Lieberman Software Tackles Privileged-Account Security Holes

Integration with Microsoft System Center Service Manager allows leverages workflows to safeguard privileged access to servers, workstations, network appliances, applications

Note: ESJ’s editors carefully choose vendor-issued press releases about new or upgraded products and services. We have edited and/or condensed this release to highlight key features but make no claims as to the accuracy of the vendor's statements.

Lieberman Software Corporation has released a solution with out-of-the-box integration between the company's privileged identity management (PIM) solutions and Microsoft System Center Service Manager (SCSM).

The new Lieberman Software integration extends Microsoft SCSM by enabling IT staff to:

  • Receive privileged access to systems and applications through the SCSM interface

  • Receive privileged access only to the extent needed to resolve each IT service issue, and only if properly authorized through SCSM

  • View documentation of each privileged password check out request including each requester and IP address, time stamps, and the reason for each request.

This two-way integration is designed to save IT staff time by granting access to IT assets whenever service is required and by eliminating the time-consuming manual tasks of obtaining approvals, documenting each access, and reporting the results. Together, SCSM and Lieberman Software's privileged identity management products also provide oversight to help organizations meet their Service Level Agreement (SLA) and regulatory compliance requirements, continuously auditing IT staff access to privileged accounts and providing authoritative records to prove compliance.

Lieberman Software's Enterprise Random Password Manager (ERPM) and Random Password Manager (RPM) control access to privileged credentials, ensuring that only authorized staff can access sensitive systems, with an approved purpose, for a limited time period. Once the password check-out time has been completed, or the administrator checks the password back in, it's automatically randomized and all dependent services are updated with the new password.

The integrations ensure that only those systems and applications relevant to each SCSM incident can be reached through privileged credentials for service and repair, and only by appropriate personnel. All password checkout/check-in transactions become part of the trouble ticket record, are audited, and are available for review by IT management and auditors.

More information is available at

Must Read Articles