BeyondTrust introduces Partnership Program

New BeyondTrust Technology Alliance Program (BTAP) supports forward-thinking companies, cultivating technology integration for enhanced security and product development.

  • 7 years ago Posted in
BeyondTrust has introduced the new BeyondTrust Technology Alliance Program (BTAP), created to help organizations develop best-of-breed Privileged Access Management solutions. The program combines the unique capabilities of BeyondTrust’s IT Risk Management Platform with the products and solutions of other providers from operations, development, and security.
 
The IT threat landscape is evolving rapidly, which not only requires bleeding-edge security solutions, but also technology platforms that can be easily integrated with each other amid such constant change. A complete security solution requires the ability to seamlessly integrate a variety of management and governance tools for total system protection and detailed analysis of user behavior.
 
BeyondTrust is uniquely positioned to this integrated approach and workflow with its use of industry-standard software and protocols, benefiting tools developed for all lines of business. The result is a highly scalable risk management system with bidirectional protection capability that maximizes the performance of existing security and operational solutions. Its modular approach allows companies to integrate it into as many systems and products as desired, with the ability to easily monitor and control everything within a single pane of glass for privileges, vulnerabilities, and threat analytics.
 
Technology Alliance Program Benefits
·         BTAP Partners enjoy recognition as trusted collaborators; enjoying increased security and compatibility with BeyondTrust solutions and commercial products and custom solutions.
·         They also receive a name listing on the BeyondTrust public website, joint literature, as well as the right to use BTAP Partner logos and the opportunity to co-fund marketing campaigns.
·         Partners also receive exclusive technology benefits, such as access to the latest APIs, including documentation and code examples, as well as access to BeyondTrust’s cloud-based development environment.
·         Other benefits include development NFR licenses and access to dedicated business and technical support resources.
 
“This visionary program is a unique opportunity for companies to take more control over their real world problems such as least privileged access and password management,” said Joseph Schramm, vice president of strategic alliances. “Partners receive all the tools they need to accelerate their technology development and bolster the sales side of their business at the same time.”
 
“We highly value our collaboration with BeyondTrust and its unique approach to network security,” said Joe Gottlieb, senior vice president of corporate development for SailPoint. “By combining BeyondInsight’s privileged account management enhanced with vulnerability assessment and our identity governance platform, we have been able to raise security awareness among our customers and deliver solutions that protect their businesses from both privileged and routine usage risks.” 
 
"Accurate and timely vulnerability data is critical to understanding an organization's risk profile and properly prioritizing triage and investigation of suspected compromises," notes Matt Winter, vice president corporate & business development at LogRhythm. "By incorporating and analyzing BeyondTrust data with the petabytes of other machine data from across their environments, our customers are able to optimally accelerate threat detection and response activities."
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...