Enterprise Random Password Manager White Papers

Product Overviews

Adaptive Privilege Management: Executive Overview
This fast-paced overview gives you all the facts you should know about privileged credentials. You’ll learn real-world business drivers for taking control of privileged access, implementation best practices, and how different management approaches can deliver different results.
Privileged Identity Management: A Technical Overview
Download this technical overview for a common-sense guide to automate your privileged identity security. You’ll learn the fundamentals of what makes a good PIM solution, the steps you can take for a successful deployment, and ways to take advantage of your new software to maximize the return.
Cyber Defense Review of  Mandiant and Verizon Threats: How-to Immediately Limit Attack Consequences
In today’s cyber security environment, the assumption is that advanced zero day threats are indefensible due to the sophisticated and automated nature of the attacks. Download this white paper to learn how you can counter each phase common to most major cyber attacks, and protect your organization from being the next data breach headline.
Who Holds the Keys to Your IT Kingdom? Four Key Steps to Securing Privileged Identities
This guide examines four key steps necessary to secure an organization's privileged identities. It describes basic, manual and ad-hoc processes that can improve control over privileged access along with automated alternatives to reduce the risks of data breaches and operational disruptions while improving staff efficiency and management oversight.
Next Generation Security: Adaptive Privilege Management
Find out how an adaptive privilege management solution can automatically protect your privileged accounts and proactively respond to a data breach.

Feature Benefits

Privileged Account Auto-Discovery
Find out how adaptive privilege management can help you automate the discovery of privileged accounts, determine where they’re being used, and change them reliably – without triggering cascading system failures of interdependent services.
Mitigating Golden Ticket Attacks with Lieberman Software
Learn how Lieberman Software can help you defend your network against Pass-the-Ticket attacks by reducing the attack surface of your environment, minimizing the presence of credentials that attackers can use to gain control of your network, and establishing a process for rapid remediation.
Secure Application to Application Passwords With Enterprise Random Password Manager
Reused or cryptographically weak, hard-coded application passwords are an easy launch point for hackers and malicious programs to gain access to your network. Lieberman Software can help you replace hard-coded privileged account passwords found in the widest range of applications with cryptographically secure, frequently changed credentials.
Reduce Password Management Risk With Pooled Account Rotation
Learn how a new feature – called pooled account rotation – can help you more safely comply with regulatory mandates and better protect your network against automated attacks and insider threats.
Free Multi-Factor Authentication Using Email and SMS in Enterprise Random Password Manager (ERPM)
Lieberman Software’s Enterprise Random Password Manager supports a wide variety of multi-factor solutions including: multi-vendor hardware and software tokens, as well as non-token solutions such as Email and SMS solutions. This rich set of choices assure that multi-factor authentication is available to all users irrespective of the form factor or delivery of the 2nd authentication factor.

Industry Use Cases

Adaptive Privilege Management Achieves White House Directives 
Download this informative white paper to find out how to comply with the White House Chief Information Officer's "cybersecurity sprint" federal government mandates.
Managing Privileged Identities in the Cloud
Download this informative whitepaper to learn how privileged identity management has evolved to a service platform capable of securing account credentials - and the full lifecycle of certificates and other file-based secrets – on cloud service provider (CSP) networks comprised of physical and virtual machines.
SCADA Security Challenges and Privileged Account Management
Learn how to find and eliminate common security holes that leave most SCADA systems vulnerable to hackers and malware.
Securing Privileged Identities in Healthcare
Learn how to lower the cost and uncertainty of HIPAA compliance; identify at-risk privileged accounts and vulnerable IT assets; and control, monitor and audit access to systems with sensitive healthcare records.
Securing Privileged Identities in Finance
Learn how to comply with PCI-DSS audits; discover at-risk IT assets; and control access to sensitive financial data.
Meeting SANS Critical Security Controls for Effective Cyber Defense with Lieberman Software
With the rise in data breaches attributed to unauthorized access to privileged accounts, most regulatory compliance initiatives now mandate proper controls for these powerful identities. The SANS guidelines are no exception. Critical Security Control 5 lists the minimum controls necessary – and the actions you’ll need to take – to secure privileged credentials.

Implementation Best Practices

Best Practices in Privileged Identity Management
Like everything else, Privileged Identity Management (PIM) must start somewhere. How you start will often dictate how well you may do in the end. We’ve identified the ways our most successful customers have started out and distilled this into a set of best practices for the start of your PIM journey.
Why Privileged Identity Management Implementations Fail
As the pioneers of privileged identity management we've been told some unsettling stories from customers who purchased other vendors’ solutions. However, you can take precautions to ensure that you're PIM solution doesn't turn into expensive shelf-ware. Or worse.
Microsoft Cyber Resiliency Framework Solution Brief
Download this solution brief to find out more about Microsoft Cyber-Resiliency Framework capabilities and participants.
Best Practices for Information Security and IT Governance A Management Perspective
Lieberman Software’s information security and IT Governance solutions go beyond simply satisfying auditor checkboxes. Our privileged identity management solutions deliver an improved security posture and real business value. Learn how in this guide.