CA ControlMinder for Virtual Environments(VE)

Contact Us
Benefits such as cost reduction and improved productivity have prompted many organizations to migrate even their most business-critical applications to virtual platforms. However, the same characteristics that allow virtualization the flexibility to quickly respond to changing business needs also increase the risk and impact of an administrative error, or worse, a security breach.
Highly automated and complex, virtual IT environments can experience significant and rapid damage from both unintentional errors and malicious attacks. Instead of damaging a single server, actions of a known or unknown perpetrator can impact literally dozens of virtual servers at once through access to a common hypervisor. Without appropriate access controls in place to address these issues, organizations are left vulnerable to costly, high-impact security threats that disrupt business and damage business reputation.
When a business operate in a virtual environment, it have a new interface layer: hypervisor. Is business securing it at the same level required for the operating systems. If not, organizations could be leaving the door open to potential security threats.

To overcome security challenges in virtualized environment, it is better to take a proactive, rather than reactive, approach to impending threats and oversights. Businesses can start with hypervisor security, by applying security fundamentals that businesses have already embedded in the traditional infrastructure into hypervisor layer. These actions allow to establish a solid security foundation. But alone, they are unable to address all the dynamic changes that make virtual servers less secure than physical servers. Businesses should shore up their virtual infrastructure by also implementing capabilities that are virtualization specific.

Virtualization-aware automation offers breakthrough capabilities to manage risks associated with hypervisor security. Applied in conjunction with security fundamentals, it can safeguard the virtual environment while supporting fast-paced demands of businesses.


Hypervisor hardening helps to ensure security in virtual environments, and privileged users are centrally controlled and audited to provide temporary privileged access across virtual and physical servers, applications and devices from a single, centralized management console
Implement fully functional and customizable workflows that enable common out-of-the-box use cases
Third-party applications support is enabled via programmatic access to passwords, eliminating need for hard-coded passwords in scripts
Built-in HyTrust Appliance provides a broad range of capabilities to harden the hypervisor
Automatic policy deployment tracks infrastructure configuration changes as well as software asset inventory, all in real time
Adopt full integration withVMware vCenter Server, which causes CA ControlMinder to adopt user interface as its own, helping vCenter administrators reduce their learning curve and quickly adapt to environment. Administrators can easily view and manage security services (Install, Uninstall, Enable, Disable, Upgrade, etc.)


Secure privileged user passwords and make users accountable for their actions. Risk mitigation reduces the risk of password cracking programs being used to gain illegal access to the server or application, reducing risk and increasing data integrity
Control privileged user access, regulate and audit secure critical servers (both physical and virtual) by implementing fine-grained access policies that align with user's role in organization, protecting against the loss of sensitive data
Use more than 60 out-of-the-box reports that cover key compliance elements such as segregation of duties, entitlements and password policies and enable businesses to proactively report on the status of key compliance policies
Reduce administrative cost and complexity by offering centrally administered server access policies and user accounts. UNIX authentication and automated privileged user password management ease the burden of managing security across global, distributed, multi-platform enterprises, which is more complex in a virtual data center
Implement advanced policy management to set policies once and push them out to servers anywhere in the world
Use the shared account management feature to remove hard-coded passwords from scripts, batch files and ODBC/JDBC applications

Get in touch with us

Hello! 👋 How can we help you today?