Menu

TechValidate Research on BeyondTrust

These pages present data that TechValidate has sourced via direct research with verified customers and users of BeyondTrust. TechValidate stands behind the authenticity of all published data. Learn more »



2,552 Customers Surveyed

17,284 Data Points Collected

62 Published TechFacts

15 Published Charts

473 Published Case Studies



Featured Research Collections for BeyondTrust

Curated collections and slideshows of TechValidate research data on BeyondTrust.



Selected Research Highlights


PowerBroker for Unix & Linux Customer Testimonial

[With PowerBroker], we have had more granular control over access on our systems which increases security. There is also more oversight to meet regulations.

IT Systems Analyst, Large Enterprise Financial Services Company

Retina Provides Visibility and Reporting to Prioritize Remediation

What types of challenges does your Retina vulnerability management solution solve for your organization?

Gaining visibility into exposures across multiple layers of infrastructure
57%
Scanning remote assets or other offline / air-gapped systems
30%
Profiling previously unknown assets on the network
24%
Understanding the operational implications of vulnerabilities
35%
Reporting risk to IT administrators, management and/or auditors
66%
Identifying and prioritizing remediation tactics
54%
Patching / updating assets with greater efficiency
42%
Other
3%

PowerBroker for Unix & Linux Customer Testimonial

What Benefits Has Your Organization Achieved with PowerBroker for Unix & Linux?

[We now have] a more secure environment. There is a large reduction in personal accounts on servers. We are able to centrally managed access policies.

Engineer, Global 500 Beverage Company

PowerBroker for Unix & Linux Customer Research

Customers Realize Tangible Benefits from Using PowerBroker for Unix & Linux; Including Speed, Simplicity and Security in Managing Unix/Linux

What results have you experienced since deploying PowerBroker for Unix & Linux?

It is faster and easier for us to achieve our compliance and audit requirements: 35%
Our Unix and Linux servers are more secure: 35%
Our Unix and Linux environment is easier to manage: 19%
Other: 11%

Case Study: Large Enterprise Computer Software Company

Introduction

This case study of a large enterprise computer software company is based on a July 2015 survey of BeyondTrust Retina customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

Use Case

  • Uses the following Retina capabilities at the following frequency:
    • Local, agent-based scanning: frequently
    • Cloud environment scanning: frequently

Results

  • Solves the following challenges with their Retina vulnerability management solution:
    • Profile previously unknown assets on the network
    • Understand the operational implications of vulnerabilities
    • Report risk to IT administrators, management, and/or auditors
  • Evaluated the following vendor before choosing BeyondTrust:
    • Qualys
  • Sees the following BeyondTrust capabilities as differentiated from the competition:
    • Asset discovery and profiling
    • Local, agent-based vulnerability scanning
    • Remediation guidance
    • Deployment scalability and flexibility
    • Customer service
  • Increased vulnerability management efficiency by 25-49% with their Retina solution.
  • Reduced security exposures in their organization by 25-49% with their Retina solution.

PowerBroker for Unix & Linux Case Study

Fortune 500 Financial Services Company

Introduction

This case study of a fortune 500 financial services company is based on a February 2017 survey of PowerBroker for Unix & Linux customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“With PCI in scope for several of our servers, we were able to comply with PCI privileged access control requirements.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select PowerBroker for Unix & Linux:

  • Compliance because they had to achieve compliance with regulatory mandates
  • Security because they had to lock down access to their Unix and Linux servers
  • Operations because they had to simplify the complexities of managing Unix and Linux

Use Case

  • Primary use cases for PowerBroker for Unix & Linux are:
    • IOLogging (session recording)
    • Logging commands (event log)
    • Audit (session recording & event log)
    • Root Shell elevation
    • Command control (command elevation)
    • Command control (command elevation) & IOLogging (session recording)
    • Command control (command elevation) & logging commands (event log)
    • Command control (command elevation) & audit (session recording & event logging)

Results

  • Rates the value that their organization is realizing from the following PowerBroker for Unix & Linux features:
    • Replicate policy files between hosts: valuable
    • Control privileged access with fine-grained policy: valuable
    • Central deployment and management of policy: valuable
    • Control applications and commands down to the system level: valuable
    • Monitor and alert on integrity of critical files and system binaries: extremely valuable
    • Centrally register all components: valuable
    • Implement role-based policies: valuable
    • Log events: extremely valuable
    • Provide controlled / audited root level shells: valuable
  • Experienced more secure Unix and Linux servers since deploying PowerBroker for Unix & Linux.


More to Explore



About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

  BeyondTrust Website