=?ISO-8859-1?Q?CA_Technologies_Offers_RSA_Secu?= =?ISO-8859-1?Q?rID=AE_Customers_Opportunity_to_T?= =?ISO-8859-1?Q?rade_their_RSA_Tokens_for_CA_Ar?= =?ISO-8859-1?Q?cotID_Secure_Software_Credential?=

Author
SySAdmin
Posted
March 29, 2011
Views
1330

Page All:

Page 1
CA Technologies Offers RSA SecurID® Customers Opportunity to Trade their RSA Tokens for CA ArcotID Secure Software Credential

RSA Token Trade-In Program Gives RSA Customers a Secure, More Flexible and Convenient Option for Advanced Authentication

ISLANDIA, N.Y., March 29, 2011 /PRNewswire/ -- CA Technologies (Nasdaq: CA) is offering all RSA SecurID® token customers an opportunity to trade their RSA tokens for CA ArcotID secure software credentials in a one-for-one swap.

For each RSA SecurID token, CA Technologies will provide a three-year enterprise license for the CA ArcotID software credential, including the CA Arcot WebFort authentication server. The only cost to the customer making the switch is maintenance. The program is in effect until Sept. 30, 2011.

"Hardware tokens are a security mechanism whose time has expired. The inconvenience of carrying an additional key fob or device for today's increasingly mobile workforce is not practical, and the difficulty of remediation in case of a hardware token breach can be overwhelming," said Ram Varadarajan, general manager for CA Arcot Security Solutions, CA Technologies.  "For the past 13 years, the Arcot technology has delivered advanced authentication using secure software credentials as a proven alternative to hardware tokens. CA ArcotID, with nearly 30 million users, offers increased flexibility and simplicity of deployment, without sacrificing security."

There are significant advantages to using the CA ArcotID secure software credential versus standalone hardware tokens for advanced authentication:

    --  Simple deployment and management - The CA ArcotID software credential
        can be easily and securely downloaded and deployed using patented
        cryptographic camouflage technology. This is more efficient than a
        hardware token which must be manufactured, physically distributed to the
        customer site, and then delivered to the end-user. In addition, in the
        event of a security breach, a software-based authentication approach
        provides a speed advantage by allowing organizations to immediately
        reset the credential. Users would then self-provision a new, and
        potentially larger, private key the next time they log in. If a hardware
        token is compromised, the situation could require deploying a new token,
        which would require the vendor's assistance and could be a costly,
        time-consuming and inefficient process.

    --  Flexibility - The CA ArcotID software credential works across multiple
        applications and environments, and it scales to support millions of
        users. Organizations also have the flexibility to store the CA ArcotID
        software credential on any supported client device, such as a PC,
        notebook, tablet device or smartphone.

    --  Uncompromised Security - The CA ArcotID software credential combines a
        standard x.509v3 digital certificate with patented cryptographic
        camouflage private key concealment technology to allow users to
        authenticate securely. In addition, each organization creates, manages
        and stores its own private keys for all its CA ArcotID users. CA
        Technologies holds no information about any individual software
        credentials, thereby reducing the risk of compromising customer data.

Customers who take advantage of this offer can benefit from a Rapid Implementation Service that includes basic workflows and templates for downloading the credential and server, and setting up a typical configuration. If a customer requires a more customized implementation, additional services are available from CA Technologies or its partners.

CA Technologies will host a Webcast, "SecurID® Breach: Restoring Strong Authentication for Your Applications," on Wednesday, March 30 at 1 p.m. ET. Jim Reno, principal security architect, CA Technologies, will discuss authentication best practices and ways to help reduce risk and secure your authentication process. Register for the Webcast at http://www.ca.com/us/lpg/forms/na/sre/26033_29603.aspx.

For more information on the RSA Token Trade-In Program, please visit http://www.ca.com/replaceSecurID.

(Logo:  http://photos.prnewswire.com/prnh/20100516/NY05617LOGO)

About CA Technologies

CA Technologies (Nasdaq: CA) is an IT management software and solutions company with expertise across all IT environments - from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. For additional information, visit CA Technologies at http://www.ca.com.

Follow CA Technologies

    --  Twitter
    --  Social Media Page
    --  Press Releases
    --  Podcasts

Legal Notices

Copyright © 2011 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Press Contact

Leanne AgurkisCA TechnologiesMobile: (407) 620-2136Office: (386) 738-1912Leanne.Agurkis@ca.com

SOURCE  CA Technologies

Photo:http://photos.prnewswire.com/prnh/20100516/NY05617LOGO
http://photoarchive.ap.org/
CA Technologies

Web Site: http://ca.com

Title

Medium Image View Large