Networking

10:50 PM
Connect Directly
RSS
E-Mail
50%
50%

BeyondTrust Acquires Assets Of Likewise Software To Expand Access Management Business

BeyondTrust, a maker of identity and access management software, has acquired some of the assets of Likewise Software in order to enable access management in cross-platform environments of Windows, Linux, Unix and Mac OS X operating systems. The Likewise acquisition will also further enable BeyondTrust to protect customers in both cloud and on-premise environments.

BeyondTrust, a maker of identity and access management software, has acquired some of the assets of Likewise Software in order to enable access management in cross-platform environments of Windows, Linux, Unix and Mac OS X operating systems. The Likewise acquisition will also further enable BeyondTrust to protect customers in both cloud and on-premise environments.

Likewise Enterprise and Likewise Open software products will be renamed PowerBroker Identity Services-Enterprise Edition and PowerBroker Identity Services-Open Edition, respectively, consistent with BeyondTrust’s PowerBroker branding for other products. Likewise will continue in operation, offering data governance products for storage systems. Terms of the asset acquisition deal were not disclosed.

With the Identity Services products, IT managers can offer single sign-on convenience for users whose access is controlled through Microsoft’s Active Directory, even if they are on a Linux, Unix or Mac system, says Jim Zierick, executive VP of product operations at BeyondTrust. Without it, users would need unique sign-on identities for each operating system. BeyondTrust already has a product called Directory Integrator that does single sign-on for multiple OSes. BeyondTrust will continue to support Directory Integrator, but it is not as feature-rich as Identity Services.

"Our value proposition is to give them [customers] a consistent, policy-based way to control who has privileged access to what infrastructure," says Zierick.

Identity and access management is a critical component of an enterprise’s network security, he says, given that many breaches are caused by an insider threat in which an employee gains access to sensitive files by abusing access privileges. Access management software determines which employees have access to which parts of the network. The software also monitors and audits access records to identify when unauthorized access may have occurred.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Cartoon
Hot Topics
7
VMware NSX Banks On Security
Marcia Savage, Managing Editor, Network Computing,  8/28/2014
5
How To Survive In Networking
Susan Fogarty, Editor in Chief,  8/28/2014
White Papers
Register for Network Computing Newsletters
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Slideshows
Twitter Feed