Risk
12/12/2012
03:25 PM
Connect Directly
RSS
E-Mail
50%
50%

BeyondTrust Acquires Blackbird Group

BeyondTrust will leverage the Blackbird product line to drive additional context and awareness around Active Directory and infrastructure components

CARLSBAD, Calif. – December 12, 2012 – BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the acquisition of Blackbird Group, a leader in Windows system management. With this addition, BeyondTrust furthers its vision to simplify IT security operations management, while providing customers much-needed context to improve decision-making to protect against both internal and external security threats.

BeyondTrust will leverage the Blackbird product line to drive additional context and awareness around Active Directory and infrastructure components by offering real-time auditing capabilities for both privileged and normal users. This combination will result in accelerated compliance reporting, as organizations will now be able to demonstrate controls of where individuals have access and what they are doing with that access. Real-time auditing events will be fed into BeyondTrust’s risk analytics warehouse – resulting in never-before seen context across the identity infrastructure.

“Having previously led NetPro Computing, I understand the importance Active Directory plays within the enterprise,” said Kevin Hickey, president and chief operating officer at BeyondTrust. “In today’s dynamic IT infrastructure, organizations have to make fundamental shifts in how they manage both identity and security. We’re excited to continue the development of Blackbird’s product line and provide a solid, seamless integrated management approach to Windows infrastructure.”

BeyondTrust’s PowerBroker unlocks the value of Active Directory as an authoritative identity store, providing appropriate access for users, applications and tasks in both on-premise and cloud-based settings. Blackbird Group solutions, coupled with BeyondTrust’s technology, will help organizations better protect identity investments with real-time auditing, recovery and protection.

Key benefits to BeyondTrust’s integrated management approach:

· Cost Savings: Helps minimize deployment costs and administrator training

· Tighter IT Controls: Simplifies compliance and reduces data loss with real-time auditing and alerting across Active Directory and File resources

· Visibility: Audit Intelligence provides more visibility and improved decision making over native tools

· Security: Provides added layer of security and protection with single click rollback and continuous recovery of malicious or inadvertent changes

"Blackbird has been singularly focused on helping our customers demonstrate compliance and drive efficiencies to decrease the cost of IT management," said Christian Ehrenthal, founder and chief executive officer of Blackbird. "BeyondTrust's leadership position in the security and compliance markets, along with their impressive sales and marketing leverage, creates this exciting opportunity to join forces.”

BeyondTrust will be hosting a public webcast on Tuesday, December 18th from 9:00 a.m. to 10:00 a.m. PST, open to all those interested in gaining better control of their Active Directory deployments. Any current and former customers of NetPro Computing and Quest Software are invited to attend as well. To register for this webcast, please visit: http://www.beyondtrust.com/bb_acquisition

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3562
Published: 2014-08-21
Red Hat Directory Server 8 and 389 Directory Server, when debugging is enabled, allows remote attackers to obtain sensitive replicated metadata by searching the directory.

CVE-2014-3577
Published: 2014-08-21
org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient before 4.3.5 and HttpAsyncClient before 4.0.2 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-...

CVE-2014-5158
Published: 2014-08-21
The (1) av-centerd SOAP service and (2) backup command in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary commands via unspecified vectors.

CVE-2014-5159
Published: 2014-08-21
SQL injection vulnerability in the ossim-framework service in AlienVault OSSIM before 4.6.0 allows remote attackers to execute arbitrary SQL commands via the ws_data parameter.

CVE-2014-5210
Published: 2014-08-21
The av-centerd SOAP service in AlienVault OSSIM before 4.7.0 allows remote attackers to execute arbitrary commands via a crafted (1) remote_task or (2) get_license request, a different vulnerability than CVE-2014-3804 and CVE-2014-3805.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.