Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/10/2012
06:01 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

BeyondTrust Buys eEye

eEye co-founder Marc Maiffret now CTO of BeyondTrust

User privilege management firm BeyondTrust has purchased vulnerability management vendor eEye Digital Security and will integrate the two vendors' product lines for a more risk-based and context-aware perspective.

eEye co-founder and CTO Marc Maiffret will become CTO of BeyondTrust, and the eEye brand name will disappear. Maiffret co-founded eEye and has served as CTO for the past two years after serving as FireEye's chief security architect and launching a boutique consulting firm in 2008. He initially left eEye in 2007, around 10 years after founding the company.

"The biggest thing [enterprises] are trying to figure out is how to make smart decisions based on context that's specific to the business," Maiffret says. "What works in security is making proper decisions that are tailored to the business -- making sure there's proper privilege management, the right things around configuration, and getting patches deployed."

That's the end goal of the acquisition, according to Jim Zierick, executive vice president of product operations at BeyondTrust. "The threat landscape our customers are facing ... is changing. The way they dealt with it in the past was to assess the external threats and vulnerabilities separately, and then deal with insiders with privileged access. That's no longer a good enough answer," Zierick says. "Attackers are using a combination of threat vectors" to steal intellectual property, for instance, he says.

Zierick says combining BeyondTrust and eEye will create context-aware, risk-management-type offerings that let companies fix key vulnerabilities based on the risk they pose to them, for instance. "We are going to integrate our products. My product operations team is working with eEye now to figure out how to do that," he says. "This is embracing the vision eEye has been driving around Retina for better access to the true context and using that information to prioritize decisions and act to secure vulnerabilities."

BeyondTrust specifically will integrate eEye’s Retina CS Vulnerability Management and Analytics solutions with BeyondTrust's PowerBroker family, a move it says will simplify prioritizing vulnerabilities within the context of user privilege and the business. eEye's product names for Retina, Blink, and other offerings will remain intact.

"This meets a need we've heard from our customers for a single pane of glass beyond our product line," he says, one that combines patch management, policy, and who can access what.

BeyondTrust would not release financial details of the deal, but says the combined entity will total more than 250 employees, including 100 in research and development. "We've never had the background of Marc and his research team that understands the business problem and the evolution of security and the way hackers and people think," Zierick says. "Marc is a unique resource for companies like us that don't have that kind of capability."

Maiffret almost overnight went from teen hacker/phone phreaker raided by the FBI to co-founder of eEye, where he discovered several critical Windows vulnerabilities in the late 1990s and later was part of the team of researchers at eEye who was one of the first to detect (and later name) the first major Microsoft worm, Code Red.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19012
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
CVE-2019-19022
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
CVE-2019-19035
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
CVE-2019-19011
PUBLISHED: 2019-11-17
MiniUPnP ngiflib 0.4 has a NULL pointer dereference in GifIndexToTrueColor in ngiflib.c via a file that lacks a palette.
CVE-2019-19010
PUBLISHED: 2019-11-16
Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.