Menu

TechValidate Research on BeyondTrust

These pages present data that TechValidate has sourced via direct research with verified customers and users of BeyondTrust. TechValidate stands behind the authenticity of all published data. Learn more »



2,236 Customers Surveyed

16,850 Data Points Collected

62 Published TechFacts

15 Published Charts

473 Published Case Studies



Featured Research Collections for BeyondTrust

Curated collections and slideshows of TechValidate research data on BeyondTrust.



Selected Research Highlights


PowerBroker for Unix & Linux Customer Statistic

75% of surveyed IT organizations consider more than 50% of their Unix / Linux servers to be “Mission Critical” to their organization.

75%

PowerBroker for Unix & Linux Case Study

Large Enterprise Electronics Company

Introduction

This case study of a large enterprise electronics company is based on a February 2017 survey of PowerBroker for Unix & Linux customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Provides non-admins with sudo access.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select PowerBroker for Unix & Linux:

  • Compliance because they had to achieve compliance with regulatory mandates
  • Security because they had to lock down access to their Unix and Linux servers
  • Operations because they had to simplify the complexities of managing Unix and Linux

Use Case

  • Primary use cases for PowerBroker for Unix & Linux are:
    • IOLogging (session recording)
    • Logging commands (event log)
    • Audit (session recording & event log)
    • Root Shell elevation
    • Command control (command elevation)
    • Command control (command elevation) & IOLogging (session recording)
    • Command control (command elevation) & logging commands (event log)
    • Command control (command elevation) & audit (session recording & event logging)
    • Jump Host with destination control
    • Jump Host with session control
    • Jump Host with destination control & session recording

Results

  • Rates the value that their organization is realizing from the following PowerBroker for Unix & Linux features:
    • Record all session activity DVR-style: extremely valuable
    • Replicate policy files between hosts: extremely valuable
    • Control privileged access with fine-grained policy: extremely valuable
    • Central deployment and management of policy: extremely valuable
    • Control applications and commands down to the system level: extremely valuable
    • Monitor and alert on integrity of critical files and system binaries: extremely valuable
    • Centrally register all components: extremely valuable
    • Implement role-based policies: extremely valuable
    • Log events: extremely valuable
    • Provide controlled / audited root level shells: extremely valuable
  • Experienced an easier to manage Unix and Linux environment since deploying PowerBroker for Unix & Linux.

BeyondTrust increases productivity

By what percentage did your PowerBroker privileged account management solution increase the productivity of your IT staff?

Greater than 75%: 6%
50-74%: 20%
25-49%: 28%
10-24%: 26%
Up to 10%: 20%

PowerBroker for Unix & Linux Customer Research

What are your primary use cases in using a commercial least privilege solution on Unix/Linux?

Root Shell only elevation
59%
Audit only (Session Recording & Event Log)
53%
Logging commands only (Event Log)
53%
Command control (Command elevation) + Audit (Session recording & Event log)
49%
IOLogging only (Session Recording)
46%
Command control (Command elevation) + Logging commands (Event log)
41%
Command control (Command elevation)
40%
Command control (Command elevation) + IOLogging (Session recording)
37%
Jump Host with destination control and session recording
34%
Jump Host with session control
27%
Jump Host with destination control only
20%

BeyondTrust Case Study

Defence.Gov.Au

Introduction

This case study of defence.gov.au is based on a February 2018 survey of BeyondTrust customers by TechValidate, a 3rd-party research service.

“BeyondTrust Retina CS is by far the best Network Vulnerability Scanner software out there. Moreover, support for the solution is outstanding.”

Challenges

The business challenges that led the profiled organization to evaluate and ultimately select BeyondTrust:

Use Case

The key features and functionalities of BeyondTrust that the surveyed organization uses:

Results

The surveyed organization achieved the following results with BeyondTrust:

  • Rates their satisfaction for the following services from BeyondTrust:
    • sales: very satisfied
    • renewals: very satisfied
    • professional services: very satisfied
    • technical support: very satisfied
    • customer portal: very satisfied
    • documentation: very satisfied
  • Rates the following BeyondTrust product attributes:
    • stable: extremely
    • high performing: extremely
    • usable: extremely
    • effective: extremely
    • comprehensive: extremely
    • effective at providing strong ROI: extremely
  • Is extremely likely to consider BeyondTrust first when looking for privileged access management or vulnerability management solutions.

BeyondTrust provided us a central solution for the management of vulnerabilities.

Engineer, Large Enterprise Professional Services Company



More to Explore



About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

  BeyondTrust Website