Search company, investor...
BeyondTrust company logo


Founded Year



Private Equity - II | Alive

Total Raised


About BeyondTrust

BeyondTrust specializes in access management, offering an approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Its platform empowers organizations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralized management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. It was founded in 1985 and is based in Johns Creek, Georgia. On September 13th, 2018, BeyondTrust was acquired by Bomgar.

Headquarters Location

11695 Johns Creek Parkway Suite 200

Johns Creek, Georgia, 30097,

United States


Missing: BeyondTrust's Product Demo & Case Studies

Promote your product offering to tech buyers.

Reach 1000s of buyers who use CB Insights to identify vendors, demo products, and make purchasing decisions.

ESPs containing BeyondTrust

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

Enterprise Tech / Information Security

The enterprise password managers market focuses on providing password management solutions designed for organizations and businesses. Enterprise password managers are software applications or platforms that help users securely store, manage, and access their passwords and credentials for various online accounts and applications. These solutions offer features such as password encryption, password …

BeyondTrust named as Leader among 10 other companies, including JumpCloud, 1Password, and Keeper Security.

Missing: BeyondTrust's Product & Differentiators

Don’t let your products get skipped. Buyers use our vendor rankings to shortlist companies and drive requests for proposals (RFPs).

Expert Collections containing BeyondTrust

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

BeyondTrust is included in 1 Expert Collection, including Cybersecurity.



4,939 items

BeyondTrust Patents

BeyondTrust has filed 21 patents.

The 3 most popular patent topics include:

  • Computer network security
  • Computer security
  • Cryptography
patents chart

Application Date

Grant Date


Related Topics




Computer memory, Computer security, Computer network security, Events (computing), Linux kernel features


Application Date


Grant Date



Related Topics

Computer memory, Computer security, Computer network security, Events (computing), Linux kernel features



Latest BeyondTrust News

3 Ways Businesses Can Optimize Their Tech Investments

Jun 2, 2023

Written by Joe Schramm Joe Schramm Today’s businesses are looking for new ways to leverage technology to reduce their dependence on human capital to perform low-value, repetitive tasks. Given the rapid rise of artificial intelligence (AI) and machine learning (ML), technology vendors are bringing solutions to the market that enable organizations to reallocate those human resources to more meaningful, rewarding and valuable tasks. Here are some ways to determine your company’s most valuable tools, demonstrate meaningful business impact and reallocate repetitive tasks. De-risking technology purchases (PDF) is a big value driver that solution providers can offer their customers and prospects. While big deals are always welcome, not all customers are ready to make large scale, enterprisewide purchases, particularly in an uncertain economy in which budgets are tightening. Furthermore, the return on investment (ROI) on these types of deals can often take years to materialize. As a result, the customer is often the party that bears the most risk. With the rapid rise of software-as-a-service (SaaS)-based solutions and subscription-based pricing models, organizations can rapidly acquire capabilities without massive up-front expenditure. Now, newer models such as consumption-based pricing and use case-based packaging provide alternate starting points for customers. This added optionality for how customers start with a solution provides them with the ability to start small, minimize risk and demonstrate business value in a condensed time frame. As solution adoption spreads and as additional use cases are deployed, the consumption-based pricing scales in parallel to the value curve for the customer. With automated IT operations , it often makes sense for a customer to start with only the components or features they need when taking a step forward in their digital transformation journey. For example, they can start with the objective of reducing observability and monitoring event “noise,” and then later move to other use cases over time, such as automated ticketing, faster detection of incidents, and tool rationalization. Provide business value. Building on the previous point, today’s businesses should avoid implementing technology for technology’s sake. They need to focus on deploying new tools and technologies that demonstrate meaningful business impact as quickly as possible . For solution providers who are looking to bring innovative solutions to their customers, this is a great opportunity to provide more value and deepen your relationships. In the world of IT operations, the idea is to improve business resiliency and continuity to ensure their digital assets are running efficiently and with high uptime. This ultimately translates into revenue protection and other value drivers that ensure the business captures as much opportunity as possible while also minimizing losses. This can also translate into cost savings through tool reduction, reduced mean time to respond (MTTR), and automation that frees expensive human capital to focus on more valuable tasks (versus monitoring and responding to incidents). For example, if an online gaming company suffers an outage, this can cost more than $20,000 per minute in lost revenue. In addition, a loss of goodwill with its customers can lead to customer churn. Lost revenue is bad enough, but it’s even tougher to recover from losing disgruntled customers due to subpar experiences and low satisfaction. By reducing the number of incidents and further reducing the mean time to detect, respond and resolve, organizations can protect revenue and improve customer satisfaction. Reduce costs. In the current economic environment where organizations are focusing on reducing costs due to the specter of a looming recession, it’s wise to look for ways to save money. However, sometimes you must spend a little to save a lot. To put it in personal terms, over the last several years many of us set out to cut the cable cord. Folks were probably already subscribing to one or two streaming services. The cost of a simple attic antenna (if you want access to local TV broadcasts) is less than $100, and more choices of subscription services emerged, offering cord-cutters more options to mix and match what they want to see. Sure, you will incur some up-front costs to make the switch, but in my case, the ROI was delivered in about four months and my ongoing at-home entertainment costs were reduced by about half. This trend is often found across a wide swath of businesses. Due to the digital transformational shift that has occurred, organizations have had to invest in a wider range of observability and monitoring tools to manage their ever-growing complex digital infrastructure. This has resulted in large-scale tool sprawl across many organizations. In addition, siloed teams of staff have emerged, each leveraging different sets of tools to manage their respective pieces of the digital landscape. When outages occur, there’s often a mad scramble to arrange bridge calls that involve many team members and consume considerable time. There are ways for IT organizations to take a holistic view of the tools in their arsenal to determine which are most useful. Expensive bridge calls can be reduced. Furthermore, with the wide-scale adoption of AI- and ML-based solutions, many of the low-value tasks performed by expensive human resources can be automated, freeing those resources to focus on more meaningful work. Joe Schramm is vice president of alliances and channels at BigPanda , where he works to forge mutually beneficial partnerships that will help BigPanda scale while delivering results to customers and clients. He previously worked as head of Americas partner sales for Sailpoint, vice president of strategic partners for BeyondTrust and vice president of alliances and channels for Trusona. You may follow him on LinkedIn or @bigpanda on Twitter.

BeyondTrust Frequently Asked Questions (FAQ)

  • When was BeyondTrust founded?

    BeyondTrust was founded in 1985.

  • Where is BeyondTrust's headquarters?

    BeyondTrust's headquarters is located at 11695 Johns Creek Parkway, Johns Creek.

  • What is BeyondTrust's latest funding round?

    BeyondTrust's latest funding round is Private Equity - II.

  • How much did BeyondTrust raise?

    BeyondTrust raised a total of $14.58M.

  • Who are the investors of BeyondTrust?

    Investors of BeyondTrust include Clearlake Capital Group, Francisco Partners, Thoma Bravo, TA Associates, Southern Farm Bureau Life Insurance Company and 4 more.

  • Who are BeyondTrust's competitors?

    Competitors of BeyondTrust include Britive, senhasegura, ThreatLocker, Delinea, Netwrix and 10 more.

Compare BeyondTrust to Competitors

Osirium Logo

Osirium offers a cybersecurity and privileged infrastructure automation solution that protects its customers from the cyber threats of hybrid-cloud IT Infrastructure.

strongDM Logo

strongDM’s infrastructure access platform gives every business secure access controls in a way folks love to use. strongDM gives businesses the control and visibility they need at the speed they want with one platform that works for every environment.

GoTo Logo

GoTo is a unified communication platform that includes video conferencing, webinars, and phone system solutions for one low price. It is based in Boston, Massachusetts.

Authentic8 Logo

Authentic8 operates as a silo web isolation platform. It solves web issues like security, anonymity, and compliance. It offers management of web risks, user-centric policies, and cloud-based infrastructure. It was founded in 2010 and is based in Redwood City, California.

Delinea Logo

Delinea provides privileged access management (PAM) solutions for modern, hybrid enterprises. Its solutions secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. The company's customers range from small businesses to large financial institutions, intelligence agencies, and critical infrastructure companies. Delinea was formerly known as Centrify and rebranded in April 2021 as part of its merger with Thycotic Software. It was founded in 2004 and is based in Redwood City, California.

Splashtop Logo

Splashtop is a software company offering enterprise mobile access and collaboration of applications. It delivers remote access and remote support software and services. Its cloud-based, secure, and managed solutions serve customers that include education, media and entertainment, healthcare, government, public sector, and others. It was formerly known as DeviceVM. The company was founded in 2006 and is based in Cupertino, California.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.