Customers using any security hardware token can trade them for CA ArcotID secure software credentials

June 18, 2011

3 Min Read


ISLANDIA, N.Y., June 13, 2011 /PRNewswire/ -- CA Technologies (NASDAQ: CA) today announced an update to its previously launched token replacement program that offers customers using any security hardware token the opportunity to trade their tokens for CA ArcotID secure software credentials in a one-for-one swap.

For each hardware token, CA Technologies will provide a three-year enterprise license for the CA ArcotID software credential, including the CA Arcot WebFort authentication server. The only cost to the customer making the switch is maintenance. The program is in effect until Sept. 30, 2011.

"Hardware tokens are a security mechanism whose time has expired. The inconvenience of carrying an additional key fob or device for today's increasingly mobile workforce is not practical, and the difficulty of remediation in case of a hardware token breach is overwhelming," said Mike Denning, general manager, Security, CA Technologies. "We have seen increased interest in the CA ArcotID secure software credential. Companies are re-evaluating their reliance on hardware tokens for authentication and consider software credentials as a superior alternative. CA ArcotID, with more than 30 million users, offers increased flexibility and simplicity of deployment, while providing unsurpassed security."

There are significant advantages to using the CA ArcotID secure software credential versus standalone hardware tokens for advanced authentication including:

-- Simple deployment and management - The CA ArcotID software credential can be easily and securely downloaded and deployed using patented cryptographic camouflage technology. This is more efficient than a hardware token which must be manufactured, physically distributed to the customer site and then delivered to the end-user. In addition, in the event of a security breach, a software-based authentication approach provides a speed advantage by allowing organizations to immediately reset the credential. Users would then self-provision a new, and potentially larger, private key the next time they log in. If a hardware token is compromised, the situation requires deploying a new token, which requires the vendor's assistance, and could be a costly, time-consuming and inefficient process. -- Flexibility - The CA ArcotID software credential works across multiple applications and environments, and it scales to support millions of users. Organizations also have the flexibility to store the CA ArcotID software credential on any supported client device, such as a PC, notebook, tablet device or smartphone. -- Uncompromised Security- The CA ArcotID software credential combines a standard x.509v3 digital certificate with patented cryptographic camouflage private key concealment technology to allow users to authenticate securely. In addition, each organization creates, manages and stores its own private keys for all its CA ArcotID users. CA Technologies holds no information about any individual software credentials, thereby reducing the risk of compromising customer data.

View a webcast "Exploring the Security, Cost And User Convenience Benefits of a Software Credential over Hardware Tokens" to hear Jim Reno, CA Technologies distinguished engineer and former Arcot CTO, discuss how software credentials can help eliminate some of the cost, distribution, provisioning and support issues found with hardware tokens. Register for the webcast at

For more information on the Token Replacement Program, please visit


About CA Technologies

CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments - from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights