CA to add ID management to Salesforce.com tools

At the RSA Conference today, CA is expected to announce additions to its enterprise identity management product that will allow customers to extend access and provisioning controls to the Salesforce.com Sales Cloud 2 application.

CA Identity Manager can now be used to automate processes, such as associating a user to a role to gain access to Sales Cloud 2, the sales forecasting application from Salesforce.com, says Lina Liberti, vice president in CA’s security business unit. This added functionality for CA Identity Manager, done in cooperation with Salesforce.com, is intended to simplify the provisioning and de-provisioning of enterprise users of Sales Cloud 2 and alleviate the need to apply manual processes to grant access, Liberti says.

“In most cases, customers have to go through heavy manual processes,” Liberti says. For instance, customers typically have to provision access to Sales Cloud 2 and later manually de-provision when an employee leaves the firm or changes jobs. But with support for Sales Cloud 2 access and provisioning under the auspices of CA Identity Manager, that process can now be automated as it might be with any of the customer’s internal applications, through a Web service.

The extended functionality, available at no additional cost in CA Identity Manager, represents one of CA’s first efforts to bring security controls into the cloud. CA’s SiteMinder single-sign-on function is already integrated into Saleforce.com, according to Liberti.

Improving security and privacy controls for cloud-based applications is the main topic that CA will take up at the RSA Conference. Dave Hansen, corporate senior vice president and general manager of the security and compliance business unit at CA, will host a panel discussing security and privacy in cloud-based applications.

Representatives from Amazon Web Services, Lockheed Martin, Acxiom and Ponemon Institute are expected to join Hansen to discuss perceived challenges in security and privacy in cloud-based computing environments. The discussion may encompass a look at some service models, such as extending security controls from the enterprise to the cloud, and how cloud service providers themselves deploy security internally.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now