Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:18 AM
Dark Reading
Dark Reading
Products and Releases

Cyber-Ark, Avecto Partner In Privileged Access Management

Deal allows for the resale of Avecto's Privilege Guard products to Cyber-Ark Privileged Identity Management Suite customers

NEW ORLEANS – Microsoft TechEd North America 2010 – Booth #2301 – June 8, 2010 – Cyber-Ark Software, the leading global software provider for protecting critical applications, identities and information, today announced a strategic partnership with Avecto, the most trusted name in privilege management for Microsoft Windows systems. By enhancing Cyber-Ark’s market leading Privileged Identity Management (PIM) Suite with Avecto’s advanced Privilege Guard™ solution, joint customers benefit from the industry’s only complete solution for securing, managing and tracking all privileged and administrative activities across an organization’s entire infrastructure, from Windows desktops and laptops, to servers, databases, hypervisors, network devices and any other system within the organization.

This partnership further extends Cyber-Ark’s impact within and across the enterprise by allowing the resale of Avecto’s Privilege Guard products to new PIM Suite customers as well as Cyber-Ark’s more than 650 current worldwide customers. Organizations can now choose a single vendor to deliver best-in-class solutions for all their critical productivity, security, audit and management requirements related to privileged users and accounts.

“Enhancing Cyber-Ark’s award-winning PIM Suite with the Avecto Privilege Guard creates instant value for new and existing customers, providing the industry’s first single vendor solution that solves both their privileged account and privileged user management challenges,” said Udi Mokady, CEO of Cyber-Ark Software. “This agreement will strengthen the overall security posture for enterprises, allowing them to secure, manage and monitor all privileged accounts and activities associated with data center management, whether on-premise or in the cloud.”

A complete privileged identity management solution consists of managing shared, administrative and application accounts, monitoring privileged activities with session control and recording, as well as allowing on-demand privileged access to administrative accounts. Cyber-Ark is the pioneer and global market leader for privileged identity management solutions.

“Teaming with Cyber-Ark Software, the privileged identity management market leader, represents a tremendous opportunity for Avecto and its customers,” said Tony Bolland, CEO of Avecto. “The combination of Cyber-Ark’s PIM Suite and Avecto Privilege Guard delivers a comprehensive solution that has been requested by the largest global organizations. This joint offering will make it possible for ‘one-stop shopping’ and provide a unified services and support environment for our mutual customers.”

Avecto Privilege Guard enables organizations to adopt the principle of least privilege and eliminate admin rights. It is no longer necessary to assign admin rights to users, as these rights can now be assigned on-demand to applications, tasks and scripts. Privilege Guard allows users to log on to corporate Windows systems with minimal rights and empowers them to perform their day-to-day role, without compromising their integrity and security.

About Avecto

Avecto is a pioneer in privilege management, helping organizations to deploy secure and compliant desktops and servers. With its innovative Privilege Guard™ technology, organizations can now empower all Windows-based desktop and server users with the privileges they require to perform their roles, without compromising the integrity and security of their systems. Customers of all sizes rely on Avecto to reduce operating expenses and strengthen security across their Windows-based environments. Our mission is to enable our customers to lower operating costs and improve system security by implementing least privilege. Avecto is building a worldwide channel of partners and system integrators and is headquartered in Manchester, UK, with offices in Boston and Rotterdam. For more information, visit www.avecto.com.

About Cyber-Ark Software

Cyber-Ark' Software is a global information security company that specializes in protecting and managing privileged users, applications and highly-sensitive information to improve compliance, productivity and protect organizations against insider threats. With its award-winning Privileged Identity Management (PIM) and Highly-Sensitive Information Management software, organizations can more effectively manage and govern application access while demonstrating returns on security investments. Cyber-Ark works with more than 650 global customers, including more than 35 percent of the Fortune 50. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, visit www.cyber-ark.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...