TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA. Colruyt ensures data privacy with Identity & Access Management.
|
|
|
- Gerard Armstrong
- 10 years ago
- Views:
Transcription
1 TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA Colruyt ensures data privacy with Identity & Access Management.
2 Table of Contents Executive Summary SECTION 1: CHALLENGE 2 Safeguarding the privacy of personal data Reducing the security risks of IT automation Securing a new distributed environment SECTION 2: OPPORTUNITY 3 Preventing unauthorised access to systems Securing the perimeter Audit trails for easier compliance SECTION 3: BENEFITS 5 Improved data security reduces risk SECTION 4: CONCLUSIONS 6 ABOUT CA Back Cover Copyright 2008 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. This document is for your informational purposes only. To the extent permitted by applicable law, CA provides this document As Is without warranty of any kind, including, without limitation, any implied warranties of merchantability or fitness for a particular purpose, or noninfringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, business interruption, goodwill or lost data, even if CA is expressly advised of such damages.
3 Executive Summary Challenge With all its processes from point of sale transactions to logistics management reliant upon IT, retailer Colruyt needs to ensure its systems and data are secure. In particular, the company needs to lock down access to servers that support its and HR systems. Any unauthorized access to confidential data could result in a breach of European privacy laws and expose the company and its staff to external security risks. When Colruyt migrated its HR and systems from a mainframe to a distributed environment, maintaining high levels of data security was paramount. Opportunity Colruyt uses a CA Identity & Access Management solution to prevent unauthorised access to its HR and communications systems and data. Using the solution s Policy Management Database and Web-based graphical user interface, Colruyt can specify complex access rights for its IT department across both Microsoft and Linux platforms. In addition to safeguarding access, the CA solution also provides comprehensive audit trails for regulatory compliance purposes. The implementation has been such a success that Colruyt is now extending the CA solution to other production systems. Benefits Colruyt can balance data security with the IT department s need to access core systems. As a result, it has been able to: REDUCE RISK Colruyt s systems are protected from malicious threats that could impact business continuity ENSURE COMPLIANCE WITH PRIVACY LAWS Employees records are protected against unauthorised access. This helps to safeguard the reputation of the company, which will be key as it continues to grow its operations. TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA 1
4 SECTION 1: CHALLENGE Safeguarding the privacy of personal data The security of personal data is a key concern for European businesses. With news reports frequently covering the loss of confidential personal data by both government and commercial organisations, data protection is a subject matter that rarely leaves the headlines. European privacy laws are well established, dating back to the European Commission s adoption of the Data Privacy Directive in This level of maturity has not, however, prevented a recent series of highly-publicised breaches of privacy and data protection laws. Mitigating the risks of a security breach and the potential impact on the business is essential. Hein Coulier Security Officer, Colruyt With identity theft on the increase, the agencies responsible for enforcing these privacy laws are more rigorous than ever, and European businesses are all too aware of the devastating reputational and financial impact of inadequate security policies. Even if a company operates in the business-to-business space, data protection is still a concern and may even be subject to formal non-disclosure and confidentiality agreements. All companies also hold a certain amount of human resources (HR) data on their employees, which must be adequately protected to comply with privacy laws. Compliance, however, is not the only driver for securing IT systems. Organisations also need to protect themselves against malicious intrusion attempts that could not only threaten data integrity but also cause IT downtime and impact business continuity. Reducing the security risks of IT automation Belgian retailer Colruyt holds data on more than 20,000 employees as well as some customer related information. One of Belgium s largest commercial companies, Colruyt sells groceries, toys and baby goods through brands such as Dreamland, Dreambaby, Coccinelle France and OKay as well as Colruyt. The company also supplies independent shopkeepers through its wholesale and distribution business, which includes 16 cash and carry stores in North East France. Colruyt s business strategy is based on offering consumers the lowest prices for its goods. For this strategy to succeed Colruyt needs to maintain very low operating costs, so the majority of its business processes rely at least to some degree on automated systems. This increasing dependency on IT has brought with it a growing awareness of security issues and the potential impact of a system breach. In 2005, Colruyt initiated a project to improve the security of its production data. Hein Coulier, Security Officer at Colruyt, comments, All our business functions rely on IT. From point of sales systems and logistics applications to HR and finance an IT outage could have a massive impact on the productivity and profitability of the business. As a result, mitigating the risks of a security breach and the potential impact on the business is essential. Securing a new distributed environment The company s existing mainframe environment was extremely secure with system access governed by a CA mainframe Identity & Access Management solution. With the number of applications being developed and used by the business growing, Colruyt had made the decision 2 TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA
5 to move some of its core systems to a distributed environment. This would enable it to deploy new systems more quickly, thus increasing business agility. Maintaining the security of its systems throughout this transformation was critical. The new distributed IT infrastructure did not offer as much inbuilt security as our mainframe platform. We were therefore eager to implement an extra layer of security to protect sensitive data and our core systems, comments Coulier. This need was reinforced when Colruyt s IT department, Colruyt Group Services, conducted a comprehensive risk assessment of the security threat to the distributed environment. With 900 IT staff including up to 600 software engineers, Colruyt needed an efficient way to manage user access accounts that would enable it to meet its stringent security policies. SECTION 2: OPPORTUNITY Preventing unauthorised access to systems After investigating a number of solutions available on the market, Colruyt selected a CA Identity & Access Management solution to help it enforce its security policies in the new distributed IT environment. CA Access Control offered the fine-grained controls required to achieve this, as well as simple centralised management. As we were already using the equivalent CA Identity & Access solution for our mainframe systems, we already had a good grasp of how the solution would work, comments Coulier. Minimising the risk involved in the implementation was high on the agenda, and the CA solution offered a good low-risk choice. CA Access Control provides a solid wall to prevent certain users accessing data and systems specified by Colruyt. Hein Coulier Security Officer, Colruyt CA Access Control r12 was deployed to protect Colruyt s HR systems as part of CA s BETA programme in January The implementation was extended to include its communications infrastructure in April 2008, which supports 3,800 users by January 2009, this number will rise to 20,000. CA Access Control is used in production, development and test environments. Due to the company s server consolidation efforts, this amounts to just four production servers (on a total of 14) running Microsoft and Linux operating systems. Securing the perimeter CA Access Control provides a solid wall to prevent certain users accessing data and systems specified by Colruyt. Using the solution s Policy Model Database, Colruyt is able to manage permissions and regulate access to resources, programs and data via a central online graphical user interface. These are categorised by department and role for simple management. For example, developers working on HR applications are able to access HR data, however developers working on finance applications cannot. The solution is currently used to manage access rights for more than 200 members of the IT department using more than 24 different policies. The volume of both users and policies will increase as Colruyt extends its use of the CA solution to all its core production systems, which will eventually encompass more than seven production servers (on a total of 20). TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA 3
6 Although access policies can be complex and involve many variables, they are easily managed via the solution s policy management interface. Adding and updating policies, or adding new users, is also quick and straightforward as the solution s policy definitions are role-based and can be deployed automatically. Audit trails for easier compliance In addition to preventing unauthorised access to sensitive data, CA Access Control provides Colruyt with comprehensive audit trails of all access to HR and communications systems. POLICY-BASED ACCESS MANAGEMENT FOR INCREASED SECURITY Using CA Access Control, Colruyt can limit access to HR and applications and data according to user roles. The solution can even automatically provide tailored reports for demonstrating compliance with specific legislation, such as the Sarbanes-Oxley Act, or ISO standards accreditation. FIGURE A 4 TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA
7 SECTION 3: BENEFITS Improved data security reduces risk Using CA Access Control, Colruyt is able to safeguard sensitive data while minimising the IT management overhead. The CA Identity & Access Management solution provides a cost-effective foundation for our internal security policies, comments Coulier. It is easy to manage, and its fine-grained controls enable us to achieve the correct balance between privacy and providing necessary access to systems. The CA Identity & Access Management solution provides a cost-effective foundation for our internal security policies. It is easy to manage, and its fine-grained controls enable us to achieve the correct balance between privacy and providing necessary access to systems. Hein Coulier Security Officer, Colruyt By enhancing its Identity & Access Management capabilities on core systems, Colruyt is able to: SAFEGUARD BUSINESS CONTINUITY AND REDUCE RISK Colruyt can protect its HR and systems from malicious sabotage, which could impact availability and therefore business continuity. SIMPLIFY COMPLIANCE WITH DATA PRIVACY LEGISLATION CA Access Control prevents unauthorised access to core data and systems in line with European privacy laws. PROTECT COMPANY REPUTATION Colruyt s 20,000 employees know that their personal data, such as home address, address and salary, are protected from unauthorised access and possible identity theft. Shareholders can also rest assured that the company is compliant and operating within accepted risk parameters. In addition to current privacy legislation, Colruyt is fully aware that regulations are constantly changing, and that rules governing access to financial systems could soon become a reality for businesses operating outside of the US. CA Access Control has given us a head-start for complying with any legislation that mirrors the Sarbanes-Oxley Act, adds Coulier. The company also has a head-start for securing other systems via the CA solution. CA Access Control is highly scalable, which will be key as the company continues to grow its business and establish greater levels of IT automation. TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA 5
8 SECTION 4: CONCLUSIONS Compliance, customer service levels and a company s reputation can all be impacted by poor data protection. To ensure that systems are protected against unauthorized access, organisations need to establish an effective Identity & Access Management strategy. This is particular key when safeguarding access to core production systems and raw data, which could be used for identify theft. Using an automated Identity & Access Management solution with policy-driven security management, organisations can easily administer a plethora of user accounts with varying access privileges. This will not only help to protect data but also safeguard compliance and business continuity. To learn more about the CA Identity & Access Management architecture and technical approach, visit 6 TECHNOLOGY BRIEF: PREVENTING UNAUTHORISED ACCESS TO CRITICAL SYSTEMS AND DATA
9 CA, one of the world s largest information technology (IT) management software companies, unifies and simplifies the management of enterprise-wide IT for greater business results. Our vision, tools and expertise help customers manage risk, improve service, manage costs and align their IT investments with their business needs. Learn more about how CA can help you transform your business at ca.com
CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.
TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive
Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM
CUSTOMER SUCCESS STORY Logica Sweden provides secure and compliant cloud services with CA IdentityMinder TM CUSTOMER PROFILE Industry: IT services Company: Logica Sweden Employees: 5,200 (41,000 globally)
agility made possible
SOLUTION BRIEF CA Technologies and NetApp Integrated Service Automation Across the Data Center can you automate the provisioning and management of both virtual and physical resources across your data center
The Eight Dimensions of Customer Experience for Financial Services
WHITE PAPER: FINANCIAL SERVICES The Eight Dimensions of Customer Experience for Financial Services OCTOBER 2007 Table of Contents Executive Summary SECTION 1 2 Financial Institutions Shift Their Focus
Atkins safeguards availability of client s geospatial systems with a CA AppLogic private cloud environment
CUSTOMER SUCCESS STORY Atkins safeguards availability of client s geospatial systems with a CA AppLogic private cloud environment CLIENT PROFILE Industry: Engineering Company: Atkins Employees: 17,700
Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM.
CUSTOMER TECHNICAL BRIEF: CREATING A CENTRALISED MATURITY MODEL FOR PROJECT AND RESOURCE MANAGEMENT Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM. Table of Contents
how can I improve performance of my customer service level agreements while reducing cost?
SOLUTION BRIEF CA Business Service Insight for Service Level Management how can I improve performance of my customer service level agreements while reducing cost? agility made possible By automating service
Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?
SOLUTION BRIEF: CA INFORMATION GOVERNANCE Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? CA Information Governance delivers
Logicalis delivers low-risk, cost-effective cloud computing services with CA Technologies
CUSTOMER SUCCESS STORY Logicalis delivers low-risk, cost-effective cloud computing services with CA Technologies CUSTOMER PROFILE Industry: IT services Organisation: Logicalis Employees: 1,900 Revenue:
CA Technologies Healthcare security solutions:
CA Technologies Healthcare security solutions: Protecting your organization, patients, and information agility made possible Healthcare industry imperatives Security, Privacy, and Compliance HITECH/HIPAA
CA Process Automation for System z 3.1
PRODUCT SHEET CA Process Automation for System z CA Process Automation for System z 3.1 CA Process Automation for System z helps enable enterprise organizations to design, deploy and administer automation
Finansbank enhances competitive advantage with greater control of 500 IT projects
CUSTOMER SUCCESS STORY Finansbank enhances competitive advantage with greater control of 500 IT projects CUSTOMER PROFILE Industry: Financial services Company: Finansbank/IBTech Profit: 344 mio TRL (230
Radix Technologies China establishes compelling cloud services using CA AppLogic
CUSTOMER SUCCESS STORY Radix Technologies China establishes compelling cloud services using CA AppLogic CUSTOMER PROFILE Industry: IT services Company: Radix Technologies China Employees: 25 BUSINESS Radix
Nordea saves 3.5 million with enhanced application portfolio management
CUSTOMER SUCCESS STORY Nordea saves 3.5 million with enhanced application portfolio management CUSTOMER PROFILE Industry: Financial services Company: Nordea Bank Employees: 30,000 Total assets: 581 billion
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
KASIKORNBANK eliminates nearly 30,000 helpdesk calls a year with automated identity management
CUSTOMER SUCCESS STORY KASIKORNBANK eliminates nearly 30,000 helpdesk calls a year with automated identity management CUSTOMER PROFILE Industry: Financial services Company: KASIKORNBANK Employees: 16,193
CA Technologies optimizes business systems worldwide with enterprise data model
CUSTOMER SUCCESS STORY CA Technologies optimizes business systems worldwide with enterprise data model CLIENT PROFILE Industry: IT Organization: CA Technologies Employees: 13,600 Revenue: $4.8 billion
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
Identity and Access Management (IAM) Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control agility made possible Enterprises Are Leveraging Both On-premise and Off-premise
Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services
CUSTOMER SUCCESS STORY Broadcloud improves competitive advantage with efficient, flexible and scalable disaster recovery services CLIENT PROFILE Industry: IT services Company: Broadcloud Staff: 40-plus BUSINESS
SOLUTION BRIEF SEPTEMBER 2014. Healthcare Security Solutions: Protecting your Organization, Patients, and Information
SOLUTION BRIEF SEPTEMBER 2014 Healthcare Security Solutions: Protecting your Organization, Patients, and Information SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT 94% of healthcare organizations
A to Z Information Services stands out from the competition with CA Recovery Management solutions
Customer success story October 2013 A to Z Information Services stands out from the competition with CA Recovery Management solutions Client Profile Industry: IT Company: A to Z Information Services Employees:
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?
SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content
CA Virtual Assurance for Infrastructure Managers
DATA SHEET CA Virtual Assurance for Infrastructure Managers (Includes CA Systems Performance for Infrastructure Managers) CA Virtual Assurance for Infrastructure Managers (formerly CA Virtual Performance
Building a Roadmap to Robust Identity and Access Management
Building a Roadmap to Robust Identity and Access Management Elevating IAM from Responsive to Proactive From cases involving private retailers to government agencies, instances of organizations failing
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies
CUSTOMER SUCCESS STORY ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies CLIENT PROFILE Industry: IT services Company: ScaleMatrix Employees: 60 BUSINESS
CA NSM System Monitoring Option for OpenVMS r3.2
PRODUCT SHEET CA NSM System Monitoring Option for OpenVMS CA NSM System Monitoring Option for OpenVMS r3.2 CA NSM System Monitoring Option for OpenVMS helps you to proactively discover, monitor and display
Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer
PRODUCT FAMILY SHEET Enterprise Report Management Enterprise Report Management CA View, CA Deliver, CA Dispatch, CA Bundl, CA Spool, CA Output Management Web Viewer CA Technologies provides leading software
CA Compliance Manager for z/os
PRODUCT SHEET CA Compliance Manager for z/os CA Compliance Manager for z/os CA Compliance Manager for z/os (CA Compliance Manager) provides your organization with a single source for real-time, compliancerelated
Fujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions
CUSTOMER SUCCESS STORY Fujitsu Australia and New Zealand provides cost-effective and flexible cloud services with CA Technologies solutions CLIENT PROFILE Industry: IT Services Company: Fujitsu Australia
SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite
SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the
CA Configuration Automation
PRODUCT SHEET: CA Configuration Automation CA Configuration Automation agility made possible CA Configuration Automation is designed to help reduce costs and improve IT efficiency by automating configuration
how can I comprehensively control sensitive content within Microsoft SharePoint?
SOLUTION BRIEF Information Lifecycle Control for Sharepoint how can I comprehensively control sensitive content within Microsoft SharePoint? agility made possible CA Information Lifecycle Control for SharePoint
The National Commission of Audit
CA Technologies submission to The National Commission of Audit November, 2013 Kristen Bresch CA Technologies Executive Summary CA Technologies is pleased to present the National Commission of Audit the
agility made possible
SOLUTION BRIEF CA IT Asset Manager how can I manage my asset lifecycle, maximize the value of my IT investments, and get a portfolio view of all my assets? agility made possible helps reduce costs, automate
CA Encryption Key Manager r14.5
PRODUCT SHEET CA Encryption Key Manager CA Encryption Key Manager r14.5 CA Encryption Key Manager is a z/os-based, software cryptographic solution that helps ensure the highest availability of encryption
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
Siemens uses CA Clarity PPM for project management of R&D for wind, solar and hydro solutions
CUSTOMER SUCCESS STORY Siemens uses CA Clarity PPM for project management of R&D for wind, solar and hydro solutions CLIENT PROFILE Industry: Energy Company: Siemens AG Employees: 82,000 Revenue: Siemens
Authentication Strategy: Balancing Security and Convenience
Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new
agility made possible
SOLUTION BRIEF ConfigXpress Utility in CA IdentityMinder can my identity management solution quickly adapt to changing business requirements and processes? agility made possible With the ConfigXpress tool
expanding web single sign-on to cloud and mobile environments agility made possible
expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online
Orchestrate IT Process with an Integrated Workflow Management
Orchestrate IT Process with an Integrated Workflow Management Table of Contents Introduction...3 What is Workload Automation?...4 Workflow...4 Workload...5 Combining Workflow and Workload...5 CA Workload
Provide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
CA SOLVE:Central Service Desk for z/os
PRODUCT SHEET CA SOLVE:Central Service Desk for z/os CA SOLVE:Central Service Desk for z/os CA SOLVE:Central Service Desk for z/os (CA SOLVE:Central for z/os) is a comprehensive service management solution
Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency
EXECUTIVE BRIEF Service Operations Management November 2011 Transforming IT Processes and Culture to Assure Service Quality and Improve IT Operational Efficiency agility made possible David Hayward Sr.
CA Message Manager. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA MESSAGE MANAGER CA Message Manager THE PROACTIVE MANAGEMENT OF EMAIL AND INSTANT MESSAGES IS INTEGRAL TO THE OVERALL STRATEGY OF INFORMATION GOVERNANCE. THERE ARE MANY COMPLEX CHALLENGES
CA Workload Automation
PRODUCT SHEET: CA Workload Automation CA Workload Automation Improve the availability of critical IT workload processes and schedules enterprise-wide by leveraging real-time IT automation, embedded workflow,
CA Clarity PPM. Overview. Benefits. agility made possible
PRODUCT SHEET CA Clarity PPM agility made possible CA Clarity Project & Portfolio Management (CA Clarity PPM) helps you innovate with agility, transform your portfolio with confidence, and sustain the
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
CA Telon Application Generator r5.1
PRODUCT SHEET CA Telon Application Generator CA Telon Application Generator r5.1 CA Telon Application Generator r5.1 (CA Telon AG) is an easy-tolearn, powerful application generator that provides the ability
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
CA Repository for z/os r7.2
PRODUCT SHEET CA Repository for z/os CA Repository for z/os r7.2 CA Repository for z/os is a powerful metadata management tool that helps organizations to identify, understand, manage and leverage enterprise-wide
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk John Hawley VP, Security CA Technologies September 2015 Today s Theme: Preparing for the Adversary How to Prepare Your Organization
The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide
SOLUTION BRIEF NIST FRAMEWORK FOR IMPROVING CRITICAL INFRASTRUCTURE CYBERSECURITY The NIST Framework for Improving Critical Infrastructure Cybersecurity - An Executive Guide SOLUTION BRIEF CA DATABASE
CA Workload Automation CA 7 Edition r11.3
PRODUCT SHEET CA Workload Automation CA 7 Edition CA Workload Automation CA 7 Edition r11.3 CA Workload Automation CA 7 Edition is a single-engine enterprisewide workload automation solution that allows
How Technology Supports Project, Program and Portfolio Management
WHITE PAPER: HOW TECHNOLOGY SUPPORTS PROJECT, PROGRAM AND PORTFOLIO MANAGEMENT SERIES 4 OF 4 How Technology Supports Project, Program and Portfolio Management SEPTEMBER 2007 Enrico Boverino CA CLARITY
Sallie Mae slashes change management costs and complexity with CA SCM
CUSTOMER SUCCESS STORY Sallie Mae slashes change management costs and complexity with CA SCM CUSTOMER PROFILE Industry: Financial services Company: Sallie Mae Customers: 23 million Student loan portfolio:
agility made possible
SOLUTION BRIEF Flexibility and Choices in Infrastructure Management can IT live up to business expectations with soaring infrastructure complexity and challenging resource constraints? agility made possible
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG. Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them?
SOLUTION BRIEF CA SERVICE MANAGEMENT - SERVICE CATALOG Can We Manage and Deliver the Services Needed Where, When and How Our Users Need Them? SOLUTION BRIEF CA DATABASE MANAGEMENT FOR DB2 FOR z/os DRAFT
Securely Outsourcing to the Cloud: Five Key Questions to Ask
WHITE PAPER JULY 2014 Securely Outsourcing to the Cloud: Five Key Questions to Ask Russell Miller Tyson Whitten CA Technologies, Security Management 2 WHITE PAPER: SECURELY OUTSOURCING TO THE CLOUD: FIVE
are you helping your customers achieve their expectations for IT based service quality and availability?
PARTNER BRIEF Service Operations Management from CA Technologies are you helping your customers achieve their expectations for IT based service quality and availability? FOR PARTNER USE ONLY DO NOT DISTRIBUTE
Asentinel Telecom Expense Management (TEM)
PRODUCT BRIEF: ASENTINEL TELECOM EXPENSE MANAGEMENT (TEM) Asentinel Telecom Expense Management (TEM) Asentinel 6.0 is a comprehensive global telecom expense management software solution encompassing the
CA Endevor Software Change Manager Release 15.1
PRODUCT SHEET CA Endevor Software Change Manager CA Endevor Software Change Manager Release 15.1 agility made possible CA Endevor Software Change Manager (CA Endevor SCM) helps organizations control all
CA Capacity Manager. Product overview. agility made possible
PRODUCT SHEET: CA Capacity Manager agility made possible CA Capacity Manager Business stakeholders demand application performance in support of their business goals. IT executives must deliver that service
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
The Future of Workload Automation in the Application Economy
The Future of Workload Automation in the Application Economy Success Requires Agility in the Application Economy The link between data center operations and business agility has never been stronger. If
Improving Service Asset and Configuration Management with CA Process Maps
TECHNOLOGY BRIEF: SERVICE ASSET AND CONFIGURATION MANAGEMENT MAPS Improving Service Asset and Configuration with CA Process Maps Peter Doherty CA TECHNICAL SALES Table of Contents Executive Summary SECTION
CA Top Secret r15 for z/os
PRODUCT SHEET: CA TOP SECRET FOR z/os we can CA Top Secret r15 for z/os CA Top Secret for z/os (CA Top Secret ) provides innovative, comprehensive security for your business transaction environments, including
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
FEMSA manages more than 80,000 IT, finance and HR tickets with CA Service Desk Manager
CUSTOMER SUCCESS STORY FEMSA manages more than 80,000 IT, finance and HR tickets with CA Service Desk Manager CLIENT PROFILE Industry: Consumer goods Company: FEMSA Employees: 177,000-plus (global) BUSINESS
CA NetMaster Network Management for TCP/IP r12.0
PRODUCT sheet: CA NETMASTER NETWORK MANAGEMENT FOR TCP/IP r12.0 CA NetMaster Network Management for TCP/IP r12.0 CA NetMaster Network Management for TCP/IP (CA NetMaster for TCP/IP) delivers capabilities
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
CA Arcot RiskFort. Overview. Benefits
PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud
Grants Management for CA Clarity PPM gives you the confidence to choose the RIGHT applicants, make the RIGHT decisions, award the RIGHT funds, and to
SOLUTION BRIEF: Grants Management for CA Clarity PPM March 2011 Can you manage the lifecycle of grants, reduce unwanted paperwork, and track the performance of awarded funds? you can Grants Management
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
Network Performance Management Solutions Architecture
Network Performance Management Solutions Architecture agility made possible Network Performance Management solutions from CA Technologies compliment your services to deliver easily implemented and maintained
Insights: Data Protection and the Cloud North America
Insights: Data Protection and the Cloud North America Survey Report May 2012 Table of Contents Executive Summary Page 3 Key Findings Page 4 Investment in data protection & DR operations Page 4 Data and
CA Chorus for Security and Compliance Management Deep Dive
Mainframe Optimization and Modernization CA Chorus for Security and Compliance Management Deep Dive Maddalena Tosoni Principal Engineering Services Architect CA Chorus Recap Improve Staff Efficiency CA
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
