www.industryarchive.org - B2B Resources & Solutions Community for B2B Professionals

Lieberman Software

Technology Software Programming Networking

800-829-6263
MAKE A CONNECTION Lieberman Software is available to connect: Send Message

Lieberman Software B2B Industry Solution Videos


Cyber Defense Behind the Firewall - Lieberman Software

Cyber Defense Behind the Firewall - Lieberman Software

Next generation firewalls, intrusion detection systems and the like are potent deterrents against known dangers. But when it comes to advanced zero day threats and targeted phishing...


We Stop Cyber Attacks

Contact Information

Company Name
Lieberman Software
Online Social Profiles
Phone Number
800-829-6263

Resource Profile

About Lieberman Software

Lieberman Software Corporation is a cyber security software company whose products help customers isolate and contain data breaches that occur after cyber attacks penetrate the network perimeter. With its proactive cyber defense solutions, Lieberman Software protects access to systems with sensitive data from advanced persistent threats (APTs) and other forms of malware, as well as malicious insiders with elevated privileges.About Lieberman Software - Privileged Access Management

The Lieberman RED Suite provides award-winning automated privileged identity & access management for large and complex environments. The modules of the Lieberman RED Suite help red/blue teams, intrusion remediation specialists (IR), IT Admins, and auditors find and clean up intrusions and security weaknesses – a key activity to be performed before any PIM/PAM project is started. The platform scales to large, dispersed enterprise environments – on premises and in the cloud.

Since its founding in 1978, Lieberman Software has been profitable, management owned and US-based. The company is headquartered in Los Angeles, CA, with offices and channel partners around the world. All product development and testing operations are conducted in the United States.

Lieberman Software Solutions


Privileged Identity Management

Protect privileged identities at scale using continuously automated controls. Our solution continuously scans the network looking for new systems and devices and immediately brings them under management based on policies you pre-configure. It is optimized for speed, understands platforms and can crawl stacks for credential use.

Privileged Access Management

Provide privileged users with secure, audited, recorded access to corporate applications on-premises and in the cloud. Protect computers and networks from potentially harmful applications with application whitelisting. Enable users to launch applications without having to enter admin credentials. Allow sensitive applications to be run via a web interface – perfect for end points that might be owned. Monitor administrator behavior with session recording.

Orchestrated Intrusion Remediation

Create closed loop environments that automatically remediate intrusions in real-time. Provide coordinated orchestration and programmatic response to detected threats in concert with your existing security frameworks and identity systems (e.g., FireEye FSO, SIEMs, trouble ticket systems, identity governance, and DevSecOps for automated secure operation). Change passwords, reset Kerberos tickets, reboot systems – orchestrate any action via web services.

Security Configuration Reporting & Repair

Clean-up compromised/poorly built environments in minutes. Provide almost instantaneous reporting on operational problems. Utilize sophisticated security reconfiguration technology to surgically repair problems on your systems. Reconfigure the registry, patch your machines or update virus protection files on every machine. Free up valuable man-hours by performing administrative tasks en masse.

Find out why security conscious enterprises around the world rely on Lieberman Software’s solutions to knock intruders out of their IT environments, and rebuild them with a foundation of proper security and configuration.

Write About You And Your Company

Lieberman Software Specialties


Available Specialties Request More Information
Cyber Security Request Information »