Privileged Access Management

Who is accessing your privileged accounts, friend or foe?

View Video Learning

Defend against privileged user risks.

Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited privileged user accounts are the common thread of most data breaches. And as your environment grows increasingly complex, so does the challenge of defending against ever more sophisticated—and damaging—attacks. Privileged Access Management from CA offers a comprehensive solution delivering both network- and host-based controls for the enterprise and hybrid cloud.

Combat breaches with Threat Analytics.

CA Threat Analytics for Privileged Access Manager enables the enterprise to continuously assess risk and quickly detect malicious activity among its privileged users. By analyzing various contextual factors about this user and each operation, a risk score can be calculated that can enable further security controls to be applied. The result: reduced threat of insider breach through either malicious or careless activities.

Get in touch with CA.


Avoid costly data breaches

Guard against costly data breaches by protecting the highly critical attack vector of privileged accounts. Automate privileged account access across multiple access points using secure single sign-on.

Control access across platforms

Manage your privileged account access across both physical and virtual systems. Protect, monitor and audit from on-premise to the cloud.

Increase security—now

Experience quick time to value through a simple, easy-to-deploy solution that scales to protect thousands of resources. And with a self-contained, appliance-based solution there’s nothing extra to buy and no hidden costs.

Why CA

You may also like ...

Featured Products

Why Privileged Access Management from CA

Privileged users see only those systems and access methods to which they’re expressly allowed access.

David Watson, CIO/Management Consultant, Tech company with 1-100 employees

[CA Privileged Access Manager] adds another layer of security from the basic OS security of Linux and Windows …

Technical Director, Tech services company with 1-100 employees

“CA Technologies’ solutions are known for the broadest range of supported systems, including the most exotic and legacy ones, and a high degree of integration between individual products. This makes it a natural fit for most organizations, especially those with heterogeneous and heavily virtualized environments.”

Ivan Niccolai, Analyst, KuppingerCole

Source: KuppingerCole Executive View: CA Privileged Access Manager

Education & Training

Sharpen your skills with training, certifications and resources that can transform your company and career.

Services & Support

Accelerate your success with help that’s timely and targeted.


Leverage the knowledge of CA Services professionals to get more from your CA solution.


Troubleshoot technical issues, browse the latest product documentation and access support announcements.


Find answers and share knowledge with your peers through interactive forums.

Are you ready for the Application Economy?

Do you have the tools and expertise you need to take advantage of this unprecedented opportunity? We do. Let us put our proven capabilities to work for you—and help transform your business.

Getting Started


Add to an existing CA product.

Find a Technology Partner >

Get in touch with CA.