Welcome!

News Feed Item

BeyondTrust Continues Momentum with Most Profitable Q1 in Company History

BeyondTrust®, the security industry's only provider of Context-Aware Security Intelligence, continues to build momentum as the global leader in Privileged Account Management and Vulnerability Management. The company finished fiscal 2013 strong as it experienced its fourth straight year of record profitably as evidenced by EBITDA margins approaching 40 percent. Corporate growth has been influenced by a number of factors over the last six months including; significant product updates, noteworthy customer traction and market partnerships, industry accolades, and key executive appointments, to position BeyondTrust for continued market advancement and growth.

Product Updates
BeyondTrust announced the release of BeyondInsight™, a new IT risk management platform that unifies two foundational security methodologies: Privileged Account Management and Vulnerability Management. BeyondInsight provides a common dashboard interface for multiple BeyondTrust solutions, offering centralized asset discovery, reporting, analytics, and other platform capabilities that enable unprecedented synchronization and collaboration between IT and Security operations.

The company continued to strengthen its standalone offerings as well. For instance, version 6.5 of PowerBroker for Windows, a desktop and server privilege management solution, introduced industry-first Vulnerability-Based Application Management (VBAM)™ capabilities. This patent-pending technology enforces least-privilege access based on an application’s known vulnerabilities, as well as their age, potential risk, and impact on regulatory compliance initiatives – and is currently included in the PowerBroker for Windows Risk Compliance module.

BeyondTrust also expanded its Vulnerability Management solution suite with the introduction of BeyondSaaS, an easy-to-use, cost effective cloud-based vulnerability assessment service. This offering enables customers to address requirements for scanning externally facing web pages and IP addresses per the Payment Card Industry Data Security Standard (PCI DSS) and other regulations. The BeyondSaaS release followed the launch of Retina Network Security Scanner Unlimited, a full-featured, unlimited-IP version of the industry’s most mature solution for scanning internal IT assets – priced competitively at $1,200 for a one-year subscription.

Strategic Partnerships/Customer Wins
In April 2014, the Defense Information Systems Agency (DISA) extended its contract with BeyondTrust to provide critical vulnerability assessment and management solutions for the U.S. Department of Defense (DoD). This extension marks the tenth anniversary of the working relationship between the two organizations.

BeyondTrust has grown to more than 4,000 customers and in Q1 2014 alone, experienced a 30% increase in new business bookings growth over Q1 2013. BeyondTrust customers include leading organizations in the government, aerospace and defense, media & entertainment, telecommunications, healthcare, pharmaceutical, education and financial services sectors. CoalFire, an independent information technology governance, risk and compliance (IT GRC) services firm mapped several BeyondTrust solutions to PCI DSS and HIPAA requirements, specifically with regard to VMware virtual IT environments.

Industry Recognition
BeyondTrust was selected as a Finalist for the upcoming Red Herring Top 100 North America awards, which recognizes “the most innovative and influential ventures across the North American high-tech industry.” The company will participate in the final round of judging at the Red Herring conference in May.

March 2014 marked the fifth anniversary of BeyondTrust as an Approved Scanning Vendor (ASV) for the PCI Security Standards Council. It was the company’s Retina Enterprise Vulnerability Management solution that successfully completed PCI Scanning Vendor Compliance Testing.

SC Magazine recognized BeyondTrust’s UVM20 Security Management Appliance with a 5-star rating, referring to it as a “solid product available as an appliance or software-only, and well worth your attention. It is our choice for Best Buy.”

Executive Leadership
BeyondTrust expanded its executive leadership team with the appointment of Kevin Hickey to President and CEO. Mr. Hickey joined BeyondTrust by way of the company's acquisition of eEye Digital Security where he served as Chief Executive Officer and Chairman. Under his leadership, eEye experienced significant growth, launched several market-first security solutions and brought the company back to category leadership. Mr. Hickey was recently chosen as a finalist for the EY Entrepreneur Of The Year™ 2014 Award in the Mountain Desert region. The awards program recognizes entrepreneurs who demonstrate excellence and extraordinary success in such areas as innovation, financial performance and personal commitment to their businesses and communities.

“2013 was a year of transition for BeyondTrust, as we prepared for accelerated growth in the vulnerability management and privileged account management markets,” said Kevin Hickey, President and CEO, BeyondTrust. “Given our record results thus far in 2014, it’s clear that both markets are indeed healthy and growing, and there are numerous opportunities in both the on-premise and SaaS portfolios. I’m very proud of the rapid growth we’re experiencing and am looking forward to our continued success in the years to come.”

About BeyondTrust
BeyondTrust empowers security-conscious organizations with Context-Aware Security Intelligence, delivering Privileged Account Management and Vulnerability Management solutions that reduce IT security risks and simplify compliance reporting across heterogeneous IT environments.

Our customers not only mitigate user-based risks arising from misuse of system or device privileges, but also identify and remediate asset vulnerabilities targeted by cyber attacks. As a result, they address both internal and external threats, while making every device – physical, virtual, mobile and cloud – as secure as possible. BeyondTrust solutions are unified under the BeyondInsight IT Risk Management Platform, which provides IT and security teams a single, contextual lens through which to view user and asset risk.

More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include 8 of the world's 10 largest banks, 8 of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust
Twitter: http://twitter.com/beyondtrust
Blog: http://blog.beyondtrust.com
LinkedIn: http://www.linkedin.com/companies/beyondtrust
Facebook: http://www.facebook.com/beyondtrust

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Microsoft Azure Container Services can be used for container deployment in a variety of ways including support for Orchestrators like Kubernetes, Docker Swarm and Mesos. However, the abstraction for app development that support application self-healing, scaling and so on may not be at the right level. Helm and Draft makes this a lot easier. In this primarily demo-driven session at @DevOpsSummit at 21st Cloud Expo, Raghavan "Rags" Srinivas, a Cloud Solutions Architect/Evangelist at Microsoft, wi...
Though cloud is the future of enterprise computing, a smooth transition of legacy applications and systems is critical for seamless business operations. IT professionals are eager to start leveraging the cost, scale and other benefits of cloud, but with massive investments already in place in existing infrastructure and a number of compliance and resource hurdles, it can be challenging to move to a cloud-based infrastructure.
Containers are rapidly finding their way into enterprise data centers, but change is difficult. How do enterprises transform their architecture with technologies like containers without losing the reliable components of their current solutions? In his session at @DevOpsSummit at 21st Cloud Expo, Tony Campbell, Director, Educational Services at CoreOS, will explore the challenges organizations are facing today as they move to containers and go over how Kubernetes applications can deploy with lega...
SYS-CON Events announced today that Avere Systems, a leading provider of hybrid cloud enablement solutions, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere Systems was created by file systems experts determined to reinvent storage by changing the way enterprises thought about and bought storage resources. With decades of experience behind the company’s founders, Avere got its ...
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
We all know that end users experience the Internet primarily with mobile devices. From an app development perspective, we know that successfully responding to the needs of mobile customers depends on rapid DevOps – failing fast, in short, until the right solution evolves in your customers' relationship to your business. Whether you’re decomposing an SOA monolith, or developing a new application cloud natively, it’s not a question of using microservices – not doing so will be a path to eventual b...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
As you move to the cloud, your network should be efficient, secure, and easy to manage. An enterprise adopting a hybrid or public cloud needs systems and tools that provide: Agility: ability to deliver applications and services faster, even in complex hybrid environments Easier manageability: enable reliable connectivity with complete oversight as the data center network evolves Greater efficiency: eliminate wasted effort while reducing errors and optimize asset utilization Security: imple...
High-velocity engineering teams are applying not only continuous delivery processes, but also lessons in experimentation from established leaders like Amazon, Netflix, and Facebook. These companies have made experimentation a foundation for their release processes, allowing them to try out major feature releases and redesigns within smaller groups before making them broadly available. In his session at 21st Cloud Expo, Brian Lucas, Senior Staff Engineer at Optimizely, will discuss how by using...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
The session is centered around the tracing of systems on cloud using technologies like ebpf. The goal is to talk about what this technology is all about and what purpose it serves. In his session at 21st Cloud Expo, Shashank Jain, Development Architect at SAP, will touch upon concepts of observability in the cloud and also some of the challenges we have. Generally most cloud-based monitoring tools capture details at a very granular level. To troubleshoot problems this might not be good enough.
Companies are harnessing data in ways we once associated with science fiction. Analysts have access to a plethora of visualization and reporting tools, but considering the vast amount of data businesses collect and limitations of CPUs, end users are forced to design their structures and systems with limitations. Until now. As the cloud toolkit to analyze data has evolved, GPUs have stepped in to massively parallel SQL, visualization and machine learning.
SYS-CON Events announced today that CAST Software will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CAST was founded more than 25 years ago to make the invisible visible. Built around the idea that even the best analytics on the market still leave blind spots for technical teams looking to deliver better software and prevent outages, CAST provides the software intelligence that matter ...
SYS-CON Events announced today that Daiya Industry will exhibit at the Japanese Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Ruby Development Inc. builds new services in short period of time and provides a continuous support of those services based on Ruby on Rails. For more information, please visit https://github.com/RubyDevInc.
The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especially great option for projects that require multiple and frequent contributions to be integrated. But… securing CICD best practices is an emerging, essential, yet little understood practice for DevOps teams and their Cloud Service Providers. The only way to get CICD to work in a highly secure environment takes collaboration, patience and persistence. Building CICD in the cloud requires rigorous ar...