TechValidate Research on BeyondTrust

These pages present data that TechValidate has sourced via direct research with verified customers and users of BeyondTrust. TechValidate stands behind the authenticity of all published data. Learn more »

1,990 Customers Surveyed

15,130 Data Points Collected

62 Published TechFacts

15 Published Charts

473 Published Case Studies

Featured Research Collections for BeyondTrust

Curated collections and slideshows of TechValidate research data on BeyondTrust.

Selected Research Highlights

BeyondTrust Retina has made our security lives comfortable as it’s a one stop solution for us as we scan, detect and patch vulnerabilities effortlessly. Kudos to BI Retina.

Saurabh Verma, Security Officer, BMC

PowerBroker for Unix & Linux Customer Research

76% of Customers Consider More than Half of the their Unix/Linux Servers to be Mission Critical

What percentage of the Unix/Linux servers in your organization are considered “Mission Critical”?

100%: 10%
76-99%: 42%
51-75%: 24%
26-50%: 12%
0-25%: 12%

BeyondTrust Case Study



This case study of FSC is based on a February 2018 survey of BeyondTrust customers by TechValidate, a 3rd-party research service.

“PowerBroker is a good product that helps us enforce least privilege on our end users.”


The business challenges that led the profiled company to evaluate and ultimately select BeyondTrust:

Use Case

The key features and functionalities of BeyondTrust that the surveyed company uses:

  • Uses the following BeyondTrust products:
  • Has been a BeyondTrust customer for 3 or more years


The surveyed company achieved the following results with BeyondTrust:

  • Rates their satisfaction for the following services from BeyondTrust:
    • Customer Portal: Satisfied
    • Documentation: Satisfied
  • Rates the following BeyondTrust product attributes:
    • Stability: Very
    • High performing: Very
    • Usability: Very
    • Effectiveness: Very
    • Comprehensiveness: Very
    • Effectiveness at providing strong ROI: Very
  • Is very likely to consider BeyondTrust first when looking for privileged access management or vulnerability management solutions

PowerBroker for Unix & Linux Customer Research

What results have you experienced since deploying a commercial least privilege solution on Unix/Linux?

It is faster and easier for us to achieve our compliance and audit requirements.: 35%
Our Unix and Linux servers are more secure.: 35%
Our Unix and Linux environment is easier to manage.: 19%
Other: 11%

Prior to using Retina there was no easy way to show management the vulnerabilities on the network. Now we get a nice easy to understand dashboard to generate reports.

Security Officer, Medium Enterprise Financial Services Company

Case Study: Membership Organization


This case study of a membership organization is based on a February 2015 survey of BeyondTrust PowerBroker customers by TechValidate, a 3rd-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.


  • Purchased their PowerBroker privileged account management solution for the following reasons:
    • Reduce risk from security breaches
    • Secure access to sensitive data

Use Case

  • Chose the following PowerBroker privileged account management solutions to solve their challenges:
  • Using their PowerBroker privileged account management solution to address the following compliance regulation:
    • PCI-DSS


  • Rates the following BeyondTrust capabilities in terms of how differentiated they are from the competition:
    • Privilege account capabilities: very highly differentiated
    • Better security context: differentiated
    • Flexible deployment options: differentiated
  • Would consider purchasing other BeyondTrust privileged account management solutions.
  • Intends to tackle auditing and reporting on activity for their next privileged account management-related project.

More to Explore

About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

  BeyondTrust Website