Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

6/15/2010
10:18 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Cyber-Ark, Avecto Partner In Privileged Access Management

Deal allows for the resale of Avecto's Privilege Guard products to Cyber-Ark Privileged Identity Management Suite customers

NEW ORLEANS – Microsoft TechEd North America 2010 – Booth #2301 – June 8, 2010 – Cyber-Ark Software, the leading global software provider for protecting critical applications, identities and information, today announced a strategic partnership with Avecto, the most trusted name in privilege management for Microsoft Windows systems. By enhancing Cyber-Ark’s market leading Privileged Identity Management (PIM) Suite with Avecto’s advanced Privilege Guard™ solution, joint customers benefit from the industry’s only complete solution for securing, managing and tracking all privileged and administrative activities across an organization’s entire infrastructure, from Windows desktops and laptops, to servers, databases, hypervisors, network devices and any other system within the organization.

This partnership further extends Cyber-Ark’s impact within and across the enterprise by allowing the resale of Avecto’s Privilege Guard products to new PIM Suite customers as well as Cyber-Ark’s more than 650 current worldwide customers. Organizations can now choose a single vendor to deliver best-in-class solutions for all their critical productivity, security, audit and management requirements related to privileged users and accounts.

“Enhancing Cyber-Ark’s award-winning PIM Suite with the Avecto Privilege Guard creates instant value for new and existing customers, providing the industry’s first single vendor solution that solves both their privileged account and privileged user management challenges,” said Udi Mokady, CEO of Cyber-Ark Software. “This agreement will strengthen the overall security posture for enterprises, allowing them to secure, manage and monitor all privileged accounts and activities associated with data center management, whether on-premise or in the cloud.”

A complete privileged identity management solution consists of managing shared, administrative and application accounts, monitoring privileged activities with session control and recording, as well as allowing on-demand privileged access to administrative accounts. Cyber-Ark is the pioneer and global market leader for privileged identity management solutions.

“Teaming with Cyber-Ark Software, the privileged identity management market leader, represents a tremendous opportunity for Avecto and its customers,” said Tony Bolland, CEO of Avecto. “The combination of Cyber-Ark’s PIM Suite and Avecto Privilege Guard delivers a comprehensive solution that has been requested by the largest global organizations. This joint offering will make it possible for ‘one-stop shopping’ and provide a unified services and support environment for our mutual customers.”

Avecto Privilege Guard enables organizations to adopt the principle of least privilege and eliminate admin rights. It is no longer necessary to assign admin rights to users, as these rights can now be assigned on-demand to applications, tasks and scripts. Privilege Guard allows users to log on to corporate Windows systems with minimal rights and empowers them to perform their day-to-day role, without compromising their integrity and security.

About Avecto

Avecto is a pioneer in privilege management, helping organizations to deploy secure and compliant desktops and servers. With its innovative Privilege Guard™ technology, organizations can now empower all Windows-based desktop and server users with the privileges they require to perform their roles, without compromising the integrity and security of their systems. Customers of all sizes rely on Avecto to reduce operating expenses and strengthen security across their Windows-based environments. Our mission is to enable our customers to lower operating costs and improve system security by implementing least privilege. Avecto is building a worldwide channel of partners and system integrators and is headquartered in Manchester, UK, with offices in Boston and Rotterdam. For more information, visit www.avecto.com.

About Cyber-Ark Software

Cyber-Ark' Software is a global information security company that specializes in protecting and managing privileged users, applications and highly-sensitive information to improve compliance, productivity and protect organizations against insider threats. With its award-winning Privileged Identity Management (PIM) and Highly-Sensitive Information Management software, organizations can more effectively manage and govern application access while demonstrating returns on security investments. Cyber-Ark works with more than 650 global customers, including more than 35 percent of the Fortune 50. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific. For more information, visit www.cyber-ark.com.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
News
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
News
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21360
PUBLISHED: 2021-03-09
Products.GenericSetup is a mini-framework for expressing the configured state of a Zope Site as a set of filesystem artifacts. In Products.GenericSetup before version 2.1.1 there is an information disclosure vulnerability - anonymous visitors may view log and snapshot files generated by the Generic ...
CVE-2021-21361
PUBLISHED: 2021-03-09
The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed...
CVE-2021-24033
PUBLISHED: 2021-03-09
react-dev-utils prior to v11.0.4 exposes a function, getProcessForPort, where an input argument is concatenated into a command string to be executed. This function is typically used from react-scripts (in Create React App projects), where the usage is safe. Only when this function is manually invoke...
CVE-2021-21510
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to 2.75.100.75 contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
CVE-2020-27575
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.