Vendor Report: CA Technologies Virtualization Security

Report Details

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security has to be well planned and requires a set of well-integrated products to provide the right balance between security and risk mitigation on one hand, and costs and complexity on the other.

CA Technologies offers a broad range of products which support customers in implementing Virtualization Security. CA Technologies specific strengths are not only that core security is provided but also IT service automation, assurance, management and other areas are covered as well. Furthermore, CA Technologies has clearly understood that Virtualization Security is not just about having yet another security tool but it is actually about enhancing the existing technologies and enabling them to seamlessly manage heterogeneous physical and virtual environments – in private and public environments (“clouds”). A specific strength for CA Technologies is what they call content-aware IAM, which is about enhancing the scope of IAM to extend to information protection and control through integrating IAM and DLP (Data Leakage Prevention) domains, thus ensuring that information access is well managed at any point of time.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Nov 30, 2010

Vendor Report: CA Technologies Virtualization Security

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system…

€95.00 Get Access
Mastercard Visa PayPal Invoice

Latest Related Reports

Leadership Compass

Leadership Compass: Privilege Management - 72330

Die führenden Unternehmen im Privilege Management - Markt bezüglich Innovationen, Produktfunktionalität und Marktführerschaft. Wie kann man den Zugriff auf kritische Systeme und Geschäftsinformationen steuern und gleichzeitig sichere und optimierte…

Leadership Compass

Leadership Compass: Identity as a Service: Single Sign-On to the Cloud (IDaaS SSO) - 71141

Leaders in innovation, product features, and market reach for Identity as a Service offerings targeting Single Sign-On to the Cloud for all types of users, with primary focus on cloud services but some support for on-premise web applications. Your compass for finding the right path in the…

Leadership Compass

Leadership Compass: Privilege Management - 72330

Leaders in innovation, product features, and market reach for Privilege Management. How do you control access to your critical systems and business information while allowing secure and optimised day to day business operations? This report provides an overview of the market for Privilege…

Leadership Compass

Leadership Compass: CIAM Platforms - 70305

This report provides an overview of the market for Consumer Identity and Access Management and provides you with a compass to help you to find the Consumer Identity and Access Management product that best meets your needs. We examine the market segment, vendor product and service…

Executive View

Executive View: CA Technologies Mobile API Gateway, Mobile App Services, and App Experience Analytics - 70811

Managing mobile device access to corporate applications and databases is a major requirement for all organizations. Mobile security, including a secure development environment for mobile apps and standardized authentication and authorization services are essential components of mobile strategies.

Whitepaper

Whitepaper: VMWare: Unified management and control of the digital workspace - 70286

Identity Management, Endpoint Security , Mobile  Device Management and Access  Management are typically considered to be isolated discipline s . This  can make  administration and governance in these areas complex.  Having a  holistic approach  for the…

Leadership Compass

Leadership Compass: Adaptive Authentication - 71173

Leaders in innovation, product features, and market reach for Adaptive Authentication. Your compass for finding the right path in the market.

Executive View

Executive View: CA Privileged Access Manager - 71264

CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network…

Leadership Compass

Leadership Compass: Access Management and Federation - 71102

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

Leadership Compass

Leadership Compass: API Security Management - 70958

This report provides an analysis of the market for API Management solutions with a strong focus on security features. Rapidly growing demand for publishing and consuming APIs, which creates new business models and communication channels, has introduced new security challenges. This…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

The Sweet Spot for Blockchains: Registries

A couple of days ago, DIACC (Digital ID & Authentication Council of Canada) together with IBM Canada and the Province of British Columbia released information about a PoC (Proof of Concept) for moving corporate registrations to a blockchain-based register. The PoC, which used the Hyperledger [...]

Latest Insights

Hot Topics

Spotlight

Connected Consumer Learn more

Connected Consumer

When dealing with consumers and customers directly the most important asset for any forward-thinking organisation is the data provided and collected for these new type of identities. The appropriate management of consumer identities is of utmost importance. Handing over personal data to a commercial organisation the consumer typically does this with two contrasting expectations. On one hand the consumer wants to benefit from the organisation as a contract partner for goods or services. Customer-facing organizations get into direct contact with their customers today as they are accessing their [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00