CA Technologies CA Identity Manager Now Available on Salesforce.com AppExchange 2, Salesforce.com’s Marketplace for Business Apps

Customers can now deploy CA Identity Manager to Provision Employees and Partners to Cloud Applications Deployed on Force.com

ISV momentum for Force.com builds as Dreamforce 2010 approaches

Islandia, NY, Nov. 30, 2010 – CA Technologies today announced the availability of CA Identity Manager on AppExchange 2. With CA Identity Manager, organizations can automate identity management functions, such as role-based user provisioning and de-provisioning, and self-service access requests, using a single, automated system to manage identities for Force.com cloud applications, as well as existing in-house applications.

In addition, CA Technologies will be attending Dreamforce 2010, the cloud computing event hosted by salesforce.com at Moscone Convention Center in San Francisco, December 6 – 9. Demos and more information will be available at the CA Technologies booth (#619).

Regardless of whether an application resides within the enterprise or in the cloud, managing the identities and controlling the access of users to key resources is a critical function for IT organizations that face increasing pressure to cut operating costs, while still enabling compliance and productivity.

“Our focus is to deliver a single identity management system to manage identities for applications no matter where they reside,” said Lina Liberti, vice president, Security, CA Technologies. “Partnering with salesforce.com and leveraging their API to extend CA Identity Manager’s capabilities give customers the added confidence to deploy cloud applications on Force.com, knowing they can securely manage the users of those applications and meet compliance demands.”

“Customers are experiencing massive success with cloud computing and want to extend its benefits to every employee,” said Kendall Collins, chief marketing officer, salesforce.com. “Our work with CA Technologies continues to accelerate adoption by giving customers an efficient way to manage user access and identity in the cloud.”

Built to support the many applications built on Force.com, the enterprise cloud computing platform, CA Identity Manager is immediately available on AppExchange 2 at http://www.salesforce.com/appexchange/.

About the Force.com Platform and AppExchange 2

Force.com is the only proven enterprise platform for building and running business applications in the cloud. The Force.com platform powers the Salesforce CRM applications, more than 1,000 ISV partner applications like those from CA Technologies, FinancialForce.com and Fujitsu, and 185,000 custom applications used by salesforce.com’s 87,200 customers such as Japan Post, Kaiser Permanente, KONE and Sprint Nextel. Force.com also enables developers to make any enterprise app social by leveraging the social collaboration components including profiles, status updates, and real-time feeds available with Chatter.

Applications built on the Force.com platform can be easily distributed to the entire cloud computing community through the salesforce.com AppExchange 2 marketplace http://www.salesforce.com/appexchange/, now featuring the ChatterExchange.

About CA Technologies

CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments – from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. For additional information, visit CA Technologies at www.ca.com.

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Contributors

Cloud Infographic – Wearable Tech And Preventative Healthcare

Cloud Infographic – Wearable Tech And Preventative Healthcare

Wearable Tech And Preventative Healthcare There are so many exciting new opportunities available to utilize wearable technology in the future.  Areas such as nanotechnology disease monitoring, crowdfunding to wearable accessories are some excellent examples of the potential. Estimates vary, but appear to suggest that the market will produce between $14-50 Billion over the next few years. Included below

Ten Tips For Successful Business Intelligence Implementation

Ten Tips For Successful Business Intelligence Implementation

Ten Tips for Successful Business Intelligence Implementation The cost of Business Intelligence (BI) software goes far beyond the purchase price. Time spent researching, implementing, and maintaining your BI investment can snowball quickly and mistakes are often expensive. Your time is valuable – save it by learning from other businesses’ experiences. We’ve compiled the top ten

Knots And Cloud Service Providers

Knots And Cloud Service Providers

How Do These Two Compare? In Boy Scouts, I learned how to tie knots. The quickest knot you can tie is the slipknot. It’s very effective for connecting one thing to another via the rope you have. It was used in setting up tents, mooring boats to docks temporarily and lifting your food up into

Aggregated News

Popular News Sources

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups

Storage Considerations for SharePoint Backups Wednesday, October 29, 2014 @ 9:00 am/12:00pm ET. Backup and Restore of a SharePoint environment can be a complex endeavor as the product consists of multiple components running at various tiers, each with their own backup and restore requirements. In addition, SharePoint documents are stored as Binary Large Objects (BLOBs) in

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

OpenDNS Deployment Leads to Twenty-Fold Decrease in Malware Infections at Hamamatsu

Decreases in Malware Infections at Hamamatsu OpenDNS, a leading provider of cloud-delivered security, today announced that it has enabled Hamamatsu, a Japanese manufacturer of optical sensor technologies, to virtually eliminate malware infections across its U.S. Read the source article at Finance News About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

IBM and Microsoft – What Are They Doing With The Hybrid Cloud?

What Are They Doing With The Hybrid Cloud? “Microsoft is committed to helping enterprise customers realize the tremendous benefits of cloud computing across their own systems, partner clouds and Microsoft Azure,” said Scott Guthrie, executive vice president,Cloud and Enterprise, Microsoft. “With this … Read the source article at CNNMoney About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized