News Feed Item

Privilege Management Provides Defense Against Land-and-Expand Cyber Attacks

Lieberman Software Explains How Advanced Persistent Threats (APTs) Are Almost Impossible to Stop, but Damage Can Be Limited With Privilege Management and Secure Network Design

LOS ANGELES, CA--(Marketwired - June 23, 2014) - Given the reality of today's advanced persistent threats (APTs) and sophisticated nation-state cyber attacks, virtually all enterprises have already been breached. However, by controlling and hardening privileged credentials, an organization can deny intruders broad access inside the network and prevent them from covertly accessing and extracting sensitive information at will.

This real-world approach to securing enterprise networks in the face of APTs is the subject of Philip Lieberman's presentation "Next Generation Technology Approaches to Manage Privileged Identities, Users and Applications" at this week's Gartner Security and Risk Management Summit. The session will be held on Tuesday, June 24 at 2:45 p.m. ET in the Potomac C room of the Gaylord National in National Harbor, Md. Lieberman is the President and CEO of Lieberman Software Corporation, a Premier Sponsor at this event and an exhibitor in booth 325.

"Conventional detect and respond tools like firewalls and intrusion prevention systems (IPS) react too late to stop zero-day exploits launched by highly skilled, professional-level attackers," Lieberman said. "IT security in most enterprises is analogous to a candy with a hard shell and a gooey interior. Today's attackers can break through the outer security -- the shell -- almost at will. Since interior security is so soft, full control over victims' networks can be obtained in a matter of minutes."

"The reality of this porous perimeter is that we must assume that attacks will succeed and intrusions will occur," he continued. "Therefore, IT departments need to ask -- what happens after a machine is compromised, a key logger is loaded, and usernames and passwords are available to the criminals? How far into the network can the hackers reach, and for how long?"

Restrict Targeted Intrusions with Privilege Management

To defend against APTs and cyber criminals, organizations can implement automated privilege management solutions. Privilege management minimizes lateral motion of intruders inside the network, time-limits the value of privileged credentials, and controls the scope of access inside the IT environment to authorized and audited users with valid reasons for access. 

"If you assume that one or more of your machines has become owned by an outsider -- via a successful social engineering attack, for example -- then privilege management is a proven active defense solution to limit how far the attacker can expand in the environment, and mitigate how long a captured credential can be exploited," Lieberman said. "To complete the earlier analogy, privilege management replaces that gooey IT interior security by adding a consistent security texture all the way through the enterprise. In essence, even if an attacker has obtained user names and passwords, they are of very little use beyond the initial breached system. The stolen credentials can't help them leapfrog from system to system within the environment, and extract sensitive data along the way."

With enterprise-grade privilege management, an organization can maintain a continuous, up-to-date list of systems and accounts -- including administrative logins, service accounts, and application passwords. Privilege management can then ensure that each system has unique, complex and frequently changing passwords. There are no shared credentials that attackers can use to access multiple systems. Disclosed passwords are changed immediately after use, so no one retains knowledge of "password secrets" for the future.

"The key to privilege management is the ability to automatically discover and remediate security breaches before cyber attackers can exploit them," Lieberman said.

The Lieberman Software Solution
Lieberman Software's Enterprise Random Password Manager™ (ERPM) is a privilege management platform with proven privileged identity management functionality that automatically detects, secures and audits privileged accounts throughout the cross-platform enterprise, both on-premises and in the cloud. It ensures that privileged identities are only available on a temporary, delegated basis to prevent unauthorized and anonymous access to systems with sensitive data.

ERPM was recently enhanced with a new privileged access management module that provides authorized users with automated access to corporate applications -- whether on-premises, in the cloud or third-party -- without disclosing passwords. Elevated operations performed by users are automatically recorded and audited. Users are granted quick and full access to the business applications they need to perform their job roles. However, privileged credentials that manage access to the applications are never known to users, and cannot be accessed without triggering an audit trail.

For more information see www.liebsoft.com/enterprise_random_password_manager.

About Lieberman Software Corporation
Lieberman Software provides award-winning privilege management products to more than 1200 enterprise customers worldwide, including nearly half of the Fortune 50. By automatically locating, securing and continuously auditing privileged identities, both on-premises and in the cloud, Lieberman Software helps protect access to systems with sensitive data, thereby reducing internal and external security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. The company developed the first solution for the privilege management space, and its products, including Enterprise Random Password Manager (ERPM), continue to lead the market. Lieberman Software also provides a mature line of Windows security management tools. The company is headquartered in Los Angeles, CA, with offices and channel partners located around the world. For more information, visit www.liebsoft.com.

Product and company names herein may be trademarks of their registered owners.

For more information, please contact:

Kevin Franks
Marketing Communications Manager
Lieberman Software Corporation
Email contactEmail contactEmail contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, will draw together recent research and lessons learned from emerging and established ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
DevOps theory promotes a culture of continuous improvement built on collaboration, empowerment, systems thinking, and feedback loops. But how do you collaborate effectively across the traditional silos? How can you make decisions without system-wide visibility? How can you see the whole system when it is spread across teams and locations? How do you close feedback loops across teams and activities delivering complex multi-tier, cloud, container, serverless, and/or API-based services?
Without lifecycle traceability and visibility across the tool chain, stakeholders from Planning-to-Ops have limited insight and answers to who, what, when, why and how across the DevOps lifecycle. This impacts the ability to deliver high quality software at the needed velocity to drive positive business outcomes. In his session at @DevOpsSummit 19th Cloud Expo, Eric Robertson, General Manager at CollabNet, will show how customers are able to achieve a level of transparency that enables everyon...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
Today every business relies on software to drive the innovation necessary for a competitive edge in the Application Economy. This is why collaboration between development and operations, or DevOps, has become IT’s number one priority. Whether you are in Dev or Ops, understanding how to implement a DevOps strategy can deliver faster development cycles, improved software quality, reduced deployment times and overall better experiences for your customers.
So you think you are a DevOps warrior, huh? Put your money (not really, it’s free) where your metrics are and prove it by taking The Ultimate DevOps Geek Quiz Challenge, sponsored by DevOps Summit. Battle through the set of tough questions created by industry thought leaders to earn your bragging rights and win some cool prizes.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...