Want to search for something else?

24 search results for: results.html

1

Documentation

…PDF Download, 5.2 MB HTML Version The Account Reset Console User’s Guide provides detailed instructions on the installation and usage of Account Reset Console. This guide will walk you through…

2

In the News: 2014

…inferior solution from an off-shore company. The rest of the targets in the listed article by Krebs purchased the same ineffective technology from the same off-shore company with similar results.”…

3

Documentation: COM+ Manager

…User’s Guide (v2.50): PDF Download, 2.44 MB HTML Version The COM+ Manager User’s Guide provides information on creating and managing systems lists and working with identity information in COM+…

4

Documentation: Task Scheduler Pro

…User’s Guide (v3.02): PDF Download, 3.6 MB HTML Version The Task Scheduler Pro User’s Guide walks you through the setup and use of the product. You should examine this…

5

Documentation: Account Reset Console

…User’s Guide (v6.0.1): PDF Download, 5.2 MB HTML Version The Account Reset Console User’s Guide provides detailed instructions on the installation and usage of Account Reset Console. This guide…

6

Documentation: User Manager Pro Suite

…User Manager Pro User’s Guide (v7.50) PDF Download, 6.8 MB HTML Version The User Manager Pro User’s Guide walks you through the installation, basic setup and use of User…

7

Documentation: Server-to-Server Password Synchronizer

…User’s Guide (v5.01): PDF Download, 465 KB HTML Version The Server-to-Server Password Synchronizer User’s Guide walks you through the installation, basic setup and use of Server-to-Server Password Synchronizer and…

8

Newsletter November 2015

…PRIVILEGED IDENTITY MANAGEMENT NEWS LINE November 2015 Top of Mind The Bad Guys Return To Basics With Great Results Jonathan Sander, VP Product Strategy Lieberman Software If you’re…

10

Revision History: Account Reset Console

…helpdesk password reset features when options were set to optional – password expiration flag is no longer enabled by default Removed: rich text email support – only HTML and TXT…

11

Documentation: Service Account Manager

…User’s Guide (v5.60): PDF Download, 4.3 MB HTML Version The Service Account Manager User’s Guide walks you through the installation, basic setup and use of Service Account Manager and…

12

Architecture Overview

…responsive HTML 5 web interface can be customized as required to efficiently access and administer ERPM from your device. The web application also provides multi language support that lets you…

13

Find a Reseller Partner

…112, Ruwi Sultanate of Oman Tel: +968-24814242 Fax: +968-24815242 Email: info@sactech.co.om http://www.sactech.co.om/index.html Panama Security Intelligence Inc. | Sistemas Aplicativos Marbella Calle 54 Este Edificio Marbella Tower 1, Piso 1A Ciudad…

15

Microsoft SCCM

…access, and reporting the results Ending risky practices of sharing privileged logins on Post-It Notes and spreadsheets Preventing privileged access from spreading to the wrong people. Together, SCCM and ERPM…

16

Newsletter June 2014

…make up a significant risk to many organizations. Lieberman on password fatigue, More EU passports for Gemalto, SecureKey at hackathon. SecureIDNews. Results from Lieberman’s 2014 report suggest a general lack…

17

Auto Discovery

…ODBC query results from configuration management databases (CMDBs) and other sources In addition, ERPM makes it easy for you to bulk-import system lists from text files, and to make ad-hoc…

18

State-Sponsored Attack Survey 2014

…These findings verify the serious security risk that today’s state-sponsored attacks pose. The results indicate that these types of attacks are difficult to identify, let alone stop. Only 41% of…

19

White Papers

…drivers for taking control of privileged access, implementation best practices, and how different management approaches can deliver different results. Privileged Identity Management: A Technical Overview Download this technical overview for…

20

Information Security Survey 2014

…of 4 of those surveyed say that the cloud applications their users download cause security headaches. → Get the Report 2014 Information Security Survey Analysis These results indicate a general…

21

Architecture

…minimizing bandwidth usage over already saturated WAN links. Zone processing results in improved Service Level Agreements (SLAs), an imperative of large, multinational enterprises. Dedicating a process on a local machine…

23

Passwords Are Failing IT Security

…within their organizations. “These results really tap into the mindset of the IT security industry,” said Philip Lieberman, President and CEO of Lieberman Software. “If the vast majority of respondents…

24

2013 Information Security Survey

…more access to sensitive information than colleagues in other departments. These results suggest that even though most IT professionals are aware of the level of access they have to systems…