|By Marketwired .||
|June 23, 2014 11:30 AM EDT||
LOS ANGELES, CA--(Marketwired - June 23, 2014) - Given the reality of today's advanced persistent threats (APTs) and sophisticated nation-state cyber attacks, virtually all enterprises have already been breached. However, by controlling and hardening privileged credentials, an organization can deny intruders broad access inside the network and prevent them from covertly accessing and extracting sensitive information at will.
This real-world approach to securing enterprise networks in the face of APTs is the subject of Philip Lieberman's presentation "Next Generation Technology Approaches to Manage Privileged Identities, Users and Applications" at this week's Gartner Security and Risk Management Summit. The session will be held on Tuesday, June 24 at 2:45 p.m. ET in the Potomac C room of the Gaylord National in National Harbor, Md. Lieberman is the President and CEO of Lieberman Software Corporation, a Premier Sponsor at this event and an exhibitor in booth 325.
"Conventional detect and respond tools like firewalls and intrusion prevention systems (IPS) react too late to stop zero-day exploits launched by highly skilled, professional-level attackers," Lieberman said. "IT security in most enterprises is analogous to a candy with a hard shell and a gooey interior. Today's attackers can break through the outer security -- the shell -- almost at will. Since interior security is so soft, full control over victims' networks can be obtained in a matter of minutes."
"The reality of this porous perimeter is that we must assume that attacks will succeed and intrusions will occur," he continued. "Therefore, IT departments need to ask -- what happens after a machine is compromised, a key logger is loaded, and usernames and passwords are available to the criminals? How far into the network can the hackers reach, and for how long?"
Restrict Targeted Intrusions with Privilege Management
To defend against APTs and cyber criminals, organizations can implement automated privilege management solutions. Privilege management minimizes lateral motion of intruders inside the network, time-limits the value of privileged credentials, and controls the scope of access inside the IT environment to authorized and audited users with valid reasons for access.
"If you assume that one or more of your machines has become owned by an outsider -- via a successful social engineering attack, for example -- then privilege management is a proven active defense solution to limit how far the attacker can expand in the environment, and mitigate how long a captured credential can be exploited," Lieberman said. "To complete the earlier analogy, privilege management replaces that gooey IT interior security by adding a consistent security texture all the way through the enterprise. In essence, even if an attacker has obtained user names and passwords, they are of very little use beyond the initial breached system. The stolen credentials can't help them leapfrog from system to system within the environment, and extract sensitive data along the way."
With enterprise-grade privilege management, an organization can maintain a continuous, up-to-date list of systems and accounts -- including administrative logins, service accounts, and application passwords. Privilege management can then ensure that each system has unique, complex and frequently changing passwords. There are no shared credentials that attackers can use to access multiple systems. Disclosed passwords are changed immediately after use, so no one retains knowledge of "password secrets" for the future.
"The key to privilege management is the ability to automatically discover and remediate security breaches before cyber attackers can exploit them," Lieberman said.
The Lieberman Software Solution
Lieberman Software's Enterprise Random Password Manager™ (ERPM) is a privilege management platform with proven privileged identity management functionality that automatically detects, secures and audits privileged accounts throughout the cross-platform enterprise, both on-premises and in the cloud. It ensures that privileged identities are only available on a temporary, delegated basis to prevent unauthorized and anonymous access to systems with sensitive data.
ERPM was recently enhanced with a new privileged access management module that provides authorized users with automated access to corporate applications -- whether on-premises, in the cloud or third-party -- without disclosing passwords. Elevated operations performed by users are automatically recorded and audited. Users are granted quick and full access to the business applications they need to perform their job roles. However, privileged credentials that manage access to the applications are never known to users, and cannot be accessed without triggering an audit trail.
For more information see www.liebsoft.com/enterprise_random_password_manager.
About Lieberman Software Corporation
Lieberman Software provides award-winning privilege management products to more than 1200 enterprise customers worldwide, including nearly half of the Fortune 50. By automatically locating, securing and continuously auditing privileged identities, both on-premises and in the cloud, Lieberman Software helps protect access to systems with sensitive data, thereby reducing internal and external security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. The company developed the first solution for the privilege management space, and its products, including Enterprise Random Password Manager (ERPM), continue to lead the market. Lieberman Software also provides a mature line of Windows security management tools. The company is headquartered in Los Angeles, CA, with offices and channel partners located around the world. For more information, visit www.liebsoft.com.
Product and company names herein may be trademarks of their registered owners.
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 6, 2016 07:00 AM EDT Reads: 1,063
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 6, 2016 07:00 AM EDT Reads: 1,217
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 6, 2016 06:00 AM EDT Reads: 1,517
In his session at @ThingsExpo, Chris Klein, CEO and Co-founder of Rachio, will discuss next generation communities that are using IoT to create more sustainable, intelligent communities. One example is Sterling Ranch, a 10,000 home development that – with the help of Siemens – will integrate IoT technology into the community to provide residents with energy and water savings as well as intelligent security. Everything from stop lights to sprinkler systems to building infrastructures will run ef...
May. 6, 2016 04:00 AM EDT Reads: 1,338
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
May. 6, 2016 02:45 AM EDT Reads: 1,296
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
May. 6, 2016 02:00 AM EDT Reads: 1,415
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 6, 2016 01:45 AM EDT Reads: 1,435
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 6, 2016 01:30 AM EDT Reads: 1,401
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
May. 6, 2016 01:00 AM EDT Reads: 1,264
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 6, 2016 12:00 AM EDT Reads: 1,490
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
May. 5, 2016 11:30 PM EDT Reads: 1,364
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 5, 2016 05:00 PM EDT Reads: 1,387
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
May. 5, 2016 05:00 PM EDT Reads: 1,288
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 5, 2016 04:00 PM EDT Reads: 798
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
May. 5, 2016 04:00 PM EDT Reads: 1,210