Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

BeyondTrust Earns Rare Perfect (A+) Grade in 2020 Orca Security Study of Vendor Virtual Appliance Offerings

November 12, 2020

  • Blog
  • Archive

Many software and cybersecurity organizations provide a virtual appliance deployment option for their solutions. Benefits of virtual appliances over hardware include both lower upfront costs and longer-term maintenance costs, simpler configuration, and the ease for deployment across cloud platforms. Of course, in the COVID-19 era, anything that can be deployed virtually as software as opposed to installed onsite via a human is also a big plus.

Yet, virtual appliance benefits can be undermined if the module itself introduces vulnerabilities within the customer’s environment. And, surprisingly, virtual appliance vulnerabilities are rife—even for offerings from some of the most well-respected names in cybersecurity, according to Orca Security’s 2020 State of Virtual Appliance Security report.

The Orca research study evaluated 2,218 virtual appliance offerings across 540 vendors. Orca scanned known vulnerabilities as well as other risks to provide an objective assessment score and ranking. Orca uncovered an astonishing 401,571 vulnerabilities across all solutions assessed!

BeyondTrust is proud to be one of a small, rarefied sliver of vendors that stood tall in the Orca study. Our BeyondInsight virtual appliance for our privileged access management (PAM) platform earned an A+ grade, along with less than 8% of all offerings in the study. No security issues were found with the BeyondTrust virtual appliance. BeyondTrust was also one of a handful of vendors highlighted several times in the report for the security robustness of our virtual appliance offering. On the opposite side of the spectrum, 15% of vendors in the report received failing (F) grades, including some IT security industry heavyweights.

One positive development from the Orca research is that 287 products have been updated and at least 36,938 vulnerabilities have since been addressed.

BeyondTrust Physical and Virtual Appliances: Built Secure

BeyondInsight is a comprehensive privileged access management platform that provides unified management, reporting, and threat analytics for BeyondTrust solutions. It maximizes visibility, simplifies deployment, automates tasks, improves security, and reduces privilege-related risks. BeyondInsight allows you to maintain complete and ongoing visibility and control over all privileges in your environment with a centralized management, reporting and analytics console.

To meet the needs of our diverse customer base, BeyondTrust offers flexible deployment options, including on-premise, cloud, and virtual appliances. BeyondTrust privileged access management appliances provide multi-platform network discovery, automated password and session management, centralized policy enforcement, least privilege enforcement, automated risk assessment, and powerful reporting, compliance, and regulatory audit capabilities. Appliances can be deployed in just 15 minutes.

BeyondTrust ensures robust security for our physical and virtual appliances by:

  • Hardening appliances to CIS standards
  • Disallowing installation of unapproved third-party applications
  • Enabling secure auto-updates via BeyondTrust Updater, which is embedded on the appliance
  • Providing a monthly release of Security Update Package Installer (SUPI), which are pre-screened security updates

BeyondTrust solutions are built secure by design to protect and enable the most security-conscious organizations in the world. Contact us today to learn how BeyondTrust can help you secure every privileged account, session, and asset across your enterprise.


Datasheets

BeyondTrust PAM Appliances

Whitepapers

Universal Privilege Management: The Journey to Securing Every Privilege, Every Time

Matt Miller

Senior Content Marketing Manager, BeyondTrust

Matt Miller is a Senior Content Marketing Manager at BeyondTrust. Prior to BeyondTrust, he developed and executed marketing strategies on cyber security and cloud technologies in roles at Accelerite (a business unit of Persistent Systems), WatchGuard Technologies, and Microsoft. Earlier in his career Matt held various roles in IR, marketing, and corporate communications in the biotech / biopharmaceutical industry. His experience and interests traverse cyber security, cloud / virtualization, IoT, economics, information governance, and risk management. He is also an avid homebrewer (working toward his Black Belt in beer) and writer.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Up next

From November 9, 2020:
Service Accounts – Don’t Overlook this Hidden Privileged Access Risk
From November 16, 2020:
Stop Ransomware Attacks like Ryuk with a Preventative Endpoint Security Approach

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.