What can we help you with?

Supercharged PAM

Combine the best of Session Management and Credential Management solutions at a new, incredible value!

Learn More Learn More

What is BeyondTrust?

Get a closer look inside the BeyondTrust identity & access security arsenal.

Learn More Learn More

Gartner Peer Insights

Find out how customers & analysts alike review BeyondTrust.

Learn More Learn More

Go Beyond Customer & Partner Conference

Our biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.

Learn More Learn More

Watch Our Video

Find out more about our integrations.

Learn More Learn More

Leader in Intelligent Identity & Secure Access

Learn how BeyondTrust solutions protect companies from cyber threats.

Learn More Learn More

The information on this page is intended for those interested in reporting security vulnerabilities to the BeyondTrust security team.

Data and product security are extremely important to us here at BeyondTrust. If you are a security researcher and you believe you have discovered a security vulnerability in one of our products or services, we would like to know about it so we can take steps to address it as quickly as possible.

To submit a security vulnerability to BeyondTrust, please e-mail your findings to secure@beyondtrust.com. Please be sure to encrypt your findings using our PGP key (found below), and include as much detail as possible in order to reproduce the problem. We will handle your report with strict confidentiality, and will not pass on your personal details to third parties without your permission.

A member of the BeyondTrust security team will make reasonable efforts to respond to your report within 5 business days. In most circumstances, the response will include an evaluation of the report and an expected resolution date. Occasionally, we may require additional information in order to validate the report.

During the resolution process, we will keep you informed of our progress. Once a fix has been released, we will attribute your name as the discoverer of the problem (unless you desire otherwise). Please note that BeyondTrust does not provide compensation or rewards for vulnerability discoveries.

Download the PGP key