TFG upgrades identity ­management

March 2016 Retail (Industry), Access Control & Identity Management, Information Security

The Foschini Group (TFG), one of South Africa’s leading fashion lifestyle retail groups, has completed the first phase of the implementation of CA Technologies’ Identity Manager and Identity Governance solutions to address information security and compliance demands.

This phase involved the implementation of the solution to manage the access of approximately half of TFG’s head office workforce. Growing digitisation of the retail value chain drove TFG’s decision to radically upgrade its data security and governance environment. The move will see TFG achieving improved security, regulatory compliance and enhanced operational efficiencies with resulting cost benefits for the business.

Kevin Day, TFG’s Head of Information Security & IT Governance, says the business objectives driving this move included the need to: assist in achieving compliance with all relevant regulations; improve operational efficiencies while reducing costs for user access management and manage the group’s data risk.

“The CA solution met all of our strategic criteria. CA’s technology and information security experience was instrumental in our decision to partner with them. Also the presence of local expertise was an important factor in our choice. We required the right skills to be available locally to provide on-site assistance with the deployment of the solution as well as post implementation support. All of which CA Southern Africa can provide us with,” says Day.

Craig De Lucchi, account manager, CA Southern Africa, says: “TFG has embarked on the process of implementing a cohesive identity and governance management environment across their organisation. The solution is built on CA Identity Manager, CA Identity Governance and CA Shared Account Manager. The role-based access provided by the CA solution is a critical foundation for digital access governance. It helps businesses to respond dynamically to changes in user roles and responsibilities.”

Day says the CA solution will ensure that all users of TFG’s systems only have access to the data resources they need to perform their jobs. “The identity and access management solution provided by the CA is critical for information security to respond dynamically to changes in the business, and is instrumental in achieving compliance with the relevant legislation and standards.”

He adds that by automating the management of the roles and their access privileges plus maintaining a central user database, the CA solution will reduce the time taken by the current manual process while greatly ­enhancing accuracy.

“Information security is an ongoing journey and another compelling aspect of the CA solution is that it contains elements like multi-factor authentication that align with our current initiatives. This improves access governance and will lead to greater control plus enhanced information security for TFG,” concludes Day.

For more information contact CA Southern Africa, +27 (0)11 417 8645, [email protected], www.ca.com/za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Axis secures the Waterfront
Surveillance Entertainment and Hospitality (Industry) Retail (Industry)
Axis Communications shares insight into its longstanding partnership with the V&A Waterfront, one of Africa’s premier retail and mixed-use precincts, through its latest, updated customer success story.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.