Vendor Report: CA Technologies Virtualization Security

Report Details

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security has to be well planned and requires a set of well-integrated products to provide the right balance between security and risk mitigation on one hand, and costs and complexity on the other.

CA Technologies offers a broad range of products which support customers in implementing Virtualization Security. CA Technologies specific strengths are not only that core security is provided but also IT service automation, assurance, management and other areas are covered as well. Furthermore, CA Technologies has clearly understood that Virtualization Security is not just about having yet another security tool but it is actually about enhancing the existing technologies and enabling them to seamlessly manage heterogeneous physical and virtual environments – in private and public environments (“clouds”). A specific strength for CA Technologies is what they call content-aware IAM, which is about enhancing the scope of IAM to extend to information protection and control through integrating IAM and DLP (Data Leakage Prevention) domains, thus ensuring that information access is well managed at any point of time.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Nov 30, 2010

Vendor Report: CA Technologies Virtualization Security

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system…

€95.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Latest Related Reports

Leadership Compass

Leadership Compass: Access Governance & Intelligence - 71145

Leaders in innovation, product features, and market reach for access governance & Intelligence. Delivering the capabilities for managing access entitlements, always knowing the state of these, and enforcing access and SoD policies across heterogeneous IT environments on premises and in…

Executive View

Executive View: VMware AppDefense - 70840

Fully integrated protection of virtual machines as part of the software defined data center. From capturing expected behavior to efficiently responding to detected threats: Intelligent endpoint security technology leveraging the insight, control and automation available within virtualized…

Leadership Compass

Leadership Compass: Identity Provisioning - 71139

Leaders in innovation, product features, and market reach for Identity Provisioning. Delivering the capabilities for managing accounts and entitlements across heterogeneous IT environments on premises and in the cloud. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: Privilege Management - 72330

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte…

Leadership Compass

Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) - 71141

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the…

Leadership Compass

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege…

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…

Executive View

Executive View: CA Technologies Mobile API Gateway, Mobile App Services, and App Experience Analytics - 70811

Managing mobile device access to corporate applications and databases is a major requirement for all organizations. Mobile security, including a secure development environment for mobile apps and standardized authentication and authorization services are essential components of mobile strategies.

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision  of all…

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00