"Our strategy has always been around privileged access management and [applying] what we have learned about delegating privileges correctly on operating systems and applications. And now we can do it to any network device," said Morey Haber, CTO at BeyondTrust.