CA Virtual Environment Access Control: Protecting Virtualization Security is imminent
Source: Internet
Author: User
KeywordsCloud Computing Virtualization User Management vSphere
Today, cloud computing solutions provider CA Technologies officially announced the launch of a virtual environment CA Access Control (CA Access Control for Virtual Environments) solutions, the program extends its identity and access management (IAM) security expertise, but also Can complement and protect VMware virtual environments. With the perfect solution to several security and compliance issues and to help control privileged users' access to virtualized environments, CA Virtual Environment Access Control enables customers peace of mind to virtualize key applications.
Virtualization security is imminent Virtualization management tools give IT administrators great flexibility and give them the power to make rapid changes to the virtual environment. However, this power adds to the internal threat, creating a new need to protect the virtual environment from the user's mistakes, misuse, or blatant malicious behavior by privileged users. More recently, reports of major operational disruptions and financial implications of a former employee at a Japanese pharmaceutical company underscored the need for virtualization security. The employee was reportedly using his or her rights to remotely access and delete multiple virtual systems running critical applications such as e-mail and other systems that support the finance function after being dismissed. Mike Denning, general manager of CA Technologies' security business, said: " Today's virtual machines are rapidly deployed, but virtual machine security and control are a contributing factor to ' virtualization delays. ' Concerns about security issues make virtualization technology ineffective Is commonly used in mission critical environments and now leverages the CA virtual environment access control in our IAM security portfolio to provide the technology required for end-to-end security automation in the data center, from host and physical servers to virtual environments. "CA Virtual Environment Access Control Enhances Virtualization Security CA Virtual Environment Access Control helps customers: • Achieve compliance with their virtual data center by privileged user management of hypervisors and client virtual machines; • Leverage activity logs and privileged users Password bank to gain visibility and control of virtual environments • Automate security operations and reduce security costs by implementing security controls based on pre-set policies • Accelerate virtualization for critical applications by improving security controls Technology adoption; • Isolation of virtualization through network partitioning Machine, create a secure multi-tenant environment. Arieh Berger, Operating Systems and Information Security Manager at Israel Airlines, said: " We think CA Virtual Environment Access Control is an important solution to meet our needs for virtualization security and to help us comply with PCI-DSS requirements. By Complementing and extending the level of security that comes with VMware , the CA virtual environment access control will enable us to enforce the division of responsibilities and control access by privileged users - all automatically. "CA Technologies Expands Portfolio with HyTrust Alliance As part of the two corporate alliances, the CA virtual environment access control includes HyTrust technology. Combining CA Technologies Proven Virtual Machine Privileged User Access Control with HyTrust 's Hypervisor Security Control, customers can further enhance virtual environment security and prevent privileged IT administrators from unauthorized access and operation. Virtual systems often require this higher level of security to comply with industry regulations and confidence to increase the use of virtualization, simplifying operations and reducing costs. Steve Coplan, senior analyst with 451 Group, said: " As the adoption of virtualized hardware continues to mature, companies are forced to find ways to automate virtualization management and security, ensure secure access to hypervisors, Implementing centrally defined controls can inject greater visibility into the virtualization layer Collaboration between CA Technologies and HyTrust brings together the expertise and level of integration at the hypervisor level and the ability to manage virtualized administrator accounts as As part of broader measures of managing privileged identities, giving people greater visibility into administrator activity and effectively defining policies to curb their privileges. "
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.