CA ControlMinder for Virtual Environments May 2012



Similar documents
Netop Remote Control Security Server

CA Unified Infrastructure Management

agility made possible

Best Practices: Modeling Virtual Environments in SPECTRUM

Radix Technologies China establishes compelling cloud services using CA AppLogic

CA Virtual Assurance for Infrastructure Managers

CA Service Desk Manager - Mobile Enabler 2.0

CA Virtual Assurance for Infrastructure Managers

Deployment Options for Microsoft Hyper-V Server

simplify monitoring Environment Prerequisites for Installation Simplify Monitoring 11.4 (v11.4) Document Date: January

CA SiteMinder SSO Agents for ERP Systems

agility made possible

Web Admin Console - Release Management. Steve Parker Richard Lechner

CA Workload Automation Agents for Mainframe-Hosted Implementations

CA Capacity Manager. Product overview. agility made possible

can you effectively plan for the migration and management of systems and applications on Vblock Platforms?

Quest vworkspace. System Requirements. Version 7.2 MR1

CA ARCserve Backup r16.x Professional Exam (CAT-360) Study Guide Version 1.1

solution brief September 2011 Can You Effectively Plan For The Migration And Management of Systems And Applications on Vblock Platforms?

Orchestrate IT Process with an Integrated Workflow Management

FAQ. NetApp MAT4Shift. March 2015

CA Client Automation: Patch Manager - Supported Patches

A to Z Information Services stands out from the competition with CA Recovery Management solutions

can you improve service quality and availability while optimizing operations on VCE Vblock Systems?

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

Securely Outsourcing to the Cloud: Five Key Questions to Ask

CA Systems Performance for Infrastructure Managers

RECOVERY OF CA ARCSERVE DATABASE IN A CLUSTER ENVIRONMENT AFTER DISASTER RECOVERY

CA Arcot RiskFort. Overview. Benefits

UPSTREAM for Linux on System z

Red Hat enterprise virtualization 3.0 feature comparison

Goliath Performance Monitor Prerequisites v11.6

CA Spectrum and CA Embedded Entitlements Manager

CA Workload Automation Agents Operating System, ERP, Database, Application Services and Web Services

How Can Central IT Use Cloud Technologies to Revolutionize Remote Store Operation?

CA SOLVE:Central Service Desk for z/os

can you simplify your infrastructure?

CA NetSpy Network Performance r12

CA Cloud Service Delivery Platform

Sallie Mae slashes change management costs and complexity with CA SCM

Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam

CA Cloud Storage for System z

solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?

CA Change Manager Enterprise Workbench r12

Installing and Administering VMware vsphere Update Manager

how can I improve performance of my customer service level agreements while reducing cost?

CA Workload Automation Agent for Microsoft SQL Server

CA Scheduler Job Management r11

Introducing Arcserve Unified Data Protection

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

CA Telon Application Generator r5.1

CA NetQoS Unified Communications Monitor

CA Automation Suite for Data Centers

CA Client Automation

CA Repository for z/os r7.2

MANAGED SERVICE PROVIDERS SOLUTION BRIEF

Cisco WebEx Meetings Server System Requirements

CA Process Automation for System z 3.1

vrealize Air Compliance OVA Installation and Deployment Guide

Fujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions

CA NSM System Monitoring Option for OpenVMS r3.2

Foglight. Foglight for Virtualization, Free Edition Installation and Configuration Guide

EMC Data Domain Management Center

Quest vworkspace Virtual Desktop Extensions for Linux

agility made possible

CA Nimsoft Monitor. Probe Guide for Performance Collector. perfmon v1.5 series

EXECUTIVE VIEW. CA Privileged Identity Manager. KuppingerCole Report

CA CMDB Connector for z/os version 2.0

Dell Statistica. Statistica Document Management System (SDMS) Requirements

What You Need to Know NOW about Next Generation Data Protection. Kenny Wong Senior Consultant June 2015

Sicredi improves data center monitoring with CA Data Center Infrastructure Management

NTP Software File Reporter Analysis Server

CA Top Secret r15 for z/os

CA Clarity PPM. Overview. Benefits. agility made possible

Cisco TelePresence Server on Virtual Machine

NTP Software File Auditor for Windows Edition

CA Technologies optimizes business systems worldwide with enterprise data model

Data Collection Agent for NAS EMC Isilon Edition

Data Collection Agent for Active Directory

Service Virtualization CA LISA introduction. Jim Dugger CA LISA Product Marketing Manager Steve Mazzuca CA LISA Public Sector Alliances Director

CA SiteMinder. Web Agent Installation Guide for IIS 12.51

How to Backup and Restore a VM using Veeam

Overview. Business value

CA SiteMinder. Web Agent Installation Guide for IIS. r12.5

Dynamic Data Center Update:

Cisco Virtual Security Gateway for Nexus 1000V Series Switch

ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies

Version Overview. Business value

Transcription:

FREQUENTLY ASKED QUESTIONS May 2012 Top Ten Questions 1. What is?... 2 2. What are the key benefits of?... 2 3. What are the key capabilities of?... 2 4. Does this release include anything from the recently announced HyTrust relationship?... 2 5. What is the difference between and for Virtual Environments?... 3 6. Do I buy instead of or should I buy both?... 4 7. I am a current customer can I benefit from for Virtual Environments?... 4 8. I have heard described as an appliance. Is this a hardware appliance? What about the HyTrust Appliance?... 5 9. Where is localized?... 5 10. What are the system requirements for?... 5 Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this document as is without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CS2077_0212

FAQs: Questions 1. What is? is a product that includes the HyTrust Appliance for security and compliance of the hypervisor along with CA Technologies capabilities that provide privileged user management, shared account management, and user activity monitoring. for Virtual Environments is an end-to-end security solution for the virtual infrastructure, from the hypervisor to the guest. 2. What are the key benefits of? Key benefits of the solution in a virtual environment include helping customers: Achieve compliance for the virtual data center Gain visibility and control over the virtual environment Automate their security operations and reduce security costs Expedite adoption of virtualization technology for critical applications Create a secure multi-tenant environment 3. What are the key capabilities of? Key capabilities include: Virtualization-aware automation of security controls Privileged user password management Audit-quality user activity monitoring and logging Segregation of duties Secure multi-tenancy Hypervisor hardening 4. Does this release include anything from the recently announced HyTrust relationship? Yes, we announced our strategic relationship with HyTrust on August 24, 2011. This release incorporates the HyTrust Appliance. By including the HyTrust Appliance, we are able to secure the VMware environment from end to end. Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 2

FAQs: 5. What is the difference between and for Virtual Environments? provides coverage of security features from virtual to physical (excluding the hypervisor), including privileged user password management, user activity monitoring, fine-grained authorizations, and UNIX authentication bridging. provides coverage for the virtual environments from the virtual infrastructure to the guest operating systems, including Privileged User Password Management and CA User Activity Reporting. Target Systems Physical & Virtual (not including the hypervisor) Pricing by Managed Device Socket/CPU Virtual (infrastructure to Guest) Key Capabilities Fine-Grained Access Controls UNIX Authentication Broker Privileged User Password Mgmt User Activity Reporting Module Virtualization-Aware automation of security controls Network Zoning Privileged User Password Mgmt User Activity Reporting Module Hypervisor Hardening & Access Controls Feature Comparison Feature for Virtual Environments Virtualization-Aware Automation UNIX Authentication Broker Fine Grain Access Control: Guest Fine Grain Access Control: Host/Hypervisor Audit Logging: Guest Audit Logging: Host/Hypervisor Secure Multi-Tenancy: (Business-Aware Network Isolation/ Segmentation) Hypervisor Hardening Two Factor Authentication* Privileged User Password Management: Guest Privileged User Password Management: Host/Hypervisor * For, this is currently limited to RSA and CAC/PIV cards. Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 3

FAQs: 6. Do I buy instead of or should I buy both? They are complementary products and there is value in purchasing both. for Virtual Environments is a virtualization-focused solution and secures individual servers physical or virtual machines. While does secure guest virtual machines, it does not yet provide the level of fine-grained controls provided by. 7. I am a current customer can I benefit from for Virtual Environments? Yes, but with some redundancies because both solutions can provide Privileged User Password Management and CA User Activity Reporting. For existing customers, we recommend using initially for the HyTrust capabilities. Below is a possible combined configuration: for Virtual Environments Secured by Secured by Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 4

FAQs: 8. I have heard described as an appliance. Is this a hardware appliance? What about the HyTrust Appliance? No, the two components that make up Access Control are both virtual (software) appliances. Neither component is sold as a hardware appliance. 9. Where is localized? is localized to Japanese, Korean, and Simplified Chinese. 10. What are the system requirements for? Components developed by CA Technologies HyTrust Appliance Environment Environment VMware ESX/ESXi Supports VMware ESX/ESXi 3.5, 4.0, 4.1, vcenter 4.0 or 4.1 and 5.0 1 CPU 64bit 2GB RAM 30GB Available disk space (thin provisioning) DB (SQL Server 2005/2008 or Oracle 10g) User Activity Reporting Virtual Appliance 4 CPU 32bit/64bit 8 GB RAM 255 GB Available disk space (thin provisioning) Host capable of running 64-bit virtual machines For Intel CPUs, virtualization acceleration (VT) needs to be enabled in BIOS HyTrust Appliance Virtual Appliance (64-bit) Delivered in the Open Virtualization Format (OVF) 2 vcpu 4GB RAM 30GB available disk space 1 physical NIC Access to HyTrust Management Console Web Application Firefox v3.6+ Internet Explorer v7 or v8 Protected Host Types ESX/ESXi 3.5, 4.0, 4.1, and 5.0 vcenter 3.5, 4.0, 4.1, and 5.0 Cisco Nexus 1000v VSM Copyright 2012 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 5