Download PDF version Contact company

BeyondTrust, a cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, today announced extremely strong fourth-quarter and 2017 results, with a significant revenue increase, hundreds of new customers, strong profit margins and a growing channel. 2017 highlights include:

  • Over 50% growth in PowerBroker Password Safe, the company’s comprehensive password management solution
  • 47% growth in multi-product business, highlighting the breadth and depth of BeyondTrust solutions and indicating strong demand for the PAM platform
  • 64% growth in channel business demonstrating significant momentum
  • Revenue from cross-sell of new products to existing customers grew over 40%, highlighting the value customers receive from BeyondTrust solutions
  • Over 500 new enterprise customers added to the growing family of BeyondTrust customers
  • Double-digit growth in revenue, driven by 100%+ growth in EMEA, demonstrating continued high demand for privilege management solutions.

With these results, the company extended its leadership position with a comprehensive privileged access management (PAM) solution.

Data Security With Privileged Access

In 2017, BeyondTrust helped more than 4,000 customers reduce insider risks and close external security gaps. In addition to adding hundreds of new customers, organizations are leveraging the value of the integrated platform to satisfy maturing privilege requirements, enabling BeyondTrust to expand relationships with existing customers.

With 80% of data breaches the result of the abuse or misuse of privileged credentials on an endpoint, it’s important for organizations to have a complete and integrated solution to address these risks,” said Kevin Hickey, President and CEO, BeyondTrust. “As a $125M+ global software company, we provide all the necessary privileged access management solutions that security and IT teams demand in the efficiency of a single platform.”

BeyondInsight-Powered Access Control

BeyondTrust customers benefitted from the following significant advancements over the past year:

  • Introduced the newest version of its central console for privileged access management and vulnerability management, BeyondInsight, with a redesigned dashboard and enhanced analytics and reporting to even further simplify the management of privileged accounts.
  • Launched support for the Microsoft Azure cloud platform, providing Azure instances of its leading privileged access management (PAM) and vulnerability management (VM) solutions. In addition, BeyondTrust performs security scans of Azure cloud instances to prevent unwanted intrusions as a result of unpatched or known vulnerabilities.
  • Launched the first privileged access management platform available on Google Cloud providing the most cloud-based deployment options and maximum flexibility for customers. BeyondTrust’s Google Cloud instance also supported a Bring Your Own Licensing (BYOL) model. BeyondTrust became the only vendor having a complete PAM platform available on Google Cloud, Amazon Web Services and Microsoft Azure Marketplace.
  • Released a new version of PowerBroker Servers Management Console (PBSMC), a centralized, web-based solution that simplifies the deployment and management of PowerBroker for Unix & Linux, PowerBroker for Sudo and PowerBroker Identity Services.
  • BeyondInsight, Retina, PowerBroker for Windows, PowerBroker Auditing & Security Suite and UVM 50 Appliance all received Common Criteria Certification. The certification awarded across privileged access management and vulnerability management solutions reduces the implementation time and complexity for government agencies and enterprises.
  • Released many more product updates, including PowerBroker Password Safe, PowerBroker for Windows, and Retina.

Strategic Security Management Partnerships

BeyondTrust extended its partner engagement in 2017:

  • New engagements with top-tier trusted identity and access management (IAM) partners CIS, GoSecure and XMS Solutions enhanced BeyondTrust’s reach by offering solutions in the cloud, allowing organizations to leverage the combined expertise of both BeyondTrust and the trusted partner in PAM and IAM deployments.
  • Launched the BeyondTrust University certification program to ensure partners have the consulting resources to deliver implementation services on BeyondTrust products.
  • New MSP partners bring strong global additions leveraging BeyondTrust solutions as a managed service while expanding existing MSP partners.
  • Newly developed consulting and system integrator partner ecosystem driving strong results.
  • Added 14 new delivery partners in 12 countries while also adding 25 new certified implementation engineers, doubling 2016 results.
  • Partnered with Secure Internet Storage Solutions to offer the first privileged access managed security service in Australia.

Industry Recognition For Enhanced Integration

BeyondTrust is recognized as the privileged access management leader:

  • For the fourth straight year, Gartner included BeyondTrust as a ‘Representative Vendor’ in the August 2017 Market Guide for Privileged Access Management report.
  • BeyondTrust was named among the leaders in every category of the KuppingerCole 2017 Leadership Compass for Privilege Management report. The company was recognized for its history as a long-standing and stable company, its support for proxy-and host-based privilege management and significantly improved integration across the portfolio.
  • BeyondTrust’s PowerBroker solutions were named the Govies Government Security Award Winner by a panel of independent judges from the security industry and editors at Security Today. Winners were selected based on features, innovation, user friendliness, interoperability, quality, design, market opportunity, impact, technical advances and scalability.
  • PowerBroker was named to CRN’s Most Innovative Security Products of 2017 list. The award honours vendors drawing the roadmap for the future of IT and providing cutting-edge solutions.
  • BeyondTrust’s Joseph Schramm was recognized as a CRN Channel Chief. The list represents top leaders in the IT channel who excel at driving growth and revenue in their organizations through channel partners.
  • BeyondTrust’s Natalie Padula was named to its prestigious 2017 Women of the Channel List for her outstanding leadership, vision, and unique role in driving channel growth and innovation.
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.

Will Airport Security’s Pandemic Measures Lead To Permanent Changes?
Will Airport Security’s Pandemic Measures Lead To Permanent Changes?

Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method.  AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI.   CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021.  Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.