SlideShare a Scribd company logo
1 of 32
Download to read offline
Getting	the	Most	from	Your	CA	Advanced	
Authentication	Solution
Charley	Chell	/	Mike	Ries
Security
CA	Technologies
Security
SCX03E
#CAWorld
2 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
For	Informational	Purposes	Only	
Terms	of	this	Presentation
©	2015	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.	The	presentation	provided at	CA	
World	2015	is	intended	for	information	purposes	only	and	does	not	form	any	type	of	warranty.	Some	of	the	specific	slides	with customer	
references	relate	to	customer's	specific	use	and	experience	of	CA	products	and	solutions	so	actual	results	may	vary.	
Certain	information	in	this	presentation	may	outline	CA’s	general	product	direction.	This	presentation	shall	not	serve	to	(i)	affect	the	rights	
and/or	obligations	of	CA	or	its	licensees	under	any	existing	or	future	license	agreement	or	services	agreement	relating	to	any	CA	software	
product;	or	(ii)	amend	any	product	documentation	or	specifications	for	any	CA	software	product.	This	presentation	is	based	on current	
information	and	resource	allocations	as	of	November	18,	2015,	and	is	subject	to	change	or	withdrawal	by	CA	at	any	time	without	notice.	The	
development,	release	and	timing	of	any	features	or	functionality	described	in	this	presentation	remain	at	CA’s	sole	discretion.	
Notwithstanding	anything	in	this	presentation	to	the	contrary,	upon	the	general	availability	of	any	future	CA	product	release referenced	in	
this	presentation,	CA	may	make	such	release	available	to	new	licensees	in	the	form	of	a	regularly	scheduled	major	product	release.	Such	
release	may	be	made	available	to	licensees	of	the	product	who	are	active	subscribers	to	CA	maintenance	and	support,	on	a	when and	if-
available	basis.	The	information	in	this	presentation	is	not	deemed	to	be	incorporated	into	any	contract.
3 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Abstract
Join	us	for	a	hands-on	lab	and	guided	session	that	will	show	you	how	to	take	
advantage	of	all	of	the	features	of	CA	Advanced	Authentication	to	help	you	
provide	both	a	better	user	experience	and	better	security.
You’ll	walk	through	behavioral	profiling	and	rule-building	 to	show	you	how	you	can	
achieve	close	to	“zero-touch”	authentication.	You	will	learn	how	to	create	
meaningful	reports	and	use	that	data	to	improve	authentication	effectiveness	and	
convenience.	You	will	see	several	demos	that	highlight	use	cases	for	the	product.	
We	will	also	be	collecting	your	input	and feedback	on	features	and	usability.	
Charley	Chell
CA	Technologies
Product	Mangement
Mike	Ries
CA	Technologies
Product	Development
4 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
What	We	Will	Cover
§ Rules	and	Scoring	/	Intro	to	Device	ID
§ Geolocation	Rules
§ User	Behavior	Profiling
§ Mobility	Index
§ Reports
§ Constructing	Your	Own	Rules
§ Using	Application-Specific	Data	in	Risk	Evaluation
§ Case	Management
5 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Short	Background	on	CA	Advanced	
Authentication
6 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
CA	Advanced	Auth
empowers	our	customers	to	
optimize	the	three	
dimensions	important	in	
authentication.
7 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
§ Easy	to	use	credentials
§ Low	customer	friction
§ No	need	for	training
§ Self-service	FYP/Change	
§ Easy	conversion	from	old	
credentials
§ Addition	of	risk	authentication
§ User	Behavior	as	a	factor
Convenience
8 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
§ Balance	of	strength	and	cost
§ Strength	of	credential	that	
meets	the	need
§ Credentials	from	multiple	
devices
§ Unbreachable Passwords
§ Secure	against	brute	force	and	
MITM	attacks
Security
9 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Business	Drivers	for	Advanced	Authentication
Convenience
Security
Convenience
Security
Costs
§ Per	user	not	per	credential	
pricing
§ Software	based	tokens	
minimize	costs	to	deploy	and	
manage
§ On	Premise,	Cloud	or	Hybrid	
options
Costs
10 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Advanced	Authentication	Marketure
Callouts
Authentication	 Hub
Authentication ReportingRule	Management
Historical	
Context
Case	
Manager
Incorporation
Callouts
Trust	Assessment
(Risk	Engine)	
Risk	Advice
Allow
Deny
Auth
Behavioral	
Model
Device	Details
Device	Type iPhone
Operating	System iOS	6.0
Browser Safari
Device	ID	Matched: Yes
User-Device	Associated: Yes
Machine	Fingerprint	(MFP)	Matched: Yes
MFP	Match	% 100
API	/	Authentication	Flow	Manager
Assessment
11 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Risk	Authentication
AUTHENTICATION
METHODS
RISK	ANALYSIS
TECHNIQUES
Make	real-time	decisions	
based	on	the	risk	of	
the	login	attempt
Where	is
the	user?
What	is	the	user
trying	to	do?
Is	the	action	
consistent	with	
history?
What	device	is	
being	used?
§ Behavioral	risk	modeling
§ Adaptive	scoring	engine
§ Dynamic	Rules
§ DeviceDNA™	device	identification
§ Transparent	data	collection
KEY	FEATURES
§ Frictionless	 customer	experience
§ Deep	integration	with	CA	SSO
§ Reduce	fraud	risk
§ Control	costs	associated	with	fraud
KEY	BENEFITS
12 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Let’s	Get	Our	Hands	Dirty
13 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Pre-work	Performed	Ahead	of	Time
§ We	created	orgs	and	admin	logins	for	each	of	you
§ We	created	a	rule	set	for	each	org	with	the	following	changes
– Implicit	user	creation	mode	enabled
– User	behavior	profiling	model	enabled
– Other	changes	to	standard	default	TBD	during	course	testing
§ Set	up	shortcuts	to	the	Administration	Console	and	Risk	
Sample	App
§ Modified	the	Risk	Sample	App	to	have	an	"Evaluate	Risk	*	10"	
checkbox. .
14 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Your	Accounts
§ For	pre-registered	attendees
§ For	others,	we’ll	set	you	up	now
Registrant Organization Login	Name Password
15 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Device	Identification	Logic	Flow
Read	the	DeviceID
and	Signature	from	
the	device
What	did	
we	read?
Compare	Signature	
to		devices	the	user	
has	used	in	the	past
Does	the	
Signature	match	
device’s	prior	
value?
High	
probability	
match	found
Existing	device	is	a	
verified	2nd
factor
New	Device
Existing	device	but	
device	trust	low
Signature
Only
DeviceID and	Signature
Signature	matched	within
threshold	tolerance
Signature	too	different
No
Yes
16 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	1:	Intro	to	Rules	and	Scoring	/	Intro	to	Device	ID
Familiarize	yourself with	how	to	use	the	sample	app,	log	into,	and	navigate	the	admin	
console. Understand	Risk	Score,	Risk	Advice,	and	Secondary	Authentication. Understand	
how	Secondary	Authentication	is	used	based	on	Risk	Advice.
1. Using	sample	app,	do	simple	Evaluate	Risk	using	your	org	admin	and	
specifying	your	org
– Note	unknown	device	ID
– Don't	store	Device	ID	/	Proceed	to	Post-Evaluate
2. Repeat
– Still	unknown	device	ID
3. Repeat
– This	time	store	Device	ID	/	Proceed	to	Post-Evaluate
– Allow
4. View	the	Rules	and	Scoring	Management	Page	to	see	what's	going	on
17 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Geo-location
§ The	solution	derives	the	geo-location	from	the	end-user’s	IP	address	by	
leveraging	third-party	Quova/Neustar IP	Intelligence	data.		
§ Quova provides	detailed	geo-location	information	such	as,	locale,	ISP,	
time	zone,	and	related	geographical	information	based	on	known	IP’s	and	
server	hop	routing	data.
§ The	Quova/Neustar database	download	and	updates	are	included	with	
the	CA	Risk	Authentication	software	license.
18 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	2:	Intro	to	Geolocation	Rules
Learn	how	geolocation	works.		Understand	where	we	get	the	data	from	and	
what	the	fields	each	mean.		Learn	geolocation,	zone	hopping,	negative	country,	
and	perhaps	anonymizing	proxies.
1. Enable	Zone	Hopping	rule
2. Using	the	sample	app,	modify	the	IP	address	to	simulate	logging	in	from	a	far-away	places,	
like
– Canada:	23.16.*.*,		Argentina:	24.232.*.*,	or	Antarctica:	46.36.195.0
3. Perform	Evaluate	Risk	with	the	modified	IP
– Note	Zone	Hopping	rule	fires	/	IncrAuth response
4. Now,	let's	add	a	country	to	the	Negative	Country	List	and	enable	the	Negative	Country	rule
– Choose	your	country	of	choice
5. Using	sample	app,	simulate	login	from	the	banned	country
– Note	Negative	Country	rule	fires	/	Deny	response
6. Disable	Zone	Hopping	Rule	so	that	it	does	not	interfere	with	Mobility	Index	Testing	coming	up
19 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
User	Behavior	Profiling
User	Behavioral	Profiling	understands	the	individual	patterns	of	each	
user	and	scores	the	abnormality	of	their	current	login	or	transaction	
against	their	established	pattern.		
•Do	they	exhibit	a	specific	pattern	or	not?	Time	of	Day	/	of	Week
•How	often	do	they	use	the	system?Frequency
•What	do	they	intend	to	accomplish?User	Actions
•Do	they	travel	or	stay	home?Location	Choices
•Do	they	always	use	particular	domains,	like	ca.comIP	Count	/	Domain	Count
•Or	particular	connection	types,	like	broadband?Connection	Type
•Are	they	likely	to	use	a	new	device?Device	Count
•Do	they	favor	a	particular	device	type?Device	Type
•Their	browser	and	language	preferences?Browser	Type	/	Language
20 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	3: Intro	to	User	Behavior	Profiling
Understand	how	User	Behavior	Profiling	works,	and	demonstrate	its	
functionality	by	generating	"anomalous"	logins
1. Create	Model	Score	Rule
– MODEL_SCORE	>	40	then	Increase	Auth
2. Choose	a	new	user	name,	perform	Evaluate	Risk	multiple	times
– Note	the	Evaluate	*10	option	in	the	sample	app		
– We	are	using	a	new	user	to	start	with	a	clean	slate,	so	that	the	calls	we	made	earlier	will	not	
influence	the	user	model
3. Now	perform	Evaluate	Risk	from	a	different	browser	but	with	a	different	IP	address	
(but	same	locale)
– Can	simulate	this	by	providing	copy/paste	MFP,	made	up	IP	address	(just	add	or	subtract	one	
to/from	the	last	octet)
4. Note	Model	Score	Rule	fired
5. Look	at	Analyze	Transactions	Report	and	note	high	model	score.
21 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	4: Intro	to	Mobility	Index
Explain	Mobility	Index	and	how	it	works	with	Model	Score	to	detect	anomalous	behavior. Demonstrate	how	
MI	is	affected	by	geographically	dispersed	 logins,	and	how	it	can	cause	an	increased	Model	Score. Explain	
how	once	a	user	has	established	a	high	Mobility	Index,	a	login	from	a	remote	location	will	no	longer	result	in	
a	high	model	score.
1. Using	an	alternate	user,	perform	generic	Evaluate	Risk	*	10
2. Look	at	report	– note	Mobility	Index	of	0
3. Perform	Evaluate	Risk	from	far-away	country	(e.g.	Argentina)
4. Note	Model	Score	is	fired
5. Far-away	location	with	low	Mobility	Index	increases	the	Model	Score
6. This	rule	complements	Zone	Hopping
– Zone	Hopping	detects	movement	that	is	faster	than	commercial	travel
– Mobility	Index	/	Model	Score	works	by	detecting	anomalous	behavior	– even	if	no	recent	logins,	the	
system	infers	that	a	login	from	Argentina	is	unusual
22 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	5:	Intro	to	Reports	
Show	various	reports	and	discuss	their	usefulness.		Show	the	ability	to	export	reports	to	a	spreadsheet.		
Discuss	how	looking	at	reports	can	allow	you	to	tune	your	ruleset,	such	as	when	a	rule	is	firing	too	frequently	
or	not	frequently	enough.		Mention	that	some	reports	only	apply	when	using	Case	Management.
1. Look	at	the	Analyze	Transactions	Report
– Note	that	it	shows	country,	IP	Address,	risk	score	/	advice,	device	ID,	Rule	Results,	Device	Type,	OS,	Browser,	etc.
– Note	that	it	shows	Model	Score	=	0	and	Mobility	Index	=	0
– Explain	that	this	is	because	we	have	not	turned	on	behavior	modelling,	which	we	will	do	in	the	next	exercise
2. Click	on	"detail"	for	one	of	the	rules	/	note	all	the	details
– Note	that	you	can	show	related	transactions	for	user,	device,	ip address
3. Look	at	the	Risk	Evaluation	Detail	Activity	Report
4. Look	at	the	Risk	Advice	Summary	Report
– Skip	Fraud	Statistics	Report	because	it	only	applies	when	using	Case	Management	(which	we	will	do	later)
– Look	at	the	Rule	Effectiveness	Report
– Skip	False	Positives	Report	because	it	only	applies	when	using	Case	Management	(which	we	will	do	later)
5. Look	at	the	Device	 Summary	Report
– Show	Export	Capability	(csv)
– Discuss	how	looking	at	reports	can	allow	you	to	tune	your	ruleset
– Maybe	have	model	enabled	by	default?
– Discuss	columns	that	only	apply	to	case	management
23 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	6:	Constructing	Your	Own	Rules
Demonstrate	the	ease	with	which	custom	rules	can	be	created
1. Using	the	rule	builder,	 create	a	custom	rule
– The	rule	will	specify	an	elevated	risk	if	the	user	has	performed	"forgot	password"	3	
times	in	the	last	24	hours.
– Transaction	Elements	/	Velocity	>=	3	In	last	24	Hours	for	Set	of	Actions	"FORGOT_PWD"
– Enable	/	Save	/	Migrate	to	Production	/	Refresh	Cache
2. With	Sample	App,	set	Additional	Data	ACTION	=	FORGOT_PWD
3. Do	this	3	times. On	third	time,	the	new	rule	fires.
4. Look	at	Analyze	Transactions	Report. Note	the	"Action"	column	shows	
FORGOT_PWD	for	these	transactions,	rather	than	Login
24 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	7:	Using	Application-Specific	Data	in	Risk	Evaluation
Discuss	Application-Specific	risk	evaluation	data	("Additional	
Input"). Demonstrate	how	to	create	a	rule	that	utilizes	this	data.
1. Using	the	rule	builder,	create	the	following	custom	rule
– Custom	Element	“DAYS_SINCE_LAST_LOGIN”	is	GREATER_THAN	 100
2. Using	sample	app,	Evaluate	Risk	with	the	additional	Input
– DAYS_SINCE_LAST_LOGIN	 =	100	-->	Rule	does	not	fire
– DAYS_SINCE_LAST_LOGIN	 =	101	-->	Rule	fires
3. Now	let's	modify	the	custom	rule	to	change	its	behavior
– DAYS_SINCE_LAST_LOGIN	 >	100	AND	NOT	TRUSTED_IP
4. Add	your	IP	Address	to	the	list	of	trusted	IPs
5. Evaluate	Risk	with	DAYS_SINCE_LAST_LOGIN	 =	200
– Rule	does	not	fire
6. Evaluate	Risk	again	with	DAYS_SINCE_LAST_LOGIN	 =	200	and	modified	IP	address	(not	on	trusted	list)
– Rule	fires
7. Disable	the	TRUSTED_IP	rule	and	repeat	the	last	two	Evaluate	Risk	calls
– Note	that	even	though	the	TRUSTED_IP	rule	is	disabled,	it's	still	evaluated	and	used	to	evaluate	your	custom	rule
25 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Case	Management
§ The	solution	provides	a	Case	Management	feature	that	enables	you	to	
investigate	transactions,	and	intuitively	and	effectively	manage	the	
transactions	that	are	marked	suspicious.		
§ This	feature	simplifies	the	challenge	of	recording	and	documenting	every	
phase	of	an	investigation,	creating	a	clear	and	comprehensive	trail	of	
activity.
§ This	feature	saves	time	by	automatically	creating	a	report	of	the	findings,	
including	a	detailed	listing	of	reason,	recommendation,	geo-location	
information,	connection	details,	and	risk	assessment	details
26 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	8: Intro	to	Case	Management
Discuss	Case	Management	and	how	it	can	be	used	to	mark	fraud. Discuss	how	
this	can	also	be	used	to	assess	False	Positives,	thereby	providing	input	that	can	
be	used	to	tune	rulesets.
1. Set	up	Case	Mangement
– Click	on	Case	Management	/	Manage	Queues
– Select	Default	Queue
– Assign	yourself	as	a	selected	administrator	to	the	queue
– Order	by	Date	Created	Ascending
– Save	/	Refresh	Cache
27 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Exercise	8: Intro	to	Case	Management
Discuss	Case	Management	and	how	it	can	be	used	to	mark	fraud. Discuss	how	
this	can	also	be	used	to	assess	False	Positives,	thereby	providing	input	that	can	
be	used	to	tune	rulesets.
1. Case	Management	/	Work	on	Cases
– Note	that	there	is	one	case	per	user	name,	and	each	case	contains	several	alerts	aggregated	to	one	case
2. Select	some	transactions	(e.g.,	all	from	Argentina	not	set	to	Allow),	and	mark	them	as	"confirmed	fraud"
– In	the	note,	select	"Called	the	Cardholder	- Cardholder	confirmed	not	doing	the	transactions"
– In	the	Additional	Note,	type	"The	cardholder	says	he	never	left	the	United	States."
– Set	Case	Status	to	In	Progress
– Click	Save
3. Mark	the	rest	of	the	transactions	as	"Confirmed	Genuine"
– Set	Case	Status	to	Closed
– Set	Note	to	"Called	the	Cardholder	- Cardholder	confirmed	doing	the	transactions"
– Click	Save
4. Move	to	the	next	case	and	mark	all	as	Genuine,	clear	off	all	cases	in	the	queue
5. Look	at	the	Fraud	Statistics	Report
6. Look	at	the	False	Positives	Report
28 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Recap
29 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
What	We	Covered
§ Rules	and	Scoring	/	Intro	to	Device	ID
§ Geolocation	Rules
§ User	Behavior	Profiling
§ Mobility	Index
§ Reports
§ Constructing	Your	Own	Rules
§ Using	Application-Specific	Data	in	Risk	Evaluation
§ Case	Management
30 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCT10S
Case	Study:		Implementing	CA	Strong	Authentication	in	
30	days
11/18/2015	at	12:15	PM
SCT05S
Roadmap:	CA	Advanced	Authentication	and	CA	Single	
Sign-On	
11/18/2015	at	4:30	PM
SCT25T
Tech	Talk:	Preventing	Data	Breaches	with	Risk	Aware	
Session	 Management
11/18/2015	at	2:00	PM
SCT24T
Tech	Talk:	Mobile	Risk	Analysis:	Take	Your	Mobile	App	
Security	to	the	Next	Level
11/19/2015	at	1:00	PM
31 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Must	See	Demos
Protect	Against	
Fraud	&	Breaches
CA	Advanced	Auth
Security	Theater
Engage	
Customers
CA	SSO
Security	Theater
Innovation	– IoT
Slot	Car
CA	AA,	APIM
Security	Theater
Secure	Omni-
Channel	Access
CA	AA,	APIM,	SSO
Security	Theater
CA	Product	Management
charley.chell@ca.com
Charley	Chell

More Related Content

What's hot

Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2Justin Richer
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへFIDO Alliance
 
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況FIDO Alliance
 
Implementing WebAuthn & FAPI supports on Keycloak
Implementing WebAuthn & FAPI supports on KeycloakImplementing WebAuthn & FAPI supports on Keycloak
Implementing WebAuthn & FAPI supports on KeycloakYuichi Nakamura
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...AURACA
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSMITRE ATT&CK
 
Web Authentication API
Web Authentication APIWeb Authentication API
Web Authentication APIFIDO Alliance
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyesThousandEyes
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and PracticesPrabath Siriwardena
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater Apigee | Google Cloud
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...TI Safe
 
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan VMware Tanzu
 
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020OpenID Foundation Japan
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Iftikhar Ali Iqbal
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationPCCW GLOBAL
 
Token, token... From SAML to OIDC
Token, token... From SAML to OIDCToken, token... From SAML to OIDC
Token, token... From SAML to OIDCShiu-Fun Poon
 

What's hot (20)

Mit 2014 introduction to open id connect and o-auth 2
Mit 2014   introduction to open id connect and o-auth 2Mit 2014   introduction to open id connect and o-auth 2
Mit 2014 introduction to open id connect and o-auth 2
 
「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ「開けゴマ!」からYubiKeyへ
「開けゴマ!」からYubiKeyへ
 
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
2020 0218 - パスワードのいらない世界へ:FIDOアライアンスとFIDO認証の最新状況
 
Implementing WebAuthn & FAPI supports on Keycloak
Implementing WebAuthn & FAPI supports on KeycloakImplementing WebAuthn & FAPI supports on Keycloak
Implementing WebAuthn & FAPI supports on Keycloak
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
Design of small to large multi site solution, based on 8300, 8800 simplex, 88...
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
Web Authentication API
Web Authentication APIWeb Authentication API
Web Authentication API
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
 
API Security : Patterns and Practices
API Security : Patterns and PracticesAPI Security : Patterns and Practices
API Security : Patterns and Practices
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
 
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
CLASS 2022 - Sergio Sevileanu (Siemens) e Felipe Coelho (Claroty) - Habilitan...
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
Secure Credential Management with CredHub - DaShaun Carter & Sharath Sahadevan
 
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID  - OpenID Summit 2020
次世代 IDaaS のポイントは本人確認 NIST と、サプライチェーンセキュリティと、みなしご ID - OpenID Summit 2020
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 
Single Sign-On Best Practices
Single Sign-On Best PracticesSingle Sign-On Best Practices
Single Sign-On Best Practices
 
Token, token... From SAML to OIDC
Token, token... From SAML to OIDCToken, token... From SAML to OIDC
Token, token... From SAML to OIDC
 

Similar to Getting the Most from Your CA Advanced Authentication Solution

Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...CA Technologies
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...CA Technologies
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a ServiceCA Technologies
 
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Build Your Own Virtual API
Build Your Own Virtual APIBuild Your Own Virtual API
Build Your Own Virtual APICA Technologies
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made EasierCA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesCA Technologies
 
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.CA Technologies
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Technologies
 
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test Ian Kelly
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashCA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumCA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?CA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldCA Technologies
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...CA Technologies
 
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...CA Technologies
 

Similar to Getting the Most from Your CA Advanced Authentication Solution (20)

Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Build Your Own Virtual API
Build Your Own Virtual APIBuild Your Own Virtual API
Build Your Own Virtual API
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
 
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
 
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
CA World 2015 Using Docker and Containers to create Bespoke Systems Under Test
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
 
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Getting the Most from Your CA Advanced Authentication Solution