{{search ? 'Close' : 'Search'}}

CA Identity Governance

(formerly CA GovernanceMinderâ„¢)

Access certification and identity governance to help meet compliance requirements.

Organizations need to meet mandated compliance requirements and also minimize risks of users with excessive entitlements. Because of the nature of the assets available in any organization, identity access governance and access certification should be defined and policies implemented and enforced at every level of the organization and for every user and business unit prior to pushing any environment live. CA Identity Governance is the solution to the problem of providing appropriate access governance and access certification within any complex, physical or virtual enterprise environment.

CA Identity Governance is designed to automate identity and access governance processes and provides continuous identity controls. This starts with leveraging a business-friendly role foundation to present information to users in the context that makes sense to them. It also checks security policies and highlights potential access or entitlement violations to business managers during processes such as entitlements certification.

CA Identity Governance’s patented advanced analytics improve time to value of activities such as privilege cleanup and role discovery. Combined with a powerful policy engine, this provides the foundation to help align security, IT and business organizations. By automating processes and controls based on more accurate entitlements, organizations can be confident that users’ access is maintained at the level they actually need, reducing the organization’s security risk profile and enabling it to more easily demonstrate compliance.

CA Identity Management and Governance Click-Thru Demo

Govern Employee & Partner Access to the Extended Enterprise

Key Features

  • Entitlements certification
  • Powerful role analytics
  • Role discovery, role modeling and mining
  • Audit reports and dashboards

Key Benefits

  • Simplify certification processes.
  • Reduce security risks.
  • Increase compliance efficiencies.
  • Deliver visibility into users entitlements.

More details >

CA Named Winner of SC Award: Best Identity Management Solution 2015

Read press release >

Follow Us on Twitter @CASecurity

Follow @CASecurity on Twitter >

Security Management Blog

CA Security Management Blog >