Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

CA Announces New Product Releases to Help Strengthen IT Security and Reduce Costs of Managing Compliance for Physical and Virtua

CA Security and Governance Products Proactively Streamline Compliance Processes, Help Secure Privileged User Access, and Advance Identity Lifecycle Management
  • 21 October, 2009 17:28

<p>Sydney, 21 October, 2009 - CA, Inc. (Nasdaq: CA) today announced new product releases and integrations designed to help strengthen IT security, lower costs of managing compliance, and improve enterprise-wide IT risk management.</p>
<p>The products and integrations include:
-- CA Access Control 12.5 with new features to deliver comprehensive privileged user management and enhanced host access control;</p>
<p>-- Improved integration of CA Identity Manager 12.5 and CA Role &amp; Compliance Manager 12.5 for more streamlined identity lifecycle management, including innovative Smart Provisioning capabilities;</p>
<p>-- CA DLP 12.0 with extended discovery, protection, and control of sensitive data, and new integrations to complementary solutions;</p>
<p>-- CA Records Manager 12.6 with additional features for information governance and content protection, as well as addressing compliance demands; and</p>
<p>-- CA Governance, Risk &amp; Compliance Manager 2.5 (CA GRC Manager) with new features to further strengthen its role as the primary platform for management of IT risk and compliance information and initiatives.</p>
<p>"The explosion of data growth and the increase in regulations have created unprecedented security and compliance challenges for organisations," said Andrew Kelly, Director of CA’s Security Business Unit, Australia and New Zealand. "CA's Security Management and Governance technologies provide a comprehensive foundation for today's security and compliance needs. With improved integration and process automation, our customers can better secure their IT environment in a cost-effective manner and more consistently address their internal and external compliance requirements."</p>
<p>Comprehensive Privileged User Management and Access Control</p>
<p>Most IT organisations have privileged user accounts for their IT administrators which give them extensive access to IT systems. However, privileged access that isn't properly controlled and may be difficult or impossible to audit can be a serious security threat.</p>
<p>Available today, CA Access Control 12.5 helps manage regulatory compliance by enforcing policy-based control of privileged users and controlling what system resources they can access and what they can do under specific circumstances.</p>
<p>New functionality in CA Access Control includes:
-- Privileged User Password Management - Helps reduce IT risk of privileged user breaches by issuing passwords on a temporary, one-time use basis, or as necessary. This also helps ease compliance processes by providing accountability of shared account access for each privileged user.</p>
<p>-- UNIX(R) Authentication Broker - Checks credentials of UNIX users via Microsoft(R) Active Directory(R). This allows the consolidation of authentication and account information into the enterprise Active Directory instead of requiring maintenance of UNIX credentials on various systems.</p>
<p>-- Unified Console - Consolidates information and facilitates policy administration from a centralized Web management interface.</p>
<p>"Enterprises must secure sensitive applications due to the risks of data breaches, unauthorised transactions, and compliance review failures," said Mark Diodati, senior identity and security analyst, Burton Group. "Products that manage privileged accounts, secure the operating system, and provide Active Directory authentication for UNIX systems are critical weapons in the arsenal. Enterprises want integrated ways to leverage these tools to manage the privilege lifecycle."</p>
<p>Next-Generation Identity Lifecycle Management for Smart Provisioning</p>
<p>CA Identity Lifecycle Management is unique in how it is advancing the way organisations can manage the identity lifecycle. Improved integration of CA Role &amp; Compliance Manager's patent-pending analytics and policy engine with CA Identity Manager's ability to automate provisioning processes will help customers execute Smart Provisioning. This allows them to take a proactive approach to meeting security and compliance requirements, while increasing business efficiencies.</p>
<p>The improved integration for Smart Provisioning will be available this quarter and will provide functionality for:</p>
<p>-- Preventative Compliance - Helps organisations proactively prevent business and regulatory policy violations during the provisioning process by automatically checking for policy violations, such as segregation of duties.</p>
<p>-- Out-of-Pattern Alerting - Issues a warning during the provisioning process when access entitlements being granted to a user are significantly different than those of his or her peers.</p>
<p>-- Suggested Roles - Assists in identifying appropriate roles needed by a user by comparing his or her attributes with those of his peers.</p>
<p>CA DLP (Data Loss Prevention)
CA DLP 12.0 addresses the insider threat by helping prevent data loss or misuse across the enterprise and with federated partners. In addition, CA DLP is identity-centric and can apply policy dynamically to end-user activity based on his or her organisational roles for content aware identity and access management.</p>
<p>New functionality in CA DLP 12.0 is available today and includes:</p>
<p>-- Enhanced Discovery - Provides the ability to scan data locally on endpoints and to scan directly into structured ODBC databases to identify sensitive data.</p>
<p>-- Extended Endpoint Control - Leverages existing data protection policies to control of end-user activity such as moving data to writable CDs or DVDs, and taking a screen print of sensitive content.</p>
<p>-- Seamless Archive Integration - Integrates with CA Message Manager, a product in CA's Information Governance Suite, to help deliver end-to-end message surveillance, reporting, and archiving.</p>
<p>The CA Security Management offerings announced today help secure both physical and virtual IT environments, while integrating with CA Enterprise Log Manager and other security event and information solutions to help streamline compliance reporting.</p>
<p>Information Governance</p>
<p>CA Records Manager 12.6, available today, is focused on helping customers reduce the complexity and costs associated with managing, controlling and discovering information necessary for compliance and litigation preparedness. CA was recognised with a strong positive rating in the Gartner Records Management MarketScope, September 10, 2009.* It also was listed as a Leader in the Forrester Records Management Wave, June 23, 2009.**</p>
<p>CA Records Manager 12.6 offers the following new and enhanced features:</p>
<p>-- Enhanced Microsoft(R) SharePoint(R) Integration - Builds policy controls for retention management and extended security directly into SharePoint.</p>
<p>-- Improved Automation, Proactive Rules-based Search - Enables intelligent and transparent identification, collection (when content cannot be managed in place), record declaration, and ongoing content preservation as it is created.</p>
<p>-- FOIA Workflow - New workflow features help government entities respond to Freedom of Information Act (FOIA) requests in a timely manner to support the renewed focus on an open government. CA Records Manager 12.6 has been verified as compliant with U.S. DoD 5015.02-STD, April 2007.</p>
<p>CA Records Manager was recently awarded the first paired certification for Microsoft Office SharePoint(R) Server 2007 on U.S. DoD 5015.2 v3 Chapters 2, 3, and 4 which includes FOIA and Classified Records. With these new certifications, CA solidifies its leadership position with the most certified pairings of any industry vendor.</p>
<p>Governance, Risk and Compliance</p>
<p>CA is also announcing the availability of CA GRC Manager 2.5, its unified platform for the management of risk and compliance activities across the enterprise. This new release includes features to help simplify and automate key compliance processes and the ability to integrate with CA Role &amp; Compliance Manager, CA Compliance Manager for z/OS, and CA IT Client Manager.</p>
<p>CA GRC Manager 2.5 is available today and includes the following new functionality:</p>
<p>-- Automated Questionnaires - Allows customers to easily create, distribute, and analyse the results of questionnaires for risk and compliance controls assessments.</p>
<p>-- Robust Reporting Engine - Provides a set of pre-defined, role-based reports, as well as easily configured reports for local needs.</p>
<p>-- Ongoing IT Controls Monitoring - Automates input of IT controls status information into CA GRC Manager and provides a single view of overall IT risk and compliance profiles.</p>
<p>-- Extensions to IT Control Framework - Supports mapping between individual controls and authority documents, featuring a library of more than 400 regulations with mappings to IT controls from the Unified Compliance Framework.</p>
<p>-- Streamlined Management of Select FISMA Requirements - Offers a centrally managed information security system with extensive dashboards and reports, providing instant, comprehensive information about controls and processes related to Federal Information Security Management Act (FISMA) requirements.</p>
<p>CA Services and Support
CA also announced today new Security/Compliance rapid implementation offerings for CA DLP and CA GRC Manager. Rapid implementations are pre-packaged, fixed-price services that provide the experience, best practices and expertise that can facilitate a fast and successful implementation.</p>
<p>CA Support also added new Plus and Premier support tiers, providing designated engineers who can help customers optimise value from CA solutions in managing hybrid physical and virtual environments.</p>
<p>In addition, a new CA High Security Support offering is planned to be made available in the United States on November 17, 2009. This offering will provide extra protection for the sensitive data customers share with CA during support interactions for certain CA products, by maintaining such files in a system authorising access only by U.S. citizens.</p>
<p>* Gartner "MarketScope for Records Management," by Kenneth Chin. ID Number: G00169707, September 10, 2009
** "The Forrester Wave(TM): Records Management, Q2 2009," Forrester Research, Inc., June 2009</p>
<p>About the MarketScope
The MarketScope is copyrighted 2009 by Gartner, Inc. and is reused with permission. The MarketScope is an evaluation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the MarketScope, and does not advise technology users to select only those vendors with the highest rating. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
(Logo: )</p>
<p>About CA
CA (Nasdaq: CA), the world's leading independent IT management software company, helps customers optimise IT for better business results. CA's Enterprise IT Management solutions for mainframe and distributed computing enable Lean IT -- empowering organisations to more effectively govern, manage and secure their IT operations. For more information, visit
Copyright A(C) 2009 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. Microsoft, Active Directory, SharePoint and SharePoint Server are registered trademarks of Microsoft Corporation in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. CA does not provide legal advice. No software product referenced herein serves as a substitute for compliance with any laws (including but not limited to any act, statute, regulation, rule, directive, standard, policy, administrative order, executive order, and so on (collectively, "Laws")) or contractual obligations with third parties. Please consult with competent legal counsel regarding any such Laws or contract obligations. Nothing herein (i) affects the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amends any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described herein remain at CA's sole discretion. For the CA High Security Support offering, categories of confidential data and identifiers that will be redacted prior to engaging personnel outside the High Security Support organisation vary by product and will be listed in the documentation for this offering. High Security Support customers must be and remain active Business Critical Support customers for the duration of the term for which they acquire High Security Support. Business Critical Support is provided in accordance with the CA Support Policy and Terms, which is available at High Security Support is provided in addition to the services described as Business Critical Support and is not available to the extent that CA is not required to provide Business Critical Support.</p>

Most Popular