SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management. improving SAP security with CA Identity and Access Management
|
|
|
- Marjory Clarke
- 10 years ago
- Views:
Transcription
1 SOLUTION BRIEF Improving SAP Security With CA Identity and Access Management improving SAP security with CA Identity and Access Management
2 The CA Identity and Access Management (IAM) suite can help you increase the security of your SAP environment, streamline management, and simplify your compliance efforts. 2
3 executive summary Challenge The SAP Business Suite and the vast breadth of its capabilities have moved SAP into a leadership position in business application software. However, there are significant security and compliance challenges in managing these complex SAP business applications. These challenges make overall management difficult and expensive, introduce potential security vulnerabilities, and make compliance an ongoing concern. Solution The CA Identity and Access Management (IAM) suite is well suited to help meet and solve these challenges. It can improve the overall security of your SAP environment by helping to mitigate risks and automate manual processes that exist in most SAP environments. It helps to eliminate improper use of information by controlling what users can do with the information that they obtain. It can also simplify user provisioning management and centralize some key security and identity-related information, thereby helping to eliminate security silos across the organization. CA SiteMinder has been chosen by SAP as the Endorsed Business Solution (EBS) for Web access management. This is due to its breadth of capability, proven scalability, and industry leadership. Benefits Beyond these important benefits for SAP installations, CA IAM can provide important additional benefits to your enterprise. It helps reduce risk and improve the security of your SAP and non-sap applications and data. It can simplify compliance and reduce the costs and efforts for compliance audits. It can also enable new business opportunities by enabling the quick and secure deployment of new online services so that you can react quickly to market and competitive events. Finally, by automating and simplifying key security processes, it can improve your operational efficiency and reduce your total costs for security and compliance management. 3
4 Section 1: Challenge Security challenges in SAP environments SAP AG is one of the largest business software companies in the world, and its suite of software applications is supporting core business processes of some of the largest companies in the world. The SAP Business Suite consists of five major areas, including: Enterprise Resource Planning (ERP) helps many organizations within an enterprise manage information and processes related to marketing and sales, production and inventory control, human resources, finance and accounting, and other areas. Customer Relationship Management (CRM) helps companies acquire and retain customers, gain marketing and customer insight. Product Lifecycle Management (PLM) helps manufacturers with product-related information. Supply Chain Management (SCM) helps companies with the process of resourcing their manufacturing and service processes. Supplier Relationship Management (SRM) enables companies to procure from suppliers. The breadth of capabilities provided by the SAP Business Suite is outstanding. However, with these capabilities come significant challenges in managing and securing the entire IT environment. The areas that have posed management difficulties for many companies include: Identity and Role Management There are typically many application roles within a large organization with a high degree of overlap. Manual management of these decentralized identities and roles can become burdensome and expensive. It also introduces security and compliance problems because it is difficult to determine the exact entitlements that each user has across all applications. Access Management SAP provides limited user authentication capabilities in the product itself and there is limited ability to tailor the authentication method to the sensitivity of the application or resource. In addition, the SAP authorization model is focused on transactions, and does not provide sufficient capability or flexibility to accommodate the complete scope of business applications needs of most large enterprises. Privileged User Management SAP provides some basic capabilities to control what administrators can do while they are managing the SAP applications, but it isn t available under the standard SAP license. However, if these administrators are privileged (Administrator or Root) users on the servers that are hosting the SAP applications, they can perform actions that could have disastrous effects on the security of these SAP servers. Since SAP does not provide capabilities for protecting the critical SAP infrastructure of application and database servers, these resources are subject to attack, breach, or inappropriate disclosure. Therefore, an ability to harden all IT servers, including those that are hosting SAP applications, is essential to help maintain the security of the entire SAP environment. 4
5 Protecting critical business information SAP environments include large amounts of information, much of which is critical to the organization. Once users have gained appropriate access to this data, many organizations have little or no control over what those users can do with it. These organizations often are not fully aware of all the places their sensitive information is stored, and have no protection against this information being exposed or disclosed to unauthorized people either internally or externally. User activity reporting SAP capabilities for reporting on user activity are limited to SAP applications, so administrators cannot flexibly aggregate, filter, and analyze activity log files from all the various systems and applications in their environment. This can make it hard to identify emerging security threats or trends, a critical requirement both for overall security and for simplifying compliance audits. Despite the enormous capabilities of the SAP Business Suite, the above security and compliance challenges should be mission-critical for most organizations. The CA Identity and Access Management (IAM) suite provides capabilities that can not only help solve these problems, but can simplify management and increase security in a number of ways for SAP deployments. This paper highlights these key areas and illustrates how CA IAM can significantly improve the overall security of your SAP environment. Section 2: Solution Leveraging CA IAM to improve SAP security The SAP Business Suite is a set of very large and complex applications. Few organizations deploy these applications all at once, but rather adopt a phased approach to limit risk and improve the probability of a successful deployment. As these complex deployments evolve, management of the SAP environment can become increasingly difficult in certain areas. But, more importantly, in a large ERP environment, the problem of security risk can become magnified and more difficult to manage. For example, data loss from a warehouse management system is not as risky as data loss from a large ERP system in which all the business and administration processes are managed, and where all the related data is stored. This data could range from HR records, all the way to sales results and financial ledger. When all the business processes in the organization are managed in one place, and all the data to support that operation is stored in one large database, security risk management becomes absolutely critical to the business. This is another reason that additional approaches to reducing security risk are needed. Although we touched on these areas above, let s explore them in more detail and highlight areas where CA IAM can provide significant security and compliance benefits for SAP environments. 5
6 Identity and role management: the challenge The management of user identities and roles within an SAP environment is a significant challenge. In most organizations, roles are created within separate environments (for example, development, test, production, etc) without any central coordination or oversight. And, considering the often large numbers of transaction types and business processes that are defined within most SAP environments, management of these user roles quickly becomes unwieldy. Decentralized role creation and user management can result in very large numbers of roles and a high degree of overlap among those roles. Potentially worse, though, is the problem of inconsistent entitlements for users with multiple roles that often result when the SAP role model gets out of hand. Segregation of duties (SoD) violations can go undetected, resulting in increased risk of fraud or inadvertent security policy violations. The largest challenge related to SAP role management is that the problem only tends to get worse over time. As roles multiply and overlap increases, management of the entire environment can become difficult and expensive. In addition, as undetected SoD violations start to arise, management is often unaware that the level of risk has risen to unacceptable levels. CA IAM: the benefits The CA IAM suite provides full Identity Lifecycle Management, which is provided by: CA GovernanceMinder leverages analytics and workflow to automate identity governance processes, including entitlements cleanup, certification, segregation of duties, and role management. By automating these processes and controls, it helps you reduce risk, improve compliance, and increase operational efficiency. CA IdentityMinder provides identity administration, provisioning/de-provisioning, user self-service, and compliance auditing and reporting. It helps you establish consistent identity security policies, simplify compliance, and automate key identity management processes. CA GovernanceMinder can add significant value to any SAP environment that has challenges with managing its SAP roles. First, it can discover roles that exist through a detailed analysis of the entitlements that your users already have. Next, it centralizes the management of your roles which can simplify your role model and reduce the cost of managing excessive numbers of roles. It also generates customizable reports that enable you to simplify role definitions and identify and remove unnecessary ones. Removing unnecessary role definitions and removing unneeded roles from specific users has a monetary benefit also, because it might enable you to save money on software license fees that you might be paying for these non-users. CA GovernanceMinder also helps you strengthen security for your SAP environment by enabling you to identify and correct SoD violations. It can generate reports that help identify improper access rights based on your SoD policies. But, it can also help prevent SoD violations because it can check dynamically for these violations when processing requests for access rights. In both cases, potentially significant security and fraud risks are reduced that would be hard to identify through manual inspection. In addition, CA IdentityMinder enables you to centralize the creation and management of user identities and accounts throughout the enterprise. It also provides extensive user provisioning that automates processes for on-boarding, modifying, and off-boarding users and their associated access. 6
7 For an improved user experience, it also provides self-service capabilities that enable end-users to initiate provisioning actions, password management, and related processes. In summary, managing SAP roles can lead to high administrative costs, highly manual processes, and increased security risk. The addition of CA GovernanceMinder can help bring order to SAP role management, simplify processes, reduce administrative costs, and reduce SoD security risk. Access management: the challenge The SAP Business Suite provides capabilities for controlling access and for single sign-on (SSO) for the applications within the Business Suite. When using the SAP Web Application Server and the SAP Enterprise Portal, for example, users are strongly authenticated and have SSO to other SAP applications. However, the inability to extend these access management capabilities beyond SAP applications can have important drawbacks. For example, it may: Limit authentication methods to those supported by SAP applications Increase support costs as users struggle with inconsistent authentication methods and interfaces across applications Reduce the quality of the user experience due to this inconsistency of the interfaces Hamper compliance due to decentralized authentication, auditing, and reporting In effect, the existence of separate access management (authentication, authorization, and reporting) capabilities for both SAP and non-sap environments can create significant administrative and security problems. A better approach is a common way of controlling access across the entire IT environment. CA SiteMinder : the benefits CA SiteMinder is an industry leader in centralized Web access management and is an SAP Endorsed Business Solution. It enables IT organizations to centralize Web access management so as to protect access to Web applications in their environment, both SAP and non-sap. In addition, it helps strengthen overall security due to the breadth and flexibility of the user authentication capabilities that it supports. Specifically, CA SiteMinder can provide the following security enhancements for SAP environments: Improved authentication capabilities support for a wide variety of authentication methods that can be combined for even stronger security for high-value applications SSO across both SAP and non-sap Web based applications Integrated session management to reduce the likelihood of unauthorized user access Standards-based support for federated networks, enabling you to provide secure online services to your business partners Centralization and simplification of password management, potentially reducing Help Desk costs and improving the user experience Improved auditing and reporting of Web access, helping you to more easily prove compliance with regulations and policies 7
8 CA AuthMinder and CA RiskMinder : the benefits These products significantly enhance authentication security for SAP applications and help prevent certain fraudulent activities. CA AuthMinder is a software-only multi-factor authentication solution that is integrated with CA SiteMinder so that it enables transparent protection and verification of Web users identities. It helps protect users from identity theft and fraud without changing their familiar sign-on experience, nor requiring the possession of hardware tokens. It also eliminates the management effort and cost associated with hardware tokens. CA RiskMinder is a fraud detection and risk-based security system that helps prevent fraud in both consumer and enterprise online services. It also provides organizations the ability to determine and enforce different levels of authentication based on the acceptable amount of risk for the given transaction. The combination of CA AuthMinder and CA RiskMinder, in conjunction with the extensive authentication capabilities of CA SiteMinder, provide flexible and strong authentication for all users of SAP applications. Privileged user management: the challenge SAP provides some control over what users, including SAP administrators, can do while they are accessing the applications in the SAP Business Suite. However, this does not provide protection from either malicious or inadvertent destructive acts (attacks) from outside the SAP environment. For example, a rogue system administrator could corrupt one of the SAP databases or could attack the application itself. He/she could also potentially turn off the system logging process, perform an unauthorized action, and then turn it back on again, in the hopes of covering their tracks. Organizations are also vulnerable to careless mistakes by a privileged user. Because these users tend to have Administrator or root access, they can do virtually anything they want to on the systems for which they are privileged. A simple mistake can result in significant data loss that can have disastrous effects. In addition, systems administrators often share (and sometimes lose) their system passwords, leading to an even larger risk of policy violations. And, when these users all login as Root or Admin, their actions, as reported in the log file, are essentially anonymous. These conditions not only pose a significant security risk, but make compliance difficult because improper actions cannot be prevented nor associated with the offending person. This is particularly important in an outsourced environment. What is needed is very granular access control on privileged users. Unfortunately, native server operating system security does not provide sufficient control over who can access what resources, nor does it provide the granular auditing generally needed to meet compliance requirements. CA ControlMinder: the benefits The CA Technologies solution for Privileged User Management, CA ControlMinder, provides extensive capabilities to limit what administrators can do on your critical SAP systems. It secures servers by providing more granular entitlements for administrators across platforms than are offered by native operating systems. This facilitates easier compliance through improved granularity of policy-based access control and enforcement that includes segregation of duties. The solution controls who has access to specific systems, resources on those systems, and critical system services (as in our previous example, it is important that administrators do not have the ability to turn off the system logging 8
9 process in order to hide any inappropriate activity). It also can simplify management through a single user interface to manage all your server platforms. CA ControlMinder also supports extensive privileged user password management (PUPM), which helps provide the accountability of privileged access through the issuance of passwords on a temporary, one-time use basis, or as necessary while providing user accountability of their actions through secure auditing. This is effective at helping to reduce the common problem of shared administrator passwords that can either get into the wrong hands, or may provide an administrator with more entitlements than is required for their job role. By deploying CA ControlMinder on your critical SAP systems, you can effectively harden the operating system on those servers, thereby creating a much more secure platform on which you run the SAP applications that your business depends on. You can also eliminate the problem of shared administrator passwords for your critical systems, and ensure that all administrators are individually identified within the system event logs. The result is greatly improved security for your SAP applications. Protecting critical business information: the challenge The information used by SAP applications is critical to your business. However, many organizations don t actually know where all their sensitive information is stored, and have no way to enforce policies over use of that information. For example, you have employees who are authorized to get access to that information, but only for legitimate business purposes. Unfortunately, some employees can be either malicious or careless and in both cases, the results can be disastrous. Something as simple as a social security number can have significant negative impacts if disclosed inappropriately. In short, you need an effective way to discover, classify, and control the use of sensitive information such as financial records, health information, customer records, intellectual property, source code, and the like. CA DataMinder : the benefits The CA Technologies solution for data discovery, classification, and control, CA DataMinder, helps you get control of your massive amount of information, and most importantly, protect sensitive data from inappropriate disclosure or misuse. CA DataMinder identifies sensitive data across the enterprise in real time and determines whether or not end-users are using that data in accordance with various security and regulatory mandates. It identifies and classifies sensitive data: examples include personally identifiable information (PII), intellectual property (IP), and non-public information (NPI). It controls sensitive data at all locations: at the endpoint, on the server, on the network, or stored across the enterprise. It enables you to define policies that determine which action should be taken if inappropriate usage of the data is detected. For example, it can prevent users from ing sensitive information outside the company, moving it to a local storage device, storing it on publicly-accessible share devices, and other improper operations. Your policies can also define a range of actions when disclosure is detected, ranging from warnings to administrator alarms. It also includes a collection of pre-built policies based on real business use cases that can facilitate quick deployment. CA DataMinder provides the classification of your sensitive information, and the enforcement of your information usage policies, so as to help prevent inappropriate use or disclosure of this critical information. This can result in reduced IT security risk and easier compliance with mandates that dictate information usage requirements. 9
10 User activity reporting: the challenge Effective management of user activity audit logs and reports is essential not only for overall security, but for compliance with external regulations and internal policies. The user activity reporting capabilities provided by SAP are basic in scope, and become particularly difficult to manage as the size of the SAP environment expands. Audit logs cannot be effectively aggregated across systems for easier analysis, and the filtering capabilities are quite limited. This fact alone can make it challenging to identify emerging or existing security threats, because important events become lost in a mass of unimportant system event information. It can be very difficult to create customized queries on this information so as to eliminate all uninteresting events so that you can focus on what s really important for your environment. In fact, many SAP administrators download this user activity information into an Excel spreadsheet, and attempt to manually filter it by whatever criteria are important for them. Although this is an improvement, it does not scale to large amounts of audit records, still requires significant manual effort, and leaves you vulnerable to human error that might leave a significant event unrecognized. There are three primary disadvantages of this approach to SAP user activity management. First, it is an intensely manual process, thereby leading to high costs and unacceptable human error rates. Second, it makes it more difficult to really understand what is going on in your systems, and to identify security events before they become critical. Lastly, because it is difficult to prove that your security controls are working effectively on the basis of the activity audit files, compliance can become more difficult and expensive. Compliance audits that are based on these limited capabilities are not for the faint of heart! CA User Activity Reporting: the benefits CA Technologies provides CA User Activity Reporting that can provide important efficiency and security benefits for SAP environments. It allows organizations to identify internal and external threats to enterprise systems and business operations by collecting and analyzing user activity data to look for suspicious activity and finding the root cause of operational problems. It aggregates activity audit files, normalizes events into a common format and classifies them into more intuitive and organized event structures, facilitating quick analysis and reporting from its Web-based dashboard. Most importantly, it can provide quick time to value for compliance because it can be quickly installed and can provide immediate value by reporting events with hundreds of out-of-the-box ready to use reports covering major regulations and standards, such as SOX, PCI and others. CA User Activity Reporting can: centrally manage and view user activity audit data across your enterprise schedule or run queries, reports and policy violation alerts generate pre-defined and customizable reports with trending information create compliance reports using regularly updated compliance reporting templates launch an event investigation using its interactive, graphical event viewers 10
11 Section 3: Benefits Leveraging CA IAM for additional benefits We have seen above how some of the specific challenges of managing large SAP environments can be met using the CA IAM solution components. These products can simplify how you manage your SAP roles, improve overall security of your web resources, improve management of your system logs, and reduce risk associated with privileged users. However, because of the breadth and the integration of the CA IAM suite, there are other significant benefits that it can provide to any environment, including SAP deployments. The most important benefits of CA IAM include: Reduced security risk CA IAM helps ensure that your critical IT resources are protected, and that only properly authorized users can access them, and only in approved ways. It helps protect your critical Web applications, Web services, federation networks, and all the systems in your IT environment. It also allows you to manage and analyze security information to quickly identify and remediate potential security issues, including improper disclosure or use of sensitive corporate or customer information. Control over information use The information processed by SAP applications is critical to the operation of the business. CA DataMinder helps protect against improper disclosure or use of sensitive information either in transit, at rest, or in use. It can thereby reduce information security risk, and make it easier to establish compliance with certain security-related regulations and best practices. Improved regulatory compliance CA IAM products provide your organization with the tools necessary to support continuous compliance with automated and centrally managed capabilities that help reduce costs while strengthening IT security controls. With comprehensive auditing, your compliance challenges can become much simpler because you can provide proof of your controls and validate to auditors the effective operation of your security controls. Reduced administrative expense and improved efficiency Manual, time-consuming security processes are a drain on IT resources and costs. CA IAM products can help automate many of your key IT security processes, especially those related to managing user identities and access rights. Along with automated filtering and analysis of security log information, these capabilities can bring significant administrative efficiencies, thereby reducing your overall IT costs. CA IAM can also improve the productivity of your employees since it helps eliminate manual, timeconsuming processes. It enables new users to be productive quickly without waiting long periods to be provisioned with accounts and applications. It also reduces the time required for management access request approvals, and enables them to focus on more important activities like growing the business. 11
12 Improved secure business enablement Customers and partners will only do business with your organization if they believe that you can provide a secure environment for their personal information. CA IAM products can help your organization secure its applications, as well as deliver new applications and services more quickly to your customers and partners. Because deploying new services becomes easier, you can respond more quickly to competitive, market, and technology trends to help protect and grow your business. The CA Technologies advantage The CA Content-Aware IAM suite offers a broad set of capabilities that can significantly improve the security of your SAP deployment. In addition, our extensive experience and expertise in successful customer IAM deployments enable us to reduce your time-to-value, and to give you the confidence to adopt new technologies in order to drive your business forward. Next steps If you are experiencing difficulty in managing any of the following in your SAP environment: User identities and roles Access entitlements Actions of privileged users and SAP server security Control of information use System log files then consider some of the CA IAM solutions that can simplify your SAP security management, improve overall security, simplify compliance, and help automate and streamline your key security procedures. To learn more about Content-Aware IAM from CA Technologies, visit ca.com/iam. 12
13 CA Technologies is an IT management software and solutions company with expertise across all IT environments from mainframe and physical to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 rely on CA Technologies to manage their evolving IT ecosystems. For additional information, visit CA Technologies at ca.com. Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CS1988_0212
How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
How To Comply With Ffiec
SOLUTION BRIEF authentication in the internet banking environment: The solution for FFIEC compliance from CA Technologies agility made possible Introduction to FFIEC Compliance In October of 2005, the
CA point of view: Content-Aware Identity & Access Management
TECHNOLOGY BRIEF CA Point of View: Content-Aware Identity and Access Management March 2011 CA point of view: Content-Aware Identity & Access Management table of contents EXECUTIVE SUMMARY SECTION 1 Challenge
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY Identity-centric Security: The ca Securecenter Portfolio How can you leverage the benefits of cloud, mobile, and social media, while protecting
Leveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
how can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
expanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information
SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
CA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
Authentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
how can I improve performance of my customer service level agreements while reducing cost?
SOLUTION BRIEF CA Business Service Insight for Service Level Management how can I improve performance of my customer service level agreements while reducing cost? agility made possible By automating service
agility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
CA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Grants Management for CA Clarity PPM gives you the confidence to choose the RIGHT applicants, make the RIGHT decisions, award the RIGHT funds, and to
SOLUTION BRIEF: Grants Management for CA Clarity PPM March 2011 Can you manage the lifecycle of grants, reduce unwanted paperwork, and track the performance of awarded funds? you can Grants Management
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
Closing the Biggest Security Hole in Web Application Delivery
WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Securely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM
CUSTOMER SUCCESS STORY Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM CUSTOMER PROFILE Industry: IT services Company: Logica Sweden Employees: 5,200 (41,000 globally)
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
agility made possible
SOLUTION BRIEF CA Technologies and NetApp Integrated Service Automation Across the Data Center can you automate the provisioning and management of both virtual and physical resources across your data center
20 Critical Security Controls
WHITE PAPER June 2012 20 Critical Security Controls How CA Technologies can help federal agencies automate compliance processes Philip Kenney CA Security Management Table of Contents Executive Summary
How Can I Better Manage My Software Assets And Mitigate The Risk Of Compliance Audits?
SOLUTION BRIEF CA SERVICE MANAGEMENT - SOFTWARE ASSET MANAGEMENT How Can I Better Manage My Software Assets And Mitigate The Risk Of Compliance Audits? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR
White paper. Four Best Practices for Secure Web Access
White paper Four Best Practices for Secure Web Access What can be done to protect web access? The Web has created a wealth of new opportunities enabling organizations to reduce costs, increase efficiency
IBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
can I customize my identity management deployment without extensive coding and services?
SOLUTION BRIEF Connector Xpress and Policy Xpress Utilities in CA IdentityMinder can I customize my identity management deployment without extensive coding and services? agility made possible You can.
agility made possible
SOLUTION BRIEF ConfigXpress Utility in CA IdentityMinder can my identity management solution quickly adapt to changing business requirements and processes? agility made possible With the ConfigXpress tool
The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide
SOLUTION BRIEF NIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide SOLUTION BRIEF CA DATABASE
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
can you improve service quality and availability while optimizing operations on VCE Vblock Systems?
SOLUTION BRIEF Service Assurance Solutions from CA Technologies for VCE Vblock Systems can you improve service quality and availability while optimizing operations on VCE Vblock Systems? agility made possible
CA NSM System Monitoring Option for OpenVMS r3.2
PRODUCT SHEET CA NSM System Monitoring Option for OpenVMS CA NSM System Monitoring Option for OpenVMS r3.2 CA NSM System Monitoring Option for OpenVMS helps you to proactively discover, monitor and display
CA Configuration Automation
PRODUCT SHEET: CA Configuration Automation CA Configuration Automation agility made possible CA Configuration Automation is designed to help reduce costs and improve IT efficiency by automating configuration
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS
TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA
CA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
how can I deliver better services to my customers and grow revenue?
SOLUTION BRIEF CA Wily Application Performance Management May 2010 how can I deliver better services to my customers and grow revenue? we can With the right solution, you can be certain that you are providing
CA Clarity PPM. Overview. Benefits. agility made possible
PRODUCT SHEET CA Clarity PPM agility made possible CA Clarity Project & Portfolio Management (CA Clarity PPM) helps you innovate with agility, transform your portfolio with confidence, and sustain the
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk John Hawley VP, Security CA Technologies September 2015 Today s Theme: Preparing for the Adversary How to Prepare Your Organization
SOLUTION BRIEF THE CA TECHNOLOGIES SOLUTION FOR PCI COMPLIANCE. How Can the CA Security Solution Help Me With PCI Compliance?
SOLUTION BRIEF THE CA TECHNOLOGIES SOLUTION FOR PCI COMPLIANCE How Can the CA Security Solution Help Me With PCI Compliance? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT CA Technologies
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
CA Workload Automation for SAP Software
CA Workload Automation for SAP Software 2 The Application Economy Spurs New SAP System Workload Challenges Business is being shaped more and more by what has become an application-based world. In this
can you simplify your infrastructure?
SOLUTION BRIEF CA Virtual Desktop Automation for Vblock Platforms can you simplify your infrastructure? agility made possible You Can. With services that increase the speed of virtual provisioning on Vblock
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
CA Technologies Strategy and Vision for Cloud Identity and Access Management
WHITE PAPER CLOUD IDENTITY AND ACCESS MANAGEMENT CA TECHNOLOGIES STRATEGY AND VISION FEBRUARY 2013 CA Technologies Strategy and Vision for Cloud Identity and Access Management Sumner Blount Merritt Maxim
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
CA Compliance Manager for z/os
PRODUCT SHEET CA Compliance Manager for z/os CA Compliance Manager for z/os CA Compliance Manager for z/os (CA Compliance Manager) provides your organization with a single source for real-time, compliancerelated
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
agility made possible
SOLUTION BRIEF CA Private Cloud Accelerator for Vblock Platforms how quickly can your private cloud support the increasing demand for business services and accelerate time-to-value for your Vblock platforms
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
CA Oblicore Guarantee for Managed Service Providers
PRODUCT SHEET CA Oblicore Guarantee for Managed Service Providers CA Oblicore Guarantee for Managed Service Providers Value proposition CA Oblicore Guarantee is designed to automate, activate and accelerate
CA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security [email protected] CA Technologies Content-Aware IAM strategy CA Technologies
Minimize Access Risk and Prevent Fraud With SAP Access Control
SAP Solution in Detail SAP Solutions for Governance, Risk, and Compliance SAP Access Control Minimize Access Risk and Prevent Fraud With SAP Access Control Table of Contents 3 Quick Facts 4 The Access
5 Pillars of API Management with CA Technologies
5 Pillars of API Management with CA Technologies Introduction: Managing the new open enterprise Realizing the Opportunities of the API Economy Across industry sectors, the boundaries of the traditional
Select the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
CA Process Automation for System z 3.1
PRODUCT SHEET CA Process Automation for System z CA Process Automation for System z 3.1 CA Process Automation for System z helps enable enterprise organizations to design, deploy and administer automation
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.
Security management solutions White paper IBM Tivoli and Consul: Facilitating security audit and March 2007 2 Contents 2 Overview 3 Identify today s challenges in security audit and compliance 3 Discover
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
How Can Central IT Use Cloud Technologies to Revolutionize Remote Store Operation?
SOLUTION BRIEF CA APPLOGIC CLOUD PLATFORM FOR ENTERPRISE How Can Central IT Use Cloud Technologies to Revolutionize Remote Store Operation? agility made possible CA AppLogic combines applications, virtual
RSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
agility made possible
SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
Dell One Identity Manager Scalability and Performance
Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities
protect your assets. control your spending
protect your assets. control your spending A European poll on IT asset management practices, commissioned by CA Technologies and conducted at the European Gartner Procurement, Financial and Asset Management
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
Designing a CA Single Sign-On Architecture for Enhanced Security
WHITE PAPER FEBRUARY 2015 Designing a CA Single Sign-On Architecture for Enhanced Security Using existing settings for a higher-security architecture 2 WHITE PAPER: DESIGNING A CA SSO ARCHITECTURE FOR
INTELLIGENCE DRIVEN IDENTITY AND ACCESS MANAGEMENT
INTELLIGENCE DRIVEN IDENTITY AND ACCESS MANAGEMENT OVERVIEW The way organizations manage access to their critical applications and data is quickly becoming unwieldy and overly complicated. That s because
TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA. Colruyt ensures data privacy with Identity & Access Management.
TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA Colruyt ensures data privacy with Identity & Access Management. Table of Contents Executive Summary SECTION 1: CHALLENGE 2
