Updates to CA Privileged Access Manager include new capabilities for centralized management, enhanced performance and data security
The scalability of a Privileged Access Management solution is critical to ensure organizations can address and control cyber risk coming from trusted users in any environment. As deployments increase to manage and monitor access expand across geographies, departments and hybrid environments, the architectural considerations can cause challenges in aligning infrastructure allocation with operating systems and databases. CA PAM supports these requirements with enhanced features that enable greater control across the diversity of user access points, and has features that make it simple for Security Administrators to extend their enforcement, control and monitoring of users.
Whether privileged access comes in the form of "root," "administrator" and "superuser" accounts, or application, API or service accounts with elevated privilege, effectively managing all points of privileged access becomes even more of a challenge in these dynamic cloud environments. This is not because these environments are inherently unsecure, but because aspects of security (especially with regard to the varied levels of privileged access) are often overlooked.*
New features of CA PAM to reduce cyber risk from trusted users include:
Gartner recommends that security and risk management leaders responsible for delivering IAM capabilities "Deploy session recording as soon as possible, because this capability will add accountability and visibility for privileged activity. Include this capability as part of your selection process."**
"Security should never be a hindrance to growth and business evolution,
but an enabler through an intelligent, risk-based approach," says
Privileged Access to Your IaaS Environment,
**Gartner Market Guide for Privileged Access Management,
Gartner Securing Privileged Access to Your IaaS Environment,
Gartner Market Guide for Privileged Access Management,
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Copyright © 2017 CA. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
News Provided by Acquire Media