Enterprise Solution

Finally, an Enterprise solution!

autocipher is an agentless password management solution for the Local Administrator User ID for computers in an Ms-Windows environment. The Local Administrator User ID is present on all Ms-Windows computers and has full privilege on the computer.

Standardized desktops help contain and control Total cost of ownership (TCO). As part of a standard desktop, the Local Administrator UserID and password on the desktop is often the same when the desktop is initially distributed within an organization. autocipher provides a secure and convenient method for changing the password and username of the Local Administrator ID and for keeping track of the change. Reporting tools are available to ensure compliance as well as provide recovery options for all computers.

autocipher uses Patent Pending technology to ensure changes to the Local Administrator passwords on all machines in an Ms-Windows network. Whether your machines are part of an Ms-Windows NT 4.0 Domain, Active Directory, Ms-Windows WorkGroup or DMZ, autocipher can be used to change passwords for all those machines, with no user intervention. Finally, there's no need to keep writing scripts to change the password on all your workstations or servers or keeping track of whether the password was distributed to all machines.

Local Administrator

The most powerful ID on a computer system is often the most compromised password in an Enterprise:

  • Local Administrator passwords are often the same on every PC in the enterprise
  • Password changes are communicated "in the clear" to all support personnel
  • Complex passwords tend to get written down
  • Often multiple Local Administrator passwords are set for similar groups of machines - IIS Servers, File Servers etc. (harder for support personnel to keep track)

A Local Administrator password breach compromises everything on a computer

  • Sensitive data
  • Intellectual property
  • Integrity of configuration and qualified systems
  • Network and file connections

..and exposes every other computer with the same Local Administrator password to the same risks. Servers are usually only slightly different:

  • Changes may be more frequent; done manually; verified but…
  • Passwords are still the same on multiple systems
  • Passwords are communicated and shared by Support personnel
  • Manual changes consume valuable time and resources

The consequences of a security breach on servers is geometrically greater than for workstations. Once the Local Administrator password is compromised:

  • Intrusion is almost undetectable
  • Local Administrator authority can be used to create additional compromised UserIDs
  • Viruses can spread with administrator authority
  • Shared passwords puts every enterprise computer at risk
  • Everything on the workstation - (in fact, on all workstations and servers) is compromised
  • They all stay compromised until the next scheduled password change
  • No accountability of who used the Local Administrator UserID

Unrecorded use of Local Administrator privileges can lead to:

  • Changes to standard/qualified configurations
  • Unauthorized data access

Enterprise-wide password changes consume valuable resources and time. They are often:

  • Manual or semi-automated
  • Success/failure is not usually recorded or verified
  • Tends to be done infrequently

Regulatory Compliance

  • Sarbanes-Oxley
  • HIPAA
  • FACTA
  • PCI
  • FDCC

autocipher provides an audit log for any use of the Local Administrator ID.