Identity Aware Proxy vs. Jump Box Architect

Agilicus AnyX is a complete Zero Trust Network Access platform, comprising authentication, authorization, audit, access. One of AnyX’ core features is the ability to remotely use a remote graphical environment, via both Remote Desktop Protocol, and VNC. These are available via a browser, or via a native client, and incorporate Agilicus’ trademark simple, seamless, single-sign-on via your existing identity providers, for your staff, your partners, with optional multi-factor authentication.

Why Modern Teams Choose Agilicus

Compare capabilities side-by-side.

Feature

BeyondTrust Privileged Remote Access

Architectural Approach

Cloud-Native Zero Trust: Identity-aware proxy; resources are invisible to the internet.

Gateway-Based: Relies on jump boxes or hardened appliances (virtual/physical) in the DMZ.

Network Model

Proxy Based
Direct connection of user to resource

Operates with outbound-only connection, eliminating the need for publicly accessible IP address

Gateway / Broker
Jumpbox connection from user to resource

Must have publicly accessible IP to connect. Exposing resources to the public internet.

Lateral Movement

User is connected only to the specific application, not the network, eliminating the risk of lateral movement

Once a user hits the gateway, they are effectively “inside” the DMZ/Network.

IP Exposure

Hidden
No public IP or DNS entry is needed for your internal resources.

Exposed
The BeyondTrust Appliance must have a publicly accessible IP/URL

User Experience

Seamless
Users use native browsers or desktop tools (RDP/SSH) to connect directly to the resource.

Clunky
Often feels like “Remote Desktop inside a browser” or requires a specific console.

Deployment

Lightweight Agilicus connector. No firewall rules or network changes needed.

Often requires complex appliance setup, firewall configurations, and “Jump Box” architecture.

Clientless Universal Access

Access all resources from any device with a web browser.

  • Equal security across all devices accessing resources
  • Enable BYOD while maintaining security
  • Easy Access to  all authorized resources in one tile-based web launcher

Granular Authorization

Granular authorization and permission levels on a per resource level.

  • Enforce read vs write permission levels per user
  • Enable specific users to perform specific tasks on a resource
  • Native resource request workflow for task based permissions

Per-Resource Authentication

User authentication at a per resource level to enable granular authorization.

  • Enables granular audit logs for what user on what device
  • Eliminate shared passwords and team level access
  • Provision / Decommission resources on a per user basis