Simeio Partners with CA Technologies to Bolster its IAM Services
FREMONT, CA: Simeio Solutions, a company specializing in enterprise Identity and Access Management (IAM) services announces its partnership with CA technologies to provide end-to-end solutions for corporate resources. With an aim to leverage the IAM software with CA technologies’ association, Simeio launches its new Identity-as-a-Service (IDaaS) suite.
Simeio’s IDaas comes as an innovative tech-product to curtail unneeded investments and complex procedures for building and maintaining IAM infrastructures. Coupled with the IAM technology of CA, Simeio lends an enormous support to its customers in tracking the business focused IAM implementation—with a considerable reduction in the time taken to deploy the suite.
Cutting the costs involved in hardware maintenance and upgrade, IDaaS integrates the identity suite, SSO, Advanced Authentication and Privileged Access Management of CA. It provides automated workflows for a variety of user specific requirements such as Identity administration, Access request, Role and Access governance and, Identity risk and intelligence. The suite has globally been deployed by over two million entities, reports the company’s press release. “Simeio’s IDaaS focuses on the long term business partnership of both the companies to provide services and infrastructure for maximizing online transactions” says Elaine Cheng, CIO of CFA institute.
The users of Simeio IDaaS will also have access to the multiple capabilities of Simeio Identity Intelligence Centre (IIC). It is a combination of proprietary IAM technologies and contemporary solutions designed to monitor and support complex, multi vendor IAM and security infrastructures. Furthermore, it leverages these infrastructures to deliver actionable business intelligence. IIC fills a critical gap by providing a single and consistent view of the IAM systems, irrespective of the environments it is deployed in—multi vendor on-premise environments, cloud or a blend of both. Simeio IIC is capable of anticipating disruptive events such as server failures and other technical glitches related to identity. For example IIC can detect ghost accounts in multi vendor environments, which are generally difficult to track.
By Michael Cockrill, CIO, State of Washington
By Brett Shockley, SVP & CIO, Avaya
By Sven Gerjets, SVP-IT, DIRECTV
By Steve Moyer, VP of Storage Software Engineering, Micron...
By Michelle R. McKenna-Doyle, SVP and CIO, National Football...
By Patrick Hale, CIO, VITAS Healthcare
By Roman Trakhtenberg, CEO, Luxoft
By Julia Davis, SVP, CIO, Aflac
By Chris Westlake, VP & GM of Service,RK
By Pauly Comtois, VP DevOps, Hearst Business Media
By Yanni Charalambous, VP & CIO, Occidental Petroleum...
By Bob Brown, VP-Production & Operations, ONE World Sports
By Arthur Hu, SVP & CIO, Lenovo
By Ron Guerrier, CIO, Farmers Insurance Group, Inc.
By Scott Cardenas, CIO, City and County of Denver
By Kevin McCarron, Vice President Collaboration, Carousel...
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Christopher Frenz, AVP of Information Security,...
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment