TFG upgrades identity ­management

March 2016 Retail (Industry), Access Control & Identity Management, Cyber Security

The Foschini Group (TFG), one of South Africa’s leading fashion lifestyle retail groups, has completed the first phase of the implementation of CA Technologies’ Identity Manager and Identity Governance solutions to address information security and compliance demands.

This phase involved the implementation of the solution to manage the access of approximately half of TFG’s head office workforce. Growing digitisation of the retail value chain drove TFG’s decision to radically upgrade its data security and governance environment. The move will see TFG achieving improved security, regulatory compliance and enhanced operational efficiencies with resulting cost benefits for the business.

Kevin Day, TFG’s Head of Information Security & IT Governance, says the business objectives driving this move included the need to: assist in achieving compliance with all relevant regulations; improve operational efficiencies while reducing costs for user access management and manage the group’s data risk.

“The CA solution met all of our strategic criteria. CA’s technology and information security experience was instrumental in our decision to partner with them. Also the presence of local expertise was an important factor in our choice. We required the right skills to be available locally to provide on-site assistance with the deployment of the solution as well as post implementation support. All of which CA Southern Africa can provide us with,” says Day.

Craig De Lucchi, account manager, CA Southern Africa, says: “TFG has embarked on the process of implementing a cohesive identity and governance management environment across their organisation. The solution is built on CA Identity Manager, CA Identity Governance and CA Shared Account Manager. The role-based access provided by the CA solution is a critical foundation for digital access governance. It helps businesses to respond dynamically to changes in user roles and responsibilities.”

Day says the CA solution will ensure that all users of TFG’s systems only have access to the data resources they need to perform their jobs. “The identity and access management solution provided by the CA is critical for information security to respond dynamically to changes in the business, and is instrumental in achieving compliance with the relevant legislation and standards.”

He adds that by automating the management of the roles and their access privileges plus maintaining a central user database, the CA solution will reduce the time taken by the current manual process while greatly ­enhancing accuracy.

“Information security is an ongoing journey and another compelling aspect of the CA solution is that it contains elements like multi-factor authentication that align with our current initiatives. This improves access governance and will lead to greater control plus enhanced information security for TFG,” concludes Day.

For more information contact CA Southern Africa, +27 (0)11 417 8645, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cybereason expands presence across sub-Saharan Africa
News Cyber Security
Cybereason has appointed Chantél Hamman as its new channel director focused on growing the company’s presence across sub-Saharan Africa.

Cyber resilience is more than security
Industrial (Industry) Cyber Security IT infrastructure
Kate Mollett, regional director at Commvault Africa advises companies to guard against cyberattacks in the shipping and logistics sector using an effective recovery strategy.

Preventing cyberattacks on critical infrastructure
Industrial (Industry) Cyber Security
Cyberattacks have the potential to disrupt our lives completely, and in instances where critical national infrastructure is attacked, they could disrupt the country’s entire economy, leading to loss of life and livelihoods.

Cybersecure surveillance cameras
HiTek Security Distributors News CCTV, Surveillance & Remote Monitoring Cyber Security
Provision-ISR builds customer trust and opens up new opportunities with Check Point Quantum IoT Protect Firmware built into Provision-ISR cameras.

CathexisVision integrated with Suprema’s BioStar2
Technews Publishing News Access Control & Identity Management Integrated Solutions
This integration uses BioStar2 access control events to trigger automated actions on the CathexisVision system, including alerts, recording a camera and commands such as locking and unlocking doors, and clearing an alarm.

Linux-based biometric access control
ZKTeco Products Access Control & Identity Management
The SpeedFace M4 is a Linux-based multi-biometric access control and time attendance terminal with visible light facial recognition and palm verification.

Risk reduction and cybersecurity
Security Services & Risk Management Cyber Security
How should risk managers think about cyber risk? What are the main considerations and red herrings? How do you know you’re mitigating cyber risk?

Virtual crime in a virtual world of work
Technews Publishing Security Services & Risk Management Cyber Security
Managers, directors and board members must become more involved in ensuring that best practices are implemented and reviewed regularly as the technological landscape continues to change.

Paxton promotes Dan Drayton
News Access Control & Identity Management Integrated Solutions
Dan Drayton has been promoted to divisional director – EMEA Sales Region for Paxton, the international security technology manufacturer.

Unrecoverable encrypted data
News Cyber Security
Cybersecurity research indicates that 76% of organisations admit to paying ransomware criminals, however, one-third are still unable to recover data.