CA, Symantec push security tools

Computer Associates International Inc. recently announced a new architecture for processing identity and access management that will become the backbone for its next-generation eTrust security product, while Symantec Corp. revealed plans for a new version of LiveState Recovery Manager that targets the enterprise.

“Security architectures depend more and more on data management architectures. When a company develops a security architecture, one of the biggest steps is to negotiate with data management on where to store event logs, intrusion-detection information, and so on,” said Steve Hunt, research director at Forrester Research.

To that end, LiveState Recovery Manager 3.0 is a centralized, policy-based system and data-protection management software program designed for enterprise datacenters, distributed computing environments, and remote locations. “This new version is designed for recovery of systems very rapidly and to offer a view of what is being backed up on an enterprise basis,” said L.D. Weller, product manager for enterprise administration at Symantec. Weller said LiveState integrates with Veritas’ NetBackup and other leading backup products. Symantec is currently acquiring Veritas.

The management framework will be a building block for future Symantec offerings, Weller said. “LiveState will make it easier for customers to deploy applications in the future, such as patch management,” he said.

LiveState Recovery Manager 3.0 is scheduled to be available in April.

CA’s new eTrust Security Management Architecture integrates authentication, authorization and auditing mechanisms across multiplatform environments and multitier applications, according to officials.

“We came out with the mainframe versions first because most transactions continue to utilize the mainframe,” said Toby Weiss, senior vice president of eTrust at CA.

Based on products obtained in CA’s Netegrity acquisition, the new architecture is much more efficient in securing handoffs between different identity and access standards across various platforms, Weiss said.

“Loss of end-to-end accountability for business transactions implemented in a multitier and multiplatform application architecture is a serious problem for enterprises coping with stringent audit and regulatory compliance demands,” said Phil Schacter, an analyst at Burton Group. “A standards-based approach is needed to address this key audit and security issue for large customers.”

Quick Link: 052853

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Empowering the hybrid workforce: how technology can build a better employee experience

Across the country, employees from organizations of all sizes expect flexibility...

What’s behind the best customer experience: How to make it real for your business

The best customer experience – the kind that builds businesses and...

Overcoming the obstacles to optimized operations

Network-driven optimization is a top priority for many Canadian business leaders...

Thriving amid Canada’s tech talent shortage

With today’s tight labour market, rising customer demands, fast-evolving cyber threats...

Staying protected and compliant in an evolving IT landscape

Canadian businesses have changed remarkably and quickly over the last few...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now