Feeds

IBM takes a shine to Lighthouse, gobbles bouncer-in-the-cloud biz

If your username's not down, you're not logging in

Intelligent flash storage arrays

IBM has acquired upstart Lighthouse Security Group, which lets sysadmins manage user accounts and identities in an off-premises cloud.

Big Blue said the privately held Rhode Island firm will, fittingly, join the IT giant's Security Identity and Access Management group. Lighthouse already bases its Gateway service on IBM's Tivoli enterprise software, so the deal should have minimal impact on customers.

Prior to the acquisition, Lighthouse Security Group operated as a subsidiary of Lighthouse Computer Services. IBM said it will not be announcing terms of the biz gobble, which has already concluded.

"Business models are rapidly evolving as employees conduct more of their work offsite. Protecting this data and who has access to it has become a challenge, costing our clients time and money," IBM Security Services general manager Kris Lovejoy said in a release announcing the acquisition deal.

"With this acquisition, IBM provides a unique identity and access management offering that combines proven software and analytics technology with expert managed services that make it easy for businesses to tackle the complexities of security in this new digital world."

Big Blue said that it plans to tie up the Lighthouse deal with its earlier acquisition of fellow enterprise identity security firm CrossIdeas.

Like Lighthouse, CrossIdeas handles stuff like identity and access management. Big Blue hopes bundling the two firms into its own offerings will help to improve the overall quality of its identity security and management offerings. The deal will also bring back a founding group from Lighthouse, which broke away from IBM Tivoli to launch the security firm in 1995. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.