CA Access Control provides a complete solution to all aspects of privileged user management protecting critical servers, applications, and devices across platforms and operating systems, and ensures regulatory compliance by enforcing policy-based control of privileged user access to system resources, their activity, and under what circumstances access is allowed.
It provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. CA Access Control mitigates internal and external risk by controlling how business or privileged users access and use enterprise data.
Industry
Category
Red Hat Certifications
This product has been certified to run on the following Red Hat products and technologies:
| Target Product | Level |
|---|---|
| Red Hat Enterprise Linux 5.x | Self-Certified |
| Red Hat JBoss Enterprise Application Platform 4.0-4.x | Self-Certified |
