Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Funding/M&A

IBM Acquires Cloud-based IAM Firm Lighthouse Security Group

IBM has made yet another move to expand and enhance its Identity and Access Management (IAM) offerings, today announcing that it has acquired the business operations of Lighthouse Security Group, LLC. 

IBM has made yet another move to expand and enhance its Identity and Access Management (IAM) offerings, today announcing that it has acquired the business operations of Lighthouse Security Group, LLC. 

Founded in 2007, Lincoln, Rhode Island-based Lighthouse Security offers a cloud-hosted IAM gateway platform, which includes a suite of functionality based on IBM Security Identity and Access Management capabilities – including user provisioning, identity lifecycle governance, single sign-on, enterprise user registry services, federation, and user self service.  

IBM Logo

The move to acquire Lighthouse, which has been an IBM Business Partner, follows IBM’s very recent acquisition of CrossIdeas, a privately held Italian cybersecurity Startup that makes Access Governance software to help organizations manage user access to applications and data across on-premise and cloud environments.

According to IBM, integrating the technologies from Lighthouse and CrossIdeas will help the company offer a full suite of security software and services that protect and manage a user’s identity.

“Business models are rapidly evolving as employees conduct more of their work offsite. Protecting this data and who has access to it has become a challenge, costing our clients time and money,” said Kris Lovejoy, General Manager, IBM Security Services. “With this acquisition, IBM provides a unique identity and access management offering that combines proven software and analytics technology with expert managed services that make it easy for businesses to tackle the complexities of security in this new digital world.”

IBM has made more than a dozen acquisitions in security over the past decade and has had double-digit revenue growth for six consecutive quarters, with the company holding the #4 spot in the overall security software market in 2013, according to IDC.

Financial terms of the acquisition were not disclosed.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.