Risk
12/12/2012
03:25 PM
50%
50%

BeyondTrust Acquires Blackbird Group

BeyondTrust will leverage the Blackbird product line to drive additional context and awareness around Active Directory and infrastructure components

CARLSBAD, Calif. – December 12, 2012 – BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the acquisition of Blackbird Group, a leader in Windows system management. With this addition, BeyondTrust furthers its vision to simplify IT security operations management, while providing customers much-needed context to improve decision-making to protect against both internal and external security threats.

BeyondTrust will leverage the Blackbird product line to drive additional context and awareness around Active Directory and infrastructure components by offering real-time auditing capabilities for both privileged and normal users. This combination will result in accelerated compliance reporting, as organizations will now be able to demonstrate controls of where individuals have access and what they are doing with that access. Real-time auditing events will be fed into BeyondTrust’s risk analytics warehouse – resulting in never-before seen context across the identity infrastructure.

“Having previously led NetPro Computing, I understand the importance Active Directory plays within the enterprise,” said Kevin Hickey, president and chief operating officer at BeyondTrust. “In today’s dynamic IT infrastructure, organizations have to make fundamental shifts in how they manage both identity and security. We’re excited to continue the development of Blackbird’s product line and provide a solid, seamless integrated management approach to Windows infrastructure.”

BeyondTrust’s PowerBroker unlocks the value of Active Directory as an authoritative identity store, providing appropriate access for users, applications and tasks in both on-premise and cloud-based settings. Blackbird Group solutions, coupled with BeyondTrust’s technology, will help organizations better protect identity investments with real-time auditing, recovery and protection.

Key benefits to BeyondTrust’s integrated management approach:

· Cost Savings: Helps minimize deployment costs and administrator training

· Tighter IT Controls: Simplifies compliance and reduces data loss with real-time auditing and alerting across Active Directory and File resources

· Visibility: Audit Intelligence provides more visibility and improved decision making over native tools

· Security: Provides added layer of security and protection with single click rollback and continuous recovery of malicious or inadvertent changes

"Blackbird has been singularly focused on helping our customers demonstrate compliance and drive efficiencies to decrease the cost of IT management," said Christian Ehrenthal, founder and chief executive officer of Blackbird. "BeyondTrust's leadership position in the security and compliance markets, along with their impressive sales and marketing leverage, creates this exciting opportunity to join forces.”

BeyondTrust will be hosting a public webcast on Tuesday, December 18th from 9:00 a.m. to 10:00 a.m. PST, open to all those interested in gaining better control of their Active Directory deployments. Any current and former customers of NetPro Computing and Quest Software are invited to attend as well. To register for this webcast, please visit: http://www.beyondtrust.com/bb_acquisition

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.