< Back to list

CA Access Control

CA Access Control provides a complete solution to all aspects of privileged user management protecting critical servers, applications, and devices across platforms and operating systems, and ensures regulatory compliance by enforcing policy-based control of privileged user access to system resources, their activity, and under what circumstances access is allowed.

It provides a proactive approach to securing sensitive information and critical systems without impacting normal business and IT activities. CA Access Control mitigates internal and external risk by controlling how business or privileged users access and use enterprise data.

Industry

Horizontal IT Infrastructure

Category

Security

Red Hat Certifications

This product has been certified to run on the following Red Hat products and technologies:

Target Product Level
Red Hat Enterprise Linux 5.x Self-Certified
Red Hat JBoss Enterprise Application Platform 4.0-4.x Self-Certified