Next generation firewalls, intrusion detection systems and the like are potent deterrents against known dangers. But when it comes to advanced zero day threats and targeted phishing...
Lieberman Software Corporation is a cyber security software company whose products help customers isolate and contain data breaches that occur after cyber attacks penetrate the network perimeter. With its proactive cyber defense solutions, Lieberman Software protects access to systems with sensitive data from advanced persistent threats (APTs) and other forms of malware, as well as malicious insiders with elevated privileges.
The Lieberman RED Suite provides award-winning automated privileged identity & access management for large and complex environments. The modules of the Lieberman RED Suite help red/blue teams, intrusion remediation specialists (IR), IT Admins, and auditors find and clean up intrusions and security weaknesses – a key activity to be performed before any PIM/PAM project is started. The platform scales to large, dispersed enterprise environments – on premises and in the cloud.
Since its founding in 1978, Lieberman Software has been profitable, management owned and US-based. The company is headquartered in Los Angeles, CA, with offices and channel partners around the world. All product development and testing operations are conducted in the United States.
Lieberman Software Solutions
Privileged Identity Management
Protect privileged identities at scale using continuously automated controls. Our solution continuously scans the network looking for new systems and devices and immediately brings them under management based on policies you pre-configure. It is optimized for speed, understands platforms and can crawl stacks for credential use.
Privileged Access Management
Provide privileged users with secure, audited, recorded access to corporate applications on-premises and in the cloud. Protect computers and networks from potentially harmful applications with application whitelisting. Enable users to launch applications without having to enter admin credentials. Allow sensitive applications to be run via a web interface – perfect for end points that might be owned. Monitor administrator behavior with session recording.
Orchestrated Intrusion Remediation
Create closed loop environments that automatically remediate intrusions in real-time. Provide coordinated orchestration and programmatic response to detected threats in concert with your existing security frameworks and identity systems (e.g., FireEye FSO, SIEMs, trouble ticket systems, identity governance, and DevSecOps for automated secure operation). Change passwords, reset Kerberos tickets, reboot systems – orchestrate any action via web services.
Security Configuration Reporting & Repair
Clean-up compromised/poorly built environments in minutes. Provide almost instantaneous reporting on operational problems. Utilize sophisticated security reconfiguration technology to surgically repair problems on your systems. Reconfigure the registry, patch your machines or update virus protection files on every machine. Free up valuable man-hours by performing administrative tasks en masse.
Find out why security conscious enterprises around the world rely on Lieberman Software’s solutions to knock intruders out of their IT environments, and rebuild them with a foundation of proper security and configuration.