Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:18 AM
Dark Reading
Dark Reading
Products and Releases

Cyber-Ark, Avecto Partner In Privileged Access Management

Deal allows for the resale of Avecto's Privilege Guard products to Cyber-Ark Privileged Identity Management Suite customers

NEW ORLEANS – Microsoft TechEd North America 2010 – Booth #2301 – June 8, 2010 – Cyber-Ark Software, the leading global software provider for protecting critical applications, identities and information, today announced a strategic partnership with Avecto, the most trusted name in privilege management for Microsoft Windows systems. By enhancing Cyber-Ark’s market leading Privileged Identity Management (PIM) Suite with Avecto’s advanced Privilege Guard™ solution, joint customers benefit from the industry’s only complete solution for securing, managing and tracking all privileged and administrative activities across an organization’s entire infrastructure, from Windows desktops and laptops, to servers, databases, hypervisors, network devices and any other system within the organization.

This partnership further extends Cyber-Ark’s impact within and across the enterprise by allowing the resale of Avecto’s Privilege Guard products to new PIM Suite customers as well as Cyber-Ark’s more than 650 current worldwide customers. Organizations can now choose a single vendor to deliver best-in-class solutions for all their critical productivity, security, audit and management requirements related to privileged users and accounts.

“Enhancing Cyber-Ark’s award-winning PIM Suite with the Avecto Privilege Guard creates instant value for new and existing customers, providing the industry’s first single vendor solution that solves both their privileged account and privileged user management challenges,” said Udi Mokady, CEO of Cyber-Ark Software. “This agreement will strengthen the overall security posture for enterprises, allowing them to secure, manage and monitor all privileged accounts and activities associated with data center management, whether on-premise or in the cloud.”

A complete privileged identity management solution consists of managing shared, administrative and application accounts, monitoring privileged activities with session control and recording, as well as allowing on-demand privileged access to administrative accounts. Cyber-Ark is the pioneer and global market leader for privileged identity management solutions.

“Teaming with Cyber-Ark Software, the privileged identity management market leader, represents a tremendous opportunity for Avecto and its customers,” said Tony Bolland, CEO of Avecto. “The combination of Cyber-Ark’s PIM Suite and Avecto Privilege Guard delivers a comprehensive solution that has been requested by the largest global organizations. This joint offering will make it possible for ‘one-stop shopping’ and provide a unified services and support environment for our mutual customers.”

Avecto Privilege Guard enables organizations to adopt the principle of least privilege and eliminate admin rights. It is no longer necessary to assign admin rights to users, as these rights can now be assigned on-demand to applications, tasks and scripts. Privilege Guard allows users to log on to corporate Windows systems with minimal rights and empowers them to perform their day-to-day role, without compromising their integrity and security.

About Avecto

Avecto is a pioneer in privilege management, helping organizations to deploy secure and compliant desktops and servers. With its innovative Privilege Guard™ technology, organizations can now empower all Windows-based desktop and server users with the privileges they require to perform their roles, without compromising the integrity and security of their systems. Customers of all sizes rely on Avecto to reduce operating expenses and strengthen security across their Windows-based environments. Our mission is to enable our customers to lower operating costs and improve system security by implementing least privilege. Avecto is building a worldwide channel of partners and system integrators and is headquartered in Manchester, UK, with offices in Boston and Rotterdam. For more information, visit www.avecto.com.

About Cyber-Ark Software

Cyber-Ark' Software is a global information security company that specializes in protecting and managing privileged users, applications and highly-sensitive information to improve compliance, productivity and protect organizations against insider threats. With its award-winning Privileged Identity Management (PIM) and Highly-Sensitive Information Management software, organizations can more effectively manage and govern application access while demonstrating returns on security investments. Cyber-Ark works with more than 650 global customers, including more than 35 percent of the Fortune 50. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, visit www.cyber-ark.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: We need more votes, check the obituaries.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-27
jp2_decode in jp2/jp2_dec.c in libjasper in JasPer 2.0.24 has a heap-based buffer over-read when there is an invalid relationship between the number of channels and the number of image components.
PUBLISHED: 2021-01-26
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
PUBLISHED: 2021-01-26
The ftpd gem 0.2.1 for Ruby allows remote attackers to execute arbitrary OS commands via shell metacharacters in a LIST or NLST command argument within FTP protocol traffic.
PUBLISHED: 2021-01-26
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
PUBLISHED: 2021-01-26
NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB, L4T versions prior to 32.5, contains a vulnerability in the apply_binaries.sh script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an un...