CA Technologies simplifies Identity Management and Governance for Business Users with new CA Identity Suite

CA-Technologies-logoNew Delhi, India, May 5, 2014: CA Technologies has announced the availability of CA Identity Suite,a new, one-stop identity management and governance solution that transforms data into business information and simplifies identity management and access governance across the enterprise.

The CA Identity Suite streamlines access requests, approvals and governance processes for the business stakeholder by translating traditional IT jargon into language and terms a business user understands.

Vic Mankotia, VP, Solution Strategy, Asia-Pacific & Japan, CA Technologies, said, “Today’s security environment demands that more non-technical business stakeholders participate in IAM functions; they are the users that know who should have access to data, systems and applications. CA Identity Suite helps simplify the IAM engagement for business users, incorporating an easy-to-use interface and language they understand in a system they can access anytime, through a variety of devices.”

With role analytics, the ability to customize policy and system connections without coding, and the functionality to request, grant and govern user access, the CA Identity Suite delivers enterprise scale identity management in a solution that requires minimal training and offers a consolidated, simplified user experience. CA incorporated SIGMA, IDMLogic’s leading business-focused application for identity and access governance, with CA IdentityMinder and CA GovernanceMinder to create the CA Identity Suite.

Myrna Soto, Chief Infrastructure and Information Security Officer, Comcast, said, “Security and compliance teams want seamless, intuitive processes that let them provide the appropriate information that their various internal partners want and need. By integrating CA Technologies and IDMLogic solutions across our organization, we have been able to help simplify identity management processes and make engagement easy for our business leaders without compromising our security and compliance needs.”

Leave a Reply

Your email address will not be published. Required fields are marked *

Pin It on Pinterest

Shares
Share This