Cybersecurity Insurance Checklist - Meet Insurance Requirements with BeyondTrust PAM Download for Free

  • Partners
  • Support
  • Careers
  • English
    • Deutsch
    • français
    • español
    • 한국어
    • português
BeyondTrust
  • Products

    Privileged Password Management

    Discover, manage, audit, and monitor privileged accounts and credentials.

    • Password Safe
    • DevOps Secrets Safe
    • Privileged Access Discovery Application

    Endpoint Privilege Management

    Enforce least privilege across Windows, Mac, Linux, and Unix endpoints.

    • Windows and Mac
    • Unix and Linux
    • Active Directory Bridge

    Secure Remote Access

    Centrally manage remote access for service desks, vendors, and operators.

    • Remote Support
    • Privileged Remote Access
    • Privileged Access Discovery Application

    Cloud Security Management

    Automate the management of identities and assets across your multicloud footprint.

    • Cloud Privilege Broker

    BeyondInsight

    Experience the industry’s most innovative, comprehensive platform for privileged access management.

  • Solutions

    Use Cases

    • Cloud Security
    • Compliance
    • Cyber Insurance
    • Digital Transformation
    • Endpoint Security
    • Operational Technology
    • Ransomware
    • Service Desk Efficiency
    • Zero Trust

    Industry Applications

    • Financial Services
    • Government Agencies
    • Healthcare
    • Law Enforcement
    • Manufacturing
    • Schools & Universities

    Solutions

    The BeyondTrust Privileged Access Management portfolio is an integrated solution that provides visibility and control over all privileged accounts and users.

  • Resources

    Learn

    • Blog
    • Customer Stories
    • Competitor Comparisons
    • Datasheets
    • Demos
    • Glossary
    • Podcast
    • Whitepapers

    Attend

    • Events
    • Go Beyond
    • Training
    • Webinars

    Support

    • Changelog
    • Professional Services
    • Technical Documentation

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

  • Company
    • About
    • Leadership
    • Core Values
    • Partners
    • Careers
  • Watch Demo
  • Contact Sales

Important Product Portfolio Update for 2020

January 17, 2020

  • Blog
  • Archive

Over the course of three decades, BeyondTrust has built a legacy of innovation and technology leadership in the Privileged Access Management (PAM) market. Our products are designed to be robust for the complex requirements of the enterprise, but also, easy to deploy and maintain. BeyondTrust also provides the most comprehensive coverage of PAM use cases via the best integrated platform in the market. All of these characteristics and capabilities have propelled BeyondTrust to a solid leadership position in the PAM space.

In 2020, we’re doubling down on our focus of developing our core PAM capabilities. Like all software companies, we review our portfolio from time to time. As renowned Harvard strategy professor and consultant Michael E. Porter said: “The essence of strategy is choosing what not to do.” So, close to the heart of our strategy, is choosing what not do to. To this end, we have decided to phase out products that are not core to our core PAM capabilities. Specifically, we are exiting the Vulnerability Management market with the announcement of the End of Sale and End of Life of our Enterprise Vulnerability Management product (formerly Retina CS and Retina Network Security Scanner). We are also exiting the Privilege Auditing solution space by announcing the End of Sale and End of Life of Auditor Suite.

These steps will allow us to marshal more focused investment into extending our PAM product capabilities. We believe that these changes will make us an even stronger PAM provider and partner in the rapidly evolving landscape of privilege management. Secondly, this strategy also gives us the opportunity to collaborate with two excellent providers and partners, Tenable and Cygna Labs, leaders in their respective areas, where we can work together to improve customer outcomes.

Tenable is our exclusive, strategic partner for customers currently using BeyondTrust’s Vulnerability Management Suite. Tenable was recently named the market leader in the 2019 Forrester Wave for Vulnerability Risk Management, ranking highest in both Strategy and Current Offerings. Tenable has a proven track record of product innovation in vulnerability management and extensive investment in vulnerability research. We are confident Tenable is the best go-forward partner for BeyondTrust Vulnerability Management Suite customers. Tenable has also created attractive incentives for transitioning BeyondTrust customers, and our customers can discuss these directly with Tenable at beyondtrust@tenable.com.

BeyondTrust is also partnering with Cygna Labs – the original developer of the technology in the Auditor Suite and a leader in privilege auditing solutions – to provide customers a migration path. This partnership means that Auditor customers will be able to procure from Cygna additional licenses and support for the BeyondTrust Auditor Suite for up to a three-year period from the date of the EOL announcement, as well as licenses and support for Cygna’s comparable products, if and when customers choose to migrate to those products. Customers can contact Cygna Labs at beyondtrust@cygnalabs.com.

We believe strongly in supporting our customers during these transitions, and these partnerships are important in making these transitions as seamless as possible. We continue to support and develop our products until their respective end of life dates.

At BeyondTrust, we are excited about the future and ready to help our customers tackle the critical challenges and use cases of Privilege Access Management.

BeyondTrust Enterprise Vulnerability Management page

BeyondTrust Auditor page

Tenable Press Release: https://www.tenable.com/press-releases/tenable-selected-as-partner-of-choice-as-beyondtrust-exits-vulnerability-management

Tenable’s BeyondTrust Customer page: https://www.tenable.com/beyondtrust

Register for the Tenable-BeyondTrust Webinar for transitioning customers: https://www.tenable.com/webinars/closing-your-cyber-exposure-gap-a-primer-for-beyondtrust-customers

Cygna Labs: https://pages.cygnalabs.com/beyondtrust/

Photograph of Allen Vance, CISSP, CCSK

Allen Vance, CISSP, CCSK, Vice President, Product Management

Allen has over 30 years of experience in software and systems development, operations, and information security, with organizations in the defense, infosec, telecom, and semiconductor industries. His functional roles have included development, architecture, product management, operations, manufacturing, and strategic alliances/new business development. His 15 years of cyber security experience includes product management and strategic alliance roles at Ionic Security, SecureWorks (now part of Dell) and Internet Security Systems (now part of IBM). At BeyondTrust, Allen and his team are responsible for the credential and session management product portfolio, including product roadmap, product business performance, and strategic product planning.

Allen’s educational background includes Computer Science and MBA degrees from Georgia Tech, the CISSP (Certified Information Systems Security Professional) and CCSK (Certificate of Cloud Security Knowledge) certifications, and a Green Belt in Lean/Six Sigma.

Allen is a member of the US FBI InfraGard program, and an active speaker on information security and risk management issues at industry events, including the Information Systems Security Association (ISSA), the RSA Security Conference, Gartner Catalyst, Open Web Application Security Project (OWASP), and the Cloud Computing Expo. He has been interviewed by industry publications including Network World, ComputerWorld Canada, Computer Dealer News, and MSP Mentor.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Whitepapers

Cybersecurity Insurance Checklist

Whitepapers

Microsoft Vulnerabilities Report 2021

Whitepapers

Privileged Access Management: PAM Checklist

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support
  • Cloud Privilege Broker

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Podcast
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press
BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2022 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.