Welcome!

News Feed Item

Lieberman Software Enables Audited, Privileged Access for Users From the Cloud to On-Premises

Enterprise Random Password Manager Provides Unified Privilege Management Platform Across Multiple Environments

LOS ANGELES, CA--(Marketwired - May 13, 2014) - Lieberman Software Corporation is introducing new privileged user management (PUM) capabilities in Enterprise Random Password Manager™ (ERPM) at Microsoft TechEd 2014 in Houston, TX this week. The new PUM capabilities allow users to launch cross-platform applications in a secure environment, where elevated operations are automatically authorized, recorded and audited. ERPM now offers connectors for a broad array of cloud provider portals, SAAS vendors and social media platforms.

"With this ERPM upgrade, users who need secure and audited privileged access -- whether in the cloud, locally, or on the web -- can now have it," said Philip Lieberman, President and CEO of Lieberman Software. "While other PUM products use proprietary standards, our new offering provides an open integration platform where customers can add systems and applications of their choice -- often in less than an hour."

"ERPM is also easy to scale to large enterprise environments," Lieberman continued. "This can be accomplished by simply adding Microsoft Server 2012 Terminal Services licenses and Windows machines as needed, or through the recently announced Microsoft Azure RemoteApp." 

With ERPM's new application launcher, users can access remote applications and web sites through a secure local server. Access is granted using passwords provided by ERPM's encrypted credentials vault, and activities are documented through built-in session recording systems.

About ERPM and Privilege Management
ERPM is an established enterprise-level privileged identity management solution that automatically discovers, secures and audits privileged accounts, both on-premises and in the cloud. With its new privileged user management capabilities, ERPM now also allows users to securely perform tasks that require elevated permissions, with fine-grained control and auditing.

With ERPM, an organization's powerful privileged accounts are only available to delegated users on a temporary, "need-to-know" basis -- preventing unauthorized, anonymous access to critical systems.

According to the 2014 Verizon Data Breach Investigations Report, privilege abuse is today's top insider threat. This threat emanates from trusted users abusing their own privileges, as well as hacking techniques that allow unauthorized users to gain elevated privileges and bypass security controls.1

ERPM Availability and Roadmap
The new version of ERPM supports integrated use of SSH keys for authentication, discovery and propagation of privileged identities, including support for SSH tunnels.

Other new ERPM features include:

  • Integrations with JIRA and OTRS service management systems, to verify trouble tickets and privileged access requirements in real-time.
  • A revised console that provides granular access delegation duties based on specific user roles and responsibilities. 
  • A broader range of RDP experiences, allowing users to take advantage of full remote desktop connection and Network Level Authentication support.

Management of VMware accounts will be added in a minor update in the coming weeks. The company upgrades ERPM with new functionality approximately twice per year.

The new ERPM version has been running in customer beta sites since 2013, and is being publicly demonstrated for the first time in booth 1209 at Microsoft TechEd this week.

For more information on ERPM, visit www.liebsoft.com/erpm.

1Verizon, "2014 Data Breach Investigations Report," 2014.

About Lieberman Software Corporation
Lieberman Software provides privileged identity management products to more than 1200 enterprise customers worldwide. By automatically locating, securing and continuously auditing privileged accounts, Lieberman Software helps protect access to systems with sensitive data, thereby reducing internal and external security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. The company developed the first solution for the privileged account management space, and its products continue to lead the market. Lieberman Software also provides a line of Windows security management tools. The company is headquartered in Los Angeles, CA, with offices and channel partners located around the world. For more information, visit www.liebsoft.com.

Product and company names herein may be trademarks of their registered owners.

For more information, please contact:
Kevin Franks
Marketing Communications Manager
Lieberman Software Corporation
310-300-3562
Email contact
Email contact
Email contact
Email contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Archi...
"We're here to tell the world about our cloud-scale infrastructure that we have at Juniper combined with the world-class security that we put into the cloud," explained Lisa Guess, VP of Systems Engineering at Juniper Networks, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
In his session at 20th Cloud Expo, Brad Winett, Senior Technologist for DDN Storage, will present several current, end-user environments that are using object storage at scale for cloud deployments including private cloud and cloud providers. Details on the top considerations of features and functions for selecting object storage will be included. Brad will also touch on recent developments in tiering technologies that deliver single solution and an end-user view of data across files and objects...
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
DXWorldEXPO LLC announced today that the upcoming DXWorldEXPO | CloudEXPO New York event will feature 10 companies from Poland to participate at the "Poland Digital Transformation Pavilion" on November 12-13, 2018.