Welcome!

News Feed Item

Lieberman Software Enables Audited, Privileged Access for Users From the Cloud to On-Premises

Enterprise Random Password Manager Provides Unified Privilege Management Platform Across Multiple Environments

LOS ANGELES, CA--(Marketwired - May 13, 2014) - Lieberman Software Corporation is introducing new privileged user management (PUM) capabilities in Enterprise Random Password Manager™ (ERPM) at Microsoft TechEd 2014 in Houston, TX this week. The new PUM capabilities allow users to launch cross-platform applications in a secure environment, where elevated operations are automatically authorized, recorded and audited. ERPM now offers connectors for a broad array of cloud provider portals, SAAS vendors and social media platforms.

"With this ERPM upgrade, users who need secure and audited privileged access -- whether in the cloud, locally, or on the web -- can now have it," said Philip Lieberman, President and CEO of Lieberman Software. "While other PUM products use proprietary standards, our new offering provides an open integration platform where customers can add systems and applications of their choice -- often in less than an hour."

"ERPM is also easy to scale to large enterprise environments," Lieberman continued. "This can be accomplished by simply adding Microsoft Server 2012 Terminal Services licenses and Windows machines as needed, or through the recently announced Microsoft Azure RemoteApp." 

With ERPM's new application launcher, users can access remote applications and web sites through a secure local server. Access is granted using passwords provided by ERPM's encrypted credentials vault, and activities are documented through built-in session recording systems.

About ERPM and Privilege Management
ERPM is an established enterprise-level privileged identity management solution that automatically discovers, secures and audits privileged accounts, both on-premises and in the cloud. With its new privileged user management capabilities, ERPM now also allows users to securely perform tasks that require elevated permissions, with fine-grained control and auditing.

With ERPM, an organization's powerful privileged accounts are only available to delegated users on a temporary, "need-to-know" basis -- preventing unauthorized, anonymous access to critical systems.

According to the 2014 Verizon Data Breach Investigations Report, privilege abuse is today's top insider threat. This threat emanates from trusted users abusing their own privileges, as well as hacking techniques that allow unauthorized users to gain elevated privileges and bypass security controls.1

ERPM Availability and Roadmap
The new version of ERPM supports integrated use of SSH keys for authentication, discovery and propagation of privileged identities, including support for SSH tunnels.

Other new ERPM features include:

  • Integrations with JIRA and OTRS service management systems, to verify trouble tickets and privileged access requirements in real-time.
  • A revised console that provides granular access delegation duties based on specific user roles and responsibilities. 
  • A broader range of RDP experiences, allowing users to take advantage of full remote desktop connection and Network Level Authentication support.

Management of VMware accounts will be added in a minor update in the coming weeks. The company upgrades ERPM with new functionality approximately twice per year.

The new ERPM version has been running in customer beta sites since 2013, and is being publicly demonstrated for the first time in booth 1209 at Microsoft TechEd this week.

For more information on ERPM, visit www.liebsoft.com/erpm.

1Verizon, "2014 Data Breach Investigations Report," 2014.

About Lieberman Software Corporation
Lieberman Software provides privileged identity management products to more than 1200 enterprise customers worldwide. By automatically locating, securing and continuously auditing privileged accounts, Lieberman Software helps protect access to systems with sensitive data, thereby reducing internal and external security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. The company developed the first solution for the privileged account management space, and its products continue to lead the market. Lieberman Software also provides a line of Windows security management tools. The company is headquartered in Los Angeles, CA, with offices and channel partners located around the world. For more information, visit www.liebsoft.com.

Product and company names herein may be trademarks of their registered owners.

For more information, please contact:
Kevin Franks
Marketing Communications Manager
Lieberman Software Corporation
310-300-3562
Email contact
Email contact
Email contact
Email contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...