Companies that use BeyondTrust PAM

Analyzed and validated by Henley Wing Chiu
All privileged access management BeyondTrust PAM

BeyondTrust PAM We detected 955 companies using BeyondTrust PAM, 43 companies that churned, and 26 customers with upcoming renewal in the next 3 months. The most common industry is Software Development (9%) and the most common company size is 1,001-5,000 employees (30%). We find new customers by discovering URLs with known URL patterns through web crawling or modifications to subprocessor lists.

⏱️ Data is delayed by 1 month. To show real-time data, sign up for a free trial or login
Company Employees Industry Country Region Usage Start Date
Mirae Asset Sekuritas Indonesia 501–1,000 Financial Services
ID Indonesia
Asia 2026-04-03
Mirae Asset Securities 1,001–5,000 Investment Banking
KR South Korea
Asia 2026-04-03
BDO Israel 1,001–5,000 Financial Services
IL Israel
Europe 2026-03-31
Digital Realty 1,001–5,000 IT Services and IT Consulting
US United States
North America 2026-03-29
Laitram 1,001–5,000 Machinery Manufacturing
US United States
North America 2026-03-27
SEDEMAC 201–500 Motor Vehicle Parts Manufacturing
IN India
Asia 2026-03-15
IN Groupe 1,001–5,000 IT Services and IT Consulting
FR France
Europe 2026-03-11
EDHEC Online 51–200 Higher Education
FR France
Europe 2026-03-04
WB Games Boston 51–200 Computer Games
US United States
North America 2026-02-23
Relativity 1,001–5,000 Software Development
US United States
North America 2026-02-18
Binance 5,001–10,000 Technology, Information and Internet
OO OO
Europe 2026-01-25
Landstar 1,001–5,000 Truck Transportation
US United States
North America 2026-01-23
Média-Participations 1,001–5,000 Entertainment Providers
FR France
Europe 2025-12-30
VITO 1,001–5,000 Research Services
BE Belgium
Europe 2025-12-24
Commerzbank AG 10,001+ Banking
DE Germany
Europe 2025-12-22
CIMIC Group 10,001+ Civil Engineering
AU Australia
Oceania 2025-12-18
Novant Health 10,001+ Hospitals and Health Care
US United States
North America 2025-12-04
Showing 1-20

Market Insights

🏢 Top Industries

Software Development 81 (9%)
Financial Services 63 (7%)
IT Services and IT Consulting 58 (6%)
Insurance 35 (4%)
Construction 33 (4%)

📏 Company Size Distribution

1,001-5,000 employees 286 (30%)
10,001+ employees 174 (18%)
201-500 employees 133 (14%)
501-1,000 employees 119 (13%)
51-200 employees 113 (12%)

📊 Who usually uses BeyondTrust PAM and for what use cases?

Source: Analysis of job postings that mention BeyondTrust PAM (using the Bloomberry Jobs API)

Job titles that mention BeyondTrust PAM
i
Job Title
Share
IAM Analyst
41%
Information Security Engineer
18%
Manager, Information Security
7%
System Administrator
5%
I noticed that BeyondTrust PAM purchasing decisions are primarily driven by Information Security leadership and IAM teams. While 41% of roles are IAM Analyst positions and 18% are Information Security Engineers, the buying authority sits with Security Directors, IAM Managers, and IT Security leadership. These buyers are focused on strategic priorities like Zero Trust implementation, compliance with regulatory requirements, and protecting privileged access across hybrid cloud environments. They're hiring to build out comprehensive identity security programs that span everything from password vaulting to session recording.

The day-to-day users are predominantly IAM analysts and security engineers who manage the technical operations of BeyondTrust solutions. My analysis shows these practitioners are configuring password rotation policies, managing privileged remote access sessions, integrating BeyondTrust with Active Directory and cloud platforms, onboarding servers and applications, and providing L2/L3 support. They're also responsible for maintaining session recordings, generating compliance reports, and monitoring privileged user activity across enterprise environments.

The core pain points revolve around securing privileged access at scale and achieving compliance. Companies repeatedly mention needs for "controlling and monitoring privileged user access," "protecting critical systems and sensitive data," and ensuring "compliance with organizational policies and industry standards." One posting emphasizes the goal of "protecting Administrators, Applications, and Service Accounts" while another highlights "implementing and monitoring access standards." Organizations are clearly trying to eliminate manual privileged access workflows, reduce security risks from compromised credentials, and establish audit trails for regulatory requirements.

👥 What types of companies use BeyondTrust PAM?

Source: Analysis of Linkedin bios of 955 companies that use BeyondTrust PAM

Company Characteristics
i
Trait
Likelihood
Funding Stage: Post IPO secondary
388.0x
Funding Stage: Post IPO debt
203.8x
Funding Stage: Post IPO equity
99.5x
Company Size: 10,001+
58.5x
Industry: Semiconductor Manufacturing
46.8x
Company Size: 5,001-10,000
45.6x
I noticed that BeyondTrust PAM customers are predominantly organizations managing critical infrastructure and complex operations. These aren't typical SaaS companies. They're running hospitals like Novant Health and Baptist Health, operating utilities and energy infrastructure, manufacturing everything from pharmaceuticals to building materials, managing financial services including banking and insurance, and overseeing government operations. Many either produce physical products or deliver essential services where downtime has serious consequences.

These are overwhelmingly mature enterprises. The signals are unmistakable: employee counts typically range from 1,000 to over 10,000, many mention decades of operation (several celebrated 50+ year anniversaries), they operate across multiple countries or states, and they're managing complex regulatory environments. I see very few venture-backed startups. Most are either publicly traded, privately held family businesses, or government entities. The few funded companies are later-stage with substantial backing.

🔧 What other technologies do BeyondTrust PAM customers also use?

Source: Analysis of tech stacks from 955 companies that use BeyondTrust PAM

Commonly Paired Technologies
i
Technology
Likelihood
828.3x
596.8x
564.8x
469.2x
362.7x
314.8x
I noticed that BeyondTrust PAM users are typically large, compliance-heavy enterprises that take security and governance extremely seriously. The combination of specialized tools like AuditBoard for compliance management, Proofpoint for security training, and ServiceNow for IT operations tells me these are companies operating in regulated industries where a single security breach could mean millions in fines or irreparable reputational damage.

The pairing with BeyondTrust Remote Support makes perfect sense because companies investing in privileged access management need secure ways to provide technical support without compromising credential security. The strong correlation with Proofpoint Security Training is particularly telling. These organizations understand that technology alone doesn't prevent breaches, so they're investing heavily in human behavior alongside technical controls. The AuditBoard connection confirms these companies face regular audits and need to demonstrate compliance with frameworks like SOC 2, HIPAA, or financial regulations.

My analysis shows these are established, process-driven enterprises rather than fast-moving startups. The presence of Adobe Audience Manager and Qualtrics suggests they're customer-focused companies with sophisticated marketing operations and experience management programs. ServiceNow indicates they've standardized on enterprise-grade IT service management. This is the tech stack of a mature company with dedicated security, compliance, and IT operations teams. They're likely sales-led organizations with long buying cycles, given the enterprise nature of every tool on this list.

Alternatives and Competitors to BeyondTrust PAM

Explore vendors that are alternatives in this category

Okta Advanced Server Access Okta Advanced Server Access Delinea Secret Server Delinea Secret Server Cyberark Privilege Cloud Cyberark Privilege Cloud Azure Key Vault Azure Key Vault Delinea Privileged Manager Delinea Privileged Manager Imprivata Imprivata

Loading data...