Read our Fact Sheet Learn More

FACT SHEET
Lieberman Software Corporate
Fact Sheet
Overview
Lieberman Software Corporation provides Privileged Identity Management and security
management products for the multiplatform enterprise. Our reputation for innovation
and dependability is founded on the ability to fill a distinctive niche in the cyber
security industry.
We realize that managing an expanding array of systems, devices, applications, users
and other IT assets is a complex endeavor in a dispersed multi-platform enterprise.
Our strategy is to increase control over the IT infrastructure through centralized,
automated security solutions that can administer critical IT tasks collectively across rich,
heterogeneous IT environments. This subsequently reduces security vulnerabilities,
minimizes unplanned downtime, increases IT staff productivity and eases the burden of
regulatory compliance.
“Lieberman Software has chosen an
automated discovery and remediation
approach that limits cyber-attack
opportunities. It offers up a rotating defense
surface with frequently updated credentials
that zero day threats find difficult to
overcome.”
Andrew Kellett
Principal Analyst, Ovum
Delivering Automated Proactive Cyber Defense at Scale
With today’s advanced zero day threats and escalation attacks, cyber attackers bypass conventional perimeter security, covertly infiltrate
the network, exploit vulnerabilities to move between systems, and extract an organization’s most sensitive data at will. During these
“land and expand” assaults, attackers maintain persistent access on the network for an average of 146 days before being discovered,
according to Mandiant.¹
Perimeter security tools like firewalls and intrusion detection systems react too late to block sophisticated, targeted cyber attacks like
APTs. We believe that organizations should assume that intruders are already inside the perimeter and act accordingly.
“…proactively managing credentials for
privileged access actually reduces an
organization’s risk of a data breach by 75
to 80%.”
Derek Brink
Vice President, Aberdeen Group
Our Privileged Access Management technology arms modern organizations with the
proactive cyber defense capabilities they need to cope with the reality of the porous
network perimeter.
The key to stopping cyber attacks with Lieberman Software is our ability to automatically
discover and eliminate privileged access security threats before cyber attackers can exploit
them. We accomplish this by limiting the value of credentials stolen by criminals, nationstate attackers or malicious insiders.
¹ M-Trends 2016, Mandiant Consulting, February 2016
Liebsoft.com | (01) 310-550-8575 | [email protected]
FACT SHEET
Our technology eliminates lateral motion when intruders penetrate the network. It does so by time-limiting how long a captured
credential can be exploited. Passwords, SSH keys and other credentials are continuously rotated, as frequently as necessary, even
every couple of hours - effectively negating zero day attacks. Even if an attacker compromises a machine, those credentials cannot be
leveraged to leapfrog from system to system, and anonymously steal sensitive data along the way.
Executive Team
Philip Lieberman - President and CEO
Jack Jaffe - Senior Vice President, Sales
Richard Weeks – Vice President, Channels and Business Development
Jonathan Sander – Vice President, Product Strategy
Chris Stoneff – Vice President, Technical Services
Jane Grafton – Director of Marketing
History
Our company was founded in 1978 as Lieberman & Associates, a software consultancy. In response to customer requests for solutions to
problems that were neglected in the Windows community, we began developing security management tools. Based on the enthusiastic
response to those tools, we released our first commercial software product in 1994 and changed our name to Lieberman Software
Corporation in 2004.
We launched the first product in the now burgeoning Privileged Access Management cyber security space in 1999, and continue to
lead this field in scalability, automation and feature set. We update these products several times a year to support the widest range of
devices and platforms in the enterprise – on premises and in the cloud.
Since its inception, our company has been a profitable, management owned firm. We consistently release new products and product
upgrades, maintaining our value and relevance to IT professionals. Our niche products, management ownership philosophy, and
technical expertise are testaments to our success and enduring growth.
Liebsoft.com | (01) 310-550-8575 | [email protected]
FACT SHEET
Customers
Due to the nature of our products, our solutions can benefit any organization
from the mid-market to the largest multinational enterprise. Our products are
widely deployed and used by security conscious organizations interested in
best-of-breed cyber defense solutions.
Clientele consists of organizations from every major vertical market segment,
including government, healthcare, finance, manufacturing, retail and energy.
We target our solutions at IT professionals charged with ensuring the
operational integrity of their organizations’ computing infrastructures. Many of
our customers have deep regulatory compliance requirements and high-value
Intellectual Property that requires stringent protection.
“ERPM is an excellent choice for large organizations
that need a way to centrally manage access to
privileged resources. It is used all over the world by
federal agencies and large companies to prevent
privileged account abuse.”
Peter Stephenson
Technology Editor, SC Magazine
Our reputation for consistently delivering reliable and relevant products has generated a loyal base of repeat customers.
Award-Winning Products
We deliver products that automate cyber security operations often ignored due to cost and complexity. Our products maintain strict
oversight control of the IT infrastructure, reduce the threat of external and internal data breaches, and provide the real-time information
and agility needed to rapidly resolve IT security and management issues as they arise.
These products can be set up once to automatically operate in the background on an ongoing basis, and eliminate time consuming
manual IT tasks. This helps organizations achieve IT operational efficiency and frees up IT staff to pursue other projects.
Our unique, fully automated cyber security products remove humans from the task of cyber defense, so that defensive measures can be
carried out 7/24 and continuously adapt to changes in IT environments. Other solutions in the Privileged Access Management market
are highly manual and require significant amounts of ongoing professional services to operate.
Enterprise Random Password Manager™ (ERPM) is a proactive cyber defense solution that falls into the category of Privileged Access
Management. It protects organizations against advanced cyber threats from state-sponsored attackers, criminal hackers and malicious
insiders. ERPM prevents unrestricted lateral motion when cyber attacks penetrate the network perimeter by time-limiting captured
credentials. Even if an intruder compromises a machine, ERPM isolates and contains the attack. Stolen credentials cannot be used to
leapfrog between systems and anonymously access systems with sensitive data.
Random Password Manager™ is the entry level alternative to Enterprise Random Password Manager. It allows you to perform most of
the functions of ERPM, except for managing service accounts, application credentials and SSH keys.
Liebsoft.com | (01) 310-550-8575 | [email protected]
FACT SHEET
User Manager Pro Suite™ is a multi-threaded Windows security management tool suite known for its speed, depth of coverage
and ease of use. It can mass manage local users, groups, registries, shares, rights, passwords and more on Windows servers and
workstations. It also lets you generate real-time, interactive compliance reports on system configurations.
Service Account Manager™ lets you access, modify and report on Windows service properties concurrently on all systems in the
network, and quickly update your service account credentials. It provides a single view of all services on all managed systems, allowing
you to report on and change virtually all service properties with just a few clicks.
Account Reset Console™ allows your users to reset or unlock their own accounts in a secure, audited, and delegated manner. It solves
one of the most common IT problems encountered by large organizations — users losing access to systems because of forgotten or
expired passwords.
Other products include Task Scheduler Pro, COM+ Manager and Server-to-Server Password Synchronizer.
Strategic Alliances
We maintain established alliances with some of the most respected software and hardware leaders in the industry. Leaders who share
our vision of delivering advanced enterprise cyber security solutions. We work closely with Microsoft, Balabit, Core Security, FireEye,
SailPoint, RSA and many other companies where our respective technologies overlap to provide a comprehensive layer of cyber defense
for the modern enterprise.
We are members of Optiv Security’s Identity Defined Security Alliance, the SailPoint Identity+ Alliance, the Microsoft Cyber Resiliency
Framework and Exclusive Networks’ Cyber Attack Remediation & Mitigation initiative.
Distribution
We complement our direct sales force with a global alliance of VARs and SIs. We maintain active partnerships in more than 60 countries
worldwide. Our company continues to expand its partner program by engaging with qualified domestic and international resellers
with an established presence in enterprise security markets. Our cyber security products are ideal for value-added resellers, integrators,
and other indirect software channels because they serve security-conscious enterprises in all vertical market segments and all regions
worldwide.
Liebsoft.com | (01) 310-550-8575 | [email protected]