NEW: Microsoft Vulnerabilities Report 2022 - Read the Findings of Our Annual Report Read Now

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

BeyondTrust Named 'Top Innovative Vendor in Secure Identity Solutions’, Recognized for Outstanding Contributions Addressing IT Security in MEA Region

October 10, 2019

  • Blog
  • Archive

We all know that we live in a world where the volume, complexity, and intensity of cyber-attacks continue their upward trajectory. With the rise of IoT, cloud applications, virtual environments, etc., IT and security teams are confronted by an expanding attack surface and shifting targets.

CISO’s and their security teams must find ways to automate and secure privileged access and seamlessly manage privileged and non-privileged identities, while complying with industry-specific, regional, and/or global regulations that are increasing in number and scope, as well as in consequences for on-compliance. Indeed, to most regulatory organizations and analysts in the security market, controls around privileges/privileged access are now considered a core pillar of every organization’s cybersecurity strategy.

Enterprises in the Middle East and Africa (MEA) are no exception to this trend. Organizations across the region are increasingly adopting and maturing privileged access management (PAM) controls to more effectively protect critical data and infrastructure, while helping to cost-effectively shrink their threat surface.

Each year, the GEC Awards, which bills itself as “The Grammys, Oscar and Nobel prize of the Tech industry for the MEA region," hosts a lively industry awards gala. This event assembles the region’s top cybersecurity solution vendors and IT services providers to recognize the most outstanding contributions to the regional IT industry. Last week, in Dubai, BeyondTrust was thrilled to be recognized as Winner of the GEC Awards 2019 – Top Innovative Vendor in Secure Identity Solutions, for our privileged access management platform.

Over the past year, BeyondTrust has been acknowledged as a PAM Leader by the top analysts (Gartner, Forrester, KuppingerCole), and has won numerous other industry accolades across the globe. This latest award reflects the ongoing commitment and investment made by BeyondTrust to help regional (MEA) organizations secure their critical assets and infrastructure with robust, holistic, and yet, user-friendly, privileged access management solutions.

“The Middle East has been a strong market for BeyondTrust where we continue to make investments that pay off in better security and compliance readiness for our customers.” says John Hathaway, VP Middle East and India at BeyondTrust. ”We have made sure our team and partners have the skills and competencies to support our market and empower our customers with the best-in-class tools to address ever-evolving security challenges. Having a strong local presence also enables us to understand and quickly adjust to geopolitical issues that may arise in the region. Receiving this award is a great honor and a recognition of the work and dedication we have been able to provide for a number of years”.

John Hathaway, VP Middle East and India (MEI) at BeyondTrust, receives the GEC 'Top Innovative Vendor in Secure Identity Solutions' Award on behalf of the BeyondTrust MEI team.

If you want to better understand how to secure privileged access around your enterprise and seek expert guidance on the key capabilities and strategies to most cost-effectively drive down risk and improve business performance, check out The Complete Buyer’s Guide for Privileged Access Management.

Or, reach out directly to BeyondTrust here.

Photograph of Astrid Kechichian

Astrid Kechichian, EMEA Marketing Specialist

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Privileged Access Management: PAM Checklist

Whitepapers

Azure PIM vs. BeyondTrust PAM

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.