NEED: To pass impending security audit
PROBLEM: Needed privileged access management implemented quickly
SOLUTION: Privilege Management platform deployed, configured and operational in less than two weeks
“As regulatory compliance requirements evolved, we faced new mandates to track access to privileged accounts and prove that proper controls over these ‘super user’ credentials were in place. To meet an impending audit deadline, we were on an immediate deadline – weeks, not months. We needed to get a solution rolled into production quickly.”
“We selected RED Identity Management and with help from Lieberman Software engineers we completed the entire project in less than two weeks. We easily passed the audit. More importantly, we now have a long-term solution in place to continuously manage, monitor and report privileged access to sensitive systems and configuration settings.”
– Systems Engineer
For details on how we can help you with regulatory compliance, please visit our Meeting Regulatory Compliance page.
NEED: Track and audit privileged access
PROBLEM: IT staff had anonymous, shared access to privileged accounts
SOLUTION: Audit administrative access to privileged accounts
“Most of our administrator accounts were tied to generic passwords, and there was no way to identify who was using them. We were sharing the same passwords between about 10 people and relying on the honor system to ensure that no one was abusing administrative privilege.”
“Whenever we did change privileged passwords we’d send the new ones in a sealed envelope to the manager of IT security. It was all manual and hardly a secure process for password storage.”
“With RED Identity Management we no longer have the problem of anonymous access to administrator IDs. If someone is making changes to GPOs, for example, and needs the administrator password, RED Identity Management notifies us when the password is checked out.”
“RED Identity Management ensures that the administrative and security tasks that should take place with privileged accounts occur behind the scenes. When you need a password it’s there for you. RED Identity Management increases security by tracking when the passwords are being used and who’s using them. And if someone leaves the IT team you can just remove them from having access to RED Identity Management. There’s no concern about former employees accessing our sensitive information.”
– Systems Engineering Manager
For more details on how RED Identity Management can help track and audit privileged access see our Auditing, Logging & Reporting page.