Lessons in IT Cost Cutting
Lieberman, President & CEO, Lieberman
recent Chief Information Officers (CIO) conference for insurance
industry executives, I gave a presentation on ways to improve the
relationships between CIOs and their IT management.
At the end of the presentation I received exasperated responses from
some of the CIOs; they told me there was little need to enhance these
relationships since they had long ago outsourced much of their IT staff
and there was effectively no “relationship” to improve.
In hindsight, ceding the US insurance industry’s IT operations to
non-employees seems like an unavoidable outcome of a relentless push to
lower costs. With their abandonment of in-house IT comes the loss of
corporate knowledge, loyalty, and innovation; the industry also
forfeits its ability to combine the CIO’s vision with the operational
knowledge of internal IT staff to achieve competitive advantage.
The road to lackluster IT performance for America’s large insurance
companies was paved by the greed and shortsightedness of their CEOs.
Somehow these executives perceived IT as a commodity that can be
reduced at will, with no ill effect on the company. Today many of these
organizations have virtually no in-house IT employees, having
outsourced much of their work offshore.
Now that they have abandoned in-house IT these former market leaders
find themselves challenged by a new breed of competitors who exist
primarily online, without the encumbrances of the brick-and-mortar
insurance world. These new entrants have the vision to regard IT
as a business weapon and are poised to show the big guys the folly of
Analysts at this insurance industry conference told us that the
industry as it now exists– with its traditional agents, disperse sales
offices and paper and pencil processes– will be dead within 15 years as
the demands of Internet-savvy consumers come to dominate.
It’s sad to think that the CIOs of these former market leaders are now
little more than hanging ornaments. Without the benefits of an engaged,
full-time IT staff the CIOs who were once valued strategists are now
little more than hatchet men tasked with reducing costs and tidying up
the deck chairs – passing out new iPads to clueless executives as the
Titanic slowly sinks.
do you think? Email me at: email@example.com.
Tip of the Month
Management Made Easy
Unsecured Windows administrator passwords
are a serious IT security threat. But with User Manager Pro Suite,
these passwords can be automatically updated and made available to
delegated and audited users. Learn more in this
New in Identity Week
commentary on our Identity Week blog this month includes:
- Majority of Americans Support
Internet “Kill Switch”
Last week, Matthew Schwartz of InformationWeek wrote an article,
Schwartz On Security: Zombie Internet ‘Kill Switch’. In the article,
Matthew highlights a report from Unisys finding that nearly two-thirds
of 1,000 people surveyed support the concept of an Internet “kill
is About Compliance, Not Trust
The word “trust” appears in the tagline for a great many security
products and services. But in the business world what we often tout as
trust simply boils down to an acceptance of risk and the expectation
that we can transfer liability to other parties should that trust be
are pleased to announce three new technology integrations for our
flagship privileged identity management products: Enterprise Random
Password Manager (ERPM) and Random Password Manager (RPM)!
- Dell Remote Access Controller (DRAC):
Lieberman Software is
the first ISV to be Dell Certified for DRAC Password Management! Our
identity management solutions are the first products Dell PartnerDirect
certified to continuously secure all DRAC devices on your network. This
protects the privileged login credentials of each device while
providing secure access through an audited web portal.
- Microsoft System Center Service Manager
(SCSM): ERPM and RPM are the first privileged identity
management solutions capable of verifying SCSM trouble ticket
information, ensuring that only those users who provide valid ticket
data can receive passwords to access sensitive systems. All privileged
password checkout and check-in transactions become part of the trouble
ticket record, are audited and are available for review by IT
management and auditors.
information on additional integrations, please visit our technology
User Management (PUM) Products: We have released an open
interface for our privileged identity management solutions that allows
end users to integrate with leading third-party PUM solutions in
Events / Press /
ramps up privileged identity push into cloud service providers. 451 Group. “Lieberman Software’s
flagship product is Enterprise Random Password Manager (ERPM), which is
designed for enterprise domain account management. The strength of the
company’s technology lies in its ability to seek out and discover which
passwords are in use at systems, services and operational tasks,
integrate target resources into its framework, perform account event
correlation at a back-end database and automate the propagation of
randomly generated passwords to the target resource.” (Subscription
required to read entire report.)
Weak Passwords: Policies To Ensure Passwords Are Safe. Processor. Data
center and IT managers should bear in mind that insider attacks are
just as imminent as attacks from outside hackers, says Chris Stoneff,
senior product manager at Lieberman Software. He suggests managers
consider bringing in applications that automatically change passwords
Get Channel Makeover. SearchITChannel.com. "Working closely
with a vendor on a business plan is a new experience for some
resellers. NetBR, a solution provider based in Sao Paolo, Brazil, last
year became an authorized reseller of Lieberman Software's privileged
identity management products. Andre Facciolli, chief technology officer
at NetBR, said Lieberman is the first technology vendor he's worked
with on a go-to-market plan."
Weak Passwords. Professional Security
Magazine. Passwords have been with us since before the age of
the desktop PC but, as Chris Stoneff, senior product manager with
Lieberman Software writes, administrators and their users need to
rethink their password security policies if they are to be truly
New Products for IT Professionals.
Magazine. How do you ensure
that two processes that require the
same resources aren't running at the same time? How can you make sure
that you don’t overload a system by running too many concurrent tasks
against service applications during the wee hours of the morning? One
tool out there that helps you centralize your scheduled task management
is Task Scheduler Pro from Lieberman Software.