BeyondTrust streamlines cyber security and vulnerability management with BeyondInsight 6.0

 
BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorised access, announced today the release of BeyondInsight 6.0, enabling organisations to assess cloud and virtual environments, share actionable intelligence with leading SIEMs, consolidate vulnerability data from various scanners and centrally manage host-based scans.
“With the mainstream adoption of cloud, virtual and mobile platforms, the rise of the application economy, and the escalating velocity and ferocity of threat activity, it’s no surprise that getting a true picture of enterprise risk requires a vast amount of data,” said Brad Hibbert, CTO at BeyondTrust. “BeyondInsight 6.0 enables organisations to correlate seemingly disparate pieces of data into definitive and actionable security intelligence.”
The new and enhanced connectors further BeyondTrust’s comprehensive vulnerability management strategy by:

  • Closing security gaps created by cloud, virtual and mobile platforms: BeyondTrust’s cloud and virtual connectors and Retina Host Security Scanner eliminate gaps within an organisations security posture, providing a true picture of its enterprise risk
  • Improving visibility of hidden and emerging threats: BeyondTrust’s SIEM connectors give organisations automated access to normalized threat intelligence, enabling them to more quickly prioritise threats and in turn respond more efficiently.
  • Covering the widest range of assets and vulnerabilities: Tenable Security Center and Tripwire connectors add to BeyondTrust’s list of supported 3rd party scanners, enabling organisations to correlate vulnerability data from a number of on premise and cloud-based scanners within a centralised reporting and analytics platform.

“Cloud and virtual infrastructures by nature are very elastic,” said Brad Hibbert, CTO at BeyondTrust. “As a result, their presence can be hard to predict making scanning them even more difficult. Unknown or undermanaged cloud and virtual environments pose a significant risk opening networks to security breaches, data loss, intellectual property theft, and regulatory compliance issues. BeyondInsight’s connectors enable organisations to discover all cloud and virtual instances in an environment, group cloud assets for secure management, and scan for known and emerging vulnerabilities.”

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Christina Alexander Judge - SecurityBuyer

Christina Alexander Announced as Security Buyer Awards Judge

Security Buyer is proud to announce Christina Alexander as the latest addition to the distinguished judging panel for the Security…
Milestone - SecurityBuyer

Milestone Systems updates across XProtect, BriefCam, Arcules

Milestone Systems today announced updates across its complete security technology portfolio with releases for XProtect
Big Interview Abdullah Tanoli

Big Interview – Hero of Leicester Square

Rebecca Spayne of Security Buyer has the privilege of speaking with a real-life hero, Abdullah Tanoli, the hero of Leicester Square..
Altronix - SecurityBuyer

Altronix POE367 Delivers 277VAC Support

Altronix has expanded its power product line with the new POE367 power supply/charger designed specifically for 277VAC input environments.
IFPO x GSA - Security Buyer

New Corporate Members for IFPO

The Global SecurAlliance (GSA)summer meeting on 16 June was held again at the stunning Château de Méry-sur-Oise on the outskirts of Paris.
Product Spotlight - HID

Product Spotlight – HID

Access control is evolving into a smart, responsive platform—integrating embedded apps, IoT, and cybersecurity to deliver…
Genetec

Genetec brings new capabilities to Security Center SaaS

Genetec announced new updates to Security Center SaaS, the company’s enterprise-grade Security-as-a-Service (SaaS) solution..
I-Pro

i-PRO Launches Revamped EMEA Partner Program

i-PRO announced a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and…
ASIs international

ASIS International Introduces New ANSI-Approved Investigations Standard

ASIS International, a leading authority in security standards, is excited to announce the release of its revised American National Standards.
Gallagher Security and Yusuf Bin Ahmed Kanoo Company Limited sign MOU in Riyadh

Gallagher Security MOU with Yusuf Bin Ahmed Kanoo Company

Gallagher Security is proud to announce the signing of a Memorandum of Understanding (MOU) with Yusuf Bin Ahmed Kanoo Company…
Scroll to Top