We just raised a $30M Series A: Read our story

CA Privileged Access Manager Server Control [EOL] OverviewUNIXBusinessApplication

What is CA Privileged Access Manager Server Control [EOL]?
CA Access Control provides tools to protect your system in both ways against unauthorized use of computer resources: block unauthorized users from accessing the system and block authorized users from accessing items to which they should not have access. CA Access Control also provides auditing tools that let you trace users' activities to track attempted misuse of the computer system.

CA Privileged Access Manager Server Control [EOL] is also known as CA Access Control, CA Privileged Identity Manager.

Buyer's Guide

Download the Privileged Access Management (PAM) Buyer's Guide including reviews and more. Updated: September 2021

CA Privileged Access Manager Server Control [EOL] Customers
Colruyt Group, Logicalis, TIS Inc.
CA Privileged Access Manager Server Control [EOL] Video

Archived CA Privileged Access Manager Server Control [EOL] Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
it_user558603
Engineer at a manufacturing company with 10,001+ employees
Vendor
I like that the access control on the agent. Installation is difficult.

What is most valuable?

The most valuable features are:

  • The access control on the agent
  • Being able to manage what a user can do
  • The password check-in/check-out process

How has it helped my organization?

It gives us the ability to track who is using what ID and for what purpose.

What needs improvement?

I would like to see some improvements, specifically in terms of some set-up items. We have spoken to CA quite a bit about the ability to have 'always-on', or 'active/active' status options, so if the infrastructure goes down, we don't lose transactions. This is very important for the environment and for the users so we cannot really afford any downtime with the solution. We have had problems with deployment, and we are concerned with the possibility for outages and how they can have a negative impact on the environment.

What do I think about the stability of the solution?

The stability is pretty good, but there is some room for improvement. We've already discussed these areas of improvement with CA. Some of the problems we ran into were with installation, but the agent seems to be stable. Some of the connection with the infrastructure is a little bit difficult to maintain sometimes. Overall, I would say it's pretty solid.

What do I think about the scalability of the solution?

It seems to scale well. Since we are a large enterprise, we will be putting that to the test pretty soon.

How are customer service and technical support?

I have used a lot of technical support and I would say that the technical support folks are very good. They are very proficient, professional, and knowledgeable.

Which solution did I use previously and why did I switch?

We didn’t have a previous solution. This is a brand new thing for us. We knew we needed identity management so we compared several products and this is the one we ended up implementing. I think CyberArk was one of the shortlisted alternatives, but I don't remember the others. In terms of selecting this product, I guess the perception of being ready for enterprise, installation, and operations are probably the main things. We need to perceive that it's going to save us time and provide more security than we already have.

How was the initial setup?

I was involved in the set up and it was not straightforward. It was a difficult installation. As an example, if you don't want to use the standard C:\ drive, it requires a number of workarounds to get it to work on a different drive. The firewall port requirements were not well documented. I've got a pretty long list of things that were challenging. It took us quite a while to install this product to get it to the point where we can repeat it every time.

What other advice do I have?

I would have to warn somebody to basically either have the adequate manpower or plenty of time to deploy it and test it in their labs before they roll it to production. This is necessary because there will probably be some surprises along the way.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user351291
SME Mainframe Security at a financial services firm with 10,001+ employees
Vendor
It works well with our IBM solution, saving us time and costs.

Valuable Features

This is a small thing, but what I find pretty valuable is that default access is denied and you have to apply for and be granted access in order to gain access. This helps us make sure that access is not undeliberately granted.

Improvements to My Organization

We're happy to see it working so well with our IBM solution, saving us time and costs.

Room for Improvement

The manuals for this product used to be good. We could find in one place answers to pretty much every question or situation we had. However, it's now in piece-meal fashion. You have to piece the information together. So the user documentation has become poor.

Deployment Issues

We've had no problems deploying it.

Stability Issues

It's stable. I don’t think we have had any downtime.

Scalability Issues

It’s very good in terms of scalability.

Customer Service and Technical Support

For the most part, technical support is great. There have been times when I haven't gotten the best technician, but that's with all tech support. If I deal with someone who's worked there a long time, the expertise is excellent and I do end up getting great support.

Initial Setup

The initial setup was straightforward as they give you detailed instructions. User documentation is poor, however.

Implementation Team

We have had very successful implementations, mainly due to the great support from CA.

Other Advice

Work with CA. Have a solid installation development plan and strategy. A lot of companies would put things in warm mode before implementing, which I recommend. Also, read the implementation guide as it is well written.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Find out what your peers are saying about Broadcom, CyberArk, BeyondTrust and others in Privileged Access Management (PAM). Updated: September 2021.
542,721 professionals have used our research since 2012.
it_user199053
Senior Software Engineer at a tech vendor with 501-1,000 employees
Vendor
Privileged User Password Management is a valuable feature

Valuable Features

Privileged User Password Management aka Shared Account Management UNIX Authentication Broker KBL Reports Session Recording Integration with SIEM tools like Splunk, UARM and etc. Ticketing tool integrations like BMC Remedy, CA Service Desk and etc and lot more.

Improvements to My Organization

The product been used by different vendors for protecting their key resources and sensitive information and for accountability.

Use of Solution

Six and a half years.

Deployment Issues

No issues encountered.

Stability Issues

No, the product been stable and robust, and boasts with new additional features.

Scalability Issues

No issue with scalability.

Customer Service and Technical Support

Customer Service: 7/10. Technical Support: 7/10.

Valuable Features

  • Privileged User Password Management aka Shared Account Management
  • UNIX Authentication Broker
  • KBL
  • Reports
  • Session Recording
  • Integration with SIEM tools like Splunk, UARM and etc.
  • Ticketing tool integrations like BMC Remedy, CA Service Desk and etc and
    lot more.

Improvements to My Organization

The product been used by different vendors for protecting their key resources and sensitive information and for accountability.

Use of Solution

Six and a half years.

Deployment Issues

No issues encountered.

Stability Issues

No, the product been stable and robust, and boasts with new additional features.

Scalability Issues

No issue with scalability.

Customer Service and Technical Support

Customer Service:

7/10.

Technical Support:

7/10.

Disclosure: My company has a business relationship with this vendor other than being a customer: I was associated with this product for six and a half years as a Quality Assurance Engineer for CA.
it_user195471
IT Security Consultant at a tech services company with 10,001+ employees
Real User
Although the securiy of the corporate network has improved, it still needs improvements when it comes to security.

What is most valuable?

The most important feature is the admin password management.

How has it helped my organization?

This product has improved the security of the corporate network and made compliance with the safety regulations of our country.

What needs improvement?

Security

For how long have I used the solution?

I have used it for two years.

What was my experience with deployment of the solution?

Yes, I encountered lots of issues.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service: Medium. Technical Support: Medium.

Which solution did I use previously and why did I switch?

No previous…

What is most valuable?

The most important feature is the admin password management.

How has it helped my organization?

This product has improved the security of the corporate network and made compliance with the safety regulations of our country.

What needs improvement?

Security

For how long have I used the solution?

I have used it for two years.

What was my experience with deployment of the solution?

Yes, I encountered lots of issues.

What do I think about the stability of the solution?

No issues encountered.

What do I think about the scalability of the solution?

No issues encountered.

How are customer service and technical support?

Customer Service:

Medium.

Technical Support:

Medium.

Which solution did I use previously and why did I switch?

No previous solution used.

How was the initial setup?

Not all the steps were explained well.

What other advice do I have?

Buy a professional service for installation and first use so they can help you to resolve the various bugs.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user194712
Senior Project Manager with 501-1,000 employees
Vendor
Automated process did not function as required during deployment but we have been able to exceed our audit requirements.

What is most valuable?

The security level for servers.

How has it helped my organization?

We have been able to exceed our audit requirements for security.

What needs improvement?

Automated deployment did not work as expected, had to go to a manual deployment.

For how long have I used the solution?

Over five years.

What was my experience with deployment of the solution?

Automated process did not function as required.

What do I think about the stability of the solution?

No issues at all totally transparent to the end user.

What do I think about the scalability of the solution?

None whatsoever/

How are customer service and technical support?

Customer Service: High. Technical Support: Average.

Which solution did I use previously and why did I switch?

We…

What is most valuable?

The security level for servers.

How has it helped my organization?

We have been able to exceed our audit requirements for security.

What needs improvement?

Automated deployment did not work as expected, had to go to a manual deployment.

For how long have I used the solution?

Over five years.

What was my experience with deployment of the solution?

Automated process did not function as required.

What do I think about the stability of the solution?

No issues at all totally transparent to the end user.

What do I think about the scalability of the solution?

None whatsoever/

How are customer service and technical support?

Customer Service:

High.

Technical Support:

Average.

Which solution did I use previously and why did I switch?

We upgraded from eTrust 8.0.

How was the initial setup?

The initial setup was straightforward.

What about the implementation team?

Our in house support team deployed to over 2000 Unix and Linux servers.

Which other solutions did I evaluate?

This was done by our engineering team, and they looked at Oracle security and Symantec.

What other advice do I have?

For financial systems this is recommended.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user191685
Senior Consultant at a tech consulting company with 51-200 employees
Consultant
User Interface needs to be improved but the most valuable feature is the security access management.

What is most valuable?

It depends on the client's requirements, but for me the most valuable one is the security access management with distributed architecture and centralized management.

How has it helped my organization?

Often, the software is installed based on security and audit requirements, for example, where the security processes of an organization need to be updated to match current security standards.

What needs improvement?

User Interface needs to be improved.

For how long have I used the solution?

I have been designing systems based on the solution for the last four years.

What was my experience with deployment of the solution?

Usually, the problems are similar to any enterprise software deployment. However, sometimes we would have problems adapting the enterprise security processes and software usage.

What do I think about the stability of the solution?

Yes, but nothing critical. Same as other software.

What do I think about the scalability of the solution?

No issues with scalability.

How are customer service and technical support?

Customer Service:

Usually, CA does not provide direct customer service, so it normally depends on the quality of CA's partners.

Technical Support:

As a partner of CA I can contact tech support directly and, in my opinion, it is at a good level.

Which solution did I use previously and why did I switch?

No I didn't and I don't know of any other software with the same complexity of functionality.

How was the initial setup?

CA Privileged Management software is very complex software and its setup needs a project manager, and trained personnel… etc.. it's not a "just installation".

What was our ROI?

You do not need this software for your direct processes but the current security standards force you to buy the product. For example, If your company manages finance it must satisfy the security standards requirements. I cannot calculate the ROI in this case as I would need to compare several projects with different solutions but I design only CA based systems.

What's my experience with pricing, setup cost, and licensing?

Depends on the project and customer requirements.

Which other solutions did I evaluate?

There are some products with similar partial functionality, but I don’t know of another complex software with the same level of functionality.

What other advice do I have?

Study the modern security standards (PCI, ISO/IEC 2700x etc.) before implementation.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user187365
CA Access Control Administrator at a tech services company with 10,001+ employees
Real User
It has a security domain with enhanced features for PIM but some stability issues with reports

What is most valuable?

Auditing Reporting Access Control

How has it helped my organization?

It efficiently controls the access to the resources from the privileged user thus implementing the security aspects and this provides fine granular access.

What needs improvement?

UI for end point and management console.

For how long have I used the solution?

15 months.

What was my experience with deployment of the solution?

No, deployment wise, the functionality is good.

What do I think about the stability of the solution?

Sometimes we encounter issues whilst generating the reports.

What do I think about the scalability of the solution?

No issues with the scalability.

How are customer service and technical support?

Customer Service: 7/10. Technical Support: 7/10. …

What is most valuable?

  • Auditing
  • Reporting
  • Access Control

How has it helped my organization?

It efficiently controls the access to the resources from the privileged user thus implementing the security aspects and this provides fine granular access.

What needs improvement?

UI for end point and management console.

For how long have I used the solution?

15 months.

What was my experience with deployment of the solution?

No, deployment wise, the functionality is good.

What do I think about the stability of the solution?

Sometimes we encounter issues whilst generating the reports.

What do I think about the scalability of the solution?

No issues with the scalability.

How are customer service and technical support?

Customer Service:

7/10.

Technical Support:

7/10.

Which solution did I use previously and why did I switch?

No, this is the first product I got my hands on.

How was the initial setup?

Pretty cool initial set-up.

What about the implementation team?

In-house implementation.

What was our ROI?

It’s quite good in industry.

What other advice do I have?

It’s pretty cool product for security domain with enhanced features for PIM

Disclosure: My company has a business relationship with this vendor other than being a customer: We are Solution Partners
it_user6414
CEO at a tech services company with 501-1,000 employees
Consultant
Access Control provide managed solution to your business systems

Valuable Features:

• Access control provides a secured environment through controlled user authentication and reliable password administration. • It facilitate information scrambling by providing different methods which can be incorporated in business systems to make the information incomprehensible to unauthorized parties trying to hack the system. • It helps the user determine which resources to use in granting, revoking and denying access to users and logins. I highly appreciate the ability of Access Control to track and documenting in the system the activities of unauthorized users thus protecting it against users with elevated privileges.

Room for Improvement:

• I found the installation process of Access Control challenging due to the much networking work involved in order to grant access to authorized users. • It is expensive to small businesses and developer in acquiring all authenticator components to maximally control access to all protected facilities of the system.

Other Advice:

Access Control enhances the security of business systems through a secured authentication and validation of user`s credentials before accessing organization`s resources. It facilitates use of groups and logins thus extending its functionality to all types of applications and management systems. If you are looking for 24 hour monitored and support to your business system, you can consider using Access Control as it is reliable and friendly.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
it_user1062
Tech Support Staff at a insurance company with 501-1,000 employees
Vendor
Access control will never disappoint you. It's just what you need for security.

Valuable Features:

Access Control is used for the management of privileged identities and helps to improve security of information. • Facilitates temporary access to all devices, programs, or applications, as well as servers and audits, monitors and controls only privileged users from a management console at a central location. • Addresses all requirements that are important in managing privileged users or identities. • Automated privileged user logins to avoid theft of passwords and all user activities are logged and tracked thereby controlling what can be done in the system. • Provides a high level of security and complexity and it is therefore difficult to hack business systems.

Room for Improvement:

I have faced a few challenges due to the system complexity, as it involves two integrated authentication systems that have to be purchased. Access control is also very expensive. It takes time to deploy an authenticator to every privileged user but these can be overlooked because access control provides immense security benefits.

Other Advice:

New features that have been added to access control have immensely improved the management and access control of privileged users and therefore the safety of critical business information is guaranteed. Management of privileged users’ passwords for automated operations of application to databases and application to application, tracking and logging of privilege user sessions, integration that is advanced and automated, and PUPM logins, are the new features that have been added to access control. Access control has greatly prevented the misuse of administrator rights which is very rampant.
Disclosure: I am a real user, and this review is based on my own experience and opinions.