Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/10/2012
06:01 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

BeyondTrust Buys eEye

eEye co-founder Marc Maiffret now CTO of BeyondTrust

User privilege management firm BeyondTrust has purchased vulnerability management vendor eEye Digital Security and will integrate the two vendors' product lines for a more risk-based and context-aware perspective.

eEye co-founder and CTO Marc Maiffret will become CTO of BeyondTrust, and the eEye brand name will disappear. Maiffret co-founded eEye and has served as CTO for the past two years after serving as FireEye's chief security architect and launching a boutique consulting firm in 2008. He initially left eEye in 2007, around 10 years after founding the company.

"The biggest thing [enterprises] are trying to figure out is how to make smart decisions based on context that's specific to the business," Maiffret says. "What works in security is making proper decisions that are tailored to the business -- making sure there's proper privilege management, the right things around configuration, and getting patches deployed."

That's the end goal of the acquisition, according to Jim Zierick, executive vice president of product operations at BeyondTrust. "The threat landscape our customers are facing ... is changing. The way they dealt with it in the past was to assess the external threats and vulnerabilities separately, and then deal with insiders with privileged access. That's no longer a good enough answer," Zierick says. "Attackers are using a combination of threat vectors" to steal intellectual property, for instance, he says.

Zierick says combining BeyondTrust and eEye will create context-aware, risk-management-type offerings that let companies fix key vulnerabilities based on the risk they pose to them, for instance. "We are going to integrate our products. My product operations team is working with eEye now to figure out how to do that," he says. "This is embracing the vision eEye has been driving around Retina for better access to the true context and using that information to prioritize decisions and act to secure vulnerabilities."

BeyondTrust specifically will integrate eEye’s Retina CS Vulnerability Management and Analytics solutions with BeyondTrust's PowerBroker family, a move it says will simplify prioritizing vulnerabilities within the context of user privilege and the business. eEye's product names for Retina, Blink, and other offerings will remain intact.

"This meets a need we've heard from our customers for a single pane of glass beyond our product line," he says, one that combines patch management, policy, and who can access what.

BeyondTrust would not release financial details of the deal, but says the combined entity will total more than 250 employees, including 100 in research and development. "We've never had the background of Marc and his research team that understands the business problem and the evolution of security and the way hackers and people think," Zierick says. "Marc is a unique resource for companies like us that don't have that kind of capability."

Maiffret almost overnight went from teen hacker/phone phreaker raided by the FBI to co-founder of eEye, where he discovered several critical Windows vulnerabilities in the late 1990s and later was part of the team of researchers at eEye who was one of the first to detect (and later name) the first major Microsoft worm, Code Red.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
Sodinokibi Ransomware: Where Attackers' Money Goes
Kelly Sheridan, Staff Editor, Dark Reading,  10/15/2019
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18218
PUBLISHED: 2019-10-21
cdf_read_property_info in cdf.c in file through 5.37 does not restrict the number of CDF_VECTOR elements, which allows a heap-based buffer overflow (4-byte out-of-bounds write).
CVE-2019-18217
PUBLISHED: 2019-10-21
ProFTPD before 1.3.6b and 1.3.7rc before 1.3.7rc2 allows remote unauthenticated denial-of-service due to incorrect handling of overly long commands because main.c in a child process enters an infinite loop.
CVE-2019-16862
PUBLISHED: 2019-10-21
Reflected XSS in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 allows a remote attacker to execute arbitrary code in the context of a user's session via the pid parameter.
CVE-2019-17409
PUBLISHED: 2019-10-21
Reflected XSS exists in interface/forms/eye_mag/view.php in OpenEMR 5.x before 5.0.2.1 ia the id parameter.
CVE-2019-10715
PUBLISHED: 2019-10-21
There is Stored XSS in Verodin Director before 3.5.4.0 via input fields of certain tooltips, and on the Tags, Sequences, and Actors pages.