CA Technologies announced May 16th that CA Privileged Access Manager (PAM) has been approved as a Cybersecurity Tool (CST) and added to the U.S. Department of Defense Information Network (DoDIN) Approved Product List (APL). CA PAM is the only privileged access management solution to simultaneously hold the Federal Information Processing Standard Publication 140-2 (FIPS PUB 140-2) verification for its cryptographic module, while also being listed on the DoDIN APL and the National Information Assurance Partnership’s Product Compliant List (NIAP PCL).
“This certification further validates that CA’s solution can operate at scale in some of the world’s most complex, mission-critical environments, and highlights our ongoing commitment to providing a robust portfolio of solutions that meet the highest level of federal standards.
The DoDIN APL is administered by the Defense Information Systems Agency (DISA) and includes only the products approved for use with DoD agencies’ technology infrastructure. This designation identifies products that have undergone a rigorous testing process conducted by the DoD that assures that mandated levels of cybersecurity and interoperability capabilities are met.
In today’s global marketplace, the need for secure access to privileged accounts is growing. CA PAM provides comprehensive access management to control administrator access and protect resources. By allowing users to centrally manage and unify privileged policies across multiple physical and virtual environments, users can securely access critical IT resources without leaving a footprint on the network—all while monitoring all activity across the entire IT infrastructure.
“This certification further validates that CA’s solution can operate at scale in some of the world’s most complex, mission-critical environments, and highlights our ongoing commitment to providing a robust portfolio of solutions that meet the highest level of federal standards,” said Mordecai Rosen, general manager, Security at CA Technologies. “Digital trust is at the forefront as federal agencies explore new, more efficient ways to engage with constituents and share information, especially as they evolve to embrace the core principles of the modern software factory. We look forward to working with the U.S. federal government to provide them with the security control needed to ensure digital trust.”