NEW YORK: CA Technologies, a provider of computer software services and solutions, unveils the latest version of their CA Identity Suite aiming to simplify business user experience, enable faster implementation and drive time-to-value. The latest release offers personalization and mobility capabilities along with pre-configured deployment scenarios.
The CA Identity Suite, now with analytics enables customers to have real time insights on core process operations within the identity management workflow. The new Identity suite also provides deep visualization into processes, enabling managers responsible for access certifications to track and identify root causes of problems quickly and fix them. The suite also reduces the risk of breach by quickly removing access to users whose user role has been removed or modified.
CA Identity Suite improves the efficiency and user experiences of those responsible for access certification by adding new customized options that enables them to take the workload offline for their convenience to review or make decisions. The suite also provides extensive mobile support that enables users to work on their mobile devices just the way they do at their desk, including making access requests and managing user lifecycles.
The Pre-configured identity and access governance business user scenarios included in the CA Identity Suite allow customers to speed up deployments by customizing scenarios and using them to the requirements of their own business needs.
“The identity and access governance functions that are critical to the security and business operations of an organization are no longer the responsibility of a central IT group; that job is now in the hands of business users who need a streamlined and simple way to process identity-related tasks and workflows,” says Mordecai Rosen, general manager, CA Technologies, Security business. “CA is committed to providing the most robust, scalable and easy-to-use identity and access governance system for our customers and partners, while helping to ensure security, compliance and operational needs are met.”