Product Report: CA Access Control – Privileged User and Password Management

Report Details

CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity Management, depending on the product specifics and the vendors marketing) within the IAM (Identity and Access Management) and broader IT Security market. The focus of PxM tools is to better manage and audit these accounts and thus mitigate the risks.

CA Access Control Privileged User and Password Management (CA Access Control PUPM) is one product in this category that provides a significantly rich feature set to address different requirements of PxM in a heterogeneous IT environment.

PxMA specific strength is the integration of this tool with other CA products, as well the other CA Access Control components such as tools like the CA Enterprise Log Manager or CA Service Desk. With this integration, CA has one of the strongest offerings in the PxM market as of now. Thus we strongly recommend including CA Access Control PUPM into evaluations of PxM solutions.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Sep 28, 2010

Product Report: CA Access Control – Privileged User and Password Management

CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity…

€95.00 Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

PowerBroker for Unix & Linux von BeyondTrust bietet Server Privilege Management und Session Management speziell für Unix- und Linux-Server. Solche Server sind häufig Angriffen sowohl von böswilligen Insidern als auch externen Hackern ausgesetzt. PowerBroker for Unix &…

Executive View

Executive View: Osirium: Privileged Access Management - 70836

Osirium’s Privileged Access Management provides a secure, streamlined way to monitor privileged users for all relevant systems. It manages context-driven access over any number of systems across an infrastructure, and supports an innovative, task-based approach. Furthermore, it comes…

Executive View

Executive View: Thycotic Privilege Manager - 70221

Thycotic Privilege Manager is a tool focused on Least Privilege management and enforcement on endpoint systems, supporting both Windows and Mac systems. It provides application control and privilege management features to restrict the access and use of highly privileged accounts and thus…

Executive View

Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363

BeyondTrust’s PowerBroker for Unix & Linux delivers Server Privilege Management and Session Management specifically for Unix and Linux servers. These servers are common targets for attackers, both malicious insiders and external attackers. PowerBroker for Unix & Linux provides…

Leadership Compass

Leadership Compass: Identity Provisioning - 71139

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

Executive View

Executive View: ManageEngine Password Manager Pro - 70613

ManageEngine, part of Zoho Corp., delivers a broad portfolio of solutions targeted at IT administrators. Among these, we find Password Manager Pro, a Privilege Management solution providing support for a variety of use cases such as Shared Account Password Management,…

Executive View

Executive View: BeyondTrust PowerBroker PAM - 70725

BeyondTrust’s PowerBroker product family provides a well-integrated solution with a broad range of capabilities for the mitigation of threats caused by the abuse or misuse of privileged system accounts and entitlements, on endpoints as well as server systems. With dedicated products…

Whitepaper

Whitepaper: Thycotic: Protecting the keys to your kingdom against cyber-attacks and insider threats - 72613

All organizations today are under constant attack, and high-privilege accounts are a primary target, allowing attackers to cause maximum damage by data theft and other attacks, due to their elevated privileges. While the number of external attacks continues to increase, internal attacks…

Executive View

Executive View: One Identity SafeGuard 2.0 - 71251

One Identity SafeGuard 2.0 is a re-architected, modular solution for Privilege Management, supporting both Shared & Privileged Account Password Management and Session Management, plus several additional capabilities. The product excels with its architecture, integration capabilities,…

Executive View

Executive View: Thycotic Secret Server - 71060

Thycotic Secret Server is a mature enterprise - class offering for Privilege  Management, supporting the key areas of the market such as Shared Account and  Privileged Password Management, Session Monitoring, Account Discovery, and others. The solution convinces with its approach…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

One Identity Acquires Balabit

Yesterday, One Identity announced that they have acquired Balabit, a company specialized on Privileged Management, headquartered in Luxembourg but with their main team located in Hungary. One Identity, a Quest Software business, counts amongst the leading vendors in the Identity Management market. [...]

Latest Insights

Hot Topics

Spotlight

Privacy & the European Data Protection Regulation Learn more

Privacy & the European Data Protection Regulation

The EU GDPR (General Data Protection Regulation), becoming effective May 25, 2018, will have a global impact not only on data privacy, but on the interaction between businesses and their customers and consumers. Organizations must not restrict their GDPR initiatives to technical changes in consent management or PII protection, but need to review how they onboard customers and consumers and how to convince these of giving consent, but also review the amount and purposes of PII they collect. The impact of GDPR on businesses will be far bigger than most currently expect. [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00