Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

BeyondTrust Named 'Top Innovative Vendor in Secure Identity Solutions’, Recognized for Outstanding Contributions Addressing IT Security in MEA Region

October 10, 2019

  • Blog
  • Archive

We all know that we live in a world where the volume, complexity, and intensity of cyber-attacks continue their upward trajectory. With the rise of IoT, cloud applications, virtual environments, etc., IT and security teams are confronted by an expanding attack surface and shifting targets.

CISO’s and their security teams must find ways to automate and secure privileged access and seamlessly manage privileged and non-privileged identities, while complying with industry-specific, regional, and/or global regulations that are increasing in number and scope, as well as in consequences for on-compliance. Indeed, to most regulatory organizations and analysts in the security market, controls around privileges/privileged access are now considered a core pillar of every organization’s cybersecurity strategy.

Enterprises in the Middle East and Africa (MEA) are no exception to this trend. Organizations across the region are increasingly adopting and maturing privileged access management (PAM) controls to more effectively protect critical data and infrastructure, while helping to cost-effectively shrink their threat surface.

Each year, the GEC Awards, which bills itself as “The Grammys, Oscar and Nobel prize of the Tech industry for the MEA region," hosts a lively industry awards gala. This event assembles the region’s top cybersecurity solution vendors and IT services providers to recognize the most outstanding contributions to the regional IT industry. Last week, in Dubai, BeyondTrust was thrilled to be recognized as Winner of the GEC Awards 2019 – Top Innovative Vendor in Secure Identity Solutions, for our privileged access management platform.

Over the past year, BeyondTrust has been acknowledged as a PAM Leader by the top analysts (Gartner, Forrester, KuppingerCole), and has won numerous other industry accolades across the globe. This latest award reflects the ongoing commitment and investment made by BeyondTrust to help regional (MEA) organizations secure their critical assets and infrastructure with robust, holistic, and yet, user-friendly, privileged access management solutions.

“The Middle East has been a strong market for BeyondTrust where we continue to make investments that pay off in better security and compliance readiness for our customers.” says John Hathaway, VP Middle East and India at BeyondTrust. ”We have made sure our team and partners have the skills and competencies to support our market and empower our customers with the best-in-class tools to address ever-evolving security challenges. Having a strong local presence also enables us to understand and quickly adjust to geopolitical issues that may arise in the region. Receiving this award is a great honor and a recognition of the work and dedication we have been able to provide for a number of years”.

John Hathaway, VP Middle East and India (MEI) at BeyondTrust, receives the GEC 'Top Innovative Vendor in Secure Identity Solutions' Award on behalf of the BeyondTrust MEI team.

If you want to better understand how to secure privileged access around your enterprise and seek expert guidance on the key capabilities and strategies to most cost-effectively drive down risk and improve business performance, check out The Complete Buyer’s Guide for Privileged Access Management.

Or, reach out directly to BeyondTrust here.

Astrid Kechichian

EMEA Marketing Specialist

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

Webcasts | January 27, 2021

AN ANALYST’S TAKE: Securing Privileged Identities & Remote Access in 2021

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.