Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Identity & Access

CA Technologies to Acquire Identity Management Firm Xceedium

Enterprise technology provider CA Technologies said on Tuesday that it has signed a definitive agreement to acquire network security software maker Xceedium for an undisclosed sum.

Enterprise technology provider CA Technologies said on Tuesday that it has signed a definitive agreement to acquire network security software maker Xceedium for an undisclosed sum.

Xceedium’s Xsuite privileged identity management solution for hybrid IT environments helps address security and compliance needs, such as centralized shared account management, administrative session recording for audit and incident forensics, and command filtering to limit the scope of administrator activity and network access.

Xsuite can be deployed as a physical or virtual appliance or as an Amazon machine image, and helps customers comply with security and privacy mandates, such as PCI DSS, FISMA, HIPAA, and NERC CIP.

According to CA Technologies, Xsuite complements CA Privileged Identity Manager’s resource- or host-based access control approach, which focuses on controlling access to the server operating system and limits the scope for administrators.

Founded in 2000, Xceedium has offices in Jersey City, NJ, and Ottawa, Canada.

Xceedium competitors include Centrify, NetIQ, CyberArk, Okta, among others.

Terms of the agreement were not disclosed, and the transaction is expected to close within the quarter.

Advertisement. Scroll to continue reading.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.