What can we help you with?

Supercharged PAM

Combine the best of Session Management and Credential Management solutions at a new, incredible value!

Learn More Learn More

What is BeyondTrust?

Get a closer look inside the BeyondTrust identity & access security arsenal.

Learn More Learn More

Gartner Peer Insights

Find out how customers & analysts alike review BeyondTrust.

Learn More Learn More

Go Beyond Customer & Partner Conference

Our biggest customer conference of the year is happening in Miami and virtually on May 1-5, 2023.

Learn More Learn More

Watch Our Video

Find out more about our integrations.

Learn More Learn More

Leader in Intelligent Identity & Secure Access

Learn how BeyondTrust solutions protect companies from cyber threats.

Learn More Learn More

Featuring guest speaker, CISSP, CISM, Senior Security Consultant with Nettitude, Ben Rothke

There’s no shortage of vulnerability management (VM) tools on the market. But running them is only one part of an effective vulnerability management program.

In this webinar, Ben Rothke, CISSP, CISM, Senior Security Consultant with Nettitude, discusses some of his top tips and tricks that IT security teams can implement immediately to ensure that the vulnerability management solutions in place are working to their maximum.

You will also learn:

Photograph of Ben Rothke

Ben Rothke, Senior Security Consultant, Nettitude

Ben Rothke (@benrothke) is a senior security consultant with Nettitude and has over 15 years of industry experience in information systems security and privacy. His career incorporates a successful track record across corporate and consulting roles, securing IT assets for numerous Fortune 1000 companies.

He is the author of Computer Security - 20 Things Every Employee Should Know (McGraw-Hill) and a speaker at industry conferences, such as RSA and MISTI, and holds numerous industry certifications.