Welcome!

Cloud Security Authors: Yeshim Deniz, Zakia Bouachraoui, Liz McMillan, Elizabeth White, Ravi Rajamiyer

News Feed Item

CIGNA Selects CA Access Control to Support Compliance, Security and Operational Efficiency

CA Access Control Helps Secure Personal Health Information and Maintain Separation of Duties for Administrators and Privileged Users

ISLANDIA, N.Y., Nov. 11 /PRNewswire-FirstCall/ -- CA, Inc. (Nasdaq: CA) today announced that CIGNA, a global health services company, has chosen CA Access Control to help secure personal health information and corporate data on CIGNA's host systems, including Microsoft® Windows®, UNIX® and Linux® platforms. CA Access Control will also help support CIGNA compliance with regulations such as those promulgated under the Health Insurance Portability and Accountability Act.

"As we execute on our security goals, we continue to streamline security processes, particularly in how we manage our user privileges and access on both physical and virtual servers across all distributed platforms," said Craig Shumard, Chief Information Security Officer, CIGNA. "By adding Privileged User Password Management capability to CA Access Control for individuals with elevated system-level privileges, we expect to improve our audit process and the security of our data."

Use of CA Access Control will help CIGNA improve its ability to:

  • Protect personal health information and private data from being exposed either accidentally or maliciously. CA Access Control helps control, manage and report privileged user access to physical or virtual servers across UNIX, Microsoft Windows and Linux platforms. This includes controlling access and system-level entitlements of privileged or root users, such as network administrators. By reducing and delegating the privileges associated with administrator accounts, CA Access Control adds a layer of granularity that assigns and enforces permissions based on specific roles. This helps ensure a separation of duties and accountability critical to security and compliance.

  • Have a simplified capability to grant temporary root/administrator privileges for select support functional roles. This will also assist when needing to grant emergency privilege access.

"CIGNA has been at the forefront of managing privileged users, their passwords and their access rights--an internal threat for all types of businesses and institutions," said Dave Hansen, corporate senior vice president and general manager, CA Security Management. "CA has been in the host access management business for more than 10 years and is proud to support leaders such as CIGNA with technology to control privileged user access across physical and virtual environments and multiple platforms."

About CIGNA

CIGNA (NYSE: CI), a global health service company, is dedicated to helping people improve their health, well-being and security. CIGNA Corporation's operating subsidiaries provide an integrated suite of medical, dental, behavioral health, pharmacy and vision care benefits, as well as group life, accident and disability insurance, to approximately 46 million people throughout the United States and around the world. To learn more about CIGNA visit www.CIGNA.com.

(Logo: http://www.newscom.com/cgi-bin/prnh/20090402/NYTH500LOGO)

About CA

CA (Nasdaq: CA), the world's leading independent IT management software company, helps customers optimize IT for better business results. CA's Enterprise IT Management solutions for mainframe and distributed computing enable Lean IT--empowering organizations to more effectively govern, manage and secure their IT operations. For more information, visit www.ca.com.

Connect with CA

Legal Notices

Copyright © 2009 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and other countries. UNIX is a registered trademark of The Open Group in the United States and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

    Press Contacts

    Leanne Agurkis
    CA, Inc.
    Office: 386-738-1912
    Mobile: 407-620-2136
    [email protected]

SOURCE CA

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...