U Westminster Deploys Lieberman Software To Manage 'Privileged' Users

The London-based University of Westminster has chosen a utility from Lieberman Software to manage privileged user accounts. The university will use Lieberman's Enterprise Random Password Manager (ERPM) to control access to accounts with special access to network resources on servers, workstations, and network devices.

"We need to control and audit access to all of the privileged account passwords in our network, and decided on Lieberman Software's ERPM for its automated account discovery capabilities, auditing features, and productivity benefits," said Jonathan Hughes, user systems manager. "Among the solutions that we evaluated, ERPM is the only one that can automatically discover every privileged account on our network, providing real advantages over the less effective, less reliable manual alternatives."

Previously, Westminster's IT staff performed manual processes to manage privileged accounts.

When ERPM is introduced into a new environment, it locates and tracks every privileged account that exists in the network. These privileged accounts hold elevated permissions to access sensitive data, install and run programs, and change the configuration settings of hardware and software. The idea of the software is that by maintaining control and management of privileged account passwords, administrators can reduce security threats and comply with audits.

"While there were numerous factors in our decision to install ERPM enterprise-wide at the university, the implementation was primarily driven by regulatory compliance and security demands," Hughes said. "The product's access and control reporting will be valuable to our annual security audit. And, while we've never experienced a security breach, we are aware of the serious threat posed by unsecured privileged accounts. ERPM mitigates this risk."

The university has 22,000 students.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • glowing digital brain interacts with an open book, with stacks of books beside it

    Federal Court Rules AI Training with Copyrighted Books Fair Use

    A federal judge ruled this week that artificial intelligence company Anthropic did not violate copyright law when it used copyrighted books to train its Claude chatbot without author consent, but ordered the company to face trial on allegations it used pirated versions of the books.

  • server racks, a human head with a microchip, data pipes, cloud storage, and analytical symbols

    OpenAI, Oracle Expand AI Infrastructure Partnership

    OpenAI and Oracle have announced they will develop an additional 4.5 gigawatts of data center capacity, expanding their artificial intelligence infrastructure partnership as part of the Stargate Project, a joint venture among OpenAI, Oracle, and Japan's SoftBank Group that aims to deploy 10 gigawatts of computing capacity over four years.

  • laptop displaying a phishing email icon inside a browser window on the screen

    Phishing Campaign Targets ED Grant Portal

    Threat researchers at cybersecurity company BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal.