Xceedium is now CA Technologies

Learn more>


Partners - Support - Contact Us

Xceedium News Coverage

Security Week

August 4, 2015

CA Technologies to Acquire Identity Management Firm Xceedium

According to CA Technologies, Xsuite complements CA Privileged Identity Manager’s resource- or host-based access control approach, which focuses on controlling access to the server operating system and limits the scope for administrators.


August 4, 2015

CA chases hot privileged identity management market with Xceedium buy

By combining its own product with Xceedium, CA will be able to offer a more complete offering for businesses that increasingly use both on-premises resources as well as cloud-based services.


August 4, 2015

CA to Acquire Xceedium for Privileged Identity Management

Acquiring Xceedium will extend CA’s security portfolio with a comprehensive solution for controlling and protecting IT administrator or other privileged user accounts from external attacks or insider mistakes and malicious misuse.


August 4, 2015

CA Technologies buying identity management service Xceedium

“The CA and Xceedium combination will reinforce our leadership position in privileged identity management and offer customers a flexible approach to managing privileged identity compliance and risk,” said Steve Firestone, senior vice president and general manager for security at CA Technologies.


August 4, 2015

Who goes there? CA will know with Xceedium buy

In a move to round out its portfolio of enterprise identity management software, CA Technologies is acquiring security software provider Xceedium. The purchase will allow CA to offer to enterprises more comprehensive coverage of who is allowed on their sensitive networks and systems, according to CA.

LA Times

June 16, 2015

Angels, Dodgers are responsible for their own cyber security

A baseball team — or any other small business — need not spend more than $20,000 to protect its intellectual property from cyber attack, said Mo Rosen, chief operating officer at Xceedium, a Virginia-based company that helps businesses and the government protect data. Rosen said a two-step authentication process — a password, plus a card provided by the Astros, similar to an ATM card — might have been enough to keep the team’s data safe. “They didn’t even take the most rudimentary steps to protect themselves,” Rosen said.

USA Today

June 16, 2015

Cardinals flap highlights new unwritten rule: Change your password

The St. Louis Cardinals confirmed Tuesday that they now are under investigation for a security breach into the Houston Astros’ computer system, stealing potential valuable information. Ken Ammon, CSO of Xceedium, a Cyber security expert, told USA TODAY Sports, “I think there’s an emotional tie here. It seems that someone must have thought that (Luhnow) downloaded intellectual property and took it with him. They feel entitled. So maybe someone thought by leaking embarrassing information, they would let them know they had access to their system. Usually, you won’t want anyone to know they have access to their system. This looks like it was personal.”

Government Executive

June 12, 2015

Why Credit Monitoring Fails to Address the Real Threat Facing Hacked Feds

Government Executive’s Eric Katz reports that while the Office of Personnel Management has offered 4 million current and former federal employees free credit monitoring and identity theft insurance, the response may completely miss the mark. As Xceedium’s Ken Ammon observes, credit monitoring is fine as a “first step,” it does little to protect individuals from bad actors. It’s likely the stolen information will be used to target individuals with highly sophisticated phishing attacks, or to attempt to coerce individuals into providing information.

Ars Technica

June 8, 2015

Why the “biggest government hack ever” got past the feds

Ken Ammon comments on the OPM breach: “I have yet to see any exploit that has this level of sophistication and data targeting,” he said. “By sophistication, what I’m talking about is what you do to start getting the data out. Getting in is way too easy, but there’s nobody who’s had that level of sophistication for data exfiltration outside of Russia and China.”

USA Today

June 7, 2015

Same groups may be behind OPM, healthcare hacks

In the last six to eight months there’s been “an unprecedented cutting through of red tape” resulting in the fastest implementations he’s ever seen in over 20 years working on government contracts, Ken Ammon of Xceedium comments on the federal response to cyber security.


Blog: Xsuite: Privileged Identity Management for Modern...

Next In The Xceedium Webcast Series We’ve all seen it. A seemingly never-ending... Read More

CDM Phase II is Here

Xsuite delivers support for CDM Phase 2 Least Privilege and Infrastructure Integrity Requirements...Read More

Video: 2-Minute Explainer

This quick video, just two minutes in length, will rapidly deliver insights into the risks posed by privileged users, and how Xsuite circumvents the risks.Read More