19.12.2016 Views

GSN_Nov-Dec_FINAL_Yumpu

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CA Technologies strengthens security portfolio with new<br />

advanced analytics and Identity-as-a-Service offerings to<br />

protect and enable the agile enterprise<br />

Mordecai Rosen<br />

LAS VEGAS, <strong>Nov</strong>. 16, 2016 – CA<br />

WORLD ’16 – CA Technologies<br />

today announced a new behavior<br />

analytics solution that integrates<br />

with CA Privileged Access Manager<br />

(PAM). Called CA Threat Analytics<br />

for PAM, the product features machine-learning<br />

capabilities for better<br />

threat detection and breach prevention<br />

associated with privileged<br />

users. CA also announced CA Identity<br />

Service, a new, turn-key identity-as-a-service<br />

solution, to address<br />

identity and access management<br />

(IAM) needs for both on-premises<br />

and cloud-based applications.<br />

“By applying CA’s unmatched<br />

self-learning behavior analytics to<br />

privileged user activity, CA can help<br />

CISOs with their biggest challenge:<br />

staying one step ahead of the bad<br />

actors,” said Mordecai Rosen, senior<br />

vice president and general<br />

manager, CA Security<br />

business. “Going beyond<br />

protection, CA is extending<br />

secure business operations<br />

with CA Identity<br />

Service to support deeply<br />

embedded on-premises<br />

systems while taking advantage<br />

of the agility of cloud applications<br />

and services.”<br />

Setting New Standards in Threat<br />

Detection, Breach Prevention and<br />

IDaaS for Hybrid IT Environments<br />

Available today, CA Threat Analytics<br />

for PAM models privileged user<br />

behavior and evaluates risk based<br />

on factors such as a user location,<br />

time and duration of activity, the<br />

data being accessed and the user’s<br />

track record for security and past<br />

behavior. When a breach or threat is<br />

detected, the system automatically<br />

triggers controls to mitigate risks,<br />

such as starting session recording,<br />

initiating a stronger authentication<br />

procedure or alerting security system<br />

and operations.<br />

In a recent global survey conducted<br />

by Coleman Parkes for CA,<br />

82 percent of respondents<br />

said identity-centric security<br />

is critical to the business.*<br />

CA Identity Service<br />

addresses the need for<br />

a modern, hybrid IAM solution<br />

– giving businesses<br />

the agility to quickly and<br />

securely adopt cloud ap-<br />

39<br />

plications and services alongside<br />

their on-premises applications<br />

controlled by CA Single Sign-On,<br />

managing everything from a single<br />

launch pad. CA Identity Service balances<br />

the demand for security, agility<br />

and a positive user experience.<br />

“We see our customers’ businesses<br />

moving increasingly to a hybrid IT<br />

environment. It’s clear we need to<br />

help them with an identity and access<br />

management solution that supports<br />

both their cloud-based and<br />

on-premises applications,” said Ed<br />

Pascua, senior vice president at Simeio<br />

Solutions. “CA Identity<br />

Service offers the flexibility and<br />

management we need to meet the<br />

demands of our customers’ hybrid<br />

enterprise. CA’s Identity Service is<br />

an excellent tool that helps Simeio<br />

More on page 52

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!