FREQUENTLY ASKED QUESTIONS May 2012 Top Ten Questions 1. What is?... 2 2. What are the key benefits of?... 2 3. What are the key capabilities of?... 2 4. Does this release include anything from the recently announced HyTrust relationship?... 2 5. What is the difference between and for Virtual Environments?... 3 6. Do I buy instead of or should I buy both?... 4 7. I am a current customer can I benefit from for Virtual Environments?... 4 8. I have heard described as an appliance. Is this a hardware appliance? What about the HyTrust Appliance?... 5 9. Where is localized?... 5 10. What are the system requirements for?... 5 Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CS2077_0212
FAQs: Questions 1. What is? is a product that includes the HyTrust Appliance for security and compliance of the hypervisor along with CA Technologies capabilities that provide privileged user management, shared account management, and user activity monitoring. for Virtual Environments is an end-to-end security solution for the virtual infrastructure, from the hypervisor to the guest. 2. What are the key benefits of? Key benefits of the solution in a virtual environment include helping customers: Achieve compliance for the virtual data center Gain visibility and control over the virtual environment Automate their security operations and reduce security costs Expedite adoption of virtualization technology for critical applications Create a secure multi-tenant environment 3. What are the key capabilities of? Key capabilities include: Virtualization-aware automation of security controls Privileged user password management Audit-quality user activity monitoring and logging Segregation of duties Secure multi-tenancy Hypervisor hardening 4. Does this release include anything from the recently announced HyTrust relationship? Yes, we announced our strategic relationship with HyTrust on August 24, 2011. This release incorporates the HyTrust Appliance. By including the HyTrust Appliance, we are able to secure the VMware environment from end to end. Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 2
FAQs: 5. What is the difference between and for Virtual Environments? provides coverage of security features from virtual to physical (excluding the hypervisor), including privileged user password management, user activity monitoring, fine-grained authorizations, and UNIX authentication bridging. provides coverage for the virtual environments from the virtual infrastructure to the guest operating systems, including Privileged User Password Management and CA User Activity Reporting. Target Systems Physical & Virtual (not including the hypervisor) Pricing by Managed Device Socket/CPU Virtual (infrastructure to Guest) Key Capabilities Fine-Grained Access Controls UNIX Authentication Broker Privileged User Password Mgmt User Activity Reporting Module Virtualization-Aware automation of security controls Network Zoning Privileged User Password Mgmt User Activity Reporting Module Hypervisor Hardening & Access Controls Feature Comparison Feature for Virtual Environments Virtualization-Aware Automation UNIX Authentication Broker Fine Grain Access Control: Guest Fine Grain Access Control: Host/Hypervisor Audit Logging: Guest Audit Logging: Host/Hypervisor Secure Multi-Tenancy: (Business-Aware Network Isolation/ Segmentation) Hypervisor Hardening Two Factor Authentication* Privileged User Password Management: Guest Privileged User Password Management: Host/Hypervisor * For, this is currently limited to RSA and CAC/PIV cards. Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 3
FAQs: 6. Do I buy instead of or should I buy both? They are complementary products and there is value in purchasing both. for Virtual Environments is a virtualization-focused solution and secures individual servers physical or virtual machines. While does secure guest virtual machines, it does not yet provide the level of fine-grained controls provided by. 7. I am a current customer can I benefit from for Virtual Environments? Yes, but with some redundancies because both solutions can provide Privileged User Password Management and CA User Activity Reporting. For existing customers, we recommend using initially for the HyTrust capabilities. Below is a possible combined configuration: for Virtual Environments Secured by Secured by Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 4
FAQs: 8. I have heard described as an appliance. Is this a hardware appliance? What about the HyTrust Appliance? No, the two components that make up Access Control are both virtual (software) appliances. Neither component is sold as a hardware appliance. 9. Where is localized? is localized to Japanese, Korean, and Simplified Chinese. 10. What are the system requirements for? Components developed by CA Technologies HyTrust Appliance Environment Environment VMware ESX/ESXi Supports VMware ESX/ESXi 3.5, 4.0, 4.1, vcenter 4.0 or 4.1 and 5.0 1 CPU 64bit 2GB RAM 30GB Available disk space (thin provisioning) DB (SQL Server 2005/2008 or Oracle 10g) User Activity Reporting Virtual Appliance 4 CPU 32bit/64bit 8 GB RAM 255 GB Available disk space (thin provisioning) Host capable of running 64-bit virtual machines For Intel CPUs, virtualization acceleration (VT) needs to be enabled in BIOS HyTrust Appliance Virtual Appliance (64-bit) Delivered in the Open Virtualization Format (OVF) 2 vcpu 4GB RAM 30GB available disk space 1 physical NIC Access to HyTrust Management Console Web Application Firefox v3.6+ Internet Explorer v7 or v8 Protected Host Types ESX/ESXi 3.5, 4.0, 4.1, and 5.0 vcenter 3.5, 4.0, 4.1, and 5.0 Cisco Nexus 1000v VSM Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 5