Featured Video, Video

Blockchain set to boost Dubai’s 2020 tourism vision

0 51Dubai’s Department of Tourism and Commerce Marketing has launched Tourism 2.0 - a blockchain-enabled marketplace that connects potential buyers directly to hotels and tour operators.
Don't show me again

CA forays into data-leak prevention

CAannounced an agreement to acquire for an undisclosed sum data-leak prevention vendor Orchestria, boosting the software maker's security, privacy and compliance technologies.

The acquisition, expected to close by month's end, will be the third security buy for CA in as many months and company executives say Orchestria's DLP technology will enhance CA's identity and access management products with capabilities to control access and set policies based on a user's identity and role.

“CA is traditionally strong on the identity management side, but we haven't gone down to the data elements before. This acquisition is a great opportunity for CA to tie security all the way back to identity and better determine who has access to what and ultimately drive different access rights to different systems,” says Dave Hansen, corporate senior vice president and general manager of CA's Security Management business unit.

CA plans to integrate Orchestria's technology and 84 employees — based in the United Kingdom. and New York — into CA's security business and offer the DLP technology stand-alone and integrated into CA's broader suite. Hansen says he will share more details around product integrations and perform demonstrations at the RSA Conference 2009 in April.

“This segment of the market is growing fast and the reality is that to solve compliance-driven problems we have to get better at extending security to the data elements,” Hansen says. “Orchestria has a holistic solution that goes from the gateway to the desktop and laptop that will really enable CA to broaden its security reach into this market.”

The concept of tying identities and data more closely together to secure environments as well as content falls under the realm of role-based access management or broader entitlement management technologies. Entitlement management products can, for instance, pull identity management data from LDAP, Active Directory or human resource directories and integrate with identity and access management tools from CA, IBM, Oracle and others to help customers build entitlement policies. Once built, the technologies monitor access across a company to determine if actions taken are in line with pre-set policies.

Previous ArticleNext Article

Leave a Reply

Your email address will not be published. Required fields are marked *


The free newsletter covering the top industry headlines