Lieberman Software
PRIVILEGED IDENTITY MANAGEMENT NEWS LINE
  Follow us on Twitter  Follow us on LinkedIn  Blog  Lieberman Software on YouTube
February 2013       

Top of Mind

Exciting Evolution in Training

Philip  Lieberman, President & CEO
Lieberman Software

The funny thing about product development is that when a product is very new, training someone to use it is generally pretty simple and a 5-10 minute task. As a product evolves and ultimately reaches the realm of an enterprise-level product, the amount of information you need or might need to impart eventually becomes so large that eventually no single person knows every element of the product.

Easy to Deploy Can Have Many Options

One clever thing we have always done with our products has been to make them easy to install and get working quickly even on a large scale. For some customers it is nothing more than clicking “Next” during the initial install and then pushing the products web site to a Windows 2008 R2 server. In fact, upgrading can also be similarly simple.

The challenge for customers is not so much the nature of the install, deployment or upgrades; the hard part can occur when you need to configure enterprise-level authentication, authorization, and/or integrations. The good news is that the product is easy to configure and only takes a few minutes, but the hard part can be the vast number of configuration and security questions that must be answered prior to production deployment. Some of our customers are normal commercial accounts, while others are defense and government agencies. As you can imagine, for the product to serve both audiences, there are a LOT of security options to suit the realities of our different customers.

Because our products implement security and audit controls that may have never existed, organizations also have to make a number of internal decisions as to what is best for them.

Course Levels

To make this process easier for our customers, we are now offering regular courses at our Los Angeles facility on product fundamentals, deployment, and configuration as well as advanced topics such as application-to-application programming using our SDK. The fundamentals course takes 5 days to complete (Course 101 and 102). We have an advanced configuration course (Course 301) that covers integrations such as certificates, multi-factor authentication, loggers, SIEMS, trouble-ticket systems, and more. Our advanced level course (Course 401) covers the use of our SDK to provide secret and password check-in/check-out as well as advanced multi-lingual programming and orchestration.

What Makes Us Different

As you know, all of our product documentation is public for our products, so you don’t have to wait for a training course to get started and deploy. You can also install the software yourself or have us help you at any point in the installation. As opposed to our competitors, you are not required to have us install our software at your site, nor are you mandated to take training or purchase professional services from us.

Our public training classes are designed to make it easier for you to get started (if you are a kinetic/verbal learner) and/or don’t want to first read the thousands of pages of documentation. A public class is also a great way to get some of your nagging questions answered as well as learn best practices.

Our courses are highly interactive and taught by professional instructors with multiple certifications. Each student gets their own workstation with a personal full environment of about 25 systems to interact with. Our offices are located in Century City, CA which has excellent amenities for our guests as well as a wide range of hotel choices.

Learning More

To learn more about our classes, contact your sales representative, or check our web site for the schedule of classes (dates and detailed syllabuses will be posted in March). 

What do you think? Email me at: Phil@liebsoft.com. You can also follow me on Twitter: @liebsoft or connect with me via LinkedIn.
What's New in Identity Week

Featured commentary on our
Identity Week blog this month includes:
  • Common Sense, Not Always So Common When It Comes to Data Breaches. We’ve all heard the stories of major data breaches caused by malicious outsiders and disgruntled employees looking for revenge. We also know that many malicious attacks are driven by insiders. But, there is a much more sinister force at work…a complete and total lack of common sense...

Events / Press / Analysts
  • Lieberman brings Identity Management to India. VAR India. Lieberman Software Corporation has announced that the company has entered into a channel partner agreement with Quoinx Technologies. Quoinx is providing Lieberman Software’s identity management products to customers throughout India, helping organizations secure privileged accounts, protect sensitive data and achieve regulatory compliance.
  • Government intervention scares users from using the cloud. SC Magazine UK. A fear of government snooping is deterring IT departments from using the cloud. According to a survey of 300 IT managers, 48 per cent said that the potential for government and legal interference puts them off from entering information into the cloud environment.
  • Cloud Security Measures Too Opaque For Customers. Network Computing. With nearly half of IT managers avoiding cloud services over worries that their data will be leaked, it is time for cloud providers to become more transparent.
  • A CSO's guide to defending against targeted cyber attacks. Info Security Products Guide. Enjoy Q&A with Philip Lieberman who answers such questions as: What can we learn from the recent cyber attacks on the New York Times, Twitter and even the US government? Where are the next big threats coming from?
  • Brace Yourself for the Post-PC Threat Era. TechNewsWorld. The bad news for a world gone mobile and social is that cyberthreats have followed the same direction. Security is more complicated and challenging than ever, with a multitude of new attack vectors available to increasingly sophisticated thieves. It's not just malware's proliferation to mobile and social platforms -- and even the Mac -- that's worrisome. It's the astonishing pace of its growth.
  • Avoiding IAM's Biggest Blunder. Dark Reading. Leaving orphan accounts enabled due to poor deprovisioning processes leaves organizations open to fraud and makes it impossible to prove chain of custody cards in the network and then update each password with cryptographically strong, unique credentials.

Tech Tip of the Month

Continuously Secure all Dell DRAC Devices on Your Network - From DRAC4 thru iDRAC7

IT administrators rely on network-connected remote access devices to manage critical server hardware from anywhere, without the need to be physically present in the datacenter. These devices give “lights-out” access to manage, patch and rebuild systems regardless of whether the computer operating system is functioning. Left unchanged, anyone with access to the management network and knowledge of widely-known default passwords can have anonymous, unaudited access and management control of any server at any time.

ERPM and RPM discover all of the Dell lights-out management cards in the network and then update each password with cryptographically strong, unique credentials.
Here's how.

Lieberman Software Corporation respects your right to privacy, and believes any information you provide us should be protected from disclosure to others. For more information, please read our privacy policy. You are receiving this email because you have granted us permission to contact you. If you do not wish to receive email messages from Lieberman Software in the future, please click here.
Lieberman Software Corporation
1900 Avenue of the Stars, Suite 425
Los Angeles, CA  90067
                 www.Liebsoft.com    |    (01) 310-550-8575  |   newsletter@liebsoft.com