CA Technologies promises to improve Virtualisation security with a new securty solution that enforces end-to-end privileged user management suport for VMware vSphere Environments.
CA Technologies is leveraging on CA Access Control for Virtual Environments to extend its identity and access management (IAM) security expertise. The new solution complements and protects VMware virtual environments.
“We see CA Access Control for Virtual Environments as a key solution that will meet our needs in virtualization security and help us to comply with PCI-DSS requirements,” said Arieh Berger, manager, Operating Systems and Information Security, EL AL Airlines. “By complementing and extending the security that comes with VMware, CA Access Control for Virtual Environments will allow us to enact segregation of duties and control privileged user access – all automatically.”The solution helps customers confidently virtualize critical applications by addressing security and compliance concerns, and helping control privileged user access to the virtual environment.
Virtualization management tools provide IT administrators with tremendous flexibility and power to make significant, rapid changes to their virtual environments.
This authority increases the insider threat and raises the need to protect virtual environments from user mistakes, misuse or blatant, malicious actions by those users with the most privilege.
CA Access Control for Virtual Environments is available direct from CA Technologies or through a growing global partner channel.
CA Access Control for Virtual Environments helps customers:
- Achieve compliance for their virtual data center through privileged user management for the hypervisor and guest virtual machines;
- Gain visibility and control over virtual environments with activity logging and privileged user password vaulting;
- Automate security operations and reduce security costs by applying security controls according to pre-set policies;
- Expedite adoption of virtualization technology for critical applications by improving security controls; and
- Create a secure, multi-tenant environment by isolating virtual machines through network zoning.
Tags: CA, security, virtualisation
[…] This post was Twitted by tech4tea […]