources accessed by third-parties, including external contractors, service providers, and other non-employees. Offering security, control, and visibility over third-party access, Leostream enables organizations to allow resource access to necessary vendors, freelancers, and external stakeholders with confidence.

As remote work continues to shape the modern workforce, enterprises are faced with a litany of security risks, both internally and externally. Managing these risks effectively, while also ensuring that remote access is efficient and governable, is key.

As Karen Gondoly, CEO of Leostream, put it, “[With] the digital world and digital workspaces, it's all about providing access, and that access is increasingly remote…[and] the problem with remote access is that it's introducing attack vectors and risk. If I need to provide remote access, do I want to get my network endangered? Do I want to provide vendors with sensitive credentials to servers that's opening up other risks?”

Leostream’s Privileged Remote Access expands on the company’s 20-plus years of managing remote access, tackling this pertinent security challenge. Leostream’s new focus on VPAM (vendor privileged access management) ensures that remote access to corporate resources is protected against the risks of malicious actors and accidental data leaks through robust security, control, and visibility measures.

Leostream’s Privileged Remote Access solution enables administrators to grant external parties the appropriate access level to enterprise resources that their role necessitates. Access can be limited by data and time, as well as automatically revoked, backed by zero-trust principles.

At the core of VPAM is monitoring and recording what a third-party entity is doing with organizational resources, highlighting instances of both malicious intent and unintentional damage. With Leostream, after being granted access to resources with a unique username/password that is differentiated from corporate login credentials, third-party sessions are recorded and paired with a comprehensive log that tracks resource usage, activity, and policy enforcement. These session recordings are archived to AWS S3, establishing a continuous history of activity.

Leostream also emphasizes simplicity and efficiency for its solution, having centralized multi-vendor management within a single portal. Additionally, Privileged Remote Access replaces VPN technology with a streamlined gateway, which programmatically opens and closes access to enterprise resources. Privileged Remote Access supports almost any hardware, device, and OS—including Windows, Linux, MacOS, ChromeOS, Android, and iOS. The Leostream in-browser desktop viewer requires no agent software installation, as well as negates the need to install software on vendor devices.

“Desktop traffic goes directly through that Leostream gateway, and that Leostream gateway handles the connection itself and includes the HTML side viewer—and that means the desktop connection is all through the customer's network. It never bounces up to a Leostream network,” explained Gondoly. “It also means it is very easy to…add new Leostream gateways. If [customers] have a multi-region cloud environment or a hybrid cloud/on-prem environment, they can just add gateways for the different networks, and they don't have to worry about installing more agents to support vendors or installing anything on the vendors client themselves.”

To learn more about Privileged Remote Access, please visit https://leostream.com/.


Sponsors