December 11, 2006
CA announced the latest release of its Identity and Access Management (IAM) solution that helps organizations minimize risk while reducing the cost of IT operations.
CA's IAM solution unifies and simplifies the management of enterprise-wide security through automated and centralized policy management. It integrates products to provide complete, modular and scalable IAM capabilities. Enhancements include expanded identity federation, strong authentication management, expanded user provisioning, and improved virtualization support.
"We simultaneously have to provide more users inside and outside the University with access to a broader range of applications than ever -- and we have to do it in a way that protects the integrity of sensitive information while ensuring we are in compliance with a wide range of federal regulations," said Karl Jackson, senior engineer, Office of Information Technology Engineering at Brigham Young University. "CA's comprehensive IAM solution enables us to meet this challenge in a centralized, cohesive and cost-effective way."
This release provides new capabilities for the products that comprise CA's IAM solution, including:
- Tighter integration with CA's access management solutions to extend single sign-on across the enterprise, including CA Embedded Entitlements Manager-instrumented applications.
- The addition of support for the XACML, SAML and SPML standards, which eases interoperability with third-party authentication, user administration and policy management systems.
- The ability to use C#, in addition to Java and C++ libraries, to externalize security policies for internally developed applications.
"The most effective and efficient way to manage user access rights across the enterprise is to drive identity, access and entitlement management from a single, centralized enterprise IAM system," said Bilhar Mann, senior vice president of Identity and Access Management at CA. "By providing such a centralized and complete solution, CA is meeting the evolving identity and access management needs of today's extended enterprise."
CA is working closely with key systems integrators to assist organizations in implementing identity and access management systems built around CA's IAM solution.
"Many companies are struggling to sustain compliance, improve governance, and reduce security management costs, while at the same time improving their end-user experience," said Deborah Golden, principal at Deloitte & Touche LLP ("Deloitte & Touche"). "CA's comprehensive IAM solution, combined with Deloitte & Touche's IAM leading practices, methodologies and frameworks, may help organizations achieve these critical and often conflicting objectives."
Frank Ding, engineering analysis & technical computing manager at Simpson Strong-Tie, discussed the advantages of utilizing the cloud for occasional scientific computing, identified the obstacles to doing so, and proposed workarounds to some of those obstacles.
The private industry least likely to adopt public cloud services for data storage are financial institutions. Holding the most sensitive and heavily-regulated of data types, personal financial information, banks and similar institutions are mostly moving towards private cloud services – and doing so at great cost.
In this week's hand-picked assortment, researchers explore the path to more energy-efficient cloud datacenters, investigate new frameworks and runtime environments that are compatible with Windows Azure, and design a uniﬁed programming model for diverse data-intensive cloud computing paradigms.
May 16, 2013 |
When it comes to cloud, long distances mean unacceptably high latencies. Researchers from the University of Bonn in Germany examined those latency issues of doing CFD modeling in the cloud by utilizing a common CFD and its utilization in HPC instance types including both CPU and GPU cores of Amazon EC2.
May 10, 2013 |
Australian visual effects company, Animal Logic, is considering a move to the public cloud.
May 10, 2013 |
Program provides cash awards up to $10,000 for the best open-source end-user applications deployed on 100G network.
May 08, 2013 |
For engineers looking to leverage high-performance computing, the accessibility of a cloud-based approach is a powerful draw, but there are costs that may not be readily apparent.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.