• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Lieberman Goes Super Secret with Privileged Passwords

    March 5, 2013 Alex Woodie

    In old war movies, you’ve probably seen how, before launching a nuclear missile, the captain and his first lieutenant must turn their keys simultaneously for the launch to work. This is actually a security practice instituted by the United States Air Force and other military organizations that’s called the “two man rule.” Last week, security software vendor Lieberman Software launched a version of the two man rule to control the passwords for privileged user profiles.

    Lieberman’s flagship product, called Enterprise Random Password Manager (EPRM), is a security utility designed to discover, secure, track, and audit the use of privileged user profiles across multiple operating systems, including IBM i, Unix, z/OS, Linux, and Windows. The software continuously changes the passwords for privileged user profiles, and generates dashboards that show auditors and managers how the powerful accounts are being used.

    With EPRM’s implementation of the two man rule–also called double safekeeping—Liebermann is giving organizations another layer of security over their most powerful and dangerous user profiles. Under double safekeeping, a single password for a powerful user profile is split into two pieces, and distributed to two individuals. To allow that user profile to be used, each of the individuals must enter his portion of the password.

    This approach bolsters the security of the user profile by eliminating the chance that a programmer or administrator will be able to log onto the system without the knowledge of anybody else, says Philip Lieberman, president and CEO of Lieberman Software.

    “When implemented, ERPM’s double safekeeping functionality prevents any one individual from having all of the credentials for the powerful privileged accounts that can access an organization’s most sensitive data and IT resources,” Lieberman says in a press release.

    While double safekeeping has long been used by institutions such as the US Government to safeguard critical assets, such as nuclear weapons, the practice is not widespread in the corporate sector. However, that could soon change.

    “Some regulatory compliance requirements, such as BASEL II, are now requiring organizations to store and retrieve sensitive information–including passwords–in multiple parts so that no one person can maintain key secrets individually,” Lieberman says.

    Lieberman made its announcement at last week’s RSA Conference. For more information, see Lieberman’s website at www.liebsoft.com.

    RELATED STORIES

    Lieberman Exposes Super-User Activity to SIEMs

    Lieberman Adds i OS Support to Password Program



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Midrange Dynamics North America

    With MDRapid, you can drastically reduce application downtime from hours to minutes. Deploying database changes quickly, even for multi-million and multi-billion record files, MDRapid is easy to integrate into day-to-day operations, allowing change and innovation to be continuous while reducing major business risks.

    Learn more.

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Profound Logic Software:  Live Webinar: 4 RPG Keys to Application Modernization Success. March 20
    BCD:  IBM i Webinar - March 7. Jumpstart Web App Development with WebSmart Mobile
    looksoftware:  Free Live Webcast: HTML5 & IBM i - Connect, Discover, Create. March 12 & 13

    More IT Jungle Resources:

    System i PTF Guide: Weekly PTF Updates
    IBM i Events Calendar: National Conferences, Local Events, and Webinars
    Breaking News: News Hot Off The Press
    TPM @ The Reg: More News From ITJ EIC Timothy Prickett Morgan

    Does Working At Home Really Work? Journal Forensics 101

    Leave a Reply Cancel reply

Volume 13, Number 7 -- March 5, 2013
THIS ISSUE SPONSORED BY:

Maxava
ProData Computer Services
ASNA
Profound Logic Software
United Computer Group, Inc.

Table of Contents

  • BCD Waves its Modernization Wand with Presto 4.5
  • McAfee Works with Raz-Lee to Monitor DB2 for i
  • Bytware Becomes More Friendly to LPM with Messenger Product
  • Townsend Adopts KMIP for License Key Interoperability
  • Spinnaker Nabs Former Rimini Executive
  • ARCTOOLS Gains JD Edwards Validations
  • Lieberman Goes Super Secret with Privileged Passwords
  • Private Clouds Growing at a 50 Percent Clip, IDC Says
  • Polaris Chooses IntelliChief for Office Automation
  • OKI Data to Carry Brooks Print Converters

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle