The Way Business Is Moving published by
Issue Date: June 2008

CA expands identity and access management portfolio

June 2008

CA has expanded its identity and access management portfolio with the launch of new products and upgrades.

It said CA Security Compliance Manager offers IT security and compliance software to enable organisations to comply with legal, corporate, and government regulations. It offers a process-centric platform to provide continuous security compliance, including IT security controls, analysis and proof of compliance, and automation of compliance processes.
It identifies orphan and inactive accounts and initiates a remediation request with automatic follow-up when it detects a policy or compliance violation. It also identifies changes in entitlements, roles, user title, cost centre, and account access. It can be integrated with Identity Manager, ACF2, Top Secret, GRC Manager, and Service Desk.
Security Compliance Manager was tested by several companies prior to its release, including risk mitigation and business solutions provider First Advantage. Isabelle Theisen, chief security officer at First Advantage, said: "Being a public company, First Advantage should comply with multiple regulations, including Sarbanes-Oxley and the Fair Credit Reporting Act. We are encouraged by our tests using CA Security Compliance Manager. We have been able to identify and remediate orphan accounts and automate the analysis and overall reporting of our identity management system."
CA also launched two major upgrades for its identity management and control product lines with the release of CA Identity Manager and CA Access Control Premium Edition.
It said CA Identity Manager Version r12 manages identity lifecycles, including creation, modification, and removal. It includes improved reporting capabilities, an open reporting foundation, and standard integration with Business Objects.
CA Access Control Premium Edition is an enhanced version of the company's Access Control product offering cross-platform creation, deployment, and management of role-based access controls for servers. It provides policy-based compliance reporting, enhanced policy reports, open policy reporting, and advanced enterprise policy management. It scales policy management to diverse server environments and can manage several endpoints from a single server.
CA said it enables administrators to construct logical host groups and deployment rules for streamlined policy deployment, versioning, and change management. The software supports VMWare ESX, Sun Solaris 10 Zones, Microsoft Virtual Server, Linux XEN, IBM AIX LPAR, HP-UX VPAR, and z/VM. It also supports IPv6 and FIPS140-2 security cryptography standards.
The IAM market was worth $4,4bn in 2006 and is projected to touch $7,48bn at a CAGR of 8,9% by 2012. Market analyst Datamonitor expects particularly strong growth in identity federation solutions and web SSO, which streamline business processes and align IT with business objectives. Identity and access auditing is expected to be another significant growth area, driven by the increasing threat of data loss, and the introduction of regulatory requirements that mandate auditing and access capabilities.
Source: Computergram

Others who read this also read these articles

Search Site


Previous Issues