Welcome!

News Feed Item

BeyondTrust Continues Momentum with Most Profitable Q1 in Company History

BeyondTrust®, the security industry's only provider of Context-Aware Security Intelligence, continues to build momentum as the global leader in Privileged Account Management and Vulnerability Management. The company finished fiscal 2013 strong as it experienced its fourth straight year of record profitably as evidenced by EBITDA margins approaching 40 percent. Corporate growth has been influenced by a number of factors over the last six months including; significant product updates, noteworthy customer traction and market partnerships, industry accolades, and key executive appointments, to position BeyondTrust for continued market advancement and growth.

Product Updates
BeyondTrust announced the release of BeyondInsight™, a new IT risk management platform that unifies two foundational security methodologies: Privileged Account Management and Vulnerability Management. BeyondInsight provides a common dashboard interface for multiple BeyondTrust solutions, offering centralized asset discovery, reporting, analytics, and other platform capabilities that enable unprecedented synchronization and collaboration between IT and Security operations.

The company continued to strengthen its standalone offerings as well. For instance, version 6.5 of PowerBroker for Windows, a desktop and server privilege management solution, introduced industry-first Vulnerability-Based Application Management (VBAM)™ capabilities. This patent-pending technology enforces least-privilege access based on an application’s known vulnerabilities, as well as their age, potential risk, and impact on regulatory compliance initiatives – and is currently included in the PowerBroker for Windows Risk Compliance module.

BeyondTrust also expanded its Vulnerability Management solution suite with the introduction of BeyondSaaS, an easy-to-use, cost effective cloud-based vulnerability assessment service. This offering enables customers to address requirements for scanning externally facing web pages and IP addresses per the Payment Card Industry Data Security Standard (PCI DSS) and other regulations. The BeyondSaaS release followed the launch of Retina Network Security Scanner Unlimited, a full-featured, unlimited-IP version of the industry’s most mature solution for scanning internal IT assets – priced competitively at $1,200 for a one-year subscription.

Strategic Partnerships/Customer Wins
In April 2014, the Defense Information Systems Agency (DISA) extended its contract with BeyondTrust to provide critical vulnerability assessment and management solutions for the U.S. Department of Defense (DoD). This extension marks the tenth anniversary of the working relationship between the two organizations.

BeyondTrust has grown to more than 4,000 customers and in Q1 2014 alone, experienced a 30% increase in new business bookings growth over Q1 2013. BeyondTrust customers include leading organizations in the government, aerospace and defense, media & entertainment, telecommunications, healthcare, pharmaceutical, education and financial services sectors. CoalFire, an independent information technology governance, risk and compliance (IT GRC) services firm mapped several BeyondTrust solutions to PCI DSS and HIPAA requirements, specifically with regard to VMware virtual IT environments.

Industry Recognition
BeyondTrust was selected as a Finalist for the upcoming Red Herring Top 100 North America awards, which recognizes “the most innovative and influential ventures across the North American high-tech industry.” The company will participate in the final round of judging at the Red Herring conference in May.

March 2014 marked the fifth anniversary of BeyondTrust as an Approved Scanning Vendor (ASV) for the PCI Security Standards Council. It was the company’s Retina Enterprise Vulnerability Management solution that successfully completed PCI Scanning Vendor Compliance Testing.

SC Magazine recognized BeyondTrust’s UVM20 Security Management Appliance with a 5-star rating, referring to it as a “solid product available as an appliance or software-only, and well worth your attention. It is our choice for Best Buy.”

Executive Leadership
BeyondTrust expanded its executive leadership team with the appointment of Kevin Hickey to President and CEO. Mr. Hickey joined BeyondTrust by way of the company's acquisition of eEye Digital Security where he served as Chief Executive Officer and Chairman. Under his leadership, eEye experienced significant growth, launched several market-first security solutions and brought the company back to category leadership. Mr. Hickey was recently chosen as a finalist for the EY Entrepreneur Of The Year™ 2014 Award in the Mountain Desert region. The awards program recognizes entrepreneurs who demonstrate excellence and extraordinary success in such areas as innovation, financial performance and personal commitment to their businesses and communities.

“2013 was a year of transition for BeyondTrust, as we prepared for accelerated growth in the vulnerability management and privileged account management markets,” said Kevin Hickey, President and CEO, BeyondTrust. “Given our record results thus far in 2014, it’s clear that both markets are indeed healthy and growing, and there are numerous opportunities in both the on-premise and SaaS portfolios. I’m very proud of the rapid growth we’re experiencing and am looking forward to our continued success in the years to come.”

About BeyondTrust
BeyondTrust empowers security-conscious organizations with Context-Aware Security Intelligence, delivering Privileged Account Management and Vulnerability Management solutions that reduce IT security risks and simplify compliance reporting across heterogeneous IT environments.

Our customers not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, they address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible. BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk.

More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include 8 of the world's 10 largest banks, 8 of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust
Twitter: http://twitter.com/beyondtrust
Blog: http://blog.beyondtrust.com
LinkedIn: http://www.linkedin.com/companies/beyondtrust
Facebook: http://www.facebook.com/beyondtrust

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software sec...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera M...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....