TechValidate Research on BeyondTrust

These pages present data that TechValidate has sourced via direct research with verified customers and users of BeyondTrust. TechValidate stands behind the authenticity of all published data. Learn more »

3,086 Customers Surveyed

19,026 Data Points Collected

63 Published TechFacts

15 Published Charts

473 Published Case Studies

Featured Research Collections for BeyondTrust

Curated collections and slideshows of TechValidate research data on BeyondTrust.

Selected Research Highlights

PowerBroker for Unix & Linux Customer Research

40% of Companies are Still Using Sudo on at Least Some of their Unix/Linux Servers, and 19% Don’t Enforce Least Privilege on Them at All

For those servers where you ARE NOT using a commercial solution, how are you achieving least privilege delegation?

Using another tool (i.e. Centrify, FoxT, etc.): 10%
Using sudo: 40%
Using a combination of another tool and sudo: 18%
We are not enforcing least privilege delegation on those servers: 19%
Other: 14%

BeyondTrust Retina has helped us to identify specifically the vulnerabilities that potentially put the organization at risk which in turn has led to more efficient patching.

IT Specialist, State & Local Government

[Retina] has allowed us to begin a corporate wide security program to reduce vulnerabilities.

IT Professional, Large Enterprise Energy & Utilities Company

PowerBroker for Unix & Linux Customer Research

Top Use Cases Include Root Shell Elevation, Auditing, Logging, and Command Control

What are your primary use cases in using PowerBroker for Unix & Linux?

Root Shell only elevation
Audit only (Session Recording & Event Log)
Logging commands only (Event Log)
Command control (Command elevation) + Audit (Session recording & Event log)
IOLogging only (Session Recording)
Command control (Command elevation) + Logging commands (Event log)
Command control (Command elevation)
Command control (Command elevation) + IOLogging (Session recording)
Jump Host with destination control and session recording
Jump Host with session control
Jump Host with destination control only

BeyondTrust Case Study

Porto Seguro Seguros


This case study of Porto Seguro Seguros is based on a November 2017 survey of BeyondTrust customers by TechValidate, a 3rd-party research service.

“PowerBroker for Windows and PowerBroker Password Safe give us a high level of protection at a great price. PowerBroker solutions allow us to enforce a least privilege security model on all our endpoints, while ensuring that privileged credentials are controlled and regularly rotated.”


The business challenges that led the profiled company to evaluate and ultimately select BeyondTrust:

Use Case

The key features and functionalities of BeyondTrust that the surveyed company uses:


The surveyed company achieved the following results with BeyondTrust:

  • Rates their satisfaction for the following services from BeyondTrust:
    • sales: satisfied
    • renewals: satisfied
    • professional services: satisfied
    • technical support: satisfied
    • customer portal: satisfied
    • documentation: satisfied
  • Rates the following attributes of BeyondTrust’s staff:
    • trustworthy: extremely
    • responsive: very
    • knowledgeable: very
    • resourceful: very
  • Rates the following BeyondTrust product attributes:
    • stable: usually
    • high performing: usually
    • usable: usually
    • comprehensive: usually
    • effective at providing strong ROI: extremely
  • Is extremely likely to consider BeyondTrust first when looking for privileged access management or vulnerability management solutions.

PowerBroker for Unix & Linux Case Study

Small Business Computer Services Company


This case study of a small business computer services company is based on a January 2017 survey of PowerBroker for Unix & Linux customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.


The business challenges that led the profiled company to evaluate and ultimately select PowerBroker for Unix & Linux:

  • Compliance because they had to achieve compliance with regulatory mandates
  • Security because they had to lock down access to their Unix and Linux servers
  • Operations because they had to simplify the complexities of managing Unix and Linux

Use Case

  • Primary use cases for PowerBroker for Unix & Linux are:
    • IOLogging (session recording)
    • Logging commands (event log)
    • Audit (session recording & event log)
    • Root Shell elevation
    • Command control (command elevation)
    • Command control (command elevation) & IOLogging (session recording)
    • Command control (command elevation) & logging commands (event log)
    • Command control (command elevation) & audit (session recording & event logging)
    • Jump Host with destination control
    • Jump Host with session control
    • Jump Host with destination control & session recording


  • Rates the value that their organization is realizing from the following PowerBroker for Unix & Linux features:
    • Record all session activity DVR-style: extremely valuable
    • Replicate policy files between hosts: extremely valuable
    • Control privileged access with fine-grained policy: valuable
    • Central deployment and management of policy: extremely valuable
    • Control applications and commands down to the system level: valuable
    • Monitor and alert on integrity of critical files and system binaries: valuable
    • Centrally register all components: extremely valuable
    • Implement role-based policies: valuable
    • Log events: extremely valuable
    • Provide controlled / audited root level shells: extremely valuable
  • Experienced faster and easier achievement of compliance and audit requirements since deploying PowerBroker for Unix & Linux.

More to Explore

About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

  BeyondTrust Website