Lieberman RED – Rapid Enterprise Defense Systems Management, formerly known as User Manager Pro Suite, is a powerful Windows security management tool. It allows IT administrators to report on and make global changes to passwords, groups, rights, registry settings, policies and more, simultaneously across the servers and workstations in the Windows network – without requiring agents.
The Premier Tool for Windows Reporting and Security Management
Lieberman RED Systems Management is a virtual “Swiss Army Knife” of tools to report on virtually everything that is happening on your Windows systems so you can take the necessary corrective action. Comprehensive in scope and rapid in operation, RED Systems Management is designed to provide almost instantaneous reporting on developing operational problems within your Windows systems, and to take action to recover control just as quickly. RED Systems Management frees up valuable man-hours by allowing administrative tasks to be performed en masse rather than one-by-one using Microsoft’s built-in tools.
RED Systems Management finds existing security holes in your Windows systems such as unauthorized software, vulnerable systems put on your network without your knowledge, known bad versions or obsolete versions of software, defective systems, inadequate infrastructure, and the detection of threats not characterized by antivirus vendors. All this information is stored in a secure and powerful central repository.
But, detecting threats and problems, is only a small part of what the product does. RED Systems Management also has sophisticated repair and reconfiguration technology not found elsewhere. This technology means that your IT department can surgically repair problems on your systems in minutes rather than imposing massive rebuilds of your user systems that can lead to lost information.
Our customers use RED Systems Management as their secret competitive advantage to keep their Windows systems under control, and as a method of responding to both internal and external security and operational threats.