Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/10/2012
06:01 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

BeyondTrust Buys eEye

eEye co-founder Marc Maiffret now CTO of BeyondTrust

User privilege management firm BeyondTrust has purchased vulnerability management vendor eEye Digital Security and will integrate the two vendors' product lines for a more risk-based and context-aware perspective.

eEye co-founder and CTO Marc Maiffret will become CTO of BeyondTrust, and the eEye brand name will disappear. Maiffret co-founded eEye and has served as CTO for the past two years after serving as FireEye's chief security architect and launching a boutique consulting firm in 2008. He initially left eEye in 2007, around 10 years after founding the company.

"The biggest thing [enterprises] are trying to figure out is how to make smart decisions based on context that's specific to the business," Maiffret says. "What works in security is making proper decisions that are tailored to the business -- making sure there's proper privilege management, the right things around configuration, and getting patches deployed."

That's the end goal of the acquisition, according to Jim Zierick, executive vice president of product operations at BeyondTrust. "The threat landscape our customers are facing ... is changing. The way they dealt with it in the past was to assess the external threats and vulnerabilities separately, and then deal with insiders with privileged access. That's no longer a good enough answer," Zierick says. "Attackers are using a combination of threat vectors" to steal intellectual property, for instance, he says.

Zierick says combining BeyondTrust and eEye will create context-aware, risk-management-type offerings that let companies fix key vulnerabilities based on the risk they pose to them, for instance. "We are going to integrate our products. My product operations team is working with eEye now to figure out how to do that," he says. "This is embracing the vision eEye has been driving around Retina for better access to the true context and using that information to prioritize decisions and act to secure vulnerabilities."

BeyondTrust specifically will integrate eEye’s Retina CS Vulnerability Management and Analytics solutions with BeyondTrust's PowerBroker family, a move it says will simplify prioritizing vulnerabilities within the context of user privilege and the business. eEye's product names for Retina, Blink, and other offerings will remain intact.

"This meets a need we've heard from our customers for a single pane of glass beyond our product line," he says, one that combines patch management, policy, and who can access what.

BeyondTrust would not release financial details of the deal, but says the combined entity will total more than 250 employees, including 100 in research and development. "We've never had the background of Marc and his research team that understands the business problem and the evolution of security and the way hackers and people think," Zierick says. "Marc is a unique resource for companies like us that don't have that kind of capability."

Maiffret almost overnight went from teen hacker/phone phreaker raided by the FBI to co-founder of eEye, where he discovered several critical Windows vulnerabilities in the late 1990s and later was part of the team of researchers at eEye who was one of the first to detect (and later name) the first major Microsoft worm, Code Red.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
HackerOne Drops Mobile Voting App Vendor Voatz
Dark Reading Staff 3/30/2020
Limited-Time Free Offers to Secure the Enterprise Amid COVID-19
Curtis Franklin Jr., Senior Editor at Dark Reading,  3/31/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11547
PUBLISHED: 2020-04-05
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
CVE-2020-11548
PUBLISHED: 2020-04-05
The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin/index.php?page=search-meter Export is performed.
CVE-2020-11542
PUBLISHED: 2020-04-04
3xLOGIC Infinias eIDC32 2.213 devices with Web 1.107 allow Authentication Bypass via CMD.HTM?CMD= because authentication depends on the client side's interpretation of the <KEY>MYKEY</KEY> substring.
CVE-2020-11533
PUBLISHED: 2020-04-04
Ivanti Workspace Control before 10.4.30.0, when SCCM integration is enabled, allows local users to obtain sensitive information (keying material).
CVE-2020-11529
PUBLISHED: 2020-04-04
Common/Grav.php in Grav before 1.6.23 has an Open Redirect.