Menu

TechValidate Research on BeyondTrust

These pages present data that TechValidate has sourced via direct research with verified customers and users of BeyondTrust. TechValidate stands behind the authenticity of all published data. Learn more »



1,625 Customers Surveyed

13,433 Data Points Collected

62 Published TechFacts

14 Published Charts

432 Published Case Studies



Featured Research Collections for BeyondTrust

Curated collections and slideshows of TechValidate research data on BeyondTrust.



Selected Research Highlights


PowerBroker for Unix & Linux Customer Research

What are your primary use cases in using a commercial least privilege solution on Unix/Linux?

Root Shell only elevation
59%
Audit only (Session Recording & Event Log)
53%
Logging commands only (Event Log)
53%
Command control (Command elevation) + Audit (Session recording & Event log)
49%
IOLogging only (Session Recording)
46%
Command control (Command elevation) + Logging commands (Event log)
41%
Command control (Command elevation)
40%
Command control (Command elevation) + IOLogging (Session recording)
37%
Jump Host with destination control and session recording
34%
Jump Host with session control
27%
Jump Host with destination control only
20%

Case Study: BMC Software

Introduction

This case study of BMC Software is based on a July 2015 survey of BeyondTrust Retina customers by TechValidate, a 3rd-party research service.

“BeyondTrust Retina has made our Security lives pretty comfortable as it’s a one-stop solution for us as we scan, detect, and patch vulnerabilities effortlessly. Kudos to BeyondTrust Retina.”

Challenges

  • Purchased their Retina vulnerability management solution to accomplish the following:
    • Reduce the risk of security breaches
    • Shrink the organization’s attack surface
    • Reduce security data overload
    • Meet compliance regulations
    • Tighten operational practices
    • Integrate with other security solutions
    • Integrate with BeyondTrust privilege management solutions

Use Case

  • Uses the following Retina capabilities at the following frequency:
    • Agentless network scanning: frequently
    • Local, agent-based scanning: frequently
    • Web application scanning: frequently
  • Uses the following Retina capabilities at the following frequency:
    • Patch management module: frequently
    • Configuration compliance: frequently
    • Regulatory reporting module: frequently
  • Addresses the following compliance regulations with their Retina vulnerability management solution:

Results

  • Solves the following challenges with their Retina vulnerability management solution:
    • Gain visibility into exposures across multiple layers of infrastructure
    • Scan remote assets or other offline / air-gapped systems
    • Profile previously unknown assets on the network
    • Understand the operational implications of vulnerabilities
    • Report risk to IT administrators, management, and/or auditors
    • Identify and prioritizing remediation tactics
    • Patch / update assets with greater efficiency
  • Evaluated the following other vendors before choosing BeyondTrust:
    • McAfee
    • Qualys
    • Tripwire (Belden)
  • Sees the following BeyondTrust capabilities as differentiated from the competition:
    • Asset discovery and profiling
    • Remote, agent-less vulnerability scanning
    • Local, agent-based vulnerability scanning
    • Patch management
    • Reporting and analytics
    • Customer service
  • Increased vulnerability management efficiency by greater than 75% with their Retina solution.
  • Reduced security exposures in their organization by greater than 75% with their Retina solution.

BeyondTrust Differentiator: End-to-end Privileged Account Management Capabilities

78% of surveyed IT organizations rate BeyondTrust’s privilege account capabilities as differentiated from the competition or better.

PowerBroker for Unix & Linux Customer Research

Security was the Primary Purchase Driver for PowerBroker for Unix & Linux Customers

What were the biggest challenges you were facing when you selected and deployed PowerBroker for Unix & Linux?

Security-we had to lock down access to our Unix and Linux servers
67%
Compliance-we had to achieve compliance with regulatory mandates
59%
Operations-we had to simplify the complexities of managing Unix and Linux
50%

PowerBroker for Unix & Linux Case Study

Global 500 Banking Company

Introduction

This case study of a global 500 banking company is based on a January 2017 survey of PowerBroker for Unix & Linux customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

The business challenge that led the profiled company to evaluate and ultimately select PowerBroker for Unix & Linux:

  • Compliance because they had to achieve compliance with regulatory mandates

Use Case

  • Primary use cases for PowerBroker for Unix & Linux are:
    • Command control (command elevation) & audit (session recording & event logging)
    • Jump Host with destination control & session recording

Results

  • Rates the value that their organization is realizing from the following PowerBroker for Unix & Linux features:
    • Record all session activity DVR-style: extremely valuable
    • Control privileged access with fine-grained policy: valuable
    • Central deployment and management of policy: valuable
    • Control applications and commands down to the system level: extremely valuable
    • Implement role-based policies: extremely valuable
    • Log events: valuable
  • Experienced more secure Unix and Linux servers since deploying PowerBroker for Unix & Linux.

BeyondTrust Retina has given us the ability to conduct in depth vulnerability analysis.

IT Specialist, Large Enterprise Banking Company



More to Explore



About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

  BeyondTrust Website