CA Unveils eTrust 20/20 Software Subscription Product

Computer Associates International

Speaking here at CA World, CA President and CEO Sanjay Kumar said the new product for the first time provides the ability to monitor physical and data access with an interface that provides a 3-D satellite view of an employee's physical access to facilities and software access to data. The product also marks the first time CA has released a software-only subscription product, said Kumar. ETrust 20/20 detects abnormal patterns of access to both physical facilities and corporate data, alerting administrators to physical or electronic security breaches, CA said.

Kumar said eTrust 20/20 solves the perennial "disconnect" between physical security access to certain facilities, including an airport or government agencies, and software access to corporate databases. "There is no other technology in the world that brings [physical and corporate data access together," he said. "We don't believe anybody in the world has done this."

Kumar demonstrated a working prototype of the product, which is currently being beta-tested by CA. It will be tested at customer sites later this summer and released later this year, said Kumar. The price of the product, which is based on how many employees and software data feeds are being monitored, will range from tens of thousands of dollars to millions of dollars annually, Kumar said.

CA solution providers will have the opportunity to be certified and sell the product in conjunction with CA, said Kumar. The new offering will come with an on-site CA engineer for the first 90 days who will help customize the product for clients and then be available later for five days per month as part of the subscription contract, CA said.

id
unit-1659132512259
type
Sponsored post

CA has applied for a patent on the product, which uses CA Neugent neural software agent technology and CA Aion, a rules-based artificial intelligence technology. The product collects log data on access to physical facilities and electronic access to e-mail and specific intranets or databases, pulls that data together based on characteristics of employees and then applies artificial intelligence to detect "abnormal behavior," CA said.

Kumar said the product would prevent security administrators from having to rummage through "gobs" of electronic logs to detect "abnormal" access to facilities or data. "This allows businesspeople and security administrators to look at these things extremely visually and to be able to pinpoint abnormal behavior," he said.