BeyondTrust Acquires Vulnerability Management Pioneer eEye Digital Security
Combined company to deliver unmatched protection strategy for internal and external threats targeting today[singlequote]s dynamic enterprises
CARLSBAD, Calif. – May 9, 2012 – BeyondTrust, the leading provider of privilege delegation and authorization management solutions, today announced it has acquired eEye Digital Security, one the industry[singlequote]s most well respected vulnerability management solution providers. Together the companies will offer the market[singlequote]s most comprehensive solution for intelligent, context-driven security and compliance.
In just the last year, the industry has witnessed several [singlequote]game-changer[singlequote] types of attacks and data breaches that demonstrate just how complex threats have become. As they often leverage known vulnerabilities on machines with elevated privileges, these attacks emphasize the need for protection from both internal and external threats. Proactive measures are needed to protect against highly targeted and persistent attacks that focus on the data – customer information, intellectual property, and patient data, for example – that is sought after in today[singlequote]s criminal underworld.
"Attacks today are more sophisticated than ever, with client-side attacks becoming the most prevalent method of entry, leveraging known vulnerabilities and exploiting user[singlequote]s rights and privileges to pilfer sensitive data from enterprises," said John Mutch, CEO at BeyondTrust. "Through the acquisition of eEye, BeyondTrust will deliver unmatched solutions to protect against both internal and external threats, spanning data and endpoint protection, rights management and vulnerability management. The result is a more cost-effective way to operate secure networks and satisfy governance initiatives."
BeyondTrust plans to integrate eEye[singlequote]s Retina CS Vulnerability Management and Analytics solutions with PowerBroker family of products to deliver the market[singlequote]s first truly context-driven security and compliance solutions. The combination of these award-winning technologies dramatically simplifies the enhanced prioritization of vulnerabilities with additional context of privilege, privilege use, data sensitivity, and data flow. Customers will see immediate benefits from dynamic privilege-use policies tied to asset risk and application exposure.
In a recent Gartner March 2012 report titled, Information Security is Becoming a Big Data Analytics Problem, authored by VP and Fellow, Neil MacDonald, one the primary key findings highlighted states, "Security monitoring generates big data, but big data is only a means to an end. The end goal is improved, risk-based information security decision making based on prioritized, actionable insight derived from the data." Under the Recommendations section of the report, Mr. MacDonald advises organizations to, "Pressure solution providers to deliver a context-aware, risk-based view of IT, combining threat intelligence, vulnerability knowledge, compliance and business impact."
Founded in 1998 by Marc Maiffret, eEye Digital Security offers enterprise software, appliances and services to help organizations protect their assets – including mobile, virtual and those in the cloud - from critical threats. eEye[singlequote]s Retina CS technology provides security intelligence which prioritizes vulnerabilities and threats, as well as remediation to protect against critical threats. eEye[singlequote]s Blink® Endpoint Protection technology has been recognized "Visionary" status in Gartner[singlequote]s Magic Quadrants for Endpoint Protection Platforms. eEye has over 10,000 customers across the globe, supporting both commercial and government agencies.
Both companies are deployed in high-profile environments, with more than half of the companies listed on the Dow Jones Industrial Average relying on BeyondTrust to secure their enterprises while eEye has been selected by the Department of Defense for eight consecutive years to protect the critical networks of the armed services. Additionally, BeyondTrust customers include eight of the world[singlequote]s 10 largest banks, seven of the world[singlequote]s 10 largest aerospace and defense firms, six of the 10 largest U.S. pharmaceutical companies as well as renowned universities.
BeyondTrust is hosting a conference call to discuss the acquisition. More information can be found here: https://www1.gotomeeting.com/register/629204048.
For more information about BeyondTrust visit www.beyondtrust.com.
Founded in 1985, BeyondTrust is the global leader in privilege authorization management, access control and security solutions for physical, virtual, cloud and infrastructure computing environments. The company’s products mitigate insider threats and secure the perimeter within across the enterprise, empowering IT governance to strengthen security, improve productivity, drive compliance and reduce expense.
More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust’s PowerBroker suite of products to secure their enterprises.
Five of the top ten commercial banks and two of America’s largest private companies have adopted PowerBroker to secure guest operating systems and ESX hypervisors in a virtualized environment. For more information, visit www.beyondtrust.com.
BeyondTrust, the BeyondTrust logo and PowerBroker are trademarks or registered trademarks, in the United States and certain other countries of BeyondTrust Software. Additional company and product names may be trademarks or registered trademarks of the individual companies and are respectfully acknowledged.
*Gartner, Inc., Magic Quadrant for Endpoint Protect Platforms, P. Firstbrook, N. MacDonald, J. Girard, January 12, 2012.
About the Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner[singlequote]s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
For More Information, Contact: