Risk
5/16/2009
09:24 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Lieberman, Microsoft System Center Ensure Compliance

Enterprise Random Password Manager and Random Password Manager integrate with Microsoft System Center to securely manage privileged accounts

LOS ANGELES, May 13, 2009 --Lieberman Software's privileged account password management packages for Microsoft System Center Configuration Manager and Microsoft System Center Operations Manager enable enterprise organizations to meet the stringent password update and identity management standards of regulatory compliance regulations.

Administrative, super user, root, fire call, and other privileged accounts are pervasive in any organization. More numerous than personal passwords, these "keys to the kingdom" grant access to programs and files containing an organization's most sensitive data. If they are not properly protected and managed, they represent a significant security and compliance risk to the organization via sabotage or theft of proprietary information. Security compliance regulations " such as Sarbanes-Oxley, PCI DSS, HIPAA and NERC/FERC " call for frequent changes to privileged account passwords to prevent unauthorized personnel from being able to access mission-critical systems. "IT auditors recognize that unmonitored, uncontrolled access to privileged accounts leaves an organization wide open to data theft, privacy breaches, and fraud and must be properly secured and managed," said Chris Stoneff, product manager at Lieberman Software. "By integrating our privileged identity management solutions Enterprise Random Password Manager and Random Password Manager into the GUI shell of System Center Operations Manager and System Center Configuration Manager, access to privileged accounts is secure and easily managed from a centralized console."

System Center Integration Lieberman Software products integrate seamlessly with System Center Operations Manager to alert administrators to what users and the Help Desk are doing with privileged accounts from a single console. The integrations address critical security information event management (SIEM) issues.

Enterprise Random Password Manager and Random Password Manager feed events to Systems Center based on password change, password verification, and password check-in/check-out job results. These events can be used by customers to automatically open and close trouble tickets based on end-user behavior and system responses to password management tasks. This allows Systems Center to take immediate action should the system encounter security misuse or operational readiness issues.

In addition, by enabling Enterprise Random Password Manager and Random Password Manager to be managed and monitored by System Center Operations Manager through a management pack provided by Lieberman Software, mutual customers can meet the burden of regulatory compliance by:

  • Receiving real-time security events and alerts should external factors, such as network or database problems, cause disruptions to regulatory-based Service Level Agreements (SLA) requirements.
  • Automatically changing local, domain, and service account passwords on every system in the enterprise at regular intervals.
  • Creating an audit trail of privileged account password changes.
  • Maintaining strict, delegated controls for users with privileged account access.
  • Automatically managing the RunAs credentials within System Center. The announcement was made at Microsoft Tech-Ed 2009 where Lieberman Software is exhibiting in booth 217.

    To learn more about Enterprise Random Password Manager, Random Password Manager and other innovative solutions; visit www.liebsoft.com or call 1-800-829-6263.

    About Lieberman Software Corporation Lieberman Software provides privileged identity management and configuration management solutions that help control the local security of the cross-platform enterprise. By automating time intensive systems administration tasks, Lieberman Software increases control over the IT infrastructure, subsequently reducing security vulnerabilities, improving productivity, minimizing system failures, and ensuring compliance. Since 1994 Lieberman Software has been providing solutions which ensure that the largest corporate, education, and government enterprises remain managed, secure, and compliant. The company is a managed Microsoft Gold Certified Partner headquartered in Los Angeles, CA. For more information, see www.liebsoft.com.

    Comment  | 
    Print  | 
    More Insights
  • Register for Dark Reading Newsletters
    White Papers
    Cartoon
    Current Issue
    Dark Reading Tech Digest, Dec. 19, 2014
    Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
    Flash Poll
    Video
    Slideshows
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2014-8370
    Published: 2015-01-29
    VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, VMware Fusion 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allow host OS users to gain host OS privileges or cause a denial of service (arbitrary write to a file) by modifying a configuration file.

    CVE-2015-0236
    Published: 2015-01-29
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.

    CVE-2015-1043
    Published: 2015-01-29
    The Host Guest File System (HGFS) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware Fusion 6.x before 6.0.5 and 7.x before 7.0.1 allows guest OS users to cause a guest OS denial of service via unspecified vectors.

    CVE-2015-1044
    Published: 2015-01-29
    vmware-authd (aka the Authorization process) in VMware Workstation 10.x before 10.0.5, VMware Player 6.x before 6.0.5, and VMware ESXi 5.0 through 5.5 allows attackers to cause a host OS denial of service via unspecified vectors.

    CVE-2015-1422
    Published: 2015-01-29
    Multiple cross-site scripting (XSS) vulnerabilities in Gecko CMS 2.2 and 2.3 allow remote attackers to inject arbitrary web script or HTML via the (1) horder[], (2) jak_catid, (3) jak_content, (4) jak_css, (5) jak_delete_log[], (6) jak_email, (7) jak_extfile, (8) jak_file, (9) jak_hookshow[], (10) j...

    Best of the Web
    Dark Reading Radio
    Archived Dark Reading Radio
    If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.