Menu

TechValidate Research on BeyondTrust

These pages present data that TechValidate has sourced via direct research with verified customers and users of BeyondTrust. TechValidate stands behind the authenticity of all published data. Learn more »



887 Customers Surveyed

7,246 Data Points Collected

62 Published TechFacts

14 Published Charts

396 Published Case Studies



Featured Research Collections for BeyondTrust

Curated collections and slideshows of TechValidate research data on BeyondTrust.



Selected Research Highlights


[Retina] is a great product that has complemented our security infrastructure.

IT Architect, Small Business Food Company

PowerBroker for Unix & Linux Customer Testimonial

What Are the Primary Benefits You Are Seeing from Using PowerBroker for Unix & Linux?

[PowerBroker has good] ease of management, we are more secure, and we are fully compliant.

Vinay Dabas, IT Systems Analyst, rci.rogers.com

BeyondTrust increases productivity

By what percentage did your PowerBroker privileged account management solution increase the productivity of your IT staff?

Greater than 75%: 6%
50-74%: 20%
25-49%: 28%
10-24%: 26%
Up to 10%: 20%

Case Study: Large Enterprise Computer Software Company

Introduction

This case study of a large enterprise computer software company is based on a July 2015 survey of BeyondTrust Retina customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

Use Case

  • Uses the following Retina capabilities at the following frequency:
    • Local, agent-based scanning: frequently
    • Cloud environment scanning: frequently

Results

  • Solves the following challenges with their Retina vulnerability management solution:
    • Profile previously unknown assets on the network
    • Understand the operational implications of vulnerabilities
    • Report risk to IT administrators, management, and/or auditors
  • Evaluated the following vendor before choosing BeyondTrust:
    • Qualys
  • Sees the following BeyondTrust capabilities as differentiated from the competition:
    • Asset discovery and profiling
    • Local, agent-based vulnerability scanning
    • Remediation guidance
    • Deployment scalability and flexibility
    • Customer service
  • Increased vulnerability management efficiency by 25-49% with their Retina solution.
  • Reduced security exposures in their organization by 25-49% with their Retina solution.

PowerBroker for Unix & Linux Customer Research

Top Use Cases Include Root Shell Elevation, Auditing, Logging, and Command Control

What are your primary use cases in using PowerBroker for Unix & Linux?

Root Shell only elevation
59%
Audit only (Session Recording & Event Log)
53%
Logging commands only (Event Log)
53%
Command control (Command elevation) + Audit (Session recording & Event log)
49%
IOLogging only (Session Recording)
46%
Command control (Command elevation) + Logging commands (Event log)
41%
Command control (Command elevation)
40%
Command control (Command elevation) + IOLogging (Session recording)
37%
Jump Host with destination control and session recording
34%
Jump Host with session control
27%
Jump Host with destination control only
20%

Case Study: Large Enterprise Energy & Utilities Company (Japan)

Introduction

This case study of a large enterprise energy & utilities company is based on a February 2015 survey of BeyondTrust PowerBroker customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“We selected PowerBroker Password Safe to strengthen the compliance of password management.”

Challenges

  • Purchased their PowerBroker privileged account management solution for the following reasons:
    • Reduce risk from security breaches
    • Meet compliance regulations
    • Lower the total cost of ownership
  • Solved the following challenges by deploying their PowerBroker privileged account management solution:
    • Secured and automated the process of managing and cycling privileged passwords, eliminating sharing
    • Logged, audited and reported on privileged activities

Use Case

  • Chose the following PowerBroker privileged account management solutions to solve their challenges:
  • Is using their PowerBroker privileged account management solution to address the following compliance regulations:
    • Sarbanes-Oxley (SOX)

Results

  • Evaluated the following vendors before choosing BeyondTrust:
    • CyberArk
    • Oracle
  • Rates the following BeyondTrust capabilities in terms of how differentiated they are from the competition:
    • Privilege account capabilities: very differentiated
    • Reporting and analytics: differentiated
    • Better security context: very differentiated
    • Low total cost of ownership: very differentiated
    • Flexible deployment options: very differentiated
  • Intends to tackle attaining least privilege on end points or servers as their next privileged account management-related project.
  • Increased IT staff productivity by 50-74% with their PowerBroker privileged account management solution.


More to Explore



About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

  BeyondTrust Website