TechValidate Research on CA Identity Management

12 Case Studies


Case Study: eSoft 2006 C.A.

Introduction

This case study of “eSoft 2006, C.A.” is based on a February 2016 survey of CA Privileged Access Manager customers by TechValidate, a 3rd-party research service.

Challenges

  • Challenges solved with CA Privileged Access Manager:
    • Addressed audit and compliance demands associated with controlling and managing privileged access
    • Improved inefficient routine processes related to managing privileged access
    • Improved tracking, reporting and monitoring privileged user activities
    • Managed privileged access across the hybrid enterprise (traditional, virtualized and cloud environment)
  • Chose CA Privileged Access Manager over:
    • CyberArk

Use Case

  • Used CA Privileged Access Manager for:
    • Privileged user credential management
    • Privileged user authentication
    • Privileged user session recording and analysis
  • IT environments that CA Privileged Manager is deployed for:
    • Traditional/on-premise data centers
    • Software-defined, virtual data centers and networks
    • Public and private clouds

Results

  • Benefits realized with CA Privileged Access Manager:
    • Reduced security and compliance risks
    • Increased accountability by gaining visibility and control of privileged user activity
    • Reduced cost of managing privileged user access by leveraging automation capabilities (e.g. password management, SSO etc.)
    • Reduced the cost and operational risk of managing application to application credential use
  • Key decision makers/influencers for making the investment in CA Privileged Access Manager:
    • IT Security (CXO/VP/Director/Manager)
    • Risk Management (CXO/VP/Director/Manager)
    • Audit (VP/Director/Manager)
  • Rated CA Privileged Access Manager’s features as:
    • Credential management: very satisfied
    • Privileged user authentication: very satisfied
    • Privileged user access control: very satisfied
    • Session recording & analysis: very satisfied
    • Activity monitoring & alerting: very satisfied
  • Outcomes from CA Privileged Access Manager:
    • Cut security/compliance risks: 50% to 74%
    • Improve compliance processes: 50% to 74%
    • Increase staff productivity: 50% to 74%
    • Increase accountability: 50% to 74%
    • Reduce cost (of PAM): 25% to 49%
  • Has significantly improved their confidence in protecting against breaches with CA Privileged Access Manager.

Case Study: Telesis Corporation

Introduction

This case study of Telesis Corporation is based on a February 2016 survey of CA Privileged Access Manager customers by TechValidate, a 3rd-party research service.

“With CA Privileged Access Manager, we have greater visibility into the activities of our privileged users. In addition, we have significantly reduced our risks from insider threats.”

Challenges

  • Challenges solved with CA Privileged Access Manager:
    • Prevented data breaches
    • Addressed audit and compliance demands associated with controlling and managing privileged access
    • Improved inefficient routine processes related to managing privileged access
    • Improved tracking, reporting and monitoring privileged user activities

Use Case

  • Used CA Privileged Access Manager for:
    • Privileged user credential management
    • Privileged user authentication
    • Privileged user access control
    • Privileged user session recording and analysis
    • Privileged user activity monitoring and alerting
  • IT environments that CA Privileged Manager is deployed for:
    • Public and private clouds

Results

  • Benefits realized with CA Privileged Access Manager:
    • Reduced security and compliance risks
    • Improved audit and compliance by satisfying access control related requirements
    • Increased accountability by gaining visibility and control of privileged user activity
  • Key decision makers/influencers for making the investment in CA Privileged Access Manager:
    • IT Security (CXO/VP/Director/Manager)
  • Rated CA Privileged Access Manager’s features as:
    • Credential management: extremely satisfied
    • Privileged user authentication: extremely satisfied
    • Privileged user access control: extremely satisfied
    • Session recording & analysis: extremely satisfied
    • Activity monitoring & alerting: extremely satisfied
  • Outcomes from CA Privileged Access Manager:
    • Cut security/compliance risks: 50% to 74%
    • Improve compliance processes: greater than 75%
    • Increase staff productivity: 50% to 74%
    • Increase accountability: greater than 75%
  • Has very significantly improved their confidence in protecting against breaches with CA Privileged Access Manager.

Case Study: State & Local Government

Introduction

This case study of a state & local government is based on a December 2015 survey of CA Technologies Identity and Access Management customers by TechValidate, a 3rd-party research service. The profiled organization asked to have their name blinded to protect their confidentiality.

“A standards-compliant API gateway layer has modernized our security layer and dramatically reduced our risk by reducing the attack surface, improving standards, enabling better controls and auditing.”

Challenges

  • Agrees that “enabling the business” for IAM spend is very significant.

Use Case

  • Is leveraging CA IAM to support their digital transformation efforts.
  • Accesses more than 20 applications with CA IAM.

Results

  • Is able to bring new applications to market 30-49% faster with CA IAM.
  • Agrees that they have improved engagement with their customers with CA security solutions.
  • Reports that CA IAM solutions have significantly improved customer retention.
  • agrees that CA IAM has enabled them to deliver new services, thus increasing revenue.
  • Reports that CA IAM solutions have increased their revenue by 20-30% by enabling them to deliver new services.
  • Has improved employee productivity by 11-19% with CA IAM solutions.

Case Study: Global 500 Banking Company

Introduction

This case study of a Global 500 banking company is based on a December 2015 survey of CA Technologies Identity and Access Management customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“We have been using a version of IAM since 2002 and have used it in over 350 applications.”

Challenges

  • Agrees that “enabling the business” for IAM spend is very significant.

Use Case

  • Is leveraging CA IAM to support their digital transformation efforts.
  • Accesses more than 20 applications with CA IAM.

Results

  • Is able to bring new applications to market 20-29% faster with CA IAM.
  • Agrees that they have improved engagement with their customers with CA security solutions.
  • Reports that CA IAM solutions have significantly improved customer retention.
  • agrees that CA IAM has enabled them to deliver new services, thus increasing revenue.
  • Reports that CA IAM solutions have increased their revenue by 20-30% by enabling them to deliver new services.
  • Has improved employee productivity by 20-30% with CA IAM solutions.

Case Study: Medtronic

Introduction

This case study of Medtronic, Inc. is based on a December 2015 survey of CA Technologies Identity and Access Management customers by TechValidate, a 3rd-party research service.

Challenges

  • Agrees that “enabling the business” for IAM spend is extremely significant.

Use Case

  • Is leveraging CA IAM to support their digital transformation efforts.
  • Accesses > 20 applications with CA IAM.

Results

  • Is able to bring new applications to market 10-19% faster with CA IAM.
  • Agrees that they have improved engagement with their customers with CA security solutions.
  • Reports that CA IAM solutions have improved customer retention.
  • Agrees that CA IAM has enabled them to deliver new services, thus increasing revenue.

Case Study: Telecom Italia

Introduction

This case study of TELECOM ITALIA is based on a December 2015 survey of CA Technologies Identity and Access Management customers by TechValidate, a 3rd-party research service.

“The solutions enable access monitoring easily and immediately.”

Challenges

  • Agrees that “enabling the business” for IAM spend is very significant.

Use Case

  • Is leveraging CA IAM to support their digital transformation efforts.
  • Accesses > 20 applications with CA IAM.

Results

  • Is able to bring new applications to market 10-19% faster with CA IAM.
  • Agrees that they have improved engagement with their customers with CA security solutions.
  • Reports that CA IAM solutions have improved customer retention.
  • Agrees that CA IAM has enabled them to deliver new services, thus increasing revenue.
  • Reports that CA IAM solutions have increased their revenue by 11-19% by enabling them to deliver new services.

Case Study: Everence Financial

Introduction

This case study of Everence Financial is based on a December 2015 survey of CA Technologies Identity and Access Management customers by TechValidate, a 3rd-party research service.

“CA Single Sign-On (formally SiteMinder) has significantly simplified securing our environment.”

Challenges

  • Agrees that “enabling the business” for IAM spend is very significant.

Use Case

  • Is leveraging CA IAM to support their digital transformation efforts.
  • Accesses up to 9 applications with CA IAM.

Results

  • Is able to bring new applications to market 20-29% faster with CA IAM.
  • Agrees that they have improved engagement with their customers with CA security solutions.
  • Reports that CA IAM solutions have improved customer retention.
  • Agrees that CA IAM has enabled them to deliver new services, thus increasing revenue.
  • Reports that CA IAM solutions have increased their revenue by 0-10% by enabling them to deliver new services.
  • Has improved employee productivity by Up to 10% with CA IAM solutions.

Case Study: Global 500 Automotive & Transport Company

Introduction

This case study of a Global 500 automotive & transport company is based on a January 2015 survey of CA Technologies Identity Management customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“CA provides a one stop shop for stability and reliability.”

Challenges

  • Adopted CA Security Solutions to address the following challenges:
    • Improve security for apps and data
    • Meet compliance requirements
    • Protect against breaches
    • Support business initiatives

Use Case

  • Deployed the following solutions:
    • CA Single Sign-On (SiteMinder)
    • CA Identity Management (Identity Manager)
  • Feels CA Security Solutions are differentiated from other solutions.

Results

  • Rated CA Security Solutions’ impact on the following capabilities:
    • reduce IT costs: significant
    • improve security for apps and data: very significant
    • meet compliance requirements: very significant
    • protect against breaches: very significant
    • support business initiatives: very significant
  • Rates CA Security Solutions in the following areas:
    • reliability: very good
    • scalability: very good
    • depth of functionality: very good
    • ease of administration: very good
    • integration w/ apps & component: very good
    • Would recommend CA Security Solutions to other companies with similar business needs.

Case Study: Tech Mahindra Ltd.

Introduction

This case study of Tech Mahindra Ltd. is based on a January 2015 survey of CA Technologies Identity Management customers by TechValidate, a 3rd-party research service.

“One of the CA solutions we are implementing is an IT Service provider in Denmark. Staying alert & prepared for the internal security breaches is very critical for the IT service provider as they are hosting the solutions of many customers in their premise. The business needs to showcase these capabilities so that they can take this as new business opportunities from the customers.”

“CA Privileged Identity Manager has a large portfolio of features that clearly make them the industry leader. We can use the single product to achieve multiple security requirements that the customer has.”

Challenges

  • Adopted CA Security Solutions to address the following challenges:
    • Reduce IT costs
    • Improve security for apps and data
    • Control privileged users
    • Meet compliance requirements
    • Protect against breaches
    • Support business initiatives

Use Case

  • Deployed the following solutions:
    • CA Single Sign-On (SiteMinder)
    • CA Identity Management (Identity Manager)
    • CA Identity Governance (Identity Governance)
    • CA Privileged Identity Manager (ControlMinder)
  • Feels CA Security Solutions are very differentiated from other solutions.

Results

  • Rated CA Security Solutions’ impact on the following capabilities:
    • reduce IT costs: very significant
    • improve security for apps and data: very significant
    • meet compliance requirements: extremely significant
    • protect against breaches: extremely significant
    • support business initiatives: very significant
  • Rates CA Security Solutions in the following areas:
    • reliability: very good
    • scalability: very good
    • depth of functionality: very good
    • ease of administration: good
    • integration w/ apps & component: very good
  • Would recommend CA Security Solutions to other companies with similar business needs.

Case Study: Medium Enterprise Telecommunications Services Company

Introduction

This case study of a medium enterprise telecommunications services company is based on a January 2015 survey of CA Technologies Identity Management customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“CA Identity Manager helped us reduce administrative overhead and stay within compliance. This freed resources for other projects and initiatives.”

Challenges

  • Adopted CA Security Solutions to address the following challenges:
    • Reduce IT costs
    • Improve security for apps and data
    • Meet compliance requirements

Use Case

  • Deployed the following solutions:
    • CA Identity Management (Identity Manager)
  • Feels CA Security Solutions are very differentiated from other solutions.

Results

  • Rates CA Security Solutions’ impact on the following capabilities:
    • Reduce IT costs: significant
    • Improve security for apps and : significant
    • Meet compliance requirements: very significant
    • Protect against breaches: very significant
    • Support business initiatives: very significant
  • Rates CA Security Solutions in the following areas:
    • Reliability: excellent
    • Scalability: very good
    • Depth of functionality : very good
    • Ease of administration: good
  • More satisfied with CA Security Solutions than with IAM solutions from other vendors deployed in their environment.
  • Would recommend CA Security Solutions to other companies with similar business needs.

Case Study: Large Enterprise Insurance Company

Introduction

This case study of a large enterprise insurance company is based on a February 2014 survey of CA Technologies IdentityMinder customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“We primarily use CA Identity Manager to provision users to multiple endpoints at one time. We also use it as a password synchronization agent for those endpoints. We are looking to include self service access requests in the future.”

Challenges

  • Purchased CA Identity Manager to solve the following business and security needs:
    • Automate provisioning processes for on-premise applications
    • Reduce costs of forgotten passwords
    • Simplify internal business processes around accessing apps

Use Case

  • Protects 10,000+ end users with CA Identity Manager.
  • Uses CA Identity Manager for the following purposes:
    • Provision employees to apps & services
    • Provide password management and user self-service

Results

  • Can provision users to new applications/services 10-15% faster with CA Identity Manager compared to manual processes and home-grown technologies.
  • Reduced administrative-related costs by 10-15% with CA Identity Manager vs. managing access to applications on an individual basis.
  • Ranked the impact of CA Identity Manager in achieving the following benefits:
    • Reduced IT costs: significantly
    • Reduced security risks: significantly
  • Finds the benefit or cost reduction of operating a single infrastructure to manage user access to applications to be significant compared to implementing separate solutions for each method.
  • Rated the following CA Identity Manager features:
    • Scalability/reliability: very good
    • Platform support/connectors: good
    • Integration w/CA IAM Products: very good
    • Ease of administration: good
    • Depth of functionality: very good

Case Study: Large Enterprise Computer Services Company

Introduction

This case study of a large enterprise computer services company is based on a February 2014 survey of CA Technologies IdentityMinder customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

“Identity Manager provides centralized management for enterprise identities both for in-house and cloud applications and systems. It has provided good integration between identity and access management products.”

Challenges

  • Purchased CA Identity Manager to solve the following business and security needs:
    • Automate provisioning processes for on-premise applications
    • Automate provisioning processes to SaaS applications
    • Reduce costs of forgotten passwords
    • Permit self-service access request for IT resources
    • Simplify internal business processes around accessing apps
    • Create a business friendly user interface for identity-related tasks such as password reset & access request

Use Case

  • Protects 20,001 to 50,000 end users with CA Identity Manager.
  • Uses CA Identity Manager for the following purposes:
    • Provision employees to apps & services
    • Provision partners & customers to web applications
    • Provide password management and user self-service
    • Allow for self-service access requests
  • Plans to use CA Identity Manager in the following ways in 2014:
    • Provision users to on-premise apps
    • Provision users to SaaS services
    • Increase support for mobile users and mobile apps
    • Provide self-service access request shopping cart
    • Ensure identity proofing

Results

  • Can provision users to new applications/services 25-50% faster with CA Identity Manager compared to manual processes and home-grown technologies.
  • Reduced administrative-related costs by 25-50% with CA Identity Manager vs. managing access to applications on an individual basis.
  • Ranked the impact of CA Identity Manager in achieving the following benefits:
    • improved user productivity: significantly
    • met compliance regulations: significantly
    • supported mobile users: significantly
    • reduced IT costs: very significantly
    • reduced security risks: very significantly
  • Finds the benefit or cost reduction of operating a single infrastructure to manage user access to applications to be very significant compared to implementing separate solutions for each method.
  • Rated the following CA Identity Manager features:
    • scalability/reliability: good
    • platform support/connectors: very good
    • integration w/CA IAM Products: very good
    • ease of administration : very good
    • depth of functionality : very good



More Research on CA Identity Management