View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Cybersecurity
January 22, 2013

Aveksa, HP collaborate to provide business identity and user context application

The development would allow enterprises to detect granting or use of sensitive entitlements.

By CBR Staff Writer

Identity and Access Management platform provider, Aveksa, has collaborated with HP to offer business identity and user context.

Aveska will use HP’s Security Intelligence platform in a bid to improve customers’ threat detection capabilities.

The collaboration is aimed at allowing customers leverage real-time activity and threat intelligence for closed-loop validation and implementation of enterprise access control processes.

HP Enterprise Security Business Development director Buck Watia said that enterprises are increasingly looking for tightly-integrated solutions to solve their complex IT security challenges while reducing operational complexity and critical security threats.

"HP is working with Aveksa to provide customers with enhanced context for identity and user access, which is crucial in quickly detecting threats and reducing business risk," Watia said.

Enterprises will benefit from added identity context of individual IT users, in addition to Security Information and Event Management (SIEM) solutions that offer visibility into activity across the IT infrastructure, such as external threats, internal threats and compliance pressures.

Aveksa chief technology officer Deepak Taneja said that in order for SIEM solutions to provide enterprises with the best threat detection, it is imperative they can distinguish between authorised and unauthorized access at a very granular level.

Content from our partners
An evolving cybersecurity landscape calls for multi-layered defence strategies
Powering AI’s potential: turning promise into reality
Unlocking growth through hybrid cloud: 5 key takeaways

"By working with HP, our customers benefit from a fully-integrated Identity/SIEM solution that enables a richer detection of threats by incorporating granular identity context, such as user roles, profiles, access rights and Information Security policies," Taneja said.

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU