BeyondTrust Expands ANZ Channel Leadership with New Partner Manager Appointment

Related

AI-Fueled Supply Chain Cyber Attacks Surge in Asia-Pacific

What happened Cybersecurity firm Group-IB has reported a notable increase...

Windows 11 Security Update KB5077181 Triggers Boot Failures and System Instability

What happened Microsoft’s February 10, 2026 Patch Tuesday security update...

Share

What happened

BeyondTrust has appointed Frank Cesarini as Partner Manager for Australia and New Zealand, strengthening its regional channel leadership to support rising demand for identity security services. Based in Melbourne, Cesarini will oversee partner enablement and drive go-to-market collaboration across system integrators, managed service providers, and distribution partners.

Who is affected

Channel partners across ANZ, enterprise organizations relying on partner-delivered identity security solutions, and service providers supporting privileged access and identity risk programs are most directly impacted by this appointment.

Why CISOs should care

The move signals continued vendor investment in partner-driven security delivery models within ANZ. BeyondTrust’s focus on privilege-centric identity security places increased emphasis on partner ecosystems to support enterprise deployments, advisory services, and implementation strategies. According to Roshi Balendran, Cesarini’s regional partner and customer experience aligns with the company’s channel-led growth approach. His background includes leadership roles at Informatica, LogMeIn, McAfee, Cisco via Ingram Micro, and Schneider Electric.

For CISOs, expanded vendor channel investment may influence service availability, partner expertise, and local deployment support for identity and privileged access management initiatives.

3 practical actions

  1. Review partner capabilities: Assess whether existing security partners align with evolving identity security offerings and vendor support structures.
  2. Engage vendor ecosystems: Strengthen relationships with vendors and their partner networks to stay informed about solution updates and service opportunities.
  3. Validate identity security strategy: Reassess privilege access and identity risk management programs to ensure they align with expanding vendor and partner capabilities.