News

eTrust Adds Security Management 'Architecture'

Computer Associates’ eTrust division this week announced a new “security management architecture” that will eventually permeate its entire line of security and identity management tools. At the same time, it began shipping new versions of two of its eTrust products that take advantage of the new architecture.

The eTrust Security Management Architecture is part of CA's vision “for complete, integrated and open identity and access management . . . providing essential security, transparency and reliability for business transactions as they move across today's complex, heterogeneous IT environments,” officials for Islandia, N.Y. -based CA said in a prepared statement.

CA’s new architectural approach aims to integrate authentication, authorization, and auditing mechanisms across multi-platform environments and the multi-tier applications they support. The architecture is standards based, supporting WS-Security, SAML, SPML, ISO-10181(AZNAPI), Kerberos, X.509, and SAF, the company says.

According to CA, among the capabilities enabled by the new architecture are security policies based on point of entry, authentication type or other variables that may change the attributes of a specific transaction. It also ensures that a user's identity is not lost in a transaction by enabling identity mapping across boundaries, providing a complete audit of a transaction as it moves throughout an organization. Additionally, it aims to unify disparate authentication, authorization and auditing information across multi-platform systems and applications.

The first products to support CA’s new architecture are versions 8 of eTrust CA-ACF2 and eTrust CA-Top Secret. One key improvement in the updated products is the addition of multilevel security, an optional layer of protection on top of discretionary access control. In addition, the two products add LDAP Directory Service enhancements that provide additional support, including recovery processing and the ability to send installation data.

CA plans to build support for the architecture into all of its eTrust Identity and Access Management solutions over time.

About the Author

Stuart J. Johnston has covered technology, especially Microsoft, since February 1988 for InfoWorld, Computerworld, Information Week, and PC World, as well as for Enterprise Developer, XML & Web Services, and .NET magazines.

Featured

  • Google IDs on Azure Active Directory B2B Service Now at 'General Availability'

    Microsoft announced on Wednesday that users of the Google identity and access service can use their personal log-in IDs with the Azure Active Directory B2B service to access resources as "guests."

  • Top 4 Overlooked Features of a Data Backup Strategy

    When it comes to implementing an airtight backup-and-recovery plan, these are the four must-have features that many enterprises nevertheless tend to forget.

  • Microsoft Bolsters Kubernetes with Azure Confidential Computing

    Microsoft on Tuesday announced various developments concerning the use of Kubernetes, an open source container orchestration solution fostered by Google.

  • Windows Will Have Support for Encrypted DNS

    Microsoft announced this week that the Windows operating system already has support for an encrypted Domain Name System option that promises to add greater privacy protections for Internet connections.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.