Analytics
11/9/2010
12:32 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lieberman Identity Management For Dell Servers

Solution builds upon the existing security of DRAC products

(LOS ANGELES, CA – November 8, 2010) Lieberman Software Corporation, the Pioneers of Privileged Identity ManagementSM, today announced the immediate availability of a Dell ™ Systems Management ISV Certified solution to discover Dell Remote Access Controllers (DRACs) in PowerEdge ™ servers and control access to their user accounts. The solution builds upon the existing security of DRAC products and makes it easier for organizations to comply with government and industry regulations that require secured account passwords.

“Lieberman Software is the first member of the Dell PartnerDirect ISV Program to be certified for managing the privileged identities that control access to DRAC devices,” said Kevin Noreen, Senior Product Manager for Systems Management, Dell Enterprise Product Group. “Dell PowerEdge server customers rely on DRAC devices for powerful, easy-to-use, remote management and configuration options that simplify IT management and enhance security. Lieberman’s Enterprise Random Password Manager (ERPM) and Random Password Manager (RPM) solutions underwent a rigorous certification process. Now our mutual customers will benefit from these incremental security measures when managing privileged access to DRAC devices.”

Typical remote access devices are accessible by distinct network addresses and are often pre-configured with default credentials. Organizations that do not manage root account logins on these devices risk exposing access to unauthorized individuals and lack an audit trail reflecting access information.

Without an automated solution to control the privileged account passwords on remote access card, many administrators enroll each controller in the organization’s directory services – a time-consuming and complex process. Others attempt to track and change these logins manually or use a common, shared password among large groups of remote access controller devices.

The Lieberman Software solution enables organizations to maintain frequently changed, unique credentials for every DRAC on the network – credentials that are provided only on a need-to-know basis and changed after each use. Access to the credentials is granted through an audited web portal.

The Lieberman Software – Dell Remote Access Controller Integration

Effective immediately, Lieberman Software integrates its fully-functioning support for Dell Remote Access Controller (DRAC) devices in the company’s privileged identity management solutions Enterprise Random Password Manager (ERPM) and Random Password Manager (RPM). The integration is available at no additional charge to the ERPM and RPM licenses, allowing organizations to automatically discover, secure, store and securely recover DRAC login credentials on Dell PowerEdge servers throughout the enterprise. Lieberman Software products deploy quickly to alleviate the difficulties associated with manually updating the accounts on these devices, allowing organizations to bring their remote access controller into compliance with regulatory mandates for securing privileged accounts.

“Our strategy is to manage privileged identities from the iron to the application – in both physical and virtual environments,” said Philip Lieberman, president and CEO of Lieberman Software. “This announcement demonstrates our expertise in controlling privileged identities by managing a fundamental component of virtually all cloud host environments, regardless of operating system. This capability is also critical to non-cloud datacenters, including large enterprises that rely on DRAC devices and other IPMI-compliant lights-out management cards.”

More information is available at http://www.liebsoft.com/drac_integration/.

About Lieberman Software Corporation

Lieberman Software provides privileged identity management and security management solutions that secure the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity, and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software developed the first software in the marketplace to address this need. The company is headquartered in Los Angeles, CA with a support office in Austin, TX. For more information, see www.liebsoft.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8893
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) mainpage.jsp and (2) GetImageServlet.img in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8894
Published: 2015-01-28
Open redirect vulnerability in IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via the out parameter.

CVE-2014-8895
Published: 2015-01-28
IBM TRIRIGA Application Platform 3.2.1.x, 3.3.2 before 3.3.2.3, and 3.4.1 before 3.4.1.1 allows remote attackers to bypass intended access restrictions and read the image files of arbitrary users via a crafted URL.

CVE-2014-8917
Published: 2015-01-28
Multiple cross-site scripting (XSS) vulnerabilities in (1) dojox/form/resources/uploader.swf (aka upload.swf), (2) dojox/form/resources/fileuploader.swf (aka fileupload.swf), (3) dojox/av/resources/audio.swf, and (4) dojox/av/resources/video.swf in the IBM Dojo Toolkit, as used in IBM Social Media A...

CVE-2014-8920
Published: 2015-01-28
Buffer overflow in the Data Transfer Program in IBM i Access 5770-XE1 5R4, 6.1, and 7.1 on Windows allows local users to gain privileges via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.