Risk
5/16/2009
09:24 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lieberman, Microsoft System Center Ensure Compliance

Enterprise Random Password Manager and Random Password Manager integrate with Microsoft System Center to securely manage privileged accounts

LOS ANGELES, May 13, 2009 --Lieberman Software's privileged account password management packages for Microsoft System Center Configuration Manager and Microsoft System Center Operations Manager enable enterprise organizations to meet the stringent password update and identity management standards of regulatory compliance regulations.

Administrative, super user, root, fire call, and other privileged accounts are pervasive in any organization. More numerous than personal passwords, these "keys to the kingdom" grant access to programs and files containing an organization's most sensitive data. If they are not properly protected and managed, they represent a significant security and compliance risk to the organization via sabotage or theft of proprietary information. Security compliance regulations " such as Sarbanes-Oxley, PCI DSS, HIPAA and NERC/FERC " call for frequent changes to privileged account passwords to prevent unauthorized personnel from being able to access mission-critical systems. "IT auditors recognize that unmonitored, uncontrolled access to privileged accounts leaves an organization wide open to data theft, privacy breaches, and fraud and must be properly secured and managed," said Chris Stoneff, product manager at Lieberman Software. "By integrating our privileged identity management solutions Enterprise Random Password Manager and Random Password Manager into the GUI shell of System Center Operations Manager and System Center Configuration Manager, access to privileged accounts is secure and easily managed from a centralized console."

System Center Integration Lieberman Software products integrate seamlessly with System Center Operations Manager to alert administrators to what users and the Help Desk are doing with privileged accounts from a single console. The integrations address critical security information event management (SIEM) issues.

Enterprise Random Password Manager and Random Password Manager feed events to Systems Center based on password change, password verification, and password check-in/check-out job results. These events can be used by customers to automatically open and close trouble tickets based on end-user behavior and system responses to password management tasks. This allows Systems Center to take immediate action should the system encounter security misuse or operational readiness issues.

In addition, by enabling Enterprise Random Password Manager and Random Password Manager to be managed and monitored by System Center Operations Manager through a management pack provided by Lieberman Software, mutual customers can meet the burden of regulatory compliance by:

  • Receiving real-time security events and alerts should external factors, such as network or database problems, cause disruptions to regulatory-based Service Level Agreements (SLA) requirements.
  • Automatically changing local, domain, and service account passwords on every system in the enterprise at regular intervals.
  • Creating an audit trail of privileged account password changes.
  • Maintaining strict, delegated controls for users with privileged account access.
  • Automatically managing the RunAs credentials within System Center. The announcement was made at Microsoft Tech-Ed 2009 where Lieberman Software is exhibiting in booth 217.

    To learn more about Enterprise Random Password Manager, Random Password Manager and other innovative solutions; visit www.liebsoft.com or call 1-800-829-6263.

    About Lieberman Software Corporation Lieberman Software provides privileged identity management and configuration management solutions that help control the local security of the cross-platform enterprise. By automating time intensive systems administration tasks, Lieberman Software increases control over the IT infrastructure, subsequently reducing security vulnerabilities, improving productivity, minimizing system failures, and ensuring compliance. Since 1994 Lieberman Software has been providing solutions which ensure that the largest corporate, education, and government enterprises remain managed, secure, and compliant. The company is a managed Microsoft Gold Certified Partner headquartered in Los Angeles, CA. For more information, see www.liebsoft.com.

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Dark Reading Tech Digest, Dec. 19, 2014
    Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
    Flash Poll
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-8142
    Published: 2014-12-20
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

    CVE-2013-4440
    Published: 2014-12-19
    Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

    CVE-2013-4442
    Published: 2014-12-19
    Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

    CVE-2013-7401
    Published: 2014-12-19
    The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

    CVE-2014-2026
    Published: 2014-12-19
    Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.