BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for May, 2012

Picture 3

BeyondTrust and eEye Acquisition Announcement Now On Demand

There’s been a good amount of buzz surrounding our announcement that BeyondTrust acquired eEye Digital Security. We’re very excited about it and the opportunity the combined company has to provide an unmatched protection strategy for both the internal and external threats that target today’s enterprise. A couple of days ago, executives from both BeyondTrust and…

Post by Sarah Lieber May 16, 2012
Tags:
, , , , , ,
CustomAuditsAndroid1-680x607

Retina Now Offers Custom Audits for Android Devices

When a marketing buzz word sticks like BYOD (Bring Your Own Device), it is inevitable to see it everywhere in an effort to capitalize on the momentum; blogs, literature, SEO, social media, etc. In the past, we have seen great terms like “ecosystem”, “framework”, and my personal favorite “distributed computing”, rise and fall in marketing….

Post by Morey Haber May 16, 2012
Tags:
, , , , ,
BT_2011

BeyondTrust Acquires eEye Digital Security

This morning BeyondTrust announced that we have acquired eEye Digital Security, a well-respected leader in vulnerability and threat management. This is a very exciting move which will accelerate our existing company velocity in the security, compliance, and governance markets. Register for a webcast to learn more about BeyondTrust’s acquisition of eEye Digital Security. When BeyondTrust…

Post by Peter McCalister May 10, 2012
thumb_default

eEye Digital Security Acquired by BeyondTrust

Earlier this morning we announced that eEye Digital Security has agreed to be acquired by BeyondTrust, the industry’s leading provider of Privileged Identity Management (PIM) solutions. This is a very exciting milestone in the history of eEye Digital Security, a company that has long been at the forefront of security product leadership and innovative security…

Post by Kevin Hickey May 10, 2012
lock

Is Your Organization Prepared Against Advanced Persistent Threats?

An advanced persistent threat (APT) is an attack by which an unauthorized person gains access to the network and stays there undetected for a long period of time. The intent of an advanced persistent threat is often to steal data than to damage the network. Sectors with high-value information, such as defense, manufacturing, financial, telecom…

Post by Peter McCalister May 9, 2012
Google

Well-Intentioned Employees Can Make Poor Judgment Calls

In 2007, Google’s Street View project began to collect “payload data” including e-mail addresses, text messages, and passwords from unsecured Wi-Fi networks of potentially hundreds of millions of people. More than a dozen countries began investigations of Street View in 2010 and in the United States, the Justice Department, the Federal Trade Commission, state attorney…

Post by Peter McCalister May 8, 2012
thumb_default

Our Newest Release – Retina CS 3.1

Our product team has just put the finishing touches on the newest release of Retina CS, our award-winning Threat Management Console. Version 3.1 expands our market leadership in innovation for helping IT secure the technologies being widely deployed today. As it has been since halfway through 2011, Retina CS remains the only unified vulnerability and…

Post by Mike Puterbaugh May 7, 2012
ponemon

Data Lost: Covering Your Assets

According to a recent CDW poll, one in four organizations experienced data loss in the past two years. Imagine the amount of customer, student, employee and patient information lost because of those incidents, never mind the ones that go unreported. Aligning with this shocking stat is that according to the same study, the number of…

Post by Peter McCalister May 4, 2012
Marc-Maiffret-NBCChicagoInterview-20121-98x98

NBC Chicago Interviews Marc Maiffret on Email Security

Recently, Marc Maiffret was interviewed on NBC Chicago about the security risks involved when unsubscribing from emails and how to best avoid being compromised by email spam (it does make up 80% of all email traffic in the United States, after all). Below is that interview and an excerpt from the article. Read the entire…

Post by Sarah Lieber May 1, 2012
Tags:
, , , , , ,