Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

CA Technologies to Acquire Identity Management Firm Xceedium

Enterprise technology provider CA Technologies said on Tuesday that it has signed a definitive agreement to acquire network security software maker Xceedium for an undisclosed sum.

Enterprise technology provider CA Technologies said on Tuesday that it has signed a definitive agreement to acquire network security software maker Xceedium for an undisclosed sum.

Xceedium’s Xsuite privileged identity management solution for hybrid IT environments helps address security and compliance needs, such as centralized shared account management, administrative session recording for audit and incident forensics, and command filtering to limit the scope of administrator activity and network access.

Xsuite can be deployed as a physical or virtual appliance or as an Amazon machine image, and helps customers comply with security and privacy mandates, such as PCI DSS, FISMA, HIPAA, and NERC CIP.

According to CA Technologies, Xsuite complements CA Privileged Identity Manager’s resource- or host-based access control approach, which focuses on controlling access to the server operating system and limits the scope for administrators.

Founded in 2000, Xceedium has offices in Jersey City, NJ, and Ottawa, Canada.

Xceedium competitors include Centrify, NetIQ, CyberArk, Okta, among others.

Terms of the agreement were not disclosed, and the transaction is expected to close within the quarter.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...

Funding/M&A

The private equity firm merges the newly acquired ForgeRock with Ping Identity, combining two of the biggest names in enterprise IAM market.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...