Welcome!

News Feed Item

Privilege Management Provides Defense Against Land-and-Expand Cyber Attacks

Lieberman Software Explains How Advanced Persistent Threats (APTs) Are Almost Impossible to Stop, but Damage Can Be Limited With Privilege Management and Secure Network Design

LOS ANGELES, CA--(Marketwired - June 23, 2014) - Given the reality of today's advanced persistent threats (APTs) and sophisticated nation-state cyber attacks, virtually all enterprises have already been breached. However, by controlling and hardening privileged credentials, an organization can deny intruders broad access inside the network and prevent them from covertly accessing and extracting sensitive information at will.

This real-world approach to securing enterprise networks in the face of APTs is the subject of Philip Lieberman's presentation "Next Generation Technology Approaches to Manage Privileged Identities, Users and Applications" at this week's Gartner Security and Risk Management Summit. The session will be held on Tuesday, June 24 at 2:45 p.m. ET in the Potomac C room of the Gaylord National in National Harbor, Md. Lieberman is the President and CEO of Lieberman Software Corporation, a Premier Sponsor at this event and an exhibitor in booth 325.

"Conventional detect and respond tools like firewalls and intrusion prevention systems (IPS) react too late to stop zero-day exploits launched by highly skilled, professional-level attackers," Lieberman said. "IT security in most enterprises is analogous to a candy with a hard shell and a gooey interior. Today's attackers can break through the outer security -- the shell -- almost at will. Since interior security is so soft, full control over victims' networks can be obtained in a matter of minutes."

"The reality of this porous perimeter is that we must assume that attacks will succeed and intrusions will occur," he continued. "Therefore, IT departments need to ask -- what happens after a machine is compromised, a key logger is loaded, and usernames and passwords are available to the criminals? How far into the network can the hackers reach, and for how long?"

Restrict Targeted Intrusions with Privilege Management

To defend against APTs and cyber criminals, organizations can implement automated privilege management solutions. Privilege management minimizes lateral motion of intruders inside the network, time-limits the value of privileged credentials, and controls the scope of access inside the IT environment to authorized and audited users with valid reasons for access. 

"If you assume that one or more of your machines has become owned by an outsider -- via a successful social engineering attack, for example -- then privilege management is a proven active defense solution to limit how far the attacker can expand in the environment, and mitigate how long a captured credential can be exploited," Lieberman said. "To complete the earlier analogy, privilege management replaces that gooey IT interior security by adding a consistent security texture all the way through the enterprise. In essence, even if an attacker has obtained user names and passwords, they are of very little use beyond the initial breached system. The stolen credentials can't help them leapfrog from system to system within the environment, and extract sensitive data along the way."

With enterprise-grade privilege management, an organization can maintain a continuous, up-to-date list of systems and accounts -- including administrative logins, service accounts, and application passwords. Privilege management can then ensure that each system has unique, complex and frequently changing passwords. There are no shared credentials that attackers can use to access multiple systems. Disclosed passwords are changed immediately after use, so no one retains knowledge of "password secrets" for the future.

"The key to privilege management is the ability to automatically discover and remediate security breaches before cyber attackers can exploit them," Lieberman said.

The Lieberman Software Solution
Lieberman Software's Enterprise Random Password Manager™ (ERPM) is a privilege management platform with proven privileged identity management functionality that automatically detects, secures and audits privileged accounts throughout the cross-platform enterprise, both on-premises and in the cloud. It ensures that privileged identities are only available on a temporary, delegated basis to prevent unauthorized and anonymous access to systems with sensitive data.

ERPM was recently enhanced with a new privileged access management module that provides authorized users with automated access to corporate applications -- whether on-premises, in the cloud or third-party -- without disclosing passwords. Elevated operations performed by users are automatically recorded and audited. Users are granted quick and full access to the business applications they need to perform their job roles. However, privileged credentials that manage access to the applications are never known to users, and cannot be accessed without triggering an audit trail.

For more information see www.liebsoft.com/enterprise_random_password_manager.

About Lieberman Software Corporation
Lieberman Software provides award-winning privilege management products to more than 1200 enterprise customers worldwide, including nearly half of the Fortune 50. By automatically locating, securing and continuously auditing privileged identities, both on-premises and in the cloud, Lieberman Software helps protect access to systems with sensitive data, thereby reducing internal and external security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. The company developed the first solution for the privilege management space, and its products, including Enterprise Random Password Manager (ERPM), continue to lead the market. Lieberman Software also provides a mature line of Windows security management tools. The company is headquartered in Los Angeles, CA, with offices and channel partners located around the world. For more information, visit www.liebsoft.com.

Product and company names herein may be trademarks of their registered owners.

For more information, please contact:

Kevin Franks
Marketing Communications Manager
Lieberman Software Corporation
310.300.3562
Email contactEmail contactEmail contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
SYS-CON Events announced today that 24Notion has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. 24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to con...
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
The initial debate is over: Any enterprise with a serious commitment to IT is migrating to the cloud. But things are not so simple. There is a complex mix of on-premises, colocated, and public-cloud deployments. In this power panel at 18th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will look at the present state of cloud from the C-level view, and how great companies and rock star executives can use cloud computing to meet their most ambitious and disruptive business ...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
In his session at 18th Cloud Expo, Andrew Cole, Director of Solutions Engineering at Peak 10, will discuss how the newest technology advances are reducing the cost and complexity of traditional business continuity and disaster recovery solutions. Attendees will: Learn why having a full disaster recovery strategy is more important now than ever before Explore the key drivers of a successful disaster recovery solution Achieve measurable operational and business value from a disaster recovery ...
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
SYS-CON Events announced today that Hanu Software will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Leveraging best-in-class people, processes, and technologies, Hanu provides high-quality, high-value software development and business process outsourcing services to independent software vendors (ISVs) and enterprises.
What a difference a year makes. Organizations aren’t just talking about IoT possibilities, it is now baked into their core business strategy. With IoT, billions of devices generating data from different companies on different networks around the globe need to interact. From efficiency to better customer insights to completely new business models, IoT will turn traditional business models upside down. In the new customer-centric age, the key to success is delivering critical services and apps wit...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, will explore the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences betwee...
SYS-CON Events announced today BZ Media LLC has been named “Media Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. BZ Media LLC is a high-tech media company that produces technical conferences and expositions, and publishes a magazine, newsletters and websites in the software development, SharePoint, mobile development and Commercial Drone markets.
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, will discuss the importance of WebRTC and how it enables companies to fo...
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...