CA delivers streamlined identity management

CA, the rebranded Computer Associates, has launched CA Identity Manager, to help companies manage IT user identities securely.

CA, the rebranded Computer Associates, has launched CA Identity Manager, to help companies manage IT user identities securely.

The product has been developed using technology from CA’s recent acquisition of Netegrity. CA Identity Manager is designed to unify identity management across the enterprise, at the same time streamlining and simplifying the administration of internal and external users and their IT entitlements. 

“Organisations are finding it difficult to meet simultaneously the needs of the business, ensure information security, comply with data privacy regulations, and keep costs down,” said Toby Weiss, senior vice-president and general manager of CA’s security management business unit.

“CA Identity Manager directly addresses these challenges by automating identity-related management processes.”

CA Identity Manager automates identity management processes.  The company said this automation delivers repeatable and auditable processes that are inherently more reliable than the ad hoc, manual procedures currently used by many firms.

The new product was announced at the supplier’s CA World user conference and is part of a new line of products that help form the company’s enterprise IT management (EITM) portfolio.

“Best practice IT governance and compliance requires disciplined policy definition, reliable policy enforcement, and credible compliance documentation,” said Chris Christiansen, an analyst at IDC.

“By addressing these three IT requirements in a single solution, CA has demonstrated a clear understanding of how enterprise organisations need to leverage identity management technology,” said Christiansen.

“Compliance efforts are now boardroom discussions, with chief information officers tasked with mitigating risks while at the same time driving down costs,” said Deborah Golden, a consultant at Deloitte & Touche LLP. “Identity management is one of the areas which help executives deliver this value.”

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.






  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...