SlideShare a Scribd company logo
1 of 2
Download to read offline
PRESS RELEASE
Lieberman Software and SailPoint Partner to Provide a Unified Privileged Identity
Access Control Layer for the Enterprise
Enterprise Random Password Manager™ and IdentityIQ™ Integrate to Control Provisioning and Access
of both Privileged and End-Users through a Unified Identity Governance Platform
(LOS ANGELES, CA – December 16, 2015) Lieberman Software Corporation today announced a new
partnership and product integration with SailPoint. The interoperable solution combines Lieberman
Software’s Adaptive Privileged Access Management (PAM) product, Enterprise Random Password
Manager™ (ERPM™), with SailPoint’s market-leading Identity Governance and Administration (IGA)
product, IdentityIQ™. When used together, the combined solution allows customers to provision, certify
and manage access for all identities in the enterprise – both regular users and privileged users – through
a single, unified solution.
“As an inaugural member of the SailPoint Identity+ Alliance, we are continuing our rich tradition of
partnership and innovation with other best-of-breed firms by delivering an integrated solution which
creates real value for our joint customers”, said Richard A Weeks, VP Channel & Business Development
at Lieberman Software. “By implementing a true ‘closed-loop’ integration with SailPoint IdentityIQ,
enterprises may unify all user provisioning and governance – across both regular and privileged accounts
– and provide automated line-of-business attestation and approval workflow for privileged access
management.”
Lieberman Software – SailPoint Integration Reduces the Risk of Data Breaches
Historically, IT security has often wound up with separate silos for managing privileged IT users and
regular end-users. As a result, most organizations have been deprived of a holistic view of user access
which exposed organizations to increased risk. Privileged accounts are a primary attack surface during
cyber attacks, and many of the recent, high-profile data breaches occurred due to the abuse of privileged
access.
With the Lieberman Software – SailPoint integration, customers gain a single platform to seamlessly
provision and govern access for end users, IT administrators, and other users. The combined strengths of
Lieberman Software’s ERPM and SailPoint’s IdentityIQ introduce new levels of control over privileged
accounts managed by ERPM, while granting instant access to privileged permissions directly in
IdentityIQ. The result is greater visibility into privileged users' access to systems and data, and the ability
to quickly identify users with excessive identity-related risk.
“We are pleased to welcome Lieberman Software as an inaugural member of the Identity+ Alliance,” said
Joe Gottlieb, SVP of Corporate Development at SailPoint. “The tightly-coupled integration between
IdentityIQ and Lieberman Software’s Adaptive Privilege Management platform creates a holistic solution
for managing identities and controlling access for all users, both regular and privileged. This integration
delivers real value for our joint customers by adding a layer of corporate governance for privileged access
control and increasing operational efficiency for the IT department.”
Connecting PAM and IAM products in one unifying solution is now viewed as an IT security best practice.
According to recent research from Gartner, organizations should “establish privileged access governance
by extending identity governance controls, such as automated provisioning, entitlements cataloguing and
access certification, to privileged accounts and administrator access.”1
For more information see http://www.liebsoft.com/SailPoint-Integration/.
About Lieberman Software Corporation
Lieberman Software proactively stops cyber attacks that bypass conventional enterprise defenses and
penetrate the network perimeter. The company provides award-winning privileged identity management
and security management products to more than 1,400 customers worldwide, including nearly half of the
US Fortune 50. By automatically securing privileged access - both on-premises and in the cloud -
Lieberman Software controls access to systems with sensitive data, and defends against malicious
insiders, zero day attacks and other advanced cyber threats. Lieberman Software is headquartered in Los
Angeles, CA, with offices and channel partners located around the world. For more information, visit
www.liebsoft.com.
1
Anmol Singh and Felix Gaehtgens, Twelve Best Practices for Privileged Access Management, Gartner, Oct. 8 2015
Product and company names herein may be trademarks of their registered owners.
For more information, please contact:
Kevin Franks
Marketing Communications Manager
Lieberman Software Corporation
310-300-3562
www.liebsoft.com
www.identityweek.com
www.twitter.com/liebsoft
kfranks@liebsoft.com

More Related Content

What's hot

Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Ping Identity
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...IBM Security
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...CloudEntr
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementOneLogin
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overviewtillbrennan
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Toolsijtsrd
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Systems, Inc.
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesBenjamin Canner
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesOneLogin
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementPrashanth BS
 

What's hot (20)

Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
Surviving the Mobile Phenomenon: Securing Mobile Access with Risk-Based Authe...
 
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
Growing Cloud Identity Crisis: Survey Report on Cloud-Based Solutions for Ide...
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
IntraLinks Company Overview
IntraLinks Company OverviewIntraLinks Company Overview
IntraLinks Company Overview
 
Identity and Access Management Tools
Identity and Access Management ToolsIdentity and Access Management Tools
Identity and Access Management Tools
 
Hitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management SuiteHitachi ID Identity and Access Management Suite
Hitachi ID Identity and Access Management Suite
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 
IdM vs. IDaaS
IdM vs. IDaaSIdM vs. IDaaS
IdM vs. IDaaS
 
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud InitiativesLeading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
Leading Trends in IAM Webinar 3: Optimizing User Experience in Cloud Initiatives
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 

Viewers also liked

Standards Based Identity Provisioning
Standards Based Identity Provisioning Standards Based Identity Provisioning
Standards Based Identity Provisioning WSO2
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTGlobal Online Trainings
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk courseGreg Hanchin
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline Greg Hanchin
 
CV Phil Green, Chicago, London
CV Phil Green, Chicago, LondonCV Phil Green, Chicago, London
CV Phil Green, Chicago, LondonPhilip Green
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43courseGreg Hanchin
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionGreg Hanchin
 
CV - Anton Stevens New
CV - Anton Stevens NewCV - Anton Stevens New
CV - Anton Stevens NewAnton Stevens
 
Operação blackout
Operação blackoutOperação blackout
Operação blackoutJamildo Melo
 
JohnConnollyResumePerformance2017
JohnConnollyResumePerformance2017JohnConnollyResumePerformance2017
JohnConnollyResumePerformance2017John Connolly
 

Viewers also liked (18)

Standards Based Identity Provisioning
Standards Based Identity Provisioning Standards Based Identity Provisioning
Standards Based Identity Provisioning
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk course
 
DEEPANSHU_Resume
DEEPANSHU_ResumeDEEPANSHU_Resume
DEEPANSHU_Resume
 
C C Resume
C C ResumeC C Resume
C C Resume
 
LvR-CV-2016
LvR-CV-2016LvR-CV-2016
LvR-CV-2016
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline
 
CV Phil Green, Chicago, London
CV Phil Green, Chicago, LondonCV Phil Green, Chicago, London
CV Phil Green, Chicago, London
 
Renuka Prasad CV
Renuka Prasad CVRenuka Prasad CV
Renuka Prasad CV
 
wfs_resume
wfs_resumewfs_resume
wfs_resume
 
RESUME_SaranyaNagaraj_A
RESUME_SaranyaNagaraj_ARESUME_SaranyaNagaraj_A
RESUME_SaranyaNagaraj_A
 
Splunk Searching and reporting 43course
Splunk Searching and reporting 43courseSplunk Searching and reporting 43course
Splunk Searching and reporting 43course
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
 
Krishna kumar-NETWORK ENGINEER
Krishna kumar-NETWORK ENGINEERKrishna kumar-NETWORK ENGINEER
Krishna kumar-NETWORK ENGINEER
 
CV - Anton Stevens New
CV - Anton Stevens NewCV - Anton Stevens New
CV - Anton Stevens New
 
Paul's Resume
Paul's ResumePaul's Resume
Paul's Resume
 
Operação blackout
Operação blackoutOperação blackout
Operação blackout
 
JohnConnollyResumePerformance2017
JohnConnollyResumePerformance2017JohnConnollyResumePerformance2017
JohnConnollyResumePerformance2017
 

Similar to PR Lieberman Sailpoint Partnership_SailPoint FINAL

TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfVishnuGone
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyGigya
 
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays
 
Build Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdfBuild Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdfMrunalshetty3
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprisehardik soni
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Symantec Brasil
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
Cloud Computing for Business Boise – CRI Advantage
Cloud Computing for Business Boise – CRI AdvantageCloud Computing for Business Boise – CRI Advantage
Cloud Computing for Business Boise – CRI AdvantageCRI Advantage
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualVMware Tanzu
 
Building cybersecurity transparency with clients using compliance automation...
 Building cybersecurity transparency with clients using compliance automation... Building cybersecurity transparency with clients using compliance automation...
Building cybersecurity transparency with clients using compliance automation...ELEKS
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...IBM Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is NowLane Billings
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021Bruce Ma
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications WebinarTodd Clayton
 

Similar to PR Lieberman Sailpoint Partnership_SailPoint FINAL (20)

TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
SailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdfSailPoint VS CyberArk.pdf
SailPoint VS CyberArk.pdf
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
apidays London 2023 - Advanced AI-powered API Security, Ricky Moorhouse (IBM)...
 
Build Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdfBuild Your Career With Sailpoint Training.pdf
Build Your Career With Sailpoint Training.pdf
 
Need of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless EnterpriseNeed of Adaptive Authentication in defending the borderless Enterprise
Need of Adaptive Authentication in defending the borderless Enterprise
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Cloud Computing for Business Boise – CRI Advantage
Cloud Computing for Business Boise – CRI AdvantageCloud Computing for Business Boise – CRI Advantage
Cloud Computing for Business Boise – CRI Advantage
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
 
Building cybersecurity transparency with clients using compliance automation...
 Building cybersecurity transparency with clients using compliance automation... Building cybersecurity transparency with clients using compliance automation...
Building cybersecurity transparency with clients using compliance automation...
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Secure Identity: The Future is Now
Secure Identity: The Future is NowSecure Identity: The Future is Now
Secure Identity: The Future is Now
 
LastPass 2021
LastPass 2021LastPass 2021
LastPass 2021
 
3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar3 Building Blocks For Managing Cloud Applications Webinar
3 Building Blocks For Managing Cloud Applications Webinar
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 

PR Lieberman Sailpoint Partnership_SailPoint FINAL

  • 1. PRESS RELEASE Lieberman Software and SailPoint Partner to Provide a Unified Privileged Identity Access Control Layer for the Enterprise Enterprise Random Password Manager™ and IdentityIQ™ Integrate to Control Provisioning and Access of both Privileged and End-Users through a Unified Identity Governance Platform (LOS ANGELES, CA – December 16, 2015) Lieberman Software Corporation today announced a new partnership and product integration with SailPoint. The interoperable solution combines Lieberman Software’s Adaptive Privileged Access Management (PAM) product, Enterprise Random Password Manager™ (ERPM™), with SailPoint’s market-leading Identity Governance and Administration (IGA) product, IdentityIQ™. When used together, the combined solution allows customers to provision, certify and manage access for all identities in the enterprise – both regular users and privileged users – through a single, unified solution. “As an inaugural member of the SailPoint Identity+ Alliance, we are continuing our rich tradition of partnership and innovation with other best-of-breed firms by delivering an integrated solution which creates real value for our joint customers”, said Richard A Weeks, VP Channel & Business Development at Lieberman Software. “By implementing a true ‘closed-loop’ integration with SailPoint IdentityIQ, enterprises may unify all user provisioning and governance – across both regular and privileged accounts – and provide automated line-of-business attestation and approval workflow for privileged access management.” Lieberman Software – SailPoint Integration Reduces the Risk of Data Breaches Historically, IT security has often wound up with separate silos for managing privileged IT users and regular end-users. As a result, most organizations have been deprived of a holistic view of user access which exposed organizations to increased risk. Privileged accounts are a primary attack surface during cyber attacks, and many of the recent, high-profile data breaches occurred due to the abuse of privileged access. With the Lieberman Software – SailPoint integration, customers gain a single platform to seamlessly provision and govern access for end users, IT administrators, and other users. The combined strengths of Lieberman Software’s ERPM and SailPoint’s IdentityIQ introduce new levels of control over privileged accounts managed by ERPM, while granting instant access to privileged permissions directly in IdentityIQ. The result is greater visibility into privileged users' access to systems and data, and the ability to quickly identify users with excessive identity-related risk.
  • 2. “We are pleased to welcome Lieberman Software as an inaugural member of the Identity+ Alliance,” said Joe Gottlieb, SVP of Corporate Development at SailPoint. “The tightly-coupled integration between IdentityIQ and Lieberman Software’s Adaptive Privilege Management platform creates a holistic solution for managing identities and controlling access for all users, both regular and privileged. This integration delivers real value for our joint customers by adding a layer of corporate governance for privileged access control and increasing operational efficiency for the IT department.” Connecting PAM and IAM products in one unifying solution is now viewed as an IT security best practice. According to recent research from Gartner, organizations should “establish privileged access governance by extending identity governance controls, such as automated provisioning, entitlements cataloguing and access certification, to privileged accounts and administrator access.”1 For more information see http://www.liebsoft.com/SailPoint-Integration/. About Lieberman Software Corporation Lieberman Software proactively stops cyber attacks that bypass conventional enterprise defenses and penetrate the network perimeter. The company provides award-winning privileged identity management and security management products to more than 1,400 customers worldwide, including nearly half of the US Fortune 50. By automatically securing privileged access - both on-premises and in the cloud - Lieberman Software controls access to systems with sensitive data, and defends against malicious insiders, zero day attacks and other advanced cyber threats. Lieberman Software is headquartered in Los Angeles, CA, with offices and channel partners located around the world. For more information, visit www.liebsoft.com. 1 Anmol Singh and Felix Gaehtgens, Twelve Best Practices for Privileged Access Management, Gartner, Oct. 8 2015 Product and company names herein may be trademarks of their registered owners. For more information, please contact: Kevin Franks Marketing Communications Manager Lieberman Software Corporation 310-300-3562 www.liebsoft.com www.identityweek.com www.twitter.com/liebsoft kfranks@liebsoft.com