BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to Security in Context

Bringing you news and commentary on solutions and strategies for protecting critical IT infrastructure in the context of your business.

Marc Maiffret: I’m Back at eEye

Posted July 12, 2010    Marc Maiffret

As you now know, I’m back at the company I co-founded, serving as CTO of eEye. It has been a few years, but my heart never left this company. To me, eEye has always been an idea greater than any product. It is the idea that modern societies will become increasingly dependent on technology, not just as something nice to have, but as a foundation for a way of life. Without a doubt, technology creates a better world through openness of information and access, which brings down barriers and allows for amazing advancements in many fields. As with all advancements and progress, however, there are going to be hurdles.

One hurdle is finding a balance between progress/innovation and security/reliability. This is compounded by the fact that now more than ever, security threats are not driven by teenage pranksters but by foreign governments and extremely well-funded criminal organizations. Make no mistake that when my colleagues and I show up to eEye every day, we feel not simply a part of a successful company, but part of a larger fight to protect a current and future way of life.

Having lived and breathed vulnerabilities for more than 13 years, my return to eEye continues my commitment to helping IT Security Professionals win the difficult battle of protecting their critical IT assets. Whether it was holding Microsoft accountable back in the day and seeing their dramatic shift into becoming one of the most secure software development companies or providing IT folks free tools to help combat the rampant computer worms of yester years – my passion has remained the same and my commitment to IT unwavering.

eEye will continue to lead through innovation. Some of today’s foundational vulnerability management concepts, such as the ability to perform non-intrusive scanning, were our innovations and appeared first in our products. It took years for our competitors to catch up and offer non-intrusive scanning. Today, eEye is the only major provider to offer a robust host-based VM agent that not only performs local active scans for security weaknesses, but also prevents zero-day attacks attempting to leverage vulnerabilities that do not yet have a patch.

We’ve innovated and led the way, but this doesn’t mean we sit back and rest on our successes. We have an aggressive plan to continue to pioneer this space. I’m thrilled to be back on the eEye team again and look forward to continuing the conversation. Good things to come for sure…

Tags:
,

Leave a Reply

Additional articles

Troubleshooting Windows Privilege Management Rules with Policy Monitor

Posted August 21, 2014    Jason Silva

When defining and testing PowerBroker for Windows rules for production or pilots, customers sometimes tell us, “I don’t think this policy / program is working.” This is usually a case of the policy not properly triggering because of the way the rule was created. A unique feature of PowerBroker for Windows compared to other solutions is a client-side…

Tags:
, , ,
darren-mar-elia

BeyondTrust Webcast: Darren Mar-Elia’s 4 Active Directory Change Scenarios to Track

Posted August 20, 2014    Chris Burd

In our latest webcast, we joined Darren Mar-Elia, CTO at SDM Software, to discuss best practices for Active Directory (AD) change management. Here are some key takeaways from the presentation, followed by a link to a full-length video of the presentation. Mar-Elia kicks things off with a critical insight: that the best AD change management…

Tags:
, , , , , , ,
normal-blog-img

New IT Security Best Practices for Maintaining “Business as Usual” Despite Evolving Threats

Posted August 13, 2014    Morey Haber

It’s time to get back to business. Here in the U.S., summer vacations are wrapping up and businesses are looking forward to closing out 2014. Over the past year, we’ve seen several incidents that warrant changes in the ways consumers make purchases and businesses conduct transactions. Consider last week’s theft of a whopping 1.2 billion…

Tags:
, , ,