Risk
12/12/2012
03:25 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

BeyondTrust Acquires Blackbird Group

BeyondTrust will leverage the Blackbird product line to drive additional context and awareness around Active Directory and infrastructure components

CARLSBAD, Calif. – December 12, 2012 – BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the acquisition of Blackbird Group, a leader in Windows system management. With this addition, BeyondTrust furthers its vision to simplify IT security operations management, while providing customers much-needed context to improve decision-making to protect against both internal and external security threats.

BeyondTrust will leverage the Blackbird product line to drive additional context and awareness around Active Directory and infrastructure components by offering real-time auditing capabilities for both privileged and normal users. This combination will result in accelerated compliance reporting, as organizations will now be able to demonstrate controls of where individuals have access and what they are doing with that access. Real-time auditing events will be fed into BeyondTrust’s risk analytics warehouse – resulting in never-before seen context across the identity infrastructure.

“Having previously led NetPro Computing, I understand the importance Active Directory plays within the enterprise,” said Kevin Hickey, president and chief operating officer at BeyondTrust. “In today’s dynamic IT infrastructure, organizations have to make fundamental shifts in how they manage both identity and security. We’re excited to continue the development of Blackbird’s product line and provide a solid, seamless integrated management approach to Windows infrastructure.”

BeyondTrust’s PowerBroker unlocks the value of Active Directory as an authoritative identity store, providing appropriate access for users, applications and tasks in both on-premise and cloud-based settings. Blackbird Group solutions, coupled with BeyondTrust’s technology, will help organizations better protect identity investments with real-time auditing, recovery and protection.

Key benefits to BeyondTrust’s integrated management approach:

· Cost Savings: Helps minimize deployment costs and administrator training

· Tighter IT Controls: Simplifies compliance and reduces data loss with real-time auditing and alerting across Active Directory and File resources

· Visibility: Audit Intelligence provides more visibility and improved decision making over native tools

· Security: Provides added layer of security and protection with single click rollback and continuous recovery of malicious or inadvertent changes

"Blackbird has been singularly focused on helping our customers demonstrate compliance and drive efficiencies to decrease the cost of IT management," said Christian Ehrenthal, founder and chief executive officer of Blackbird. "BeyondTrust's leadership position in the security and compliance markets, along with their impressive sales and marketing leverage, creates this exciting opportunity to join forces.”

BeyondTrust will be hosting a public webcast on Tuesday, December 18th from 9:00 a.m. to 10:00 a.m. PST, open to all those interested in gaining better control of their Active Directory deployments. Any current and former customers of NetPro Computing and Quest Software are invited to attend as well. To register for this webcast, please visit: http://www.beyondtrust.com/bb_acquisition

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web