Analytics
11/9/2010
12:32 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lieberman Identity Management For Dell Servers

Solution builds upon the existing security of DRAC products

(LOS ANGELES, CA – November 8, 2010) Lieberman Software Corporation, the Pioneers of Privileged Identity ManagementSM, today announced the immediate availability of a Dell ™ Systems Management ISV Certified solution to discover Dell Remote Access Controllers (DRACs) in PowerEdge ™ servers and control access to their user accounts. The solution builds upon the existing security of DRAC products and makes it easier for organizations to comply with government and industry regulations that require secured account passwords.

“Lieberman Software is the first member of the Dell PartnerDirect ISV Program to be certified for managing the privileged identities that control access to DRAC devices,” said Kevin Noreen, Senior Product Manager for Systems Management, Dell Enterprise Product Group. “Dell PowerEdge server customers rely on DRAC devices for powerful, easy-to-use, remote management and configuration options that simplify IT management and enhance security. Lieberman’s Enterprise Random Password Manager (ERPM) and Random Password Manager (RPM) solutions underwent a rigorous certification process. Now our mutual customers will benefit from these incremental security measures when managing privileged access to DRAC devices.”

Typical remote access devices are accessible by distinct network addresses and are often pre-configured with default credentials. Organizations that do not manage root account logins on these devices risk exposing access to unauthorized individuals and lack an audit trail reflecting access information.

Without an automated solution to control the privileged account passwords on remote access card, many administrators enroll each controller in the organization’s directory services – a time-consuming and complex process. Others attempt to track and change these logins manually or use a common, shared password among large groups of remote access controller devices.

The Lieberman Software solution enables organizations to maintain frequently changed, unique credentials for every DRAC on the network – credentials that are provided only on a need-to-know basis and changed after each use. Access to the credentials is granted through an audited web portal.

The Lieberman Software – Dell Remote Access Controller Integration

Effective immediately, Lieberman Software integrates its fully-functioning support for Dell Remote Access Controller (DRAC) devices in the company’s privileged identity management solutions Enterprise Random Password Manager (ERPM) and Random Password Manager (RPM). The integration is available at no additional charge to the ERPM and RPM licenses, allowing organizations to automatically discover, secure, store and securely recover DRAC login credentials on Dell PowerEdge servers throughout the enterprise. Lieberman Software products deploy quickly to alleviate the difficulties associated with manually updating the accounts on these devices, allowing organizations to bring their remote access controller into compliance with regulatory mandates for securing privileged accounts.

“Our strategy is to manage privileged identities from the iron to the application – in both physical and virtual environments,” said Philip Lieberman, president and CEO of Lieberman Software. “This announcement demonstrates our expertise in controlling privileged identities by managing a fundamental component of virtually all cloud host environments, regardless of operating system. This capability is also critical to non-cloud datacenters, including large enterprises that rely on DRAC devices and other IPMI-compliant lights-out management cards.”

More information is available at http://www.liebsoft.com/drac_integration/.

About Lieberman Software Corporation

Lieberman Software provides privileged identity management and security management solutions that secure the multi-platform enterprise. By automating time-intensive IT administration tasks, Lieberman Software increases control over the computing infrastructure, reduces security vulnerabilities, improves productivity, and helps ensure regulatory compliance. As Pioneers of Privileged Identity ManagementSM Lieberman Software developed the first software in the marketplace to address this need. The company is headquartered in Los Angeles, CA with a support office in Austin, TX. For more information, see www.liebsoft.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3407
Published: 2014-11-27
The SSL VPN implementation in Cisco Adaptive Security Appliance (ASA) Software 9.3(.2) and earlier does not properly allocate memory blocks during HTTP packet handling, which allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCuq68888.

CVE-2014-4829
Published: 2014-11-27
Cross-site request forgery (CSRF) vulnerability in IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allows remote attackers to hijack the authentication of arbitrary users for requests tha...

CVE-2014-4831
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to hijack sessions via unspecified vectors.

CVE-2014-4832
Published: 2014-11-27
IBM Security QRadar SIEM and QRadar Risk Manager 7.1 before MR2 Patch 9 and 7.2 before 7.2.4 Patch 1, and QRadar Vulnerability Manager 7.2 before 7.2.4 Patch 1, allow remote attackers to obtain sensitive cookie information by sniffing the network during an HTTP session.

CVE-2014-4883
Published: 2014-11-27
resolv.c in the DNS resolver in uIP, and dns.c in the DNS resolver in lwIP 1.4.1 and earlier, does not use random values for ID fields and source ports of DNS query packets, which makes it easier for man-in-the-middle attackers to conduct cache-poisoning attacks via spoofed reply packets.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?