Product Report: CA GovernanceMinder™ - 70837

Report Details

CA Technologies acquired Eurekify, a leading provider of role mining and role engineering, in November 2008. Using that technology, CA Technologies has built the current product CA GovernanceMinder. The product is tightly integrated with CA IdentityMinder™, the Identity Provisioning product provided by CA Technologies, and follows the same architectural and user interface paradigms. However, it supports other Identity Provisioning products as well.

Features are increasingly also supported by the CA CloudMinder™ offering for cloud-based delivery models. Role mining is still the strength of the product. However, customers should keep in mind that successful implementations of Access Governance rely first and foremost on well-established processes, organizations, guidelines, and that a top-down approach is preferred. Role mining is not the core technology but more a supporting feature.

Among the outstanding features is the integrated support for user activity monitoring, adding a dynamic view to the static management of access. Another is the new integration with the Privileged Identity Management products of CA Technologies. Yet another important feature is the tight integration with Service Management tools, especially the ones from CA Technologies itself. While being tightly integrated with CA IdentityMinder, standalone deployments are supported as well.

CA GovernanceMinder is a solution that is definitely worth evaluating, based on its strong feature set and the tight integration with other products from CA Technologies. However, it might also act as a standalone solution on top of existing Identity Provisioning tools. We strongly recommend evaluating the product, focusing especially on the features in addition to those connected with role mining.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Nov 11, 2013

Product Report: CA GovernanceMinder™ - 70837

CA Technologies acquired Eurekify, a leading provider of role mining and role engineering, in November 2008. Using that technology, CA Technologies has built the current product CA GovernanceMinder. The product is tightly integrated with CA IdentityMinder™, the Identity Provisioning…

€295.00 Get Access

Latest Related Reports

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Executive View

Executive View: CA Privileged Access Manager - 71264

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network…

Leadership Compass

Leadership Compass: Access Management and Federation - 71102

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: API Security Management - 70958

This report provides an analysis of the market for API Management solutions with a strong focus on security features. Rapidly growing demand for publishing and consuming APIs, which creates new business models and communication channels, has introduced new security challenges. This…

Executive View

Executive View: CA Privileged Identity Manager - 71059

CA Privileged Identity Manager is a comprehensive Privileged Identity Management solution for physical and virtual environments with a very broad range of supported target systems and impressive integration capabilities.

Leadership Compass

Leadership Compass: IAM/IAG Suites - 71105

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management.…

Leadership Compass

Leadership Compass: Access Governance - 70948

Leaders in innovation, product features, and market reach for Identity and Access Governance and Access Intelligence. Your compass for finding the right path in the market.

Executive View

Executive View: CA ControlMinder - 71059

CA Technologies is a multinational publicly held software company headquartered in New York, USA. Founded in 1976 to develop and sell mainframe software, over the decades CA Technologies has grown significantly via a series of strategic acquisitions. Although it used to produce consumer…

Leadership Compass

Leadership Compass: Cloud User and Access Management - 70969

Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud services and on-premise web applications. Your compass for finding the right path in the market.

Executive View

Executive View: CA SiteMinder® - 71022

CA SiteMinder® in conjunction with CA SiteMinder® Federation provides secure single sign-on and access management to Web applications and Web services either on-premise, at a partner’s site or in the cloud, from a web browser or a mobile device.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

GDPR as opportunity to build trusted relationships with consumers

During the KuppingerCole webinar run March 16th, 2017, which has been supported by ForgeRock, several questions from attendees were left unanswered due to a huge number of questions and a lack of time to cover them all. Here are answers to questions that couldn’t be answered live during the [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00