Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

BeyondTrust Acquires Assets Of Likewise Software To Expand Access Management Business

BeyondTrust, a maker of identity and access management software, has acquired some of the assets of Likewise Software in order to enable access management in cross-platform environments of Windows, Linux, Unix and Mac OS X operating systems. The Likewise acquisition will also further enable BeyondTrust to protect customers in both cloud and on-premise environments.

Likewise Enterprise and Likewise Open software products will be renamed PowerBroker Identity Services-Enterprise Edition and PowerBroker Identity Services-Open Edition, respectively, consistent with BeyondTrust’s PowerBroker branding for other products. Likewise will continue in operation, offering data governance products for storage systems. Terms of the asset acquisition deal were not disclosed.

With the Identity Services products, IT managers can offer single sign-on convenience for users whose access is controlled through Microsoft’s Active Directory, even if they are on a Linux, Unix or Mac system, says Jim Zierick, executive VP of product operations at BeyondTrust. Without it, users would need unique sign-on identities for each operating system. BeyondTrust already has a product called Directory Integrator that does single sign-on for multiple OSes. BeyondTrust will continue to support Directory Integrator, but it is not as feature-rich as Identity Services.

"Our value proposition is to give them [customers] a consistent, policy-based way to control who has privileged access to what infrastructure," says Zierick.

Identity and access management is a critical component of an enterprise’s network security, he says, given that many breaches are caused by an insider threat in which an employee gains access to sensitive files by abusing access privileges. Access management software determines which employees have access to which parts of the network. The software also monitors and audits access records to identify when unauthorized access may have occurred.

  • 1