About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
CA Named Top Identity and Access Management Software Vendor
Thursday, 11 November 2004 11:13 EST

ISLANDIA, N.Y., November 10, 2004 – Computer Associates International, Inc. (NYSE: CA) today announced that it has been named the worldwide market leader in Identity and Access Management (IAM) software for 2003 by IDC with a 15 percent market share and revenues exceeding $300 million.

Entitled “Worldwide Identity and Access Management 2004 – 2008 Forecast and 2003 Vendor Shares: The Death of Security 3A, Part I,” IDC projects worldwide revenue for the IAM software market to reach $3.4 billion in 2008, representing a compound annual growth rate of 9.7%. IDC also noted that customers are demanding increased integration and less complexity from their IAM solutions.

IDC defines Identity and Access Management as solutions used to identify users in a system – and control their access to resources – by associating user rights with established identities. According to IDC, critical components of identity and access management include Web and host single sign-on, user provisioning, advanced and legacy authentication, public key infrastructure, and directory services.

IDC notes that this more comprehensive and integrated approach to IAM is supplanting the classic “3As” (Administration, Authorization and Authentication) that historically characterized enterprise security management environments – a market that CA had led for the last three years consecutively.

“IDC's report clearly shows that CA has effectively leveraged its market leadership in 3A security to become the leading solution provider for IT's next generation of IAM implementations,” said Toby Weiss, senior vice president of eTrust security management at CA. “Our eTrust brand of security management software continues to set the pace for effectiveness and efficiency across the global enterprise marketplace.”

CA's eTrust Identity and Access Management Suite is the first solution to bring provisioning, enforcement and auditing together with a common architecture and shared administrative interface. It empowers IT organizations to manage growing internal and external user populations, secure an increasingly complex array of resources and services, and comply with critical regulatory mandates. The suite consists of six modular components for distributed platforms:

* eTrust Admin for identity provisioning
* eTrust Access Control for identity-based access control to servers, files and applications
* eTrust Audit for identity-based auditing
* eTrust Directory for a scalable and secure identity repository
* eTrust Single Sign-On for simplified access to multiple applications
* eTrust Web Access Control for identity-based access control to websites, portals, Web services and other extranet resources

CA's eTrust identity and access management portfolio also includes eTrust CA-ACF2 Security and eTrust CA-Top Secret Security for mainframe security management.

The IDC report also ranked Netegrity, Inc. as having the fifth highest IAM market share in 2003. CA announced last month that it has signed a definitive agreement to acquire Netegrity in an all-cash merger. The transaction is subject to the satisfaction of certain conditions, including approval by Netegrity stockholders and regulatory authorities.

About CA

Computer Associates International, Inc. (NYSE:CA), the world's largest management software company, delivers software and services across operations, security, storage, life cycle and service management to optimize the performance, reliability and efficiency of enterprise IT environments. Founded in 1976, CA is headquartered in Islandia, N.Y., and operates in more than 100 countries. For more information, please visit http://ca.com.



Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter