Simeio Partners with CA Technologies to Bolster its IAM Services
FREMONT, CA: Simeio Solutions, a company specializing in enterprise Identity and Access Management (IAM) services announces its partnership with CA technologies to provide end-to-end solutions for corporate resources. With an aim to leverage the IAM software with CA technologies’ association, Simeio launches its new Identity-as-a-Service (IDaaS) suite.
Simeio’s IDaas comes as an innovative tech-product to curtail unneeded investments and complex procedures for building and maintaining IAM infrastructures. Coupled with the IAM technology of CA, Simeio lends an enormous support to its customers in tracking the business focused IAM implementation—with a considerable reduction in the time taken to deploy the suite.
Cutting the costs involved in hardware maintenance and upgrade, IDaaS integrates the identity suite, SSO, Advanced Authentication and Privileged Access Management of CA. It provides automated workflows for a variety of user specific requirements such as Identity administration, Access request, Role and Access governance and, Identity risk and intelligence. The suite has globally been deployed by over two million entities, reports the company’s press release. “Simeio’s IDaaS focuses on the long term business partnership of both the companies to provide services and infrastructure for maximizing online transactions” says Elaine Cheng, CIO of CFA institute.
The users of Simeio IDaaS will also have access to the multiple capabilities of Simeio Identity Intelligence Centre (IIC). It is a combination of proprietary IAM technologies and contemporary solutions designed to monitor and support complex, multi vendor IAM and security infrastructures. Furthermore, it leverages these infrastructures to deliver actionable business intelligence. IIC fills a critical gap by providing a single and consistent view of the IAM systems, irrespective of the environments it is deployed in—multi vendor on-premise environments, cloud or a blend of both. Simeio IIC is capable of anticipating disruptive events such as server failures and other technical glitches related to identity. For example IIC can detect ghost accounts in multi vendor environments, which are generally difficult to track.
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Dave Doyle, CIO & SVP, IT, Regal Entertainment Group
By Sergey Cherkasov, CIO, PhosAgro
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Thomas Musgrave, EVP & CIO, AmeriCold Logistics
By Vin Sharma, Director, Strategic Planning & Marketing, Big...
By Federico Flórez, Chief Information & Innovation Officer,...
By Barbara Adams, VP, Innovative Technology Solutions, Texas...
By John Mason, CIO, Bottomline Technologies
By Jamshid Khazenie, CTO, USA Today Network / Gannett
By Miguel Gamino, CIO & Executive Director-Department of...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By John Landwehr, Public Sector CTO, Adobe
By Aaron Gette, CIO, The Bay Club Company
By Denise Zabawski, CIO, Nationwide Children's Hospital
By Amit Bahree, Executive, Global Technology and Innovation,...