SaaS / Managed Services Market trends and adoption challenges
|
|
- Patrick Hicks
- 8 years ago
- Views:
Transcription
1 SaaS / Managed Services Market trends and adoption challenges Jason Forrest Hollis Security Asia Pacific & Japan 2013 CA All rights reserved
2 Legal Notice Copyright 2013 CA All rights reserved All trademarks, trade names, service marks and logos referenced herein belong to their respective companies No unauthorized use, copying or distribution permitted THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY CA assumes no responsibility for the accuracy or completeness of the information TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT AS IS WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised of the possibility of such damages Certain information in this presentation may outline CA s general product direction This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product The development, release and timing of any features or functionality described in this presentation remain at CA s sole discretion Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available (i) for sale to new licensees of such product; and (ii) in the form of a regularly scheduled major product release Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis 2 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
3 3 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
4 4 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
5 Rise of Mobile workforce By 2015, the world s mobile worker population will reach 13 billion, or 372% of the total workforce That is another 300 million mobile workers on the planet compared to % Mobile WORLD WORKFORCE % Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted IDC WW Mobile Worker Population Forecast, Doc #
6 Public Cloud Adoption Source : CA Technologies based on analyst data Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
7 Traditional IT: IT as the Gatekeeper to Technology Business IT IT Systems 7 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
8 Why Maintain Technology, When You Can Deliver Innovation? Bring innovation to market more quickly Make the right strategic decisions Reduce risk & Transform the economics of IT 8 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
9 wwwgeekcom 9 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
10 10 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
11 While protecting against evolving threats New Online Risks & Threats Partners/Divisions Cloud Services Mobile Apps Developer Community IoT / Big Data Rogue Developers External Attack Bad Apps Spoofed Cloud Service Hacked Social Login Social Registration 11 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
12 The SaaS Adoption Challenge Keeping Up With the advancement of SaaS solutions, many IT and non-it based groups alike need solutions for getting enterprise users access to solutions Speed to market is critical to ensuring we enable the business while protecting the brand Services such as AWS and Rackspace further complicate the world With IaaS services the cloud becomes even more risky with the reality that non-it based groups can spin up servers, hire an external dev team and in no time be a self contained solution with their own Identity Store How quickly can a SaaS provider be enabled to accept Partner Credentials? 30 Minutes on Average to enable Federation capability (based on SAML enabled solutions) 12 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
13 But where is the budget? 30% IT department budget 30% of IT spending being done by business units outside the official IT budget Source: PwC 13 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
14 Social Media is creating a bring your own identity trend 143B social network users by 2012¹ Social Media Please create an account and yet another password But I already have an identity! Bring Your Own Identity Customer Applications 14 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
15 IAM as a SaaS Itself What are the risks? Should we release our most protected assets to a cloud provider More and more cloud solution offerings provide a streamlined and effective set of services to completely move IAM to the cloud This puts our keys in the control of a 3 rd party both administratively and physically What are the Contractual risks associated with delivering it in the cloud Risks include how to appropriately audit and have transparent visibility to how IAM services are being controlled, how tenets are isolated and can ensure autonomy of data and security breach incidents and corresponding requirements How big is the SaaS Market? $12b In Sales in 2012 based on Gartner Research 15 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
16 Key Challenges a typical organization is facing today Accepting Business Partner Credentials to eliminate the need for internal specific credential management Is the risk reduced or increased by relying on the other business party to ensure proper management of the ID s Enterprise credentials in the cloud What is the exposure of either syncing ID s with a cloud provider or completely moving to a cloud solution for all ID management The use of SaaS and IaaS solutions internal to the company and ensuring they don t become their own IAM solutions as well How does IT better integrate into these processes to enable the business but maintain security Using other ID s in the enterprise FaceBook, Google, Yahoo Where do they fit in the enterprise What apps would this be acceptable for Blurring of internal and customer facing Identity & accounts Evaluating use of Loyalty_ID as an internal credential Using our Enterprise ID and information to enhance employee experience 16 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
17 17 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
18 The NTT Network By some estimates operates 40% of the world s Commercial internet fabric First global SDN network Lowest global Latency network Leading network latency of less than 43 milliseconds from Hong Kong to Tokyo and less than 64 milliseconds from Singapore to Tokyo 18 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
19 Global Data Centers Providing over 200 DCs worldwide and planning to increase 1 Malaysia Cyberjaya 3 DC (April, 2012/approx2km2) Always on 100% - Latest Generation Facilities like the Hong Kong Data Centre boasts utmost redundancy with continuous cooling system, continuous rating generators and compartmentalized infrastructure design, providing the highest level of service availability The HKG FDC facility has over 70,000 square meters of gross floor area and over 6,000 racks in total In addition to its high capacity, the FDC is also equipped with an 8-tiered security access control, offering a strong value proposition for industry players who are most concerned about their data assets 4 India Netmagic Solutions DC (Planned in 2012/7DCs approx6km2) 2 Singapore Serangoon DC (April, 2012/approx5km2) 3 Europe (13 DCs/ 8 cities) China/HK (9 DCs/ 4 cities) Japan (91 DCs/ 51 cities) US Lundy DC (in operation/approx8km2) US (7 DC/6 cities) 3 UK Gyron Internet DC (May, 2012/ 3DCs approx4km2) APAC (21 DCs/11 cities) 19 * 2DCs are under construction (planned Copyright in 1Q, 2013) 2013 CA All rights reserved No unauthorized copying or distribution permitted 6 US Sterling DC (in operation/approx5km2)
20 Gartner: Cloud-based security as a service set to take off November 4, 2013 Gartner is predicting the cloud-based security services market, which includes secure or web gateways, identity and access management (IAM), remote vulnerability assessment, security information and event management to hit $413 billion by 2017 Today, IAM stands at about $500 million but is expected to see growth to $860 million in 2015, and then to $124 billion in 2017 for a total 283% combined annual growth rate, according to Gartner Within this area of authentication as a service, the most growth is expected to come from what Gartner calls "multifunction identity as a service (IDaaS)" IDaaS is described as a combination of administration and account provisioning, authentication and authorization and reporting functions Cloud-based IAM can be used to manage software-as-a-service (SaaS) applications and internal applications as well Among the vendors mentioned by Gartner to watch in the IAM area are Atos,, Exostar, Fischer International, Identropy, Ilantus Technologies, Lighthouse Security Group, Mycroft, Intel, Okta, OneLogIn, Ping Identity, RSA Symantec, Symplified, Sena Systems, Simeio Solutions, Verizon and Wipro Source: 20 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
21 CA Provides Leadership Solutions & Portfolio CA Technologies named a leader in the following Gartner Magic Quadrants User Authentication : Ant Allan, 7 March, User Administration and Provisioning: Earl Perkins, 27 December 2012 Identity & Access Governance: Earl Perkins, 17 December 2012 Content-Aware Data Loss Prevention: Eric Ouellet, 3 January, 2013 CA Technologies is ranked as Positive in the following MarketScope Web Access Management MarketScope: Gregg Kreizman, 03 December 2012 CA Technologies named a leader in the following Forrester Wave reports: IAM Suites: Q3 2013; Forrester Research Inc; September 2013 Risk-based Authentication: Q1 2012; Forrester Research Inc; February API Management Platforms: Q1 2013, Forrester Research Inc; February 5, SOA Application Gateways: Q4 2011, Forrester Research Inc; November 18, CA Technologies named a leader in the following KuppingerCole Leadership Compass reports: Access Governance: February 2013 Identity Provisioning: Oct 2012 Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose 1) 2) Layer 7 was acquired by CA Technologies in June, ) Layer 7 Gateway V6 21 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
22 CA CloudMinder vision Ability to Deliver Identity and Access Management (IAM) capabilities using a enterprise-grade service as a unified-solution to provide a consumerized experience and address current and future needs of both large and emerging enterprises Single Sign-On Service Advanced Authentication Service Identity Management Service Identity Governance Service Privileged Identity Management Authorization Service Data Protection Service Other Security Services CA CloudMinder Security To the Cloud, For the Cloud & Enterprise, From the Cloud & Enterprise = planned = future direction 22 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
23 CA Security Solutions THE ^ SECURE THE MOBILE, CLOUD- CONNECTED ENTERPRISE OPEN ENTERPRISE DELIVER SECURE NEW BUSINESS SERVICES via WEB, MOBILE, API Single Sign-on to services Adaptive Risk-based AuthN Move beyond passwords Securely connect cloud services Reduce cost of managing users Remove orphan accounts Control shared account access Integrate applications to cloud Deploy APIs to partners, customers Monetize new business channels Deploy new mobile applications Leverage Social registration Reduce fraud across all channels Protect data across all channels Reduce Cost Manage Risk Drive Revenue 23 Copyright 2013 CA All rights reserved No unauthorized copying or distribution permitted
24 Questions Please come and see us in booth G12 for further discussion Jason Forrest Hollis
Architecture in the API Era
Architecture in the API Era Mark Sigda Senior Principal Consultant, CA Technologies May 21, 2015 ITARC Stockholm, Sweden Mark Sigda Fort Collins, Colorado, USA IASA member since 2007 CITA-F Certified MCAD
More informationGlobal Service Delivery: Industrialising Service Management
Global Service Delivery: Industrialising Service Management Drive Business Value with Service & Portfolio Management PS109SN Global Service Delivery: Industrialising Service Management in partnership with
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More information1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com. CA Security SaaS Validation Program. Copyright 2015 CA. All Rights Reserved.
1 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com CA Security SaaS Validation Program 2 CA SECURITY SAAS VALIDATION PROGRAM 2015 ca.com At a Glance KEY BENEFITS/ RESULTS The CA Security SaaS Validation
More informationClosing the Biggest Security Hole in Web Application Delivery
WHITE PAPER DECEMBER 2014 Closing the Biggest Security Hole in Web Application Delivery Addressing Session Hijacking with CA Single Sign-On Enhanced Session Assurance with DeviceDNA Martin Yam CA Security
More informationSecurity in the App Economy
SESSION ID: SPO1-W02 Security in the App Economy How to Ride the Wave Without Wiping Out! Michelle Waugh Vice President, Security Solutions CA Technologies Are you rolling out new apps & services to your
More informationThe Best Kept Secrets of Cloud Service Providers
Cloud Solutions CP103PN The Best Kept Secrets of Cloud Service Providers Matt Richards Senior Director, Product Marketing The Best Kept Secrets of Cloud Service Providers New cloud offerings are providing
More informationIdentity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
More informationWeb Admin Console - Release Management. Steve Parker Richard Lechner
Web Admin Console - Release Management Steve Parker Richard Lechner Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject
More informationConnecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
More informationIdentity Centric Security: Control Identity Sprawl to Remove a Growing Risk
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk John Hawley VP, Security CA Technologies September 2015 Today s Theme: Preparing for the Adversary How to Prepare Your Organization
More informationCA Virtual Assurance for Infrastructure Managers
PRODUCT SHEET: CA Virtual Assurance for Infrastructure Managers CA Virtual Assurance for Infrastructure Managers agility made possible CA Virtual Assurance for Infrastructure Managers is an add-on product
More informationexpanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
More informationDynamic Data Center Update:
15293 Dynamic Data Center Update: System z and Data Center What Changed Since Boston? Mike Madden General Manager, CA Technologies March 11, 2014 No better time to be on the MAINFRAME 2 SHARE Anaheim 2014
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationSOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information
SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations
More informationsolution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service?
solution brief February 2012 How Can I Obtain Identity And Access Management as a Cloud Service? provides identity and access management capabilities as a hosted cloud service. This allows you to quickly
More informationCA Business Service Insight
DATA SHEET CA Business Service Insight With CA Business Service Insight, you can know what services are being used within your business, improve service performance while helping to reduce operating costs,
More informationAuthentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
More informationAn Enterprise Architect s Guide to API Integration for ESB and SOA
An Enterprise Architect s Guide to API Integration for ESB and SOA The New Digital Imperative While some are still adjusting to the idea, you re well aware that we re living in an application economy.
More informationData Modeling in a Coordinated Data Management Environment: The Key to Business Agility in the Era of Evolving Data
Data Modeling in a Coordinated Data Management Environment: The Key to Business Agility in the Era of Evolving Data Shawn Rogers Enterprise Management Associates Vice President of Research, Business Intelligence
More informationCA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
More informationCA ERwin Data Modeling's Role in the Application Development Lifecycle
CA ERwin Data Modeling's Role in the Application Development Lifecycle Hybrid Data Protection DH010SN CA ERwin Data Modeling's Role in the Application Development Lifecycle Donna Burbank CA Technologies
More informationSingle Sign-on to Salesforce.com with CA Federation Manager
TECHNOLOGY BRIEF: SINGLE SIGN-ON TO SALESFORCE.COM WITH CA FEDERATION MANAGER Single Sign-on to Salesforce.com with CA Federation Manager TOMMY CHENG, PRINCIPAL ENGINEERING SERVICES ARCHITECT, CA PETER
More informationService Virtualization CA LISA introduction. Jim Dugger CA LISA Product Marketing Manager Steve Mazzuca CA LISA Public Sector Alliances Director
Service Virtualization CA LISA introduction Jim Dugger CA LISA Product Marketing Manager Steve Mazzuca CA LISA Public Sector Alliances Director innovate or die The Product is the entire brand and customer
More informationChange for the Better: Improved Productivity via CA Service Desk Manager
Change for the Better: Improved Productivity via CA Service Desk Manager Drive Business Value with Service & Portfolio Management PS105SN Change for the Better: Improved Productivity via CA Service Desk
More informationCA Chorus for Security and Compliance Management Deep Dive
Mainframe Optimization and Modernization CA Chorus for Security and Compliance Management Deep Dive Maddalena Tosoni Principal Engineering Services Architect CA Chorus Recap Improve Staff Efficiency CA
More informationHow can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
More informationAgile@CA Development Process. Simon Cockayne Misc Track
Agile@CA Development Process Simon Cockayne Misc Track FOR INFORMATION PURPOSES ONLY Terms of this presentation This presentation was based on current information and resource allocations as of April 2013
More informationSecurely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
More informationMeasuring end-to-end application performance in an on-demand world. Shajeer Mohammed Enterprise Architect
Measuring end-to-end application performance in an on-demand world Shajeer Mohammed Enterprise Architect Agenda 1 Introduction to CA 2 Application Performance Management and its Need 3 How CA Solutions
More informationHow To Be A World Class Data Center
CUSTOMER SUCCESS STORY Ativas enhances cloud services with CA Technologies solutions CUSTOMER PROFILE Industry: IT managed services Company: Ativas Employees: 200+ Revenue (2011): R$ 30 million BUSINESS
More informationSoftware Asset Management (SAM) Best Practice
Software Asset Management (SAM) Best Practice Drive Business Value with Service & Portfolio Management PS200SN Software Asset Management (SAM) Best Practice Peter Beruk Business Software Alliance abstract
More informationCA Service Desk Manager - Mobile Enabler 2.0
This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will
More informationRECOVERY OF CA ARCSERVE DATABASE IN A CLUSTER ENVIRONMENT AFTER DISASTER RECOVERY
RECOVERY OF CA ARCSERVE DATABASE IN A CLUSTER ENVIRONMENT AFTER DISASTER RECOVERY Legal Notice This publication is based on current information and resource allocations as of its date of publication and
More informationHow To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
More informationDocuments Cloud Service Simple. Secure. Everywhere.
Documents Cloud Service... Copyright 2014 Oracle Corporation. All Rights Reserved. Your Files in Oracle Cloud Today s world doesn t sleep. Having 24/7 access to business-critical information for you and
More informationROI Business Use Case. Cross-Enterprise Application Performance Management. Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality
ROI Business Use Case Cross-Enterprise Application Performance Management Helps Reduce Costs & MTTR, Simplify Management, Improve Service Quality Today s applications are complex, running across your network
More informationdefending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
More informationNTT Com Global Cloud Services
NTT Com Global Cloud Services NTT Communications Corporation November 1, 2013 Copyright NTT Communications Corporation. All right reserved. 1. Group Structure Agenda 2. Vision 3. Offering Strategy (Global
More informationReference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
More informationEnabling and Protecting the Open Enterprise
Enabling and Protecting the Open Enterprise The Changing Role of Security A decade or so ago, security wasn t nearly as challenging as it is today. Users, data and applications were all centralized in
More informationCA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
More informationProtecting What Matters Most. Bartosz Kryński Senior Consultant, Clico
Protecting What Matters Most Bartosz Kryński Senior Consultant, Clico Cyber attacks are bad and getting Leaked films and scripts Employee lawsuit Media field day There are two kinds of big companies in
More informationStrengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
More information2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Welcome to the AWS Cloud Steve Halliwell General Manager, State, Local & Education What is Amazon Web Services? Deployment & Administration Application Services Compute Storage Database
More informationHands-on Lab: CA ehealth PM Integration with Cisco Unified Communications Manager. Eve Curcio
Hands-on Lab: CA ehealth PM Integration with Cisco Unified Communications Manager Eve Curcio Terms of This Presentation This presentation was based on current information and resource allocations as of
More informationSOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible
SOLUTION BRIEF CA Cloud Compass how do I know which applications and services to move to private, public and hybrid cloud? agility made possible You don t. But you can get complete visibility to the cloud
More informationCA Workload Automation Restart Option for z/os Schedulers: NJE Restarts. Jared Moran
CA Workload Automation Restart Option for z/os Schedulers: NJE Restarts Jared Moran Terms of This Presentation This presentation was based on current information and resource allocations as of October
More informationLAB: Assembling a Business Service Insight (BSI) Dashboard
LAB: Assembling a Business Service Insight (BSI) Dashboard Drive Business Value with Service & Portfolio Management PS304LN LAB: Assembling a BSI Dashboard Brian Jurasic CA Technologies agenda Review of
More informationRisk and threats everywhere, all the time
Risk and threats everywhere, all the time Hackers Cloud Remote Offices/ Workers Authentication & Encryption Mobile Devices Virtualization Malicious & Well-meaning Users Cyber Threats Social Media Compliance
More information5 Pillars of API Management with CA Technologies
5 Pillars of API Management with CA Technologies Introduction: Managing the new open enterprise Realizing the Opportunities of the API Economy Across industry sectors, the boundaries of the traditional
More informationpingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA
pingidentity.com IDENTITY SECURITY TRENDS IN THE MOBILE ERA CONTENTS TRENDS IN IDENTITY SECURITY 3 INSIGHT #1 4 PRODUCTIVITY AND USER EXPERIENCE TRUMP EVERYTHING ELSE INSIGHT #2 5 SECURITY IS BOTH A LEADING
More informationCA Virtual Assurance for Infrastructure Managers
DATA SHEET CA Virtual Assurance for Infrastructure Managers (Includes CA Systems Performance for Infrastructure Managers) CA Virtual Assurance for Infrastructure Managers (formerly CA Virtual Performance
More informationThe Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications
The Next Generation of IT Management Jason Andrew Vice President, Marketing & Communications BMC Has Outperformed the Market Growing Stock Price Over 130 Percent in 5 Years BMC +134% IBM +76% HP +50% NASDAQ
More informationConnecting the dots from automated software discovery to asset management
Connecting the dots from automated software discovery to asset management Drive Business Value with Service & Portfolio Management PS113SN Connecting the dots from automated software discovery to asset
More informationhow can I improve performance of my customer service level agreements while reducing cost?
SOLUTION BRIEF CA Business Service Insight for Service Level Management how can I improve performance of my customer service level agreements while reducing cost? agility made possible By automating service
More informationSOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
More informationThe NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide
SOLUTION BRIEF NIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide SOLUTION BRIEF CA DATABASE
More informationKeynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson
Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationCA Clarity PPM. Overview. Benefits. agility made possible
PRODUCT SHEET CA Clarity PPM agility made possible CA Clarity Project & Portfolio Management (CA Clarity PPM) helps you innovate with agility, transform your portfolio with confidence, and sustain the
More informationWorkshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business
Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced
More informationBuilding a Roadmap to Robust Identity and Access Management
Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing
More informationBaker Tilly simplifies Windows 7 deployment with CA Technologies solutions
Customer success story Baker Tilly simplifies Windows 7 deployment with CA Technologies solutions Customer profile Industry: Professional services Company: Baker Tilly Employees: 2,400 Revenue: 204 million
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationLogicalis delivers low-risk, cost-effective cloud computing services with CA Technologies
CUSTOMER SUCCESS STORY Logicalis delivers low-risk, cost-effective cloud computing services with CA Technologies CUSTOMER PROFILE Industry: IT services Organisation: Logicalis Employees: 1,900 Revenue:
More informationCA Systems Performance for Infrastructure Managers
PRODUCT SHEET: CA Systems Performance for Infrastructure Managers agility made possible CA Systems Performance for Infrastructure Managers CA Systems Performance for Infrastructure Managers is an add-on
More information1 Introduction... 2 2 Product Description... 3 3 Strengths and Challenges... 4 4 Copyright... 5
This document is licensed to iwelcome KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger April 2015 iwelcome Identity & Access Management as a Service iwelcome delivers Identity and Access Management
More informationCA Nimsoft Monitor. Probe Guide for Cloud Monitoring Gateway. cuegtw v1.0 series
CA Nimsoft Monitor Probe Guide for Cloud Monitoring Gateway cuegtw v1.0 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject to change or withdrawal
More informationKey Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
More informationcan you differentiate with cloud? you can
cloud accelerators can you differentiate with cloud? you can We ve transitioned customers from classical infrastructure to a fully virtualized infrastructure with CA AppLogic across both large and small
More informationCA Service Desk Manager Change Management. Ken Laufmann Raymond Cadden
CA Service Desk Manager Change Management Ken Laufmann Raymond Cadden Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is subject
More informationSOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY Identity-centric Security: The ca Securecenter Portfolio How can you leverage the benefits of cloud, mobile, and social media, while protecting
More informationCan you simplify the buying and managing of services for your customers?
cloud luminaries Can you simplify the buying and managing of services for your customers? We enable IT on demand and provide a very easy way to buy all kinds of products and services from servers, storage,
More informationHow to Get to Single Sign-On
How to Get to Single Sign-On Gregg Kreizman Neil Wynne Twitter: @neilwynne Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in
More informationPeople-Focused Access Management. Software Consulting Support Services
People-Focused Access Management Software Consulting Support Services A beautiful experience. Anytime, anywhere. Access: One is an industry-leading Access Management platform that provides you with versatile
More informationA FinCo Case Study - Using CA Business Service Insight to Manage Outsourcing Suppliers
WHITE PAPER August 2012 A FinCo Case Study - Using CA Business Service Insight to Manage Outsourcing Suppliers Erik Hille Senior Principal Product Marketing Manager Table of Contents Executive Summary
More informationprotect your assets. control your spending
protect your assets. control your spending A European poll on IT asset management practices, commissioned by CA Technologies and conducted at the European Gartner Procurement, Financial and Asset Management
More informationare you helping your customers achieve their expectations for IT based service quality and availability?
PARTNER BRIEF Service Operations Management from CA Technologies are you helping your customers achieve their expectations for IT based service quality and availability? FOR PARTNER USE ONLY DO NOT DISTRIBUTE
More informationCentris optimises user support with integrated service desk
CUSTOMER SUCCESS STORY Centris optimises user support with integrated service desk CUSTOMER PROFILE Industry: IT services Company: Centris AG, Solothurn, Switzerland Revenue: 2008 sales: 46.7M SFR Employees:
More informationCA s Cloud Storage for System z
CA s Cloud Storage for System z Michael Melillo Sr. User Experience Architect Cloud Solutions for System z April 15 th, 2014 2013 CA. All rights reserved. Disclaimer Certain information in this presentation
More informationBlackBerry Enterprise Solution and RSA SecurID
Technology Overview BlackBerry Enterprise Solution and RSA SecurID Leveraging Two-Factor Authentication to Provide Secure Access to Corporate Resources Table of Contents Executive Summary 3 Empowering
More informationCA ControlMinder for Virtual Environments May 2012
FREQUENTLY ASKED QUESTIONS May 2012 Top Ten Questions 1. What is?... 2 2. What are the key benefits of?... 2 3. What are the key capabilities of?... 2 4. Does this release include anything from the recently
More informationDesigning a CA Single Sign-On Architecture for Enhanced Security
WHITE PAPER FEBRUARY 2015 Designing a CA Single Sign-On Architecture for Enhanced Security Using existing settings for a higher-security architecture 2 WHITE PAPER: DESIGNING A CA SSO ARCHITECTURE FOR
More informationCollaboration for Big Data, Business Intelligence, and Mobile Initiatives
Collaboration for Big Data, Business Intelligence, and Mobile Initiatives Valeh Nazemoff, Acolyst Sr. Vice President Session Code BI01 Speaker Bio Specializing in enterprise business performance management
More informationCA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
More informationERwin R8 Reporting Easier Than You Think Victor Rodrigues. Session Code ED05
ERwin R8 Reporting Easier Than You Think Victor Rodrigues Session Code ED05 Speaker Bio Victor Rodrigues is an industryrecognized database modeling consultant with over 11 years experience working with
More informationSOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
More informationThe Role of Service Catalog in IT Asset Management. Faisal Faquih Khalid
The Role of Service Catalog in IT Asset Management Faisal Faquih Khalid Terms of This Presentation This presentation was based on current information and resource allocations as of October 2009 and is
More informationCA Workload Automation Strategy and Roadmap. Bill Sherwin Principal Consultant EMEA Workload Automation Owner
CA Workload Automation Strategy and Roadmap Bill Sherwin Principal Consultant EMEA Workload Automation Owner CA Workload Automation: Key component in successful enterprise IT management Service Service
More informationSecurity Landscape of Cloud Computing
Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1 This document is for informational purposes. It is not a commitment to deliver any material, code,
More informationPRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability
PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers Delivering consistent quality of service, scalability and service level assurance When it comes to cloud-based online
More informationCorporate Presentation 2016
Corporate Presentation 2016 2 AGENDA About SPAMINA Cool Vendor 2016 The Security Challenge 3 Concerns over data protection and confidentiality Why Spamina? SPAMINA Platform 4 Parla Secure Cloud Email ParlaMI
More informationcan you simplify your infrastructure?
SOLUTION BRIEF CA Virtual Desktop Automation for Vblock Platforms can you simplify your infrastructure? agility made possible You Can. With services that increase the speed of virtual provisioning on Vblock
More informationAn Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
More informationCloud User and Access Management
KuppingerCole Report LEADERSHIP COMPASS Leaders in innovation, product features, and market reach for Cloud User and Access Management. Manage access of employees, business partners, and customers to Cloud
More information10A CA Plex in the Cloud. Rob Layzell CA Technologies
10A CA Plex in the Cloud Rob Layzell CA Technologies Legal This presentation was based on current information and resource allocations as of April 18, 2011 and is subject to change or withdrawal by CA
More informationagility made possible
SOLUTION BRIEF CA Technologies and NetApp Integrated Service Automation Across the Data Center can you automate the provisioning and management of both virtual and physical resources across your data center
More information