Insider threats eliminated

April 2011 Access Control & Identity Management, Products & Solutions

Privileged identity management gets a boost.

CA Southern Africa has announced the addition of new features and functionality to CA Access Control that help customers address critical needs in privileged identity management.

The new features allow for centrally controlling, monitoring and auditing privileged users. It also provides temporary privileged from a single management console.

“It is generally known but seldom publicly discussed that the most serious threats today come from within companies,” says Gary Lawrence, MD, CA Southern Africa. “Most IT departments run privileged user accounts for their IT administrators, which give them extensive access to IT systems. However, the inability to properly control and audit privileged access can create a serious security threat. The number of reported insider breaches in recent years around the world has shown this.”

Research and reports from the US market suggest that the misuse of privileged administrator credentials is the largest cause of data breaches.

“The new capabilities in CA Access Control offer secure use of privileged accounts within applications and address the growing security and compliance needs for privileged user monitoring,” says Lawrence.

The new features add to the established abilities of the CA Access Control product and meet new security needs.

“Security remains a primary concern, whether the threats are external or internal,” says Lawrence. “The concern is that internal threats are both increasing and more damaging to the customer’s business. The new abilities of CA Access Control provide powerful tools to manage privileged users’ accounts and minimise this growing risk.”

For more information contact CA Southern Africa, +27 (0)11 417 8645, [email protected].





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Save energy with Paxton’s Net2 Access Control
Paxton Power Management Products & Solutions
Paxton offers access control systems that can help save building energy by utilising smart features. This not only has a positive environmental impact but, importantly, helps save businesses money.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...