Welcome!

News Feed Item

BeyondTrust Continues Momentum with Most Profitable Q1 in Company History

BeyondTrust®, the security industry's only provider of Context-Aware Security Intelligence, continues to build momentum as the global leader in Privileged Account Management and Vulnerability Management. The company finished fiscal 2013 strong as it experienced its fourth straight year of record profitably as evidenced by EBITDA margins approaching 40 percent. Corporate growth has been influenced by a number of factors over the last six months including; significant product updates, noteworthy customer traction and market partnerships, industry accolades, and key executive appointments, to position BeyondTrust for continued market advancement and growth.

Product Updates
BeyondTrust announced the release of BeyondInsight™, a new IT risk management platform that unifies two foundational security methodologies: Privileged Account Management and Vulnerability Management. BeyondInsight provides a common dashboard interface for multiple BeyondTrust solutions, offering centralized asset discovery, reporting, analytics, and other platform capabilities that enable unprecedented synchronization and collaboration between IT and Security operations.

The company continued to strengthen its standalone offerings as well. For instance, version 6.5 of PowerBroker for Windows, a desktop and server privilege management solution, introduced industry-first Vulnerability-Based Application Management (VBAM)™ capabilities. This patent-pending technology enforces least-privilege access based on an application’s known vulnerabilities, as well as their age, potential risk, and impact on regulatory compliance initiatives – and is currently included in the PowerBroker for Windows Risk Compliance module.

BeyondTrust also expanded its Vulnerability Management solution suite with the introduction of BeyondSaaS, an easy-to-use, cost effective cloud-based vulnerability assessment service. This offering enables customers to address requirements for scanning externally facing web pages and IP addresses per the Payment Card Industry Data Security Standard (PCI DSS) and other regulations. The BeyondSaaS release followed the launch of Retina Network Security Scanner Unlimited, a full-featured, unlimited-IP version of the industry’s most mature solution for scanning internal IT assets – priced competitively at $1,200 for a one-year subscription.

Strategic Partnerships/Customer Wins
In April 2014, the Defense Information Systems Agency (DISA) extended its contract with BeyondTrust to provide critical vulnerability assessment and management solutions for the U.S. Department of Defense (DoD). This extension marks the tenth anniversary of the working relationship between the two organizations.

BeyondTrust has grown to more than 4,000 customers and in Q1 2014 alone, experienced a 30% increase in new business bookings growth over Q1 2013. BeyondTrust customers include leading organizations in the government, aerospace and defense, media & entertainment, telecommunications, healthcare, pharmaceutical, education and financial services sectors. CoalFire, an independent information technology governance, risk and compliance (IT GRC) services firm mapped several BeyondTrust solutions to PCI DSS and HIPAA requirements, specifically with regard to VMware virtual IT environments.

Industry Recognition
BeyondTrust was selected as a Finalist for the upcoming Red Herring Top 100 North America awards, which recognizes “the most innovative and influential ventures across the North American high-tech industry.” The company will participate in the final round of judging at the Red Herring conference in May.

March 2014 marked the fifth anniversary of BeyondTrust as an Approved Scanning Vendor (ASV) for the PCI Security Standards Council. It was the company’s Retina Enterprise Vulnerability Management solution that successfully completed PCI Scanning Vendor Compliance Testing.

SC Magazine recognized BeyondTrust’s UVM20 Security Management Appliance with a 5-star rating, referring to it as a “solid product available as an appliance or software-only, and well worth your attention. It is our choice for Best Buy.”

Executive Leadership
BeyondTrust expanded its executive leadership team with the appointment of Kevin Hickey to President and CEO. Mr. Hickey joined BeyondTrust by way of the company's acquisition of eEye Digital Security where he served as Chief Executive Officer and Chairman. Under his leadership, eEye experienced significant growth, launched several market-first security solutions and brought the company back to category leadership. Mr. Hickey was recently chosen as a finalist for the EY Entrepreneur Of The Year™ 2014 Award in the Mountain Desert region. The awards program recognizes entrepreneurs who demonstrate excellence and extraordinary success in such areas as innovation, financial performance and personal commitment to their businesses and communities.

“2013 was a year of transition for BeyondTrust, as we prepared for accelerated growth in the vulnerability management and privileged account management markets,” said Kevin Hickey, President and CEO, BeyondTrust. “Given our record results thus far in 2014, it’s clear that both markets are indeed healthy and growing, and there are numerous opportunities in both the on-premise and SaaS portfolios. I’m very proud of the rapid growth we’re experiencing and am looking forward to our continued success in the years to come.”

About BeyondTrust
BeyondTrust empowers security-conscious organizations with Context-Aware Security Intelligence, delivering Privileged Account Management and Vulnerability Management solutions that reduce IT security risks and simplify compliance reporting across heterogeneous IT environments.

Our customers not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, they address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible. BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk.

More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include 8 of the world's 10 largest banks, 8 of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust
Twitter: http://twitter.com/beyondtrust
Blog: http://blog.beyondtrust.com
LinkedIn: http://www.linkedin.com/companies/beyondtrust
Facebook: http://www.facebook.com/beyondtrust

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Did you know that you can develop for mainframes in Java? Or that the testing and deployment can be automated across mobile to mainframe? In his session at @DevOpsSummit at 20th Cloud Expo, Vaughn Marshall, Sr. Principal Product Owner at CA Technologies, will discuss and demo how increasingly teams are developing with agile methodologies using modern development environments and automating testing and deployments, mobile to mainframe.
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process that binds all application delivery stages together into one well-orchestrated machine: Continuous Testing. Continuous Testing is the conveyor belt between the Software Factory and production stages. Artifacts are ...
SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network...
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In his Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, will explore t...
NHK, Japan Broadcasting, will feature the upcoming @ThingsExpo Silicon Valley in a special 'Internet of Things' and smart technology documentary that will be filmed on the expo floor between November 3 to 5, 2015, in Santa Clara. NHK is the sole public TV network in Japan equivalent to the BBC in the UK and the largest in Asia with many award-winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology and will be covering @ThingsExpo Silicon Val...
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory?
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists will examine how DevOps helps to meet th...
SYS-CON Events announced today that Hitachi Data Systems, a wholly owned subsidiary of Hitachi LTD., will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City. Hitachi Data Systems (HDS) will be featuring the Hitachi Content Platform (HCP) portfolio. This is the industry’s only offering that allows organizations to bring together object storage, file sync and share, cloud storage gateways, and sophisticated search an...
SYS-CON Events announced today that Hitachi, the leading provider the Internet of Things and Digital Transformation, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Hitachi Data Systems, a wholly owned subsidiary of Hitachi, Ltd., offers an integrated portfolio of services and solutions that enable digital transformation through enhanced data management, governance, mobility and analytics. We help globa...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTred processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across supply chain networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost and time for product recall as well as advance trade. Are you curious about Blockchain and how it can provide you with new opportunities for innovation and growth? In her session at 20th Cloud Exp...
Cloud promises the agility required by today’s digital businesses. As organizations adopt cloud based infrastructures and services, their IT resources become increasingly dynamic and hybrid in nature. Managing these require modern IT operations and tools. In his session at 20th Cloud Expo, Raj Sundaram, Senior Principal Product Manager at CA Technologies, will discuss how to modernize your IT operations in order to proactively manage your hybrid cloud and IT environments. He will be sharing be...
While some vendors scramble to create and sell you a fancy solution for monitoring your spanking new Amazon Lambdas, hear how you can do it on the cheap using just built-in Java APIs yourself. By exploiting a little-known fact that Lambdas aren’t exactly single threaded, you can effectively identify hot spots in your serverless code. In his session at 20th Cloud Expo, David Martin, Principal Product Owner at CA Technologies, will give a live demonstration and code walkthrough, showing how to o...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...