CA Fortifies ID Management Suite

With its acquisition of eTrust Cleanup, Computer Associates is attacking the problem of eradicating obsolete and inactive user IDs that pose a security threat.

Computer Associates International Inc. is addressing a serious security problem that is difficult to solve without automated tools with the acquisition this week of eTrust Cleanup, a mainframe identity management system from InfoSec Inc.

The eTrust package is designed to automatically discover and remove unused, obsolete or rogue user identities that provide an opportunity for hackers to penetrate corporate or government computer systems.

Obsolete or rogue user IDs "are a huge problem because they are difficult to root out and delete," said Chris Christiansen, a security products and infrastructure analyst with International Data Corp. in Framingham, Mass.

"They represent a huge potential liability in terms of security," because many companies dont have effective polices or automated procedures in place for tracking user ID status.

Even when there were procedures in place it was a tedious process that would greatly benefit from automation, he said.

But the security vulnerability was a more important issue than the administrative overhead involved in keeping track of user ID status, Christiansen said.

Making sure that obsolete logons are totally purged from computer systems has become a major issue for government-mandated regulatory compliance, said Ron Moritz, chief security strategist with CA in Islandia, N.Y.

/zimages/3/28571.gifOblix CEO and president Gordon Eubanks spoke recently about the importance of implementing a comprehensive identity management system. Click here to read more.

Financial services companies regulated under the Gramm-Leach-Bliley Act, corporations regulated under the Sarbanes-Oxley Act or the Health Insurance Portability and Accountability Act all have to show that they are fully safeguarding customer information, Moritz said.

These companies have to show through audits that that they are in compliance with the information security provisions of these laws, Moritz said. But many companies would still be hard pressed to do so, he suggested.

/zimages/3/28571.gifTo read about the Liberty Alliances efforts to create a global standard for computer system identity management, click here.

"Some companies have tried to build their own provisioning and de-provisioning applications," Moritz said.

Next Page: Keeping track of user IDs.

John Pallatto

John Pallatto

John Pallatto has been editor in chief of QuinStreet Inc.'s since October 2012. He has more than 40 years of experience as a professional journalist working at a daily newspaper and...