Semiconductor Manufacturer  Manufacturingl-40x40.png

NEED: A way to easily manage the local administrator password for every server in our enterprise
PROBLEM: Static passwords
SOLUTION: Run scheduled password randomizations

“We needed a way to easily manage the local administrator password for every server in our enterprise. To be prepared for emergencies, my team required fast, reliable access to the local admin accounts on each system.”

“Of course, the most basic solution is to set each server with a random password and leave it. But we wanted secure, immediate access to all our passwords to address problems we experienced in the past. Sometimes we were unable to log in with our domain accounts. And if you don’t know the password for the local account, you have a serious problem.”

“A script or other manual alternatives would have been too much work on hundreds of servers. Besides, we also need a way to store the passwords in a secure and encrypted manner. So a one-time solution would not have been a real solution.”

”We purchased Rapid Enterprise Defense (RED) Identity Management and now run scheduled password randomizations. We’re now happy with the security of our servers. We know that we can still access them if the domain trust ever fails, and RED Identity Management runs smoothly without manual intervention.”

– Manager of Systems

To learn more about how RED Identity Management can help get your privileged accounts under control, please visit our Privileged Identity Management page.

Hospital Healthcare-40x40-min.png

NEED: Ensure the security of healthcare records and financial data
PROBLEM: Shared administrator passwords
SOLUTION: Create unique administrator account credentials on all managed systems

“We needed to ensure the security of our healthcare records and financial data. Removing shared administrator passwords was a good way to restrict access to that sensitive information. We had attempted to manually change administrator passwords with our own script-based solution. This was not a secure option because the passwords were handled in visible plain text.”

“We went with RED Identity Management. It was quickly up and running on our network, giving us the security of unique credentials for every administrator account on each managed system. It’s a valuable investment that’s significantly improved the security of our personal and financial data.”

– Head of Desktop Services

To learn more about how RED Identity Management can help you get your privileged accounts under control, please visit our Privileged Identity Management page.

University
Education-40x40-min.png

NEED: Secure access to confidential data and meet HIPAA compliance mandates
PROBLEM: No way to change privileged passwords frequently enough or detect every credential in need of change
SOLUTION: Continuous privileged credential management

“We attempted to manage privileged account passwords manually, first by storing a list of current passwords in a safe and later by writing scripts that changed the passwords. However, these processes were time-intensive, lacked documentation, were difficult to troubleshoot and provided insufficient reporting. They also offered no way to change privileged passwords frequently enough or detect every credential in need of change.”

“With RED Identity Management, we automatically change our local account passwords nightly and our SQL Server SA accounts weekly. By doing so, we secure access to our confidential data and meets the mandates of HIPAA compliance regulations.”

“It took less than one day from the time that we started the installation until we changed all of the privileged passwords on our machines. It was that simple.”

– Information Security Manager

Learn more about how RED Identity Management can help automate your privileged account management processes on our Privileged Identity Management page.

Bank
Finance-40x40-min.png

NEED: To enhance internal security posture
PROBLEM: Insecure spreadsheets stored privileged passwords
SOLUTION: Control who has access to privileged passwords and what they’re doing with them

“We needed to enhance our internal security posture. We were using password spreadsheets in an attempt to manage our system passwords. Essentially, we were holding the ‘keys to the castle’ in a number of insecure places. We realized these spreadsheets could be vectors for hacking.”

“We also wanted to know who was accessing our ‘secret keys’. A single spreadsheet might contain 200 to 250 passwords. When a systems administrator accessed a spreadsheet we didn’t know which password he used, or what actions he performed with that access.”

“With RED Identity Management we have much tighter control over who has access to the passwords and what they’re doing with them.  That’s only going to become more important as our IT infrastructure grows and our teams expand. We have 400 members on the IT staff, and all of them might need access to the accounts managed by RED Identity Management on a daily basis.”

“We have a lot of people who have access to the ‘keys to the IT kingdom’. RED Identity Management lets us keep tighter control of those keys. That way we don’t lose them.”

– Director of Access

Learn more about how RED Identity Management can help automate your privileged account management processes at our Privileged Identity Management page.

Begin your story today.