Lieberman RED – Rapid Enterprise Defense Identity Management makes it easy to configure virtually every on-premises and cloud-based application for secure, automated login on local machines and your choice of secure bastion hosts and jump servers.
RED Identity Management gives authorized staff a delegated interface to launch corporate applications – whether hosted on premises or in the cloud – with a single click.
Users log into RED Identity Management and see only authorized applications; they can then click their choice of application and are transparently logged onto the application or website without ever seeing the administrator credentials. Full session recording can be configured to create an application access audit trail that can help prove compliance.
Authorized administrators can easily configure, customize and expand on-premises, cloud, and third-party Web apps (such as Salesforce.com, Facebook, Twitter, LinkedIn, and many others) for secure, delegated access.
RED Identity Management privileged access management offers:
- Easy scalability – manages the largest environments without the need to buy add-on appliances
- Unlimited applications – makes it easy for authorized admins to configure new applications – whether on-premises or in the cloud – without any vendor lock-in
- Open standards – with transparent documentation and easy extensibility
- Choice of configuration – enable users to launch on local machines or a secure bastion host / jump server
Configurable Application Launcher
The RED Identity Management application launcher leverages Microsoft RemoteApp on its bastion host to securely launch applications. RED Identity Management supports multiple bastion hosts for easy deployment and access to cloud services as well as on premise services.
Remote terminal programs such as PuTTy and virtually any other SSH client can be run and controlled from the RED Identity Management bastion host. RED Identity Management can transparently connect with a username and password, SSH keys, and also supports SSH tunneling and proxies out of the box.
RED Identity Management makes it easy to configure secure access with optional session recording, to a wide variety of enterprise applications such as SQL Management Studio, Oracle Enterprise Manager, IBM Tivoli Endpoint Manager, and many more.
The RED Identity Management solution uniquely provides integration source code and complete documentation so you can transition current and future applications for secure user login. Now you can leverage the full range of VDI, virtualization, server farms, and other flexible technologies in your environment.
With RED Identity Management you’ll avoid the wait for technical support and expensive professional services engagements when it’s time to expand your application lists. Best of all, the technology is non-proprietary, scalable, fully documented, and able to help you take control of your deployment quickly and easily.
In concert with RED Identity Management’s Secure Application Launch capabilities, session recording can be configured to work automatically, whenever users access selected corporate applications – both on-premises and in cloud. As soon as a user closes the application session, raw video files are converted to your preferred formats for archival, searching and playback. Administrators with Auditor rights can then search and play back the session recordings.
RED Identity Management also includes support for an optional free multi-format video transcoder that can convert your video recordings into multiple formats for multiple playback devices. This means you can playback your session recordings on a wide range of desktop and mobile devices. You can leverage Microsoft’s smooth video streaming technologies in IIS for high performance video.
In addition to bundled and available open source recorder solutions, RED Identity Management also provides integrations to leading commercial session recorders including Wallix.