Protect critical accounts and endpoints while providing a seamless user experience.
See How in 1 MinuteCentrally manage and unify privileged user policies across multiple physical and virtual environments. Users can securely access critical IT resources without gaining a footprint on the network—while you monitor all activity across your entire IT infrastructure.
Deploy CA Privileged Access Manager as a hardened device or virtual machine to accelerate and automate your privileged access management lifecycle. Almost immediately, you can proactively control user activity to prevent policy violations, exposures and downtime.
This privileged access management solution enables you to monitor user activity and get real-time alerts to terminate potentially damaging sessions. Session recording and playback lets you track all activities and events. You can also easily archive all command line activity to meet audit and compliance mandates.
With Privileged Access Management from CA, your privileged users will gain access only to authorized hybrid cloud infrastructure—with all activity fully monitored and recorded.
With CA Privileged Access Manager, you can leverage your existing identity and access management infrastructure through integration with Active Directory, LDAP- compliant directories, RADIUS, TACACS+, smartcards, hardware tokens and more.
“CA Technologies’ solutions are known for the broadest range of supported systems, including the most exotic and legacy ones, and a high degree of integration between individual products. This makes it a natural fit for most organizations, especially those with heterogeneous and heavily virtualized environments.”
Ivan Niccolai, Analyst, KuppingerCole
CA Threat Analytics for PAM | Competitors | |
---|---|---|
Simple to understand analytics with quick time-to-value |
|
|
Automated response capabilities |
|
|
Advanced machine-learning engine |
|
|
Source: KuppingerCole Report Leadership Compass: Privilege Management, Jun 2017.
Check out the integrations that work with CA Privileged Access Manager.
Troubleshoot technical issues, browse the latest product documentation and access support announcements.
Find answers and share knowledge with your peers through interactive forums.
BUYER’S GUIDE
EBOOK
INDUSTRY ANALYST REPORT
DATA SHEET
Leverage the knowledge of CA Services professionals to get more from your CA solution.
Sharpen your skills with training, certifications and resources that can transform your company and career.
All trademarks, trade names, service marks and logos referenced herein belong to their respective companies.
This publication is for your informational purposes only. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this publication “as is” without warranty of any kind, including, without limitation, any implied warranties of merchantability, fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this publication, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised in advance of the possibility of such damages.
Some information in this publication is based upon CA’s experiences with the referenced software product in a variety of development and customer environments. Past performance of the software product in such development and customer environments is not indicative of the future performance of such software product in identical, similar or different environments. CA does not warrant that the software product will operate as specifically set forth in this publication. CA will support the referenced product only in accordance with (i) the documentation and specifications provided with the referenced product, and (ii) CA’s then-current maintenance and support policy for the referenced product.