CA RCM is based on advanced pattern recognition technology. CA RCM provides a comprehensive set of highly sophisticated solutions to the challenges that organizations face when implementing and maintaining role-based management.
Core Technology
An important innovation of CA RCM lies in the observation that role-based management revolves around patterns of privileges and access. As such, even in an organization where privileges are not currently managed by roles, the actual assignment of privileges roughly follows role-based patterns. Similarly, deviations and exceptions should be detectable when they do not follow same patterns.
CA RCM's technology is designed to uncover the patterns that are hidden in existing sets of privileges. This is not trivial, since the number of excessive privileges may sometimes reach 50% of the total number of privileges. Many users may also be under-privileged or wrongly-privileged. Furthermore, the problem is extremely complex due to the sheer number of user accounts typical of large enterprises. CA RCM combines a set of pattern recognition techniques and other advanced algorithms and applies them to the special challenges of roles management.
Other Technology Components
In addition to this core technology, CA has developed substantial additional technology that is required to deploy a full solution:
| Copyright © 2010 CA. All rights reserved. | Email CA Technologies about this topic |