11.07.2015 Views

Content-Aware Identity and Access Management - CA Technologies

Content-Aware Identity and Access Management - CA Technologies

Content-Aware Identity and Access Management - CA Technologies

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>CA</strong> <strong>Technologies</strong> Point of View: <strong>Content</strong>-<strong>Aware</strong> <strong>Identity</strong> <strong>and</strong> <strong>Access</strong> <strong>Management</strong>• Control information (<strong>CA</strong> DataMinder) Find, classify, <strong>and</strong> control how information is used basedon content <strong>and</strong> identity.<strong>CA</strong> DataMinder identifies sensitive data across the enterprise in real time <strong>and</strong> determines whetheror not end users are using that data in accordance with various security <strong>and</strong> regulatory m<strong>and</strong>ates. Itidentifies <strong>and</strong> classifies all sensitive data; examples include personally identifiable information (PII),intellectual property (IP), <strong>and</strong> nonpublic information (NPI). It controls sensitive data at all locations:at the endpoint, on the server, on the network, or stored across the enterprise.Many companies have faced the negative effects of sensitive information being emailed outsidecorporate boundaries. Sometimes this comes from malicious insiders, but often it’s simply a careless butdangerous act. <strong>CA</strong> DataMinder can analyze all email to identify <strong>and</strong> prevent sensitive information frombeing sent to the wrong person. The result is reduced risk of improper information disclosure.The following graphic highlights information flow between the IAM components. It also highlights howthe Classification Service provides information about information content to each component, resulting inincreased granularity of access <strong>and</strong> usage enforcement, as well as content-aware role management.Figure B.The <strong>Content</strong>-<strong>Aware</strong> IAM architecture from <strong>CA</strong> <strong>Technologies</strong>.ID GovernanceRole Mgt<strong>Identity</strong>AnalyticsID MgtProvisioningEntitlementsProvisionRisk AnalysisReportingWeb <strong>Access</strong> Mgtw/SSOAdvancedAuthenticationPrivileged User<strong>Management</strong>InformationProtection &Control<strong>Access</strong>EnforcementAudit CollectionUser Activity & Compliance ReportingReportingAn important strength of <strong>Content</strong>-<strong>Aware</strong> IAM from <strong>CA</strong> <strong>Technologies</strong> is the level of integration among thecomponents. This level of integration helps to simplify administration <strong>and</strong> foster consistencyof interfaces across all components. And, simpler administration means lower costs.9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!