TechValidate Research on BeyondTrust

These pages present data that TechValidate has sourced via direct research with verified customers and users of BeyondTrust. TechValidate stands behind the authenticity of all published data. Learn more »



2,552 Customers Surveyed

17,284 Data Points Collected

62 Published TechFacts

15 Published Charts

473 Published Case Studies



Featured Research Collections for BeyondTrust

Curated collections and slideshows of TechValidate research data on BeyondTrust.



Selected Research Highlights


BeyondTrust Case Study

Large Enterprise Pharmaceuticals Company

Introduction

This case study of a large enterprise pharmaceuticals company is based on a June 2016 survey of BeyondTrust customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

The business challenges that led the profiled company to evaluate and ultimately select BeyondTrust:

  • Uses BeyondTrust products to address the following challenges:

Use Case

The key features and functionalities of BeyondTrust that the surveyed company uses:

Results

The surveyed company achieved the following results with BeyondTrust:

  • Rates their satisfaction for the following services from BeyondTrust:
    • Professional services: satisfied
    • Technical support: very satisfied
    • Customer portal: satisfied
    • Documentation: satisfied
  • Rates the following attributes of BeyondTrust’s staff:
    • Trustworthy: extremely
    • Responsive: extremely
    • Knowledgeable: extremely
    • Resourceful: extremely
  • Rates the following BeyondTrust product attributes:
    • Stable: extremely
    • High performing: very
    • Usable: extremely
    • Effective: extremely
    • Comprehensive: extremely
    • Effective at providing strong ROI: extremely
  • Is extremely likely to consider BeyondTrust first when looking for privileged access management or vulnerability management solutions.

BeyondTrust Retina has given us the ability to conduct in depth vulnerability analysis.

IT Specialist, Large Enterprise Banking Company

BeyondTrust Case Study

Cheetah Digital

Introduction

This case study of Cheetah Digital is based on a May 2018 survey of BeyondTrust customers by TechValidate, a 3rd-party research service.

“BeyondTrust’s support has been excellent, and they have gone out of their way to assist us in getting the most out of their great products.”

Challenges

The business challenges that led the profiled company to evaluate and ultimately select BeyondTrust:

Use Case

The key features and functionalities of BeyondTrust that the surveyed company uses:

  • Currently uses the following BeyondTrust products:
    **"PowerBroker Password Safe":https://www.beyondtrust.com/products/powerbroker-password-safe/
  • Has been a BeyondTrust customer for six months to a year.
  • Plans to add the following IT solutions within the next 6 to 12 months:

Results

The surveyed company achieved the following results with BeyondTrust:

  • Rates the following BeyondTrust product attributes:
    • Stable: Very
    • Usable: Very
    • Effective: Very
    • Comprehensive: Very
    • Effective at providing strong ROI: Very
  • Is very likely to consider BeyondTrust first when looking for privileged access management or vulnerability management solutions.
  • Rated the following BeyondTrust services:
    • Sales & renewals: Satisfied
    • Documentation: Satisfied
    • Professional services: Satisfied
    • Technical support: Satisfied
    • Customer portal: Satisfied

Retina Provides Visibility and Reporting to Prioritize Remediation

What types of challenges does your Retina vulnerability management solution solve for your organization?

Gaining visibility into exposures across multiple layers of infrastructure
57%
Scanning remote assets or other offline / air-gapped systems
30%
Profiling previously unknown assets on the network
24%
Understanding the operational implications of vulnerabilities
35%
Reporting risk to IT administrators, management and/or auditors
66%
Identifying and prioritizing remediation tactics
54%
Patching / updating assets with greater efficiency
42%
Other
3%

PowerBroker for Unix & Linux Customer Testimonial

What Benefits Are You Seeing with PowerBroker for Unix & Linux?

PowerBroker has enabled a level of security for admin and application role management, allowing us to easily show compliance and maintain fine-grained security controls that support least-privilege access to all our critical environments.

System Administrator, Global 500 Telecommunications Services Company

PowerBroker for Unix & Linux Customer Research

76% of Customers Consider More than Half of the their Unix/Linux Servers to be Mission Critical

What percentage of the Unix/Linux servers in your organization are considered “Mission Critical”?

100%: 10%
76-99%: 42%
51-75%: 24%
26-50%: 12%
0-25%: 12%


More to Explore



About BeyondTrust

BeyondTrust is a global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks. Corporate and government organizations rely on BeyondTrust solutions to shrink attack surfaces and identify imminent threats. The company’s integrated risk intelligence platform presents a unique competitive advantage in its ability to reveal critical risks hidden within volumes of user and system data. This unifies IT and security departments, empowering them with the information and control they need to jointly prevent breaches, maintain compliance, and ensure business continuity. BeyondTrust’s privileged access management and vulnerability management solutions are trusted by over 4,000 customers worldwide, including over half of the Fortune 100.

  BeyondTrust Website