Traditional IAM stops at the point of access. CA Technologies Content-Aware IAM vision, a next-generation approach, takes IAM a step further to help control users, their access and how they handle information. This innovative approach helps organizations protect critical information from inappropriate use or disclosure.
"Balancing business productivity and enablement with security and data protection is one of the top priorities for the Chief Security Officer. This is made more difficult by today's collaborative environments that include extended teams from within and outside an organization," said
To help address these challenges,
"Organizations are challenged with unknown Personally Identifiable Information (PII) that exists within documents residing across the enterprise," said
As organizations expand their use of Microsoft SharePoint, they may face accelerated growth of siloed SharePoint instances, the proliferation of sensitive data across the SharePoint environment and increased compliance mandates.
CA DataMinder includes CA DataMinder™ Classification, which dynamically scans, locates and classifies sensitive content stored within Microsoft SharePoint, including intellectual property, financial information and PII such as social security numbers, credit card numbers and other employee relevant data. CA SiteMinder 12.5 will be enhanced to use the content classification information from CA DataMinder as input for access policies to more precisely determine whether a user should be granted access to a document. This combination will provide more fine-grained and better defined access control, helping to improve the security of data without hampering productivity.
- Convenient authentication through CA SiteMinder single sign-on, authentication, authorization and auditing;
- Content-aware access management with automatic data discovery, classification and content-aware access control; and
- Information lifecycle control for SharePoint data from creation, storage, access, distribution and disposal.
"We have supported many implementations for IAM systems – all improving security postures for those customers. A next-generation IAM approach that classifies and flags documents with sensitive content and then associates identity and access policies with that content will further enhance information protection," said