Subscribe and receive the latest news from the industry.
Join 62,000+ members. Yes it's completely free.
March 29, 2005
ISLANDIA, N.Y. -- Computer Associates International, Inc. (NYSE: CA - News) today announced the acquisition of an advanced mainframe identity and access management solution that protects enterprise IT environments by automatically identifying and removing obsolete, unused and rogue user IDs and access rights. Terms of the agreement with InfoSec Inc., a privately-held provider of specialized products and services for large-scale information security, were not disclosed.
The solution, eTrust Cleanup, helps customers cope with the increased complexity of identity and access management, which is being fueled by government regulations, consumer privacy requirements, Internet-based hacking, virus attacks and other factors. eTrust Cleanup is the latest addition to CA's industry-leading line of identity and access management solutions and complements the provisioning and deprovisioning capabilities in CA's eTrust Admin for distributed platforms.
Provisioning is the assignment and management of user access rights to applications and resources; deprovisioning is the removal of those rights as required by termination of employment, changes in job function, physical relocation, and other factors. Failure to deprovision users can result in serious security breaches.
"When it comes to securing critical corporate information assets, deprovisioning is clearly as critical as provisioning," said Toby Weiss, senior vice president of eTrust security management at CA. "With eTrust Cleanup, CA customers can automate their deprovisioning processes -- and thereby eliminate a significant source of potential exposure."
eTrust Cleanup uses a role-based security structure to help organizations comply with regulatory, statutory and audit requirements, including the Sarbanes-Oxley Act, the Gramm-Leach-Bliley Act, Basel II and the Health Insurance Portability and Accountability Act, which require control of material IT systems and processes, and appropriate management of private consumer data. It also responds to the U.S. Department of Homeland Security advisories about current cyber-terrorism threats to mainframe systems, which urges protection against the exposures that can result from weak access management processes.
Computer Associates International Inc. (CA)
You May Also Like
Rethinking AIOPs — It's All About the DataMar 12, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Fiddling with Fixed WirelessMar 21, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Cable and 5G: The Odd Couple?Apr 18, 2024
SCTE® LiveLearning for Professionals Webinar™ Series: Delivering the DAA DifferenceMay 16, 2024