Vendor Report: CA Technologies Virtualization Security
Report Details

Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security has to be well planned and requires a set of well-integrated products to provide the right balance between security and risk mitigation on one hand, and costs and complexity on the other.
CA Technologies offers a broad range of products which support customers in implementing Virtualization Security. CA Technologies specific strengths are not only that core security is provided but also IT service automation, assurance, management and other areas are covered as well. Furthermore, CA Technologies has clearly understood that Virtualization Security is not just about having yet another security tool but it is actually about enhancing the existing technologies and enabling them to seamlessly manage heterogeneous physical and virtual environments – in private and public environments (“clouds”). A specific strength for CA Technologies is what they call content-aware IAM, which is about enhancing the scope of IAM to extend to information protection and control through integrating IAM and DLP (Data Leakage Prevention) domains, thus ensuring that information access is well managed at any point of time.
Date | Title | Price | |
---|---|---|---|
Nov 30, 2010 |
Vendor Report: CA Technologies Virtualization SecurityVirtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system… |
€95.00
excl. VAT
|
Get Access
![]() |
![]() ![]() ![]() ![]() |
Latest Related Reports
KuppingerCole PLUS
Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Blog
Does Microsoft Double Key Encryption Help with Schrems II?


On July 16th, 2020 the European Court of Justice issued its decision on the adequacy of the protection provided by the EU-US Data Protection Shield for the transfer of personal data for commercial purposes by an economic operator established in an EU Member State to another economic operator established in a third country. The use of cloud services is now commonplace and has been increased due to the need for working from home due to the coronavirus pandemic. In addition, [...]
Latest Insights
Hot Topics
Spotlight

AI for the Future of Your Business
AI for the Future of your Business: Effective, Safe, Secure & Ethical Everything we admire, love, need to survive, and that brings us further in creating a better future with a human face is and will be a result of intelligence. Synthesizing and amplifying our human intelligence have therefore the potential of leading us into a new era of prosperity like we have not seen before, if we succeed keeping AI Safe, Secure and Ethical. Since the very beginning of industrialization, and even before, we have been striving at structuring our work in a way that it becomes accessible for [...]