HOUSTON, Nov. 15, 2016 /PRNewswire/ -- BMC, the global leader in IT solutions for the digital enterprise, today announced enhancements to its BMC Discovery solution that both make it more open for other systems to interact with it while also increasing security and efficiency. Through a RESTful API, BMC Discovery v11.1 now provides an open platform enabling other systems to take advantage of rich discovery data and drive discovery configuration. The new version also enhances time-to-value and security by leveraging seamless integration with the CyberArk Privileged Account Security Solution to manage and secure privileged access to scanned environments.
Organizations seeking more agility and efficiency are simultaneously struggling with an increasing amount of systems, applications, devices, and data in their networks. The BMC Discovery v11.1 solution closes the gaps by allowing third-party systems to trigger model updates or endpoint scans in reaction to infrastructure and software changes. For example, BMC Discovery now includes a configurable event-based integration to poll discovered VMware vCenters for events to represent changes to VMs as they occur. "We don't typically think of openness and security as being complementary attributes, as they are more commonly thought to be opposed to one another," said Nayaki Nayyar, president of Digital Service Management at BMC. "As our customers fast track digital business, they are looking to take a more proactive security posture while also dramatically increasing efficiency. BMC Discovery v11.1 accomplishes both by becoming much more open to other systems and applications while also developing a tighter relationship with their privileged account security solution." BMC's seamless integration with the CyberArk Privileged Account Security Solution in BMC Discovery v11.1 automatically and securely leverages credentials from the CyberArk solution to perform authenticated scans. Credential rotation is automatically optimized and completed based on policy. This reduces deployment time while it mitigates threats, reduces risk, and enhances compliance.