BeyondTrust to Share IT Risk Mgmt Tool Under FireEye-Led Cyber Coalition; Ed Barry Comments

cyberBeyondTrust has joined a FireEye-led coalition in an effort to help government and commercial clients detect and respond to potential cyber attacks.

BeyondTrust will work to integrate its BeyondInsight IT Risk Management Platform with the FireEye-built Global Threat Management Platform under the cybersecurity coalition, BeyondTrust said Monday.

“The growing complexity of cybersecurity and protecting against advanced threats has made the work of security professionals increasingly complex, as more technologies and resulting alerts overwhelm their time and resources,” said Ed Barry, vice president of the cybersecurity coalition at FireEye.

Both companies will work to provide user and asset intelligence data to clients in an effort to help them detect network vulnerabilities and other security risks in cloud and on-premise network environments based on risk assessments, as well as comply with government and industry mandates on asset security and privileged access.

Check Also

John Cooney

Former ITA Official John Cooney to Lead SkyWater’s Government Engagements

John Cooney, a former official at the Department of Commerce's International Trade Administration, has joined semiconductor foundry services provider SkyWater Technology as director of U.S. government relations.

Ellen Lord

DoD Launches Pilot Programs for Software Procurement; Ellen Lord Quoted

The Department of Defense (DoD) has made continued efforts to transform software procurement across the military,  FedScoop reported Thursday. Ellen Lord, undersecretary of defense for acquisition and sustainment and four-time Wash100 Award recipient, has developed pilot programs to test the acquisition.

Analyst1

Analyst1 to Help DoD’s Innovation Org Develop Cyber Threat Intell Platform

Analyst1 has been selected help the Defense Innovation Unit transform cybersecurity operations through the development of an enterprise-grade technology that will work to automatically process threat intelligence data.