Lieberman Software is a leader in the Privileged Identity Management market. This segment is also known as: Shared Account Password Management, Privileged Account Management, Privilege Management and Privileged Access Management. Our competitive strengths in this space are as follows:
Lieberman Software Corporation has the most experience and the strongest legacy around managing and securing privileged accounts in large enterprise environments -including service and process accounts. Our focus has always been to build into our Adaptive Privilege Management Platform all the functionality that our clients need to easily deploy and use our solution, without relying on expensive professional services.
Our technology is fundamentally different from other vendors in the privilege management space, who offer security appliances. We begin with the philosophy that access control inherently becomes more difficult to maintain over time. Most organizations don’t have up-to-the-minute catalogs of privileged identities, systems and account interdependencies for their global environments. To solve this problem, our privilege management solution incorporates automated continuous discovery and correlation to regain visibility and command over the IT environment.
Lieberman Software is the pioneer of automated privileged identity management, with comprehensive expertise in operational systems management. By automatically discovering, managing and securing privileged identities that appear whenever enterprises deploy and change IT resources, our products help secure access to systems with sensitive data. In doing so, Lieberman Software helps organizations reduce internal and external security vulnerabilities, improve IT productivity, achieve regulatory compliance, and mitigate what security experts call the “primary method for attackers to spread inside a target enterprise”. Our goal is to automate privileged account management and remove humans from the process. Hackers are using automated hacking tools to breach your network; you need to fight back with automated security solutions.
Superior Privileged Account Auto-Discovery, Correlation and Propagation Technology
Our solution incorporates continuous, automated discovery and correlation of privileged accounts. Competitors’ solutions require you to maintain complete knowledge of systems lists, credentials and their usage. When this information changes, you must manually input these changes as they occur.
Conversely, our technology immediately reduces the manual operations required to implement privileged identity management and SSH Key management, while providing ever improving coverage and transparency into your evolving IT infrastructure. For proof, open our console and see where your credentials are, how they are being used, and the details of their life cycle. Make a change in your environment and see how we automatically pick up the change. Because our solution continuously discovers where privileged accounts are used, it can rapidly propagate credentials updates to where these accounts are referenced. This prevents account lockouts and service failures that could otherwise occur when manual processes install obsolete credentials.
According to research published by IDC, we have “the largest verified deployment of a password manager/vault, consisting of hundreds of thousands of machines for privileged access management.”1 Our adaptive privilege management solution is built using industrial strength database technology provided by Microsoft SQL Server. We implement an n-tier architecture, which means that we can easily scale up for performance and scale out for reliability and fail-over. Our product also supports network load balancing and clustering technology.
With our adaptive privilege management solution, our customers can change credentials on 2000 systems per minute per node, allowing them to bring hundreds of thousands of systems under management very quickly. Our solution enables customers to change privileged credentials across their entire IT infrastructure as often as every couple hours.
Open Standards: No Proprietary Technology
Our solution is fully documented and does not contain proprietary components (security by obscurity). You can download our documentation, trial software, SDK and other materials from our web site. We don’t believe in proprietary solutions. We believe that our customers should be able to configure and upgrade their privileged identity management solution without having to purchase professional services. We turn over the keys to our product immediately and allow the product to do the work.
Rapid, Complete Enterprise Deployments – in Days, not Months
Our solution installs quickly, and is simple to configure and deploy. On a regular basis, we have customers successfully deploying on tens of thousands of machines in complex, geographically dispersed environments, within just a few days. Our adaptive privilege management solution has been designed from the ground up to be operationally efficient. Integrations with leading systems management, SIEM and help desk applications are fast and easy to implement.
Orchestration and Programmatic Access via PowerShell and Web Services
To keep pace with the demands of the largest cloud service providers and largest enterprise networks, our adaptive privilege management solution has evolved to a service platform where discovery, auditing and access control can be managed by machines instead of through direct human intervention. By giving you programmatic control our solution allows you to manage the entire privileged identity management lifecycle via any language or platform.
Security Auditor Involvement
We want to work with your security auditors to help you achieve regulatory compliance as soon as possible. Our solution prepares a full data warehouse for your auditors, and has management packs to monitor its availability. It can integrate with your existing SIEM systems to provide you with the ability to implement a continuous auditing profile for the management of privileged credentials. Many of our deployments are completed in less than a week, and our customers are then ready for a positive security audit outcome.
US Owned and Operated
Since our inception in 1978, we have been proud to be a profitable, management-owned company, not beholden to venture capital or investors. All of our product development is performed in-house at our Los Angeles, CA and Austin, TX offices.
To learn more about how Lieberman Software’s adaptive privilege management platform, contact us today.
Find out why more than 1,400 enterprises around the world, including nearly half of the Fortune 50, rely on us to secure their privileged account vulnerabilities and mitigate cyber attacks that penetrate the network perimeter.
1Pete Lindstrom, IDCMarketScape: Worldwide Privileged Access Management 2014 Vendor Assessment, IDC