|By Business Wire||
|May 14, 2014 09:05 AM EDT||
BeyondTrust®, the security industry's only provider of Context-Aware Security Intelligence, continues to build momentum as the global leader in Privileged Account Management and Vulnerability Management. The company finished fiscal 2013 strong as it experienced its fourth straight year of record profitably as evidenced by EBITDA margins approaching 40 percent. Corporate growth has been influenced by a number of factors over the last six months including; significant product updates, noteworthy customer traction and market partnerships, industry accolades, and key executive appointments, to position BeyondTrust for continued market advancement and growth.
BeyondTrust announced the release of BeyondInsight™, a new IT risk management platform that unifies two foundational security methodologies: Privileged Account Management and Vulnerability Management. BeyondInsight provides a common dashboard interface for multiple BeyondTrust solutions, offering centralized asset discovery, reporting, analytics, and other platform capabilities that enable unprecedented synchronization and collaboration between IT and Security operations.
The company continued to strengthen its standalone offerings as well. For instance, version 6.5 of PowerBroker for Windows, a desktop and server privilege management solution, introduced industry-first Vulnerability-Based Application Management (VBAM)™ capabilities. This patent-pending technology enforces least-privilege access based on an application’s known vulnerabilities, as well as their age, potential risk, and impact on regulatory compliance initiatives – and is currently included in the PowerBroker for Windows Risk Compliance module.
BeyondTrust also expanded its Vulnerability Management solution suite with the introduction of BeyondSaaS, an easy-to-use, cost effective cloud-based vulnerability assessment service. This offering enables customers to address requirements for scanning externally facing web pages and IP addresses per the Payment Card Industry Data Security Standard (PCI DSS) and other regulations. The BeyondSaaS release followed the launch of Retina Network Security Scanner Unlimited, a full-featured, unlimited-IP version of the industry’s most mature solution for scanning internal IT assets – priced competitively at $1,200 for a one-year subscription.
Strategic Partnerships/Customer Wins
In April 2014, the Defense Information Systems Agency (DISA) extended its contract with BeyondTrust to provide critical vulnerability assessment and management solutions for the U.S. Department of Defense (DoD). This extension marks the tenth anniversary of the working relationship between the two organizations.
BeyondTrust has grown to more than 4,000 customers and in Q1 2014 alone, experienced a 30% increase in new business bookings growth over Q1 2013. BeyondTrust customers include leading organizations in the government, aerospace and defense, media & entertainment, telecommunications, healthcare, pharmaceutical, education and financial services sectors. CoalFire, an independent information technology governance, risk and compliance (IT GRC) services firm mapped several BeyondTrust solutions to PCI DSS and HIPAA requirements, specifically with regard to VMware virtual IT environments.
BeyondTrust was selected as a Finalist for the upcoming Red Herring Top 100 North America awards, which recognizes “the most innovative and influential ventures across the North American high-tech industry.” The company will participate in the final round of judging at the Red Herring conference in May.
March 2014 marked the fifth anniversary of BeyondTrust as an Approved Scanning Vendor (ASV) for the PCI Security Standards Council. It was the company’s Retina Enterprise Vulnerability Management solution that successfully completed PCI Scanning Vendor Compliance Testing.
SC Magazine recognized BeyondTrust’s UVM20 Security Management Appliance with a 5-star rating, referring to it as a “solid product available as an appliance or software-only, and well worth your attention. It is our choice for Best Buy.”
BeyondTrust expanded its executive leadership team with the appointment of Kevin Hickey to President and CEO. Mr. Hickey joined BeyondTrust by way of the company's acquisition of eEye Digital Security where he served as Chief Executive Officer and Chairman. Under his leadership, eEye experienced significant growth, launched several market-first security solutions and brought the company back to category leadership. Mr. Hickey was recently chosen as a finalist for the EY Entrepreneur Of The Year™ 2014 Award in the Mountain Desert region. The awards program recognizes entrepreneurs who demonstrate excellence and extraordinary success in such areas as innovation, financial performance and personal commitment to their businesses and communities.
“2013 was a year of transition for BeyondTrust, as we prepared for accelerated growth in the vulnerability management and privileged account management markets,” said Kevin Hickey, President and CEO, BeyondTrust. “Given our record results thus far in 2014, it’s clear that both markets are indeed healthy and growing, and there are numerous opportunities in both the on-premise and SaaS portfolios. I’m very proud of the rapid growth we’re experiencing and am looking forward to our continued success in the years to come.”
BeyondTrust empowers security-conscious organizations with Context-Aware Security Intelligence, delivering Privileged Account Management and Vulnerability Management solutions that reduce IT security risks and simplify compliance reporting across heterogeneous IT environments.
Our customers not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, they address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible. BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk.
More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include 8 of the world's 10 largest banks, 8 of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
May. 22, 2015 08:45 AM EDT Reads: 1,063
Data-intensive companies that strive to gain insights from data using Big Data analytics tools can gain tremendous competitive advantage by deploying data-centric storage. Organizations generate large volumes of data, the vast majority of which is unstructured. As the volume and velocity of this unstructured data increases, the costs, risks and usability challenges associated with managing the unstructured data (regardless of file type, size or device) increases simultaneously, including end-to-...
May. 22, 2015 08:30 AM EDT Reads: 4,006
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
May. 22, 2015 08:30 AM EDT Reads: 3,716
Actifio, the copy data virtualization company, today announced a series of new features and functional enhancements to better support the growing number of customers leveraging its virtual data pipeline technology in support of DevOps use cases. While infrastructure is increasingly seen as a commodity inside large enterprises, applications – where the technology touches the business – are becoming more strategic. Managing the flow of data that powers those applications presents a range of cha...
May. 22, 2015 08:00 AM EDT Reads: 1,550
Cloud services are the newest tool in the arsenal of IT products in the market today. These cloud services integrate process and tools. In order to use these products effectively, organizations must have a good understanding of themselves and their business requirements. In his session at 15th Cloud Expo, Brian Lewis, Principal Architect at Verizon Cloud, outlined key areas of organizational focus, and how to formalize an actionable plan when migrating applications and internal services to the ...
May. 22, 2015 08:00 AM EDT Reads: 3,411
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
May. 22, 2015 08:00 AM EDT Reads: 3,929
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing...
May. 22, 2015 08:00 AM EDT Reads: 4,498
Most companies hope for rapid growth so it's important to invest in scalable core technologies that won't demand a complete overhaul when a business goes through a growth spurt. Cloud technology enables previously difficult-to-scale solutions like phone, network infrastructure or billing systems to automatically scale based on demand. For example, with a virtual PBX service, a single-user cloud phone service can easily transition into an advanced VoIP system that supports hundreds of phones and ...
May. 22, 2015 07:00 AM EDT Reads: 2,592
The recent trends like cloud computing, social, mobile and Internet of Things are forcing enterprises to modernize in order to compete in the competitive globalized markets. However, enterprises are approaching newer technologies with a more silo-ed way, gaining only sub optimal benefits. The Modern Enterprise model is presented as a newer way to think of enterprise IT, which takes a more holistic approach to embracing modern technologies.
May. 22, 2015 06:00 AM EDT Reads: 5,800
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developmen...
May. 22, 2015 06:00 AM EDT Reads: 1,999
Security can create serious friction for DevOps processes. We've come up with an approach to alleviate the friction and provide security value to DevOps teams. In her session at DevOps Summit, Shannon Lietz, Senior Manager of DevSecOps at Intuit, will discuss how DevSecOps got started and how it has evolved. Shannon Lietz has over two decades of experience pursuing next generation security solutions. She is currently the DevSecOps Leader for Intuit where she is responsible for setting and driv...
May. 22, 2015 06:00 AM EDT Reads: 3,689
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @Things...
May. 22, 2015 06:00 AM EDT Reads: 4,461
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
May. 22, 2015 06:00 AM EDT Reads: 4,642
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that ...
May. 22, 2015 05:45 AM EDT Reads: 6,247
“Oh, dev is dev and ops is ops, and never the twain shall meet.” With apoloies to Rudyard Kipling and all of his fans, this describes the early state of the two sides of DevOps. Yet the DevOps approach is demanded by cloud computing, as the speed, flexibility, and scalability in today's so-called “Third Platform” must not be hindered by the traditional limitations of software development and deployment. A recent report by Gartner, for example, says that 25% of Global 2000 companies will b...
May. 22, 2015 05:45 AM EDT Reads: 2,603