EMC/RSA To Acquire IAM Player AveksaEMC/RSA To Acquire IAM Player Aveksa
Aveksa's technology will help extend RSA's vision of Adaptive IAM
July 8, 2013
HOPKINTON, MA – July 8, 2013
· EMC Corporation announced it has acquired privately held Aveksa Inc., a leader in business-driven Identity and Access Management ("IAM") solutions.
· Aveksa's innovative technology will help extend RSA's vision of Adaptive IAM, designed to transform traditional static systems into agile, intelligent and scalable "situational perimeters" to help organizations dynamically manage user lifecycles and access across enterprise and cloud environments.
· Aveksa's leadership in Identity and Access Governance ("IAG") and Provisioning will help RSA customers ensure that users have appropriate and secure access to applications from within the enterprise or the cloud regardless of their location or device.
· Leveraging their complementary technologies to promote intelligence-driven security, Aveksa and RSA together will align insight from roles, processes, and security-oriented Big Data to help enable better visibility, prioritization, detection and response to risk and real-time threats.
EMC Corporation (NYSE: EMC) today announced it has acquired privately held Aveksa Inc., a leader in business-driven Identity and Access Management. Effective immediately, Aveksa will operate within the RSA security division as part of RSA's Identity Trust Management product group, bringing leading technology and expertise that will help RSA bring innovative new solutions to identity and access management challenges across enterprise, cloud and mobile access use cases. Terms of the deal were not disclosed. The acquisition is not expected to have a material impact to EMC GAAP or non-GAAP EPS for the full 2013 fiscal year.
In today's increasingly cloud-based and application-centric world, authentication, authorization and identity management have become even more intertwined, complex and critical. The model for each user has shifted from a single authentication to an enterprise network, to dozens of authentications to applications and related data, from multiple user devices, across cloud and on-premise infrastructures. The task of ensuring that the right users get access to appropriate company resources has traditionally been IT-driven, using legacy IAM solutions to enforce all the policies, processes, procedures and applications that help organizations manage access to information. The lack of intelligence and business context has led to increased risk of data breaches, non-compliance and excessive privilege.
RSA and Aveksa together will help give organizations the ability to automate the complete identity lifecycle of users from a business-driven perspective, helping turn traditional IAM systems into more agile, intelligent and scalable "situational perimeters." With Aveksa, customers have a unified dashboard to manage, control, and deliver access, while consistently enforcing identity and access policies across the enterprise and cloud, at a granular level.
Aveksa solutions help define rich user profiles and increase the convenience of managing user identities, allowing customers to continue building "situational perimeters" that can flexibly enforce security whenever and wherever users interact with corporate data and resources. The line of business is given easy and secure access to applications, while enabling them to take accountability and responsibility for making access decisions, within the controls, processes, and policies defined by the information security organization.
Similar to RSA, Aveksa solutions are deployed by customers of all sizes in financial services, healthcare, retail, energy/utility, telecommunications, transportation and manufacturing to solve a wide range of identity management challenges. Aveksa is a comprehensive solution – it spans multiple, heterogeneous IT systems for both on-premise and SaaS systems, and is designed to be easily integrated into an enterprise's infrastructure.
Aveksa aligns with RSA's intelligence-driven security strategy, leveraging insight from roles, processes, and security-oriented Big Data to enable better evaluation, prioritization, detection and response to real-time threats. For example, Aveksa's ability to provide rich identity context could be used to enhance situational awareness within the RSA Security Analytics solution.
Aveksa products also complement RSA's strong authentication, access management and federation solutions portfolio. Together, RSA and Aveksa have the opportunity to fuse notions of authentication and identity as part of an Adaptive Identity platform, leveraging Big Data analytics to transform identity assurance and access controls to ensure only legitimate users have appropriate access to sensitive corporate information.
Art Coviello, RSA Executive Chairman and Executive Vice President, EMC Corporation
"Today's enterprises face significant challenges around Identity and Access Management. The adoption of cloud-based IT infrastructures and the pervasive use of mobile means that security organizations are being asked to secure and provide access to assets they don't own, manage, or control. Without the deep intelligence able to provide insight into what users should and should not have access to, traditional tools that simply automate IAM leave organizations exposed to the risk of excessive privilege, data breaches and regulatory non-compliance. Together, RSA and Aveksa see tremendous opportunity to help our customers overcome these IAM challenges."
Vick Vaishnavi, Aveksa Corp. Chief Executive Officer
"We are excited about joining the RSA team and the strategic alignment between our organizations. Over the years, our customers have benefited from Aveksa's comprehensive, business-driven IAM solutions. Together with RSA, we can continue our journey to adaptive identity management that addresses today's ever-evolving access challenges. We will continue to provide our customers and the broader market with best-in-class solutions that reduce business risk and enable efficient operations."
· RSA Blog: "Rebooting IAM: Transforming IT at its Foundation"
· Aveksa Blog: "An Ending, a Beginning, and the Next Phase of IAM"
· RSA Technology Brief: "Adaptive IAM: Defending the Borderless Enterprise"
Learn more about Aveksa, Inc.
Learn more about RSA Trusted Identity Management solutions
Learn more about Trusted IT from EMC
Connect with RSA via Twitter, Facebook, YouTube, LinkedIn and the RSA Speaking of Security Blog and Podcast.
RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world's leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats.
Combining agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services, RSA brings visibility and trust to millions of user identities, the data they create, the transactions they perform, and the IT infrastructure they rely on. For more information, please visit www.EMC.com/RSA.
EMC Corporation is a global leader in enabling businesses and service providers to transform their operations and deliver IT as a service. Fundamental to this transformation is cloud computing. Through innovative products and services, EMC accelerates the journey to cloud computing, helping IT departments to store, manage, protect and analyze their most valuable asset -- information -- in a more agile, trusted and cost-efficient way. Additional information about EMC can be found at www.EMC.com.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Get the Gartner Report: SOC Model Guide
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage