About
Subscribe
  • Home
  • /
  • Enterprise
  • /
  • CA eTrust SCM takes holistic approach to Internet threats

CA eTrust SCM takes holistic approach to Internet threats

Johannesburg, 30 Jun 2003

Computer Associates Africa has introduced eTrust Secure Content Management (SCM), a single solution that addresses the multiple security management challenges faced by South African companies today.

eTrust SCM protects organisations from the diverse dangers of the Internet such as viruses, spam as well as the unacceptable use of the Web by employees.

The solution delivers on CA`s vision of fully integrated, intelligently automated management and enforcement of security policies and practices across the enterprise.

Says Mark Smissen, eTrust brand manager at Computer Associates Africa: "Piecemeal approaches to information security are ineffective, expensive and difficult to manage.

"With eTrust Secure Content Management, CA is empowering organisations to take a truly holistic approach to the diverse threats they face from the Internet plus enabling optimal protection that fall within their existing budget and resource constraints.

"Organisations increasingly realise the inefficiency of dealing with each new threat as an isolated issue. This strategy often means that they are reactive, vulnerable and operationally inefficient," comments Brian Burke, research manager at IDC.

"The integrated approach offered by CA`s eTrust Secure Content Management helps move IT from fire-fighting mode to proactive risk minimisation. Moreover, it can offload some spam management and Web filtering tasks from overburdened IT departments to users."

Security managers can, for example, utilise eTrust SCM to customise string searches to all e-mail and Web traffic across the network. This in turn reduces administrative overhead and ensures effective, consistent policy enforcement.

Key features of eTrust Secure Content Management include:

* Customisable, policy-based scanning of e-mail and Web traffic to detect and block malicious and/or unacceptable content, such as music-sharing applications and pornography.

* A User Accept/Deny feature that allows administrators to empower individual users to help filter spam and block URLs while reducing false positives.

* Customisable word/string search and alerting to prevent sensitive corporate information from leaving an enterprise.

* An advanced content management-reporting interface that gives security managers a 360-degree view of Internet content trends and security events across the enterprise.

* Use of CA`s dual-engine scanning to ensure effective protection against all viruses.

Share

Editorial contacts

Anke Robottom
Computer Associates Africa
(011) 236 9111
Anke.Robottom@ca.com