Security is a global concern. It affects not only corporate personnel assigned to administer and audit security, but also end users at every level. To ensure that your security policies and procedures remain sound, ensure that all users understand the following: security is a team effort.
CA Top Secret is an important component in the CA family of integrated security solutions, designed to streamline security administration, enable single-point user signon, and provide auditing capabilities.
CA Top Secret offers a unique hierarchical security configuration similar to the organizational structure of your corporate environment. Administrative tools, reporting options and automatic logging capabilities help ensure the integrity and security of your corporate assets.
The purpose of security software is to minimize the risks of accidental or intentional corruption, destruction, or disclosure of data. The integrity of the information kept in the computing environment is essential. CA Top Secret provides that integrity.
Through individual accountability, access permissions, and a comprehensive audit trail, CA Top Secret controls and monitors who can access and change data. Until permissions are issued to control how new data is shared, that data is protected by default.
Additional advanced technology within CA Top Secret provides further assurance of data integrity. Also, CA Top Secret is fully SAF-compliant, providing controlled mechanisms for access to security information.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|