CA delivers streamlined identity management

CA, the rebranded Computer Associates, has launched CA Identity Manager, to help companies manage IT user identities securely.

CA, the rebranded Computer Associates, has launched CA Identity Manager, to help companies manage IT user identities securely.

The product has been developed using technology from CA’s recent acquisition of Netegrity. CA Identity Manager is designed to unify identity management across the enterprise, at the same time streamlining and simplifying the administration of internal and external users and their IT entitlements. 

“Organisations are finding it difficult to meet simultaneously the needs of the business, ensure information security, comply with data privacy regulations, and keep costs down,” said Toby Weiss, senior vice-president and general manager of CA’s security management business unit.

“CA Identity Manager directly addresses these challenges by automating identity-related management processes.”

CA Identity Manager automates identity management processes.  The company said this automation delivers repeatable and auditable processes that are inherently more reliable than the ad hoc, manual procedures currently used by many firms.

The new product was announced at the supplier’s CA World user conference and is part of a new line of products that help form the company’s enterprise IT management (EITM) portfolio.

“Best practice IT governance and compliance requires disciplined policy definition, reliable policy enforcement, and credible compliance documentation,” said Chris Christiansen, an analyst at IDC.

“By addressing these three IT requirements in a single solution, CA has demonstrated a clear understanding of how enterprise organisations need to leverage identity management technology,” said Christiansen.

“Compliance efforts are now boardroom discussions, with chief information officers tasked with mitigating risks while at the same time driving down costs,” said Deborah Golden, a consultant at Deloitte & Touche LLP. “Identity management is one of the areas which help executives deliver this value.”



Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...