Sr. Solution Strategist Security - Platinum Accounts at CA Technologies
30 April 18
I have been in the industry both as a buyer of these products and now I am on the vendor side.
I have noticed that most of the folks answering are, like politicians, answering a different, and unasked question without addressing your question. I will do my best to answer the question you asked. Out of the gate and to the best of my knowledge IBM TAM is going end of life and has been
renamed to ISAM. It consists of two primary components A user registry, and an authorization service consisting of an authorization database and an authorization engine that performs the decision-making action on the request. Tivoli Access Manager is not a single product but rather a family of products that use the same core authorization and authentication engine.
Past similarities notwithstanding CA SSO has come a long way and CA has shifted left as has their product stack. CA SSO is • Industry leader. Consistently recognized as an industry leading solution by independent market research organizations, and proven in some of the most demanding environments in financial, telecommunications, and government organizations.
Flexible architecture. Supports five different deployment architectures that can be used jointly or
independently to meet varying business needs. These architectures include: agent and gateway-based policy enforcement points, open federation standards, format flexible cookie, and REST and SOAP-based web services.Interoperability. Provides validated integration and SSO across hundreds of applications on a broad range of platforms, including app servers, collaboration environments, cloud apps, ERP apps, mobile devices and web servers. Enhanced session assurance. Prevents hackers from hijacking legitimate sessions with stolen cookies through CA's patented DeviceDNA™ device validation process. Hybrid cloud. Integrates with CA Identity Service to enable seamless access across cloud and on premises applications optionally launched via a simple to use integrated UI. Out of the Box Integration – the solution is tested against more than 450 different third-party product combinations to ensure the widest platform support in the market.
If you are like the majority of other companies, you most likely use cloud environments or multi-cloud implementations. Even though cloud computing has become increasingly popular, it introduces security threats such as contract breaches, compliance problems, and APIs that are not secure or are misconfigured. Because most SaaS applications include large amounts of sensitive data, such as credit...
This is our new bi-weekly Community Spotlight that includes recent contributions (questions, articles and discussions) by the PeerSpot community members.
Check the top products and solutions below (selected based on peer reviews) or contribute your own article!
Top Security Orchestration Automation and Response (SOAR) Solutions
Top 8 Data Loss Prevention (DL...
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias.
Our users have ranked these solutions according to their valuable features, and discuss which features they like most and why.
You can read user reviews for the Top 8 Single Sign-On (SSO) Tools to help...
CTO at NATIONAL MOTOR FREIGHT TRAFFIC ASSOCIATION INC
03 June 22
It was interesting not to see Okta on this list. Did it make a broader list, but not the top tools?
I have implemented Okta, and I have implemented a dual-headed Okta in the past with ease, so I was a little surprised. The other tool I use is Thycotic Secret Server for Admin passwords, though they are now part of a new company.
Search Engine Optimization Specialist at LoginRadius
17 August 22
SSO is an essential feature of an Identity and Access Management (IAM) access control platform.
User identity authentication is important when it comes to understanding which permissions a user will have.