It security.


Computer Associates International has released CA Identity Manager, what it calls a "highly scalable and adaptable solution for automating the management of user identities to manage risk, enhance regulatory compliance and reduce administrative costs."

Leveraging technology from CA's acquisition of Netegrity, Identity Manager unifies identity management across the entire enterprise--from the Web to the mainframe--to streamline and simplify administration of internal and external users and their entitlements. This helps ensure that IT systems are under control and that business processes are conducted in accordance with enterprise policies.

CA Identity Manager supports improved compliance and security through the automation of identity management processes. This automation drives repeatable and auditable processes that CA says are inherently more reliable than the ad hoc, manual processes that are often used today. In addition, control policies such as those related to segregation of duties or entitlement re-certifications can be managed more easily through policy-based automation.

"Our identity and access management initiatives have enabled us to achieve operational efficiencies and reduce the burden on information security administrators by streamlining and standardizing the process of managing our users and automating key identity processes," said Jacob Goodson, information security officer at Franciscan Missionaries of Our Lady Health System.

CA Identity Manager leverages the CA Integration Platform to unify and simplify the management of enterprise-wide security by utilizing consistent workflow capabilities for user administration and entitlements. Organizations can more easily automate processes in order to reduce costs and risk, enforce IT best practices and accelerate time-to-benefit for new applications and services.


Identity assurance company Strike-Force Technologies has launched ProtectID[TM], which it calls "one of the industry's most secure and flexible two-factor authentication platforms." The solution uses up to 10 authentication methods--including mobile phones, tokens and iris scanners--to grant authorized account access, creating a highly secure online environment designed to shut out hackers.


To continue reading