âBy combining Lieberman Softwareâs industry-leading privileged identity management solutions with Viewfinityâs advanced capabilities for privileged user management, we can eliminate a wide range of security threats related to unmanaged privileged access,â said Philip Lieberman, president and CEO of Lieberman Software. âOur mutual customers can benefit from a unified solution that manages and audits both privileged users and accounts.â
ERPM from Lieberman Software automatically locates every privileged account in the enterprise, frequently changes each accountâs password to a unique and complex value, and deploys the password changes wherever they are used in the data center. The solution provides new accountability by showing precisely who on the IT staff had access to sensitive data, at what time and for what stated purpose.
Viewfinityâs Privilege Management allows IT administrators to create a "Least Privilege" environment, removing wide-scale administrative rights and enforcing policies to grant elevated permissions on a flexible, granular basis. As a result, Viewfinity enhances corporate security and productivity by allowing users to perform all of their required duties with the least privilege necessary.
Together, these products ensure that powerful privileged account passwords are not disclosed to end-users and are granted only to authorised IT staff for a limited time. Least privilege compliance is enforced by managing permissions for privileged accounts through the elevation of privileges for applications or by reducing permissions for privileged users. A full audit trail of user and administrative access and activity is logged and can be provided to auditors to verify compliance with major regulatory mandates such as PCI-DSS, HIPAA, CAG-8, FISMA and others.
"These combined solutions expand the footprint of IT security by ensuring complete coverage for the crucial areas of PIM and least privilege enforcement," said Gil Rapaport, president and co-founder of Viewfinity. "The customers we serve together will benefit from the most comprehensive and automated solutions available for tracking, auditing and enforcing all privileged and admin-level access. We can elevate or de-elevate privilege policies across the entire infrastructure, including Windows endpoints, servers, virtual machines, cloud/SaaS connections, remote endpoints and any other system within the organization."