Providing security automation at scale for Linux

Lieberman Software Corporation is advancing the security of the Linux enterprise by keeping the privileged attack surface in constant motion on Linux systems.

  • 7 years ago Posted in
Growth of Linux Deployments Creates Need for Linux Security
The growth of Linux deployments has accelerated exponentially. One of the biggest sectors of this increase has been in the cloud, where Linux’s flexibility as an automated platform is particularly convenient. According to a recent estimate, Linux is used for 79 percent of cloud deployments.
The increased popularity of Linux, however, has also led to a rise of security vulnerabilities on the platform. Unsecured Linux servers are often attacked because of poor privileged credential management. Default passwords that are never changed, cryptographically weak passwords set for human convenience, and sudo settings with unknown consequences are common Linux security challenges.
Privileged Access Management for the Linux Enterprise
With the release of Enterprise Random Password Manager™ (ERPM) v5.5.0, Lieberman Software significantly improved Linux security, whether on premises or in the cloud. ERPM contains cyber attacks that penetrate the network perimeter. It does so by securing the privileged accounts needed to access critical systems.
With the new version of ERPM, Linux privileged accounts become a moving target for attackers. Privileged access is locked down to satisfy internal security and regulatory compliance audit requirements – even for the root user.
“Linux requires security that can be every bit as flexible and automated as it is,” said Jonathan Sander, VP of Product Strategy at Lieberman Software. “ERPM provides exactly the scale, speed, and automation required to match the needs of the dynamic Linux world.”
ERPM’s Linux Security Features
  • Linux Discovery – ERPM can build an inventory of Linux systems. It scans the network, identifies systems, and starts managing them. ERPM also finds accounts, SSH Keys, sudo policies and more. This allows users to secure their systems quickly and efficiently.
  • Password Rotation – ERPM removes Linux privileged passwords from people’s heads, notebooks, and spreadsheets and puts them in a secure, encrypted library. Only authorized and audited personnel can access the passwords.
  • Full sudo Policy Visibility – ERPM takes in sudoers policy files from every host it manages and lays out the policies in place for each one of them. Users can see how and where privileges are granted.
  •  SSH Key Pair Discovery and Management – ERPM finds SSH key pairs, catalogs them, and shows where they exist. It can use SSH key pairs for all its own connections to improve security and rotate critical SSH keys.
  • Script & Orchestration Friendly – ERPM offers comprehensive web services in SOAP and JSON formats. There’s no need for Linux administrators to compromise on their scripting, automation, orchestration and application integration duties.
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...