The HP iLO products make it possible for remote IT staff to:
- Access servers’ local administrative consoles
- Reboot the server
- Power on and off hardware
- View the condition of power supplies, cooling fans, and other critical components
- Install and update BIOS
Failure to change the privileged account passwords on their servers’ remote access devices can pose a security threat. Left unchanged, anyone with access to the management network and knowledge of these often static and widely-known privileged passwords can have anonymous, unaudited access and management control of any server at any time.
Secure HP ProLiant Servers
Lieberman RED – Rapid Enterprise Defense Identity Management is the first product to continuously secure all HP iLO devices in your datacenter. This safeguards the privileged login credentials of each device while providing secure access through an audited web portal. RED Identity Management discovers HP lights-out management cards in the network and then updates each password with cryptographically strong, unique credentials. It’s easy to import your existing iLO credentials in just a few clicks, so you can strengthen your HP lights-out card credentials and begin continuous auditing of access in minutes. The internal controls and release workflows within the Lieberman Software products provide a “check-out” and “check-in” process that automatically changes the passwords between usages, assuring a time-limited access to these powerful consoles. And, RED Identity Management makes it easy to configure HP iLO security by importing the devices’ configuration files en masse for fast setup and assured remediation.
Maintain Regulatory Compliance
Most corporate and government organizations are required to proactively manage privileged account passwords, including those found on server remote access cards. Security compliance standards such as PCI-DSS, HIPAA, FISMA, and Sarbanes-Oxley require that organizations maintain documented controls for the release, use and changing of privileged identities. The lack of automated products to mass-manage and control privileged access to these critical devices lead to negative audit findings, costly fines anddamaging data breaches. With RED Identity Management, you’ll know precisely who had access to each of your privileged accounts, when and for what purpose. These solutions secure not only the privileged logins used to access remote access cards, but also administrative user accounts and the privileged accounts stored by applications and services to access sensitive data on your network.
Download the white paper, Privileged Identity Management for the HP Ecosystem. Learn how to control privileged access and achieve regulatory compliance in enterprises that use HP security and management solutions.