BeyondTrust

Displaying 1-28 of 28 results

  • Case Studies // Mar 2015

    Technical College Reduces Malware and Extends Lifetime of PCs with PowerBroker for Windows

    A technical college in the United States, serving nearly 12,000 students in person and online. Their challenges are to eliminate risky, performance-clogging plugins and other unauthorized software installs. They chose BeyondTrust to overcome these challenges. They have deployed PowerBroker for Windows. The results of deploying BeyondTrust were enabled faculty and...

    Provided By BeyondTrust

  • Case Studies // Feb 2015

    RWE Supply & Trading Secures Against User and Asset-Based Risks

    RWE Supply & Trading is a leading energy trading house and a key player in the European energy sector. The European energy sector is undergoing fundamental changes, with subsidized expansion of renewables causing margins and utilization of conventional power stations to decline, thereby requiring energy providers to reduce costs. But...

    Provided By BeyondTrust

  • Case Studies // Feb 2015

    Major Telecom Company Migrates from NIS to Active Directory with BeyondTrust

    A major US-based telecom carrier had just completed an internal security audit. Their challenges are to internal security audits found that the company was not compliant with Sarbanes-Oxley; needed a more modern identity management structure. The company had a very inefficient user on-boarding and off-boarding process due to the size...

    Provided By BeyondTrust

  • Case Studies // Dec 2014

    DCI Exceeds Compliance Requirements for Privilege and Password Management

    DCI is a premier developer of core banking software and technologies, including the award winning iCore360 software used by hundreds of community banks nationwide. Their challenge is to secure and manage privileged accounts to meet audit and compliance requirements. They chose BeyondTrust to overcome this challenge. They have implemented PowerBroker...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Multinational Bank Integrates PBUL with its Own Custom Permissions System to Achieve Global Compliance

    As a globally recognized multinational banking and financial services company, this bank provides retail, wholesale and investment banking, as well as wealth management, mortgage lending and credit cards. Their challenges are they need to meet broad data privacy compliance requirements from over 99 countries. They chose BeyondTrust to overcome these...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Retail Giant, Gap Inc. Direct, Utilizes Red Hat And PowerBroker Identity Services \"AD Bridge\"

    The Gap Inc. is a specialty retailing firm that operates more than 3,100 retail and outlet stores within the United States and internationally. Their challenge is to ensure security and PCI compliance while managing system level access across the enterprise. They chose BeyondTrust to overcome this challenge. PBIS Enabled Gap...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Mobile Knowledge Stretches Their Security Budget with PowerBroker Endpoint Protection Platform

    Mobile Knowledge provides GPS, wireless and mobile data communications technology for fleet management applications. Their challenge is to improve zero-day protection, bolstering internal security and streamlining security administration. They chose BeyondTrust to overcome this challenge. They have implemented PowerBroker endpoint protection offered many more security features for the same price...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Off shore Call Center Locks Down Thousands of Linux Desktops

    This leading global financial services firm operates with more than 150,000 employees in over 50 countries. Their challenges are to manage the customer service division's offshore call center had grown to over 5,000 Linux desktops that needed to be better managed and secured. They chose BeyondTrust to overcome these challenges....

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Locknet Locks in Customer Loyalty with Beyondtrust

    Locknet provides managed security services to 400 customers, managing 2,500 end devices for customers. Their challenges are to find a way to conduct comprehensive vulnerability assessments from a centralized, remote location. They chose BeyondTrust to overcome these challenges. They have implemented retina network security scanner, a comprehensive vulnerability assessment tool...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Eide Bailly Technology Puts BeyondTrust to the Test

    Eide Bailly LLC technology and accounting services go hand in hand. As one of the country's top 25 accounting firms, Eide Bailly performs audits for a number of banks and financial institutions. Their challenge is to find a comprehensive vulnerability scanning solution to serve as the foundation for penetration testing...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Protecting the Grid: CCS and BeyondTrust Team up to Secure Power Plants

    Comprehensive Computer Solutions, Inc. has envisioned these scenarios. The company sells computing solutions designed for industrial applications. Their challenge is to finding a low-cost, highly effective hips solution to package with computing solutions for energy sector customers. They chose BeyondTrust to overcome this challenge. They have implemented PowerBroker endpoint protection...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    FFVA Mutual Insurance Company

    FFVA Mutual Insurance Company is specialty insurance provider focused on controlling costs for worker compensation insurance. Their challenge is to eliminate user admin rights exposing the enterprise to risks and vulnerabilities. They chose BeyondTrust to overcome this challenge. They have implemented BeyondTrust PowerBroker for windows with BeyondInsight allowed users to...

    Provided By BeyondTrust

  • Case Studies // Jan 2014

    XING Improves Security and Transparency of Access Rights with PowerBroker

    XING is the social network for business professionals. Their challenges are to ensure a higher level of security; improve transparency of access rights; use Active Directory (AD) integration; and reduce the time spent for setting up users and individual rights. They chose to PowerBroker from BeyondTrust overcome these challenges. They...

    Provided By BeyondTrust

  • Case Studies // Dec 2013

    A Higher Education Institution Faces the Challenge of Managing Necessary Resources with Limited Controls

    Gonzaga University is a private, four-year institution of higher education located in Spokane, Washington. Their challenge is to disparate and heterogeneous infrastructure with limited control over resources that absolutely have to be a part of the network. They chose BeyondTrust to overcome this challenge. They have implemented Retina CS delivered...

    Provided By BeyondTrust

  • Case Studies // Oct 2013

    Sensitivity of Data: Vulnerability Management and Compliance Risk Management

    DTI is the nation's largest independent provider of in-house and outsourced legal services and technology solutions. Their challenge is sensitivity of data: vulnerability management and compliance risk management. They chose BeyondTrust to overcome this challenge. They have deployed Retina CS which delivered the right information, in the proper context, to...

    Provided By BeyondTrust

  • Case Studies // Oct 2013

    Find It and Fix It: Integrated Vulnerability Management and Patching

    SM Energy company is an independent energy company engaged in the acquisition, exploration, development, and production of crude oil, natural gas and natural gas liquids in onshore North America. Their challenge is to find it and fix it: integrated vulnerability management and patching. They chose BeyondTrust to overcome this challenge....

    Provided By BeyondTrust

  • White Papers // May 2013

    Take Back Control of Your Active Directory Auditing

    Every organization needs to have management tools that allow them seamless control over all aspects of their Active Directory environment. Uptime is extremely important for every organization and every minute that Active Directory is not functioning properly could cause a financial loss. Administrators need tools that can provide them with...

    Provided By BeyondTrust

  • White Papers // Feb 2013

    Headlines vs. Reality: Survey Report: How Do IT Security Professionals Prioritize?

    In this report, BeyondTrust shares the results and analysis of a recent industry survey. Cyber threats that don’t make headlines are in fact the ones causing concern for IT security professionals. The survey, which polled 1677 respondents, demonstrated that headline-driving attacks are not what keep IT security professionals or executives...

    Provided By BeyondTrust

  • White Papers // Feb 2013

    The Need for Vulnerability Assessment and Remediation: What My CIO Needs to Know

    This paper examines the importance of vulnerability assessment and the common myths surrounding security protection. Today’s network environments are dynamic, requiring a multitude of defense measures to effectively prevent attacks and efficiently mitigate vulnerabilities across the entire enterprise. Organizations must not only be aware of threats, but also the impact...

    Provided By BeyondTrust

  • White Papers // Jan 2013

    Avoiding the Top 5 Vulnerability Management Mistakes

    This guide will outline the top five mistakes around vulnerability management and how to avoid them to protect critical IT assets and improve your security posture, while reducing costs.

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    BeyondTrust Protects High School from Dangerous Computing Activities

    Bishop Verot Catholic High School in Fort Myers, Florida provides students with a number of PCs that they can use to complete homework or conduct research. Their challenges are to enforcing security policies that prevent students from accessing unauthorized sites without hindering their school work, protecting against malware; securing internal...

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    The Washington Savings Bank Cuts Recurring Costs with PowerBroker Endpoint Protection Platform

    The Washington Savings Bank (TWSB) was unhappy with its endpoint security headquartered in Bowie, Maryland. Their challenges are to finding lower-cost endpoint protection with additional integrated features beyond AV, including antispyware protection, intrusion prevention and vulnerability scanning. They chose BeyondTrust to overcome these challenge. They have implemented PowerBroker Endpoint Protection...

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    Central Florida Educators Federal Credit Union Switches to PowerBroker Endpoint Protection Platform

    The Central Florida Educators Federal Credit Union (CFE) was having problems with its endpoint security. Their challenge is to finding an integrated security suite that protect s robust endpoints, such as workstations, while protecting servers and virtualized computing environments. They chose BeyondTrust to overcome this challenge. They have deployed integrated...

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    Brazil's Credit Union SICREDI Selects BeyondTrust's Retina Scanner to Tame its Network Security Issues

    SICREDI, which has branches across central and southern Brazil, serves approximately 1.5 million customers. Their challenge is to finding a comprehensive vulnerability scanning solution to help them regain control of their heterogeneous network. They chose BeyondTrust to overcome this challenge. They have implemented Retina network security scanner. The results of...

    Provided By BeyondTrust

  • White Papers // Dec 2011

    How to Avoid the High Cost of Security Audits

    The majority of today's security regulations are centered on identity and policy management. These most directly affect companies serving the government, processing credit card payments, or handling medical or financial records. Let us walk you through the advantages and disadvantages of each approach.

    Provided By BeyondTrust

  • Case Studies // May 2010

    VistaPrint Improves Security, Meets Productivity Demands

    VistaPrint is a leading online supplier of high-quality graphic design services. VistaPrint wanted to achieve a least privilege user environment and reduce virus and malware security issues at its call center without jeopardizing employee productivity. They chose BeyondTrust PowerBroker to overcome this challenge. VistaPrint began using BeyondTrust PowerBroker for desktops...

    Provided By BeyondTrust

  • White Papers // May 2010

    BeyondTrust PowerBroker for Virtualization

    PowerBroker for Virtualization provides a dedicated solution to centrally address risks from unmanaged administrative privileges in virtualized datacenter environments. In a secure and compliant environment, users privileged access to virtual resources are managed to give them access to only what they need to do their job. PowerBroker for Virtualization provides...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    A Process Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance

    This white paper outlines a sound process-based approach in protecting critical privileged accounts that are found in virtually every application, database and infrastructure device throughout enterprises. This paper will present BeyondTrust PowerKeeper as a solution to secure passwords for privileged accounts in heterogeneous IT environments. Through features such as automated...

    Provided By BeyondTrust

  • White Papers // May 2010

    BeyondTrust PowerBroker for Virtualization

    PowerBroker for Virtualization provides a dedicated solution to centrally address risks from unmanaged administrative privileges in virtualized datacenter environments. In a secure and compliant environment, users privileged access to virtual resources are managed to give them access to only what they need to do their job. PowerBroker for Virtualization provides...

    Provided By BeyondTrust

  • White Papers // Oct 2009

    A Process Approach to Protecting Privileged Accounts & Meeting Regulatory Compliance

    This white paper outlines a sound process-based approach in protecting critical privileged accounts that are found in virtually every application, database and infrastructure device throughout enterprises. This paper will present BeyondTrust PowerKeeper as a solution to secure passwords for privileged accounts in heterogeneous IT environments. Through features such as automated...

    Provided By BeyondTrust

  • White Papers // Feb 2013

    Headlines vs. Reality: Survey Report: How Do IT Security Professionals Prioritize?

    In this report, BeyondTrust shares the results and analysis of a recent industry survey. Cyber threats that don’t make headlines are in fact the ones causing concern for IT security professionals. The survey, which polled 1677 respondents, demonstrated that headline-driving attacks are not what keep IT security professionals or executives...

    Provided By BeyondTrust

  • White Papers // Feb 2013

    The Need for Vulnerability Assessment and Remediation: What My CIO Needs to Know

    This paper examines the importance of vulnerability assessment and the common myths surrounding security protection. Today’s network environments are dynamic, requiring a multitude of defense measures to effectively prevent attacks and efficiently mitigate vulnerabilities across the entire enterprise. Organizations must not only be aware of threats, but also the impact...

    Provided By BeyondTrust

  • White Papers // Dec 2011

    How to Avoid the High Cost of Security Audits

    The majority of today's security regulations are centered on identity and policy management. These most directly affect companies serving the government, processing credit card payments, or handling medical or financial records. Let us walk you through the advantages and disadvantages of each approach.

    Provided By BeyondTrust

  • White Papers // Jan 2013

    Avoiding the Top 5 Vulnerability Management Mistakes

    This guide will outline the top five mistakes around vulnerability management and how to avoid them to protect critical IT assets and improve your security posture, while reducing costs.

    Provided By BeyondTrust

  • White Papers // May 2013

    Take Back Control of Your Active Directory Auditing

    Every organization needs to have management tools that allow them seamless control over all aspects of their Active Directory environment. Uptime is extremely important for every organization and every minute that Active Directory is not functioning properly could cause a financial loss. Administrators need tools that can provide them with...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Multinational Bank Integrates PBUL with its Own Custom Permissions System to Achieve Global Compliance

    As a globally recognized multinational banking and financial services company, this bank provides retail, wholesale and investment banking, as well as wealth management, mortgage lending and credit cards. Their challenges are they need to meet broad data privacy compliance requirements from over 99 countries. They chose BeyondTrust to overcome these...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Retail Giant, Gap Inc. Direct, Utilizes Red Hat And PowerBroker Identity Services \"AD Bridge\"

    The Gap Inc. is a specialty retailing firm that operates more than 3,100 retail and outlet stores within the United States and internationally. Their challenge is to ensure security and PCI compliance while managing system level access across the enterprise. They chose BeyondTrust to overcome this challenge. PBIS Enabled Gap...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Off shore Call Center Locks Down Thousands of Linux Desktops

    This leading global financial services firm operates with more than 150,000 employees in over 50 countries. Their challenges are to manage the customer service division's offshore call center had grown to over 5,000 Linux desktops that needed to be better managed and secured. They chose BeyondTrust to overcome these challenges....

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    FFVA Mutual Insurance Company

    FFVA Mutual Insurance Company is specialty insurance provider focused on controlling costs for worker compensation insurance. Their challenge is to eliminate user admin rights exposing the enterprise to risks and vulnerabilities. They chose BeyondTrust to overcome this challenge. They have implemented BeyondTrust PowerBroker for windows with BeyondInsight allowed users to...

    Provided By BeyondTrust

  • Case Studies // Jan 2014

    XING Improves Security and Transparency of Access Rights with PowerBroker

    XING is the social network for business professionals. Their challenges are to ensure a higher level of security; improve transparency of access rights; use Active Directory (AD) integration; and reduce the time spent for setting up users and individual rights. They chose to PowerBroker from BeyondTrust overcome these challenges. They...

    Provided By BeyondTrust

  • Case Studies // May 2010

    VistaPrint Improves Security, Meets Productivity Demands

    VistaPrint is a leading online supplier of high-quality graphic design services. VistaPrint wanted to achieve a least privilege user environment and reduce virus and malware security issues at its call center without jeopardizing employee productivity. They chose BeyondTrust PowerBroker to overcome this challenge. VistaPrint began using BeyondTrust PowerBroker for desktops...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Locknet Locks in Customer Loyalty with Beyondtrust

    Locknet provides managed security services to 400 customers, managing 2,500 end devices for customers. Their challenges are to find a way to conduct comprehensive vulnerability assessments from a centralized, remote location. They chose BeyondTrust to overcome these challenges. They have implemented retina network security scanner, a comprehensive vulnerability assessment tool...

    Provided By BeyondTrust

  • Case Studies // Feb 2015

    RWE Supply & Trading Secures Against User and Asset-Based Risks

    RWE Supply & Trading is a leading energy trading house and a key player in the European energy sector. The European energy sector is undergoing fundamental changes, with subsidized expansion of renewables causing margins and utilization of conventional power stations to decline, thereby requiring energy providers to reduce costs. But...

    Provided By BeyondTrust

  • Case Studies // Dec 2014

    DCI Exceeds Compliance Requirements for Privilege and Password Management

    DCI is a premier developer of core banking software and technologies, including the award winning iCore360 software used by hundreds of community banks nationwide. Their challenge is to secure and manage privileged accounts to meet audit and compliance requirements. They chose BeyondTrust to overcome this challenge. They have implemented PowerBroker...

    Provided By BeyondTrust

  • Case Studies // Feb 2015

    Major Telecom Company Migrates from NIS to Active Directory with BeyondTrust

    A major US-based telecom carrier had just completed an internal security audit. Their challenges are to internal security audits found that the company was not compliant with Sarbanes-Oxley; needed a more modern identity management structure. The company had a very inefficient user on-boarding and off-boarding process due to the size...

    Provided By BeyondTrust

  • Case Studies // Mar 2015

    Technical College Reduces Malware and Extends Lifetime of PCs with PowerBroker for Windows

    A technical college in the United States, serving nearly 12,000 students in person and online. Their challenges are to eliminate risky, performance-clogging plugins and other unauthorized software installs. They chose BeyondTrust to overcome these challenges. They have deployed PowerBroker for Windows. The results of deploying BeyondTrust were enabled faculty and...

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    The Washington Savings Bank Cuts Recurring Costs with PowerBroker Endpoint Protection Platform

    The Washington Savings Bank (TWSB) was unhappy with its endpoint security headquartered in Bowie, Maryland. Their challenges are to finding lower-cost endpoint protection with additional integrated features beyond AV, including antispyware protection, intrusion prevention and vulnerability scanning. They chose BeyondTrust to overcome these challenge. They have implemented PowerBroker Endpoint Protection...

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    BeyondTrust Protects High School from Dangerous Computing Activities

    Bishop Verot Catholic High School in Fort Myers, Florida provides students with a number of PCs that they can use to complete homework or conduct research. Their challenges are to enforcing security policies that prevent students from accessing unauthorized sites without hindering their school work, protecting against malware; securing internal...

    Provided By BeyondTrust

  • Case Studies // Oct 2013

    Sensitivity of Data: Vulnerability Management and Compliance Risk Management

    DTI is the nation's largest independent provider of in-house and outsourced legal services and technology solutions. Their challenge is sensitivity of data: vulnerability management and compliance risk management. They chose BeyondTrust to overcome this challenge. They have deployed Retina CS which delivered the right information, in the proper context, to...

    Provided By BeyondTrust

  • Case Studies // Dec 2013

    A Higher Education Institution Faces the Challenge of Managing Necessary Resources with Limited Controls

    Gonzaga University is a private, four-year institution of higher education located in Spokane, Washington. Their challenge is to disparate and heterogeneous infrastructure with limited control over resources that absolutely have to be a part of the network. They chose BeyondTrust to overcome this challenge. They have implemented Retina CS delivered...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Eide Bailly Technology Puts BeyondTrust to the Test

    Eide Bailly LLC technology and accounting services go hand in hand. As one of the country's top 25 accounting firms, Eide Bailly performs audits for a number of banks and financial institutions. Their challenge is to find a comprehensive vulnerability scanning solution to serve as the foundation for penetration testing...

    Provided By BeyondTrust

  • Case Studies // Oct 2013

    Find It and Fix It: Integrated Vulnerability Management and Patching

    SM Energy company is an independent energy company engaged in the acquisition, exploration, development, and production of crude oil, natural gas and natural gas liquids in onshore North America. Their challenge is to find it and fix it: integrated vulnerability management and patching. They chose BeyondTrust to overcome this challenge....

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Mobile Knowledge Stretches Their Security Budget with PowerBroker Endpoint Protection Platform

    Mobile Knowledge provides GPS, wireless and mobile data communications technology for fleet management applications. Their challenge is to improve zero-day protection, bolstering internal security and streamlining security administration. They chose BeyondTrust to overcome this challenge. They have implemented PowerBroker endpoint protection offered many more security features for the same price...

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    Central Florida Educators Federal Credit Union Switches to PowerBroker Endpoint Protection Platform

    The Central Florida Educators Federal Credit Union (CFE) was having problems with its endpoint security. Their challenge is to finding an integrated security suite that protect s robust endpoints, such as workstations, while protecting servers and virtualized computing environments. They chose BeyondTrust to overcome this challenge. They have deployed integrated...

    Provided By BeyondTrust

  • Case Studies // Nov 2012

    Brazil's Credit Union SICREDI Selects BeyondTrust's Retina Scanner to Tame its Network Security Issues

    SICREDI, which has branches across central and southern Brazil, serves approximately 1.5 million customers. Their challenge is to finding a comprehensive vulnerability scanning solution to help them regain control of their heterogeneous network. They chose BeyondTrust to overcome this challenge. They have implemented Retina network security scanner. The results of...

    Provided By BeyondTrust

  • Case Studies // Aug 2014

    Protecting the Grid: CCS and BeyondTrust Team up to Secure Power Plants

    Comprehensive Computer Solutions, Inc. has envisioned these scenarios. The company sells computing solutions designed for industrial applications. Their challenge is to finding a low-cost, highly effective hips solution to package with computing solutions for energy sector customers. They chose BeyondTrust to overcome this challenge. They have implemented PowerBroker endpoint protection...

    Provided By BeyondTrust