Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

9/11/2012
02:44 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CA Technologies Helps Protect Data Stored On Windows Server 2012 & An Update

CA DataMinder Classification helps to deliver precise and fine-grained access control

ISLANDIA, NY, September 4, 2012 – CA Technologies (CA: NASDAQ) today announced support for Windows Server 2012 Dynamic Access Control. Integrating CA DataMinder™ Classification with Windows Server 2012 gives customers more precise access control of their data stored on Windows Server, helping to improve information security, reduce risk and meet compliance mandates.

Documents stored on a server that were once classified as non-sensitive can quickly change to contain sensitive or classified information throughout day-to-day operations. CA DataMinder Classification scans, locates and classifies sensitive content stored within Windows Server 2012, including intellectual property, financial information and personally identifiable information such as social security numbers, credit card numbers and other employee relevant data. When used with Windows Server 2012 Dynamic Access Control, CA DataMinder Classification helps to deliver precise and fine-grained access control that enables business processes to continue while protecting the most critical information assets.

“Windows Server 2012 Dynamic Access Control lets customers define central access policies at the organizational level and lets customers control access to data and achieve regulatory compliance,” said Andrew Conway, Director, Product Marketing, Enterprise Client, at Microsoft. “CA DataMinder Classification addresses the dynamic nature of data. By combining the content classification from CA DataMinder with the access policies set in Windows Server 2012, customers can better protect critical information from inappropriate use or disclosure.”

This integration extends CA Technologies Content-Aware Identity and Access Management (IAM) product strategy, which helps protect critical data from inappropriate use or disclosure by controlling users, their access and how they handle information. CA Technologies first delivered capability for Content-Aware IAM by associating content and data policies with identities and roles managed by CA IdentityMinder™ (formerly CA Identity Manager). It continued its Content-Aware direction earlier this year with a security solution for Microsoft SharePoint that enabled CA SiteMinder® to use content classification information for more precise Web access control.

“A core focus for a security professional is to ensure the right people have the right access to the right information. But information changes more quickly than access rights, which can leave organizations vulnerable to sensitive data leaks,” said Mike Denning, general manager, Security, CA Technologies. “Organizations need a layered security approach where information about the data is used as input for access policies to more precisely determine whether a user should be granted access to information.”

About CA Technologies

CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. Learn more about CA Technologies at www.ca.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13485
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header.
CVE-2020-13486
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows malicious redirection.
CVE-2020-13482
PUBLISHED: 2020-05-25
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
CVE-2020-13458
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action.
CVE-2020-13459
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There is stored XSS in the Bulk Resize action.