Analytics
11/9/2010
12:32 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Lieberman Identity Management For Dell Servers

Solution builds upon the existing security of DRAC products

(LOS ANGELES, CA – November 8, 2010) Lieberman Software Corporation, the Pioneers of Privileged Identity ManagementSM, today announced the immediate availability of a Dell ™ Systems Management ISV Certified solution to discover Dell Remote Access Controllers (DRACs) in PowerEdge ™ servers and control access to their user accounts. The solution builds upon the existing security of DRAC products and makes it easier for organizations to comply with government and industry regulations that require secured account passwords.

“Lieberman Software is the first member of the Dell PartnerDirect ISV Program to be certified for managing the privileged identities that control access to DRAC devices,” said Kevin Noreen, Senior Product Manager for Systems Management, Dell Enterprise Product Group. “Dell PowerEdge server customers rely on DRAC devices for powerful, easy-to-use, remote management and configuration options that simplify IT management and enhance security. Lieberman’s Enterprise Random Password Manager (ERPM) and Random Password Manager (RPM) solutions underwent a rigorous certification process. Now our mutual customers will benefit from these incremental security measures when managing privileged access to DRAC devices.”

Typical remote access devices are accessible by distinct network addresses and are often pre-configured with default credentials. Organizations that do not manage root account logins on these devices risk exposing access to unauthorized individuals and lack an audit trail reflecting access information.

Without an automated solution to control the privileged account passwords on remote access card, many administrators enroll each controller in the organization’s directory services – a time-consuming and complex process. Others attempt to track and change these logins manually or use a common, shared password among large groups of remote access controller devices.

The Lieberman Software solution enables organizations to maintain frequently changed, unique credentials for every DRAC on the network – credentials that are provided only on a need-to-know basis and changed after each use. Access to the credentials is granted through an audited web portal.

The Lieberman Software – Dell Remote Access Controller Integration

Effective immediately, Lieberman Software integrates its fully-functioning support for Dell Remote Access Controller (DRAC) devices in the company’s privileged identity management solutions Enterprise Random Password Manager (ERPM) and Random Password Manager (RPM). The integration is available at no additional charge to the ERPM and RPM licenses, allowing organizations to automatically discover, secure, store and securely recover DRAC login credentials on Dell PowerEdge servers throughout the enterprise. Lieberman Software products deploy quickly to alleviate the difficulties associated with manually updating the accounts on these devices, allowing organizations to bring their remote access controller into compliance with regulatory mandates for securing privileged accounts.

“Our strategy is to manage privileged identities from the iron to the application – in both physical and virtual environments,” said Philip Lieberman, president and CEO of Lieberman Software. “This announcement demonstrates our expertise in controlling privileged identities by managing a fundamental component of virtually all cloud host environments, regardless of operating system. This capability is also critical to non-cloud datacenters, including large enterprises that rely on DRAC devices and other IPMI-compliant lights-out management cards.”

More information is available at http://www.liebsoft.com/drac_integration/.

About Lieberman Software Corporation

Lieberman Software provides privileged identity management and security management solutions that secure the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity, and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software developed the first software in the marketplace to address this need. The company is headquartered in Los Angeles, CA with a support office in Austin, TX. For more information, see www.liebsoft.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5452
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier does not anticipate the possibility of invalid C-CDA documents with crafted XML attributes, which allows remote attackers to conduct XSS attacks via a document containing a table that is improperly handled during unrestricted xsl:copy operations.

CVE-2014-6041
Published: 2014-09-02
The Android Browser application 4.2.1 on Android allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick="window.open('\u0000javascript: sequence.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.