CA rolls out security management architecture

Computer Associates has introduced its eTrust Security Management Architecture, for integrating authentication, authorisation and...

Computer Associates has introduced its eTrust Security Management Architecture, for integrating authentication, authorisation and auditing mechanisms across multi-platform environments and applications.

CA said eTrust Security Management Architecture provides security, transparency and reliability for business transactions as they move across complex IT environments.

The software company has already released two eTrust identity and access management solutions that take advantage of the new architecture. Other solutions will support the architecture over time, said CA.

The execution of a typical business transaction involves multiple layers of applications and multiple underlying technologies including Web services, middleware and other systems.

Each of these technologies may use different security mechanisms for authentication, authorisation and auditing, which can cause problems.

ETrust Security Management Architecture addresses these problems by providing a common security "backbone" across all underlying technologies.

It uses open standards such as WS-Security, SAML, SPML, ISO-10181(AZNAPI), Kerberos, X.509, and SAF to enable true interoperability between diverse platforms and security mechanisms.

Click here for the white paper on the eTrust Security Management Architecture >>

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Business applications

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close