In addition to supplying the regular security functions-such as an access rule database, an audit log, and administration tools-CA Access Control intercepts the operating system events that are to be protected. Since CA Access Control has to work with many different operating systems, it intercepts events in memory. No changes are made to system files, and the operating system is not modified at all.
| Copyright © 2012 CA. All rights reserved. |
|