Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/10/2012
06:01 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

BeyondTrust Buys eEye

eEye co-founder Marc Maiffret now CTO of BeyondTrust

User privilege management firm BeyondTrust has purchased vulnerability management vendor eEye Digital Security and will integrate the two vendors' product lines for a more risk-based and context-aware perspective.

eEye co-founder and CTO Marc Maiffret will become CTO of BeyondTrust, and the eEye brand name will disappear. Maiffret co-founded eEye and has served as CTO for the past two years after serving as FireEye's chief security architect and launching a boutique consulting firm in 2008. He initially left eEye in 2007, around 10 years after founding the company.

"The biggest thing [enterprises] are trying to figure out is how to make smart decisions based on context that's specific to the business," Maiffret says. "What works in security is making proper decisions that are tailored to the business -- making sure there's proper privilege management, the right things around configuration, and getting patches deployed."

That's the end goal of the acquisition, according to Jim Zierick, executive vice president of product operations at BeyondTrust. "The threat landscape our customers are facing ... is changing. The way they dealt with it in the past was to assess the external threats and vulnerabilities separately, and then deal with insiders with privileged access. That's no longer a good enough answer," Zierick says. "Attackers are using a combination of threat vectors" to steal intellectual property, for instance, he says.

Zierick says combining BeyondTrust and eEye will create context-aware, risk-management-type offerings that let companies fix key vulnerabilities based on the risk they pose to them, for instance. "We are going to integrate our products. My product operations team is working with eEye now to figure out how to do that," he says. "This is embracing the vision eEye has been driving around Retina for better access to the true context and using that information to prioritize decisions and act to secure vulnerabilities."

BeyondTrust specifically will integrate eEye’s Retina CS Vulnerability Management and Analytics solutions with BeyondTrust's PowerBroker family, a move it says will simplify prioritizing vulnerabilities within the context of user privilege and the business. eEye's product names for Retina, Blink, and other offerings will remain intact.

"This meets a need we've heard from our customers for a single pane of glass beyond our product line," he says, one that combines patch management, policy, and who can access what.

BeyondTrust would not release financial details of the deal, but says the combined entity will total more than 250 employees, including 100 in research and development. "We've never had the background of Marc and his research team that understands the business problem and the evolution of security and the way hackers and people think," Zierick says. "Marc is a unique resource for companies like us that don't have that kind of capability."

Maiffret almost overnight went from teen hacker/phone phreaker raided by the FBI to co-founder of eEye, where he discovered several critical Windows vulnerabilities in the late 1990s and later was part of the team of researchers at eEye who was one of the first to detect (and later name) the first major Microsoft worm, Code Red.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...