CA Technologies Scales Up Privileged Access Management for Large Enterprise and Managed Service Deployments
Updates to CA Privileged Access Manager include new capabilities for centralized management, enhanced performance and data security
Singapore – 5 October, 2017 – CA Technologies (NASDAQ:CA) today announced a new
release of its CA Privileged Access Management (PAM) solution that addresses
scalability and performance needs for departmental and geographical expansion.
CA PAM 3.0 gives companies the ability to scale their PAM deployments across
multiple departments, and provides Managed Service Providers (MSPs) a helpful
way to manage multiple instances of the product for their customer base across
platforms and infrastructures.
release of its CA Privileged Access Management (PAM) solution that addresses
scalability and performance needs for departmental and geographical expansion.
CA PAM 3.0 gives companies the ability to scale their PAM deployments across
multiple departments, and provides Managed Service Providers (MSPs) a helpful
way to manage multiple instances of the product for their customer base across
platforms and infrastructures.
The scalability of a Privileged
Access Management solution is critical to ensure organizations can address and
control cyber risk coming from trusted users in any environment. As
deployments increase to manage and monitor access expand across geographies,
departments and hybrid environments, the architectural considerations can cause
challenges in aligning infrastructure allocation with operating systems and
databases. CA PAM supports these requirements with enhanced features that
enable greater control across the diversity of user access points, and has
features that make it simple for Security Administrators to extend their
enforcement, control and monitoring of users.
Access Management solution is critical to ensure organizations can address and
control cyber risk coming from trusted users in any environment. As
deployments increase to manage and monitor access expand across geographies,
departments and hybrid environments, the architectural considerations can cause
challenges in aligning infrastructure allocation with operating systems and
databases. CA PAM supports these requirements with enhanced features that
enable greater control across the diversity of user access points, and has
features that make it simple for Security Administrators to extend their
enforcement, control and monitoring of users.
Whether privileged access comes in the form of
“root,” “administrator” and “superuser” accounts,
or application, API or service accounts with elevated privilege, effectively
managing all points of privileged access becomes even more of a challenge in
these dynamic cloud environments. This is not because these environments are
inherently unsecure, but because aspects of security (especially with regard to
the varied levels of privileged access) are often overlooked.*
“root,” “administrator” and “superuser” accounts,
or application, API or service accounts with elevated privilege, effectively
managing all points of privileged access becomes even more of a challenge in
these dynamic cloud environments. This is not because these environments are
inherently unsecure, but because aspects of security (especially with regard to
the varied levels of privileged access) are often overlooked.*
“Many organizations today are
transforming themselves digitally to capitalize on the opportunities in the
application economy. However, this can elevate cyber risks as itinevitably results in more entry points that are
accessible by a greater number and more diverse set of identities. This will
lead to an increase in attack vectors if not managed properly,” said Lim Teng Sherng, vice president, Security, Asia Pacific
& Japan, CA Technologies.
transforming themselves digitally to capitalize on the opportunities in the
application economy. However, this can elevate cyber risks as itinevitably results in more entry points that are
accessible by a greater number and more diverse set of identities. This will
lead to an increase in attack vectors if not managed properly,” said Lim Teng Sherng, vice president, Security, Asia Pacific
& Japan, CA Technologies.
“To reap the full benefits of digitalization, organizations
need to integrate privileged access management at the onset and at every stage
of any digital initiatives. This will require an advanced, consolidated and
versatile PAM solution that can adjust, adapt and scale with the business
requirements and risks throughout the enterprise’s digital transformation
journey,” Teng Sherng added.
need to integrate privileged access management at the onset and at every stage
of any digital initiatives. This will require an advanced, consolidated and
versatile PAM solution that can adjust, adapt and scale with the business
requirements and risks throughout the enterprise’s digital transformation
journey,” Teng Sherng added.
New features of CA PAM to reduce cyber risk from trusted users include:
· A new simplified Management
Console designed to provide visibility across security-as-a-service and
multi-department deployments.
Console designed to provide visibility across security-as-a-service and
multi-department deployments.
· Enhanced clustering capabilities
and concurrent session performance assures large, global enterprises and MSPs
consistent policy across clusters and instances.
and concurrent session performance assures large, global enterprises and MSPs
consistent policy across clusters and instances.
· Augmented session recording
encryption and crypto module enhancements across deployments of all sizes.
encryption and crypto module enhancements across deployments of all sizes.
· Localization that delivers CA PAM
capabilities to the Japanese market. As demand for more integrated, global
security solutions grow, CA PAM offers multinational companies the ability to
manage a single solution with multiple instances.
capabilities to the Japanese market. As demand for more integrated, global
security solutions grow, CA PAM offers multinational companies the ability to
manage a single solution with multiple instances.
Gartner recommends that security and risk management leaders
responsible for delivering IAM capabilities “Deploy session recording as soon as possible, because this
capability will add accountability and visibility for privileged activity.
Include this capability as part of your selection process.”**
responsible for delivering IAM capabilities “Deploy session recording as soon as possible, because this
capability will add accountability and visibility for privileged activity.
Include this capability as part of your selection process.”**
Resources
Gartner does not endorse any vendor, product or service
depicted in its research publications, and does not advise technology users to
select only those vendors with the highest ratings or other designation.
Gartner research publications consist of the opinions of Gartner’s research
organization and should not be construed as statements of fact. Gartner
disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
depicted in its research publications, and does not advise technology users to
select only those vendors with the highest ratings or other designation.
Gartner research publications consist of the opinions of Gartner’s research
organization and should not be construed as statements of fact. Gartner
disclaims all warranties, expressed or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.
About CA Technologies
CA Technologies (NASDAQ:CA)
creates software that fuels transformation for companies and enables them to
seize the opportunities of the application economy. Software is at the heart of
every business in every industry. From planning, to development, to management
and security, CA is working with companies worldwide to change the way we live,
transact, and communicate – across mobile, private and public cloud,
distributed and mainframe environments. Learn more at www.ca.com.
creates software that fuels transformation for companies and enables them to
seize the opportunities of the application economy. Software is at the heart of
every business in every industry. From planning, to development, to management
and security, CA is working with companies worldwide to change the way we live,
transact, and communicate – across mobile, private and public cloud,
distributed and mainframe environments. Learn more at www.ca.com.
Follow CA Technologies
About CA Technologies
CA Technologies (NASDAQ:CA) creates software that fuels
transformation for companies and enables them to seize the opportunities of the
application economy. Software is at the heart of every business in every
industry. From planning, to development, to management and security, CA is
working with companies worldwide to change the way we live, transact, and
communicate – across mobile, private and public cloud, distributed and
mainframe environments. Learn more at www.ca.com.
transformation for companies and enables them to seize the opportunities of the
application economy. Software is at the heart of every business in every
industry. From planning, to development, to management and security, CA is
working with companies worldwide to change the way we live, transact, and
communicate – across mobile, private and public cloud, distributed and
mainframe environments. Learn more at www.ca.com.
Legal Notices
Copyright © 2017 CA, Inc. All Rights Reserved. All
trademarks, trade names, service marks, and logos referenced herein belong to
their respective companies.
trademarks, trade names, service marks, and logos referenced herein belong to
their respective companies.
For the LATEST tech updates,
FOLLOW us on our Twitter
LIKE us on our FaceBook
SUBSCRIBE to us on our YouTube Channel!