SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

BeyondTrust’s privileged access management solutions augment industrial cyber security

17 Jan 2018

BeyondTrust’s privileged access management solutions augment industrial cyber security
Contact company
Contact BeyondTrust
icon Add as a preferred source Download PDF version
Related Links
  • Video surveillance and access control data will allow users to see the bigger picture in 2018

BeyondTrust, a cyber security company dedicated to preventing privilege misuse and stopping unauthorised access, today announced extremely strong fourth-quarter and 2017 results, with a significant revenue increase, hundreds of new customers, strong profit margins and a growing channel. 2017 highlights include:

  • Over 50% growth in PowerBroker Password Safe, the company’s comprehensive password management solution
  • 47% growth in multi-product business, highlighting the breadth and depth of BeyondTrust solutions and indicating strong demand for the PAM platform
  • 64% growth in channel business demonstrating significant momentum
  • Revenue from cross-sell of new products to existing customers grew over 40%, highlighting the value customers receive from BeyondTrust solutions
  • Over 500 new enterprise customers added to the growing family of BeyondTrust customers
  • Double-digit growth in revenue, driven by 100%+ growth in EMEA, demonstrating continued high demand for privilege management solutions.

With these results, the company extended its leadership position with a comprehensive privileged access management (PAM) solution.

Data security with privileged access

In 2017, BeyondTrust helped more than 4,000 customers reduce insider risks and close external security gaps. In addition to adding hundreds of new customers, organisations are leveraging the value of the integrated platform to satisfy maturing privilege requirements, enabling BeyondTrust to expand relationships with existing customers.

“With 80% of data breaches the result of the abuse or misuse of privileged credentials on an endpoint, it’s important for organisations to have a complete and integrated solution to address these risks,” said Kevin Hickey, President and CEO, BeyondTrust. “As a $125M+ global software company, we provide all the necessary privileged access management solutions that security and IT teams demand in the efficiency of a single platform.”

BeyondInsight-powered access control

BeyondTrust customers benefitted from the following significant advancements over the past year:

  • Introduced the newest version of its central console for privileged access management and vulnerability management, BeyondInsight, with a redesigned dashboard and enhanced analytics and reporting to even further simplify the management of privileged accounts.
  • Launched support for the Microsoft Azure cloud platform, providing Azure instances of its leading privileged access management (PAM) and vulnerability management (VM) solutions. In addition, BeyondTrust performs security scans of Azure cloud instances to prevent unwanted intrusions as a result of unpatched or known vulnerabilities.
  • Launched the first privileged access management platform available on Google Cloud providing the most cloud-based deployment options and maximum flexibility for customers. BeyondTrust’s Google Cloud instance also supported a Bring Your Own Licensing (BYOL) model. BeyondTrust became the only vendor having a complete PAM platform available on Google Cloud, Amazon Web Services and Microsoft Azure Marketplace.
  • Released a new version of PowerBroker Servers Management Console (PBSMC), a centralised, web-based solution that simplifies the deployment and management of PowerBroker for Unix & Linux, PowerBroker for Sudo and PowerBroker Identity Services.
  • BeyondInsight, Retina, PowerBroker for Windows, PowerBroker Auditing & Security Suite and UVM 50 Appliance all received Common Criteria Certification. The certification awarded across privileged access management and vulnerability management solutions reduces the implementation time and complexity for government agencies and enterprises.
  • Released many more product updates, including PowerBroker Password Safe, PowerBroker for Windows, and Retina.

Strategic security management partnerships

BeyondTrust extended its partner engagement in 2017:

  • New engagements with top-tier trusted identity and access management (IAM) partners CIS, GoSecure and XMS Solutions enhanced BeyondTrust’s reach by offering solutions in the cloud, allowing organisations to leverage the combined expertise of both BeyondTrust and the trusted partner in PAM and IAM deployments.
  • Launched the BeyondTrust University certification program to ensure partners have the consulting resources to deliver implementation services on BeyondTrust products.
  • New MSP partners bring strong global additions leveraging BeyondTrust solutions as a managed service while expanding existing MSP partners.
  • Newly developed consulting and system integrator partner ecosystem driving strong results.
  • Added 14 new delivery partners in 12 countries while also adding 25 new certified implementation engineers, doubling 2016 results.
  • Partnered with Secure Internet Storage Solutions to offer the first privileged access managed security service in Australia.

Industry recognition for enhanced integration

BeyondTrust is recognised as the privileged access management leader:

  • For the fourth straight year, Gartner included BeyondTrust as a ‘Representative Vendor’ in the August 2017 Market Guide for Privileged Access Management report.
  • BeyondTrust was named among the leaders in every category of the KuppingerCole 2017 Leadership Compass for Privilege Management report. The company was recognised for its history as a long-standing and stable company, its support for proxy-and host-based privilege management and significantly improved integration across the portfolio.
  • BeyondTrust’s PowerBroker solutions were named the Govies Government Security Award Winner by a panel of independent judges from the security industry and editors at Security Today. Winners were selected based on features, innovation, user friendliness, interoperability, quality, design, market opportunity, impact, technical advances and scalability.
  • PowerBroker was named to CRN’s Most Innovative Security Products of 2017 list. The award honours vendors drawing the roadmap for the future of IT and providing cutting-edge solutions.
  • BeyondTrust’s Joseph Schramm was recognised as a CRN Channel Chief. The list represents top leaders in the IT channel who excel at driving growth and revenue in their organisations through channel partners.
  • BeyondTrust’s Natalie Padula was named to its prestigious 2017 Women of the Channel List for her outstanding leadership, vision, and unique role in driving channel growth and innovation.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Industrial security
  • Security access systems
  • Identity management
  • Visitor management systems
  • Testing & Approvals
  • Cyber security
  • Data Security
  • Cloud security
  • Related categories
  • Access control software
  • Intruder detectors
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec