CA Data Protection

(formerly CA DataMinder™)

Control data—and who can access it—in use, in motion, at rest and on access.

Protecting your IT infrastructure and the information that flows through it requires you to know where the data are located, how they are handled and their sensitivity level. CA Data Protection helps reduce the loss and misuse of data by controlling the information ̶ and access to it ̶ at every point in the system.

Delivering data security solutions through CA Data Protection Endpoint, CA Data Protection Network, CA Data Protection Email, CA Data Protection Stored Data and integration with CA Identity & Access Management (CA IAM) solutions, CA Data Protection provides your organization with data security protection and data access control solutions to help minimize the accidental, negligent and malicious misuse of data while helping your organization comply with various data protection standards and regulations.

Through the delivery of broad information and communication coverage, precise policy enforcement through identity context and Content-Aware Identity and Access Management (IAM), CA Data Protection can help enable your organization to take a comprehensive approach to reducing risk to your most critical assets while enabling critical business processes to continue.

With CA Data Protection, you’re helping your organization to define its configurable business and regulatory policies, accurately detect sensitive and unstructured data, monitor known and unknown business processes, and control accidental, negligent and malicious threats to sensitive corporate assets.

CA Data Protection delivers this level of data security protection with the objective to control information across various enterprise locations: endpoints, network, message servers and stored data. It then securely delegates violations for review while measuring key performance metrics over time to drive ongoing program improvement. This is delivered through a central management platform that provides an executive dashboard, detailed and customizable reporting and seamless workflow capabilities. This is augmented with a customer-focused services program that helps organizations realize both quick time to value and a strong return on investment.

CA Data Protection Demo

Protecting Against Insider Threats and External Attacks

CA DataMinder

CA Data Protection Demo

Take Away Documents

Key Features

  • Control data handling and access.
  • Identify various content types.
  • Enable superior detection methods.
  • Ensure enterprise scalability.

Key Benefits

  • Enable transition to cloud services.
  • Mitigate high-risk modes of communication.
  • Enable compliance with regulatory and corporate policies.

More details >

Watch the Video

Control Privileged Users and Data in the Datacenter

Follow us on Twitter @CASecurity

Follow @CASecurity on Twitter >

Security Management Blog

CA Security Management Blog >