Software firm CA Technologies has introduced CA Access Control for Virtual Environments, a new offering that extends CA Technologies identity and access management (IAM) security expertise, and complements and protects VMware virtual environments.

With CA Access Control for Virtual Environments customers can confidently virtualise critical applications by addressing security and compliance concerns, and helping control privileged user access to the virtual environment, said the comapany.

CA Access Control for Virtual Environments helps customers to achieve compliance for their virtual data center through privileged user management for the hypervisor and guest virtual machines; gain visibility and control over virtual environments with activity logging and privileged user password vaulting;

In addition the CA Access Control for Virtual Environments helps customers in automating security operations; reduce security costs by applying security controls according to pre-set policies; to expedite adoption of virtualisation technology for critical applications by improving security controls; and to create a secure multi-tenant environment by isolating virtual machines through network zoning.

As a part of a collaborative alliance between CA Technologies and HyTrust, CA Access Control for Virtual Environments includes technology from HyTrust.

By combining CA Technologies user access controls for virtual machines with the hypervisor security controls from HyTrust, customers can add increased security to the virtual environment and protect against unauthorised access and actions by IT administrators.

CA Technologies Security business general manager Mike Denning said the security and control of virtual machines that can be rapidly produced is a contributing factor to the concept of ‘virtual stall.’ Security is commonly cited as a reason why virtualisation is not used more pervasively in a production environment for critical applications.

"Now, with CA Access Control for Virtual Environments in our identity and access management security portfolio, we can deliver the technology needed to automate end-to-end security of the data center – from the mainframe and physical servers to virtual environments," said Denning.