CA snags Arcot: Another step for cloud identity and security

Not everything in the news this week is about VMworld.

Not everything in the news this week is about VMworld.  CA Technologies pulled in an interesting new security-related acquisition today, one that brings in solutions focused on advanced authentication and on-line fraud detection. The idea is to leverage these capabilities to help solve some of the issues in cloud computing related to one of the key concepts that needs solving:  managing identity.

As those who watch this space know, security has been on the minds of folks in cloud computing since the term appeared, with the topic topping the list of cloud worries in survey after survey.

The company being acquired is Arcot Systems, Inc., a 165-person firm based in Sunnyvale, Calif., which has a pretty healthy business in this space.

Arcot will team with CA Technologies’ security group’s and on their existing focus on Identity and Access Management (what the folks in the know on this stuff call, well, IAM).  In fact, the CA security folks tell me they think this move does quite a bit to accelerate CA Technologies’ IAM cloud service offering. 

Arcot has quite a bit of street cred, it seems.  Currently, their solutions (which can be on-premise or cloud-based) are used to prevent fraudulent transactions for about 1 million credit card transactions a day.

“Identity is a critical area for security whether you’re talking about in-house or the cloud,” noted Arcot’s president & CEO Ram Varadarajan in the press release.  They boast 120 million identities verified by their solutions today.  The company has been around since 1997, has 35 patents awarded or pending, and co-invented the 3-D Secure protocol for online payment security with a little company you may have heard of called Visa.

Not too shabby.  Especially on the heels of other security-related M&A activity, including Intel gobbling up McAfee, which also mentioned the cloud angle.

For more granular details, though, I’ll direct you to folks in the know on this topic.  The CA Technologies cloud security strategy (articulated here) has 3 pieces to it:

  • Enable organizations to extend existing on-premises IAM systems to support cloud applications and services;

  • Provide IAM technology to cloud providers to secure their services – whether public, private or hybrid; and

  • Enable IAM services from the cloud

And, for a bit more detail about this deal in particular, check out today’s press release, Arcot’s website, or Matthew Gardiner’s blog post.

This blog is cross-posted at Data Center Dialog. Do you tweet? Follow Jay on Twitter @jayfry3.

Written by

Jay Fry

Published in

View this topic
  • James Holland

    This is great. Hooray for Disney’s imagineers!


    become a new brand in the share market research with its accurate research. Proven
    itself always right whether market is bull or bear. Last week all paid clients
    booked handsome profit in NIFTY, BANKINIFTY & STOCKS. Now for the coming
    week we expect more correction can come in NIFTY as the IRAQ issue is getting
    more tense, If it happens more then you will see a sharp fall in all world marketNSE BSE, STOCK TIPSbecause as we know all world run on
    crude & most of the crude comes from IRAQ. So be ready for a sharp fall so
    sell will be the best strategy for next week also. Traders can make a sell
    position in NIFTY around 7600-7650 with stoploss 7750 for the target of
    7300-7200.One can also make a sell call NIFTY 50 stocks as per NIFTY levels. You
    can also take our two days free trial to check our accuracy. For further updates
    you can visit our website.



  • king lear

    testing comment functionality, please do not publish this

  • Rachel Macik

    Love the personal pic :)

    • CAHighlight

      Thank you!

  • Plutora Inc

    This is a good case study. 2.3 sec’s off a login transaction is big.

  • Michele Hudnall

    While the analysts were hyping DevOps, I posted the oversight of not including security as part of that discussion as you are highlighting here. Instead of just talking DevOps, it should be DOS (what’s old is new again :-) – DevOpsSec. As a previous AppDev person, it’s the app, who’s using it, why and where rather than the device and having the service available.

    As you rightly point, out Security should be baked into the solution.

    Nice Post and Timely!


    • CAHighlight

      Thank you for your feedback Michele. Agreed – security cannot be overlooked. Appreciate your input!

  • Mitesh

    I would love a printed copy

  • Lars Johansson

    I love the idea of BYOID! This makes me choose if I am almost anonymous (with my Hotmail Nicname) or official with identity from an official organisation. My Identity Provider will attach identity with right level of LoA according to the need of the Service provider.

    • CAHighlight

      Thank you for your comment. BYOID has tangible benefits for end users and relying parties but it also has to be weighed in the balance with potential risks and liability concerns. It will be interesting to see how BYOID plays out in the enterprise.