RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Aveksa

Company

In July, 2013 EMC announced acquisition of Aveksa private company, developer of IAM solutions (Identity and Access Management/management identification and access) for business. According to the reached agreements Aveksa will function within RSA, division of security of EMC, and its solutions will become a part of a product line of Identity Trust Management from RSA. Financial terms of transaction do not reveal.

Owners:
RSA (Security Division of EMC)

Owners

As expected, jointly RSA and Aveksa will be able to give to the companies an opportunity to automate complete lifecycle of identification of users according to requirements of business and to transform the traditional IAM systems to more flexible, intellectual and scaled "situational perimeters". Aveksa offers clients the unified toolbar for management, control and providing access, helping to provide accomplishment the politician of identification and access for physical and cloud environments.

It is remarkable that solutions of both RSA, and Aveksa are intended for the companies of any sizes of the most different industries (the financial sector, health care, retail, telecommunications, power, manufacturing industry, transportations). Aveksa provides the comprehensive solution covering a set of heterogeneous IT systems and capable it is easy to be integrated into corporate infrastructure.

Aveksa acquisition completely corresponds to the strategy of security of RSA directed to increase in efficiency of the analysis, prioritizing, detecting and response to threats on the scale of real time, emphasized in EMC. For example, the opportunity for delivery of a context of identification data (identity context) implemented in the solution Aveksa will allow to increase the situational awareness provided with the solution RSA Security Analytics.

Besides, according to EMC, RSA and Aveksa will be able to integrate the principles of authentication and identification within the adaptive platform (Adaptive Identity platform) and, thanks to analytics of Big Data, to optimize means of identification and access control so that only the registered users could get access to confidential corporate information (taking into account their rights or job responsibilities).