SlideShare a Scribd company logo
1 of 29
Download to read offline
World®
’16
Five	Easy	Steps	for	Migrating	
to	CA	Directory
Greg	Vickery,			Principal	Services	Consultant,	CA	Technologies
SCX12E
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Join	us	for	a	discussion	on	the	steps	for	migrating	your	current	User	Store	or	Policy	Store	to	CA	
Directory. We	will	discuss	discovery	and	project	scoping,	along	with	Building	the	CA	Directory	
environment,	Schema	(Data	Type)	migration,	Data	clean-up	and	Application	Team	sign-off.
Greg	Vickery
CA	Technologies
Principal	Services	
Consultant
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
WHY	MIGRATE	TO	CA	DIRECTORY
DESIGN	THE	NEW	DIRECTORY
GO	LIVE!
LDAP	TO	CA	DIRECTORY	TASKS
MIGRATING	DATABASE	TO	CA	DIRECTORY	TASKS
APPLICATION	TESTING
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Directory	Review
§ Application	communicating	
with	a	data	store
– Via	protocol	- LDAP
§ Data	store	may	contain:
– policy	information
– Authentication	Info
– Authorization	Info	
– or	Any	other	Data
Level	set	the	conversation
Application	Layer
LDAP
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Why	CA	Directory
§ Performance
– Replication	– all	Directories	are	synced	
(often	measured	in	milliseconds)
§ Small	footprint	– Very	large	environments	w/	fewer	servers	
§ Scalability	– 50++	million	is	OK
– Only	Limited	by	hardware	
– Can	horizontally	scale	(virtually	no	limits)
CA	experiencing	a	larger	migration	to	CA	Directory
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Why	CA	Directory
§ Monitoring	multiple	ways
– Log	files	for	accurate	record	of	activity
– Time	log	to	validate	performance	
– Real-time	monitoring	with	SNMP
§ Including	SNMP	tool
§ Operational	Advantages	(easy	to	manage)
– Data	and	indexes	need	no	tuning
– Very	fast	backup	and	restore
– Few	moving	parts
CA	experiencing	a	larger	migration	to	CA	Directory
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Types	of	Migration
§ Existing	LDAP	environment	to	CA	Directory	
– Most	common	Migration	for	User	Store	environments
– May	have	very	short	project	lengths	(quick)
§ Existing	Database	environment	to	CA	Directory	
– Generally	requires	more	tasks
– More	Benefits	are	realized
§ Replication	in	directory	much	faster	than	databases
§ Datacenter	to	Datacenter	(WAN)	replication	is	easy
Two	migration	types	from	the	field
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
5	Steps	of	Migration
§ Architect	the	New	CA	Directory	environment	
§ Schema	(Data	Definition)	Migration
§ Data	Migration
§ Application	Testing	
§ Go	Live!
Overview	of	Tasks
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	Existing	LDAP	to	CA	Directory
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Architecting	the	CA	Directory	solution
§ CA	Directory	Architecture
– Typically	requires	less	servers	than	LDAP	Servers
– Don’t	be	afraid	to	design	for	the	strengths	of	the	CA	Directory
§ One	to	One	replacement	could	be	bad	design
§ AND	- Departure	from	old	design	my	allow	us	to	optimize	the	design
– Hardware	Requirements	(Server	Specs)	may	change
§ CA	Directory	is	a	memory	resident	directory
§ Changing	O/S	may	be	an	option
View	as	a	chance	to	optimize
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	the	Schema
§ Schema	Migration
– CA	Directory	tools	
§ dxschemaldif - extracts	schema	from	existing	LDAP	servers
§ ldif2dxc – formats	LDIF	to	CA	Directory	configuration
– Focus	is	on	your	custom	schema
§ Although	we	have	had	to	change	standard	schema	to	support	apps
– Most	LDAP	Servers	have	relaxed	schema
§ May	have	text	OID
§ Tools	will	supply	valid	OIDs	during	conversion
Define	Tasks
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	the	Data
§ Export	Data	From	existing	LDAP	Server
– In	most	cases	use	existing	LDAP	Server	tools	to	pull	the	data
– Some	other	vendor	tools	may	be	able	to	exclude	proprietary	data
§ Clean	Data
– Could	be	the	most	time	consuming	portion	of	migration
– Create	or	adapt	existing	data	clean	tool
– Remove	LDAP	Server	specific	Data	(proprietary	data)
§ Import
– May	find	more	data	issues	here	– Update	clean	tool	and	run	again
Cleaning	the	data	for	import
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	the	Data	(continued)
§ A	large	number	of	hours	could	be	involved	with	this	process
– Ongoing	process,	tool	may	be	updated	several	times.
§ The	data	clean	process	will	be	run	in	multiple	environments
– Dev,	QA,	Staging,	etc.	before	Production	(Go	Live)
– Each	environment	may	have	unique	data	anomalies	
§ Opportunity	to	re-organize	or	remove	unwanted	data
– Legacy	/unused	attributes	can	be	removed
– Often	find	attributes	that	are	misused
§ Example:			telephoneNumber (attribute)	with	a	value	of	‘out	of	the	country’
Case	Study	(field	experiences)
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	the	Data	(continued)
§ Do	you	plan	to	sync	old	and	new	environments?
– “One	foot	in	the	boat,	one	foot	on	the	dock”
– CA	Directory	has	some	limited	ability	to	sync	(DXLink)
– Sync	may	introduce	an	new	(3rd)	component	to	the	environment
§ May	require	additional	expertise	
§ Will	have	performance	implications	(slowing	the	new	environment)
– Sync	tool	may	be	slower	than	new	directory	server
– Highly	likely	the	old	environment	may	be	slower	than	the	new	environment
§ If	sync	process	fails	– is	this	cause	for	rollback?
– Manual	recovery	(rollback)	may	be	faster
Other	Considerations
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Application	Verification
§ Identify	Applications	for	testing	and	verification
– Typically	sample	group	of	representative	applications	will	be	used
§ Develop	a	test	plan	for	testing	applications
§ Identify	Required	Resources	(personnel)	needed	for	rollout
§ The	process	should	be	run	(and	refined)	in	multiple	
environments	before	production	
– Time	all	phases,	can	the	process	be	executed	within	our	outage	window
Test	Plan	to	verify	applications	work	with	new	environment
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Go	Live
§ Pre-Go	Live	(sometime	before	GO	Live):
– Transform	the	test	plan	into	rollout	script	and	check	list	(process)
– The	process	should	be	run	in	multiple	environments	before	production
– Include	a	Roll-back	Plan	in	case	of	issues	or	unexpected	disruptions
– Verify	the	correct	personnel	are	available	
§ Directory	Team,	Operations,	Application	owners,	Vendors,	etc.
§ Execute	rollout	script
– Success!		- Meet	the	next	day	with	the	entire	team	to	review
Cutover	to	Production
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	Existing	Database	to	
CA	Directory
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	Database	to	CA	Directory
§ User	Store
– CA	Directory	has	faster	replication	(Datacenter	to	Datacenter)
§ Policy	Store	(CA	SSO)
– Very	Cost	effective	
§ Session	Store	(CA	SSO)
– CA	Directory	is	the	only	Directory	/	LDAP	server	supported	as	session	store
– Datacenter	to	Datacenter	Database	synchronization	is	expensive
Advantages	to	migrate	the	different	environments
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	Database	to	CA	Directory
§ Involves	more	tasks	than	LDAP	User	store	conversion
§ Create	CA	Directory	Schema
§ No	Schema	to	export
§ Convert	Fields	to	attributes
§ Convert	Tables	to	objectClasses
§ May	be	able	to	use	CA	Directory	‘Views’	configuration	to	replace	stored	
procedures
Migrating	User	Store	From	Database
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	Database	to	CA	Directory
§ CA	Directory	‘Views’	Configuration
– ‘Views’	configuration	may	be	able	to	replace	certain	stored	procedures
§ Views	are	pre-defined	searches	with	multiple	‘phases’
§ Application	conversion	
§ Applications	will	need	to	be	LDAP	enabled
§ Develop	as	LDAP	Requests	(different	than	SQL	Requests)
§ Testing	the	functionality	
– Start	at	beginning	of	project
– More	complete	set	of	use	cases										
Migrating	User	Store	From	Database	(continued)
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	Database	to	CA	Directory
§ Steps	for	migration	of	Policy	Store	Data
– Build	CA	Directory	Server	environment	(in	CA	SSO	Guide)
§ Build	DIT	(Tree)	structure	for	Policy	Store	data
§ Add	Policy	Data	Schema	files	to	CA	Directory
– Extract	Data	from	current	Policy	Store
§ Use	the	available	CA	SSO	Tools	to	export	the	policies
§ This	process	is	the	same	whether	Database	or	LDAP	Server
– Configure	CA	SSO	Policy	Server	for	new	Policy	Store
– Import	Policies	into	CA	Directory
§ Using	the	CA	SSO	Import	tool
CA	SSO	(formerly	SiteMinder)	Policy	Store
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Migrating	Database	to	CA	Directory
§ Steps	for	migration	of	Session	Store	Data
– Add	Session	Data	Schema	files	to	CA	Directory
– Determine	performance	requirements:
§ Calculate	number	of	concurrent	sessions
§ Factor	the	session	timeout	(or	average	session	life)	
– CA	Directory	as	a	session	store	has	specialized	configuration
§ Documentation	outlines	the	specific	settings
– Hardware	intensive	for	high	demand	environments
§ Consult	CA	for	hardware	guidelines
– Configure	CA	SSO	Policy	Server	to	use	CA	Directory	
CA	SSO	Session	Store
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Review	of	Migration	Steps
§ Architect	the	new	solution
– Don’t	be	afraid	to	change	from	old	design
§ Schema	Migration
– Utilize	CA	Directory	tools
§ Data	Migration
– May	be	time	consuming
§ Test	Application
§ GO	Live
Quick	Recap
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCT45T	 How	Fast	is	your	Directory? 11/16/2016	at	4:30	pm
SCX20S
CA	Roadmap:	Advanced	Authentication,	Single	Sign-On,	
Directory
11/16/2016	at	1:45	pm
SCT44T WAM	&	Federation	(Tech	Talk) 11/17/2016	at	4:30	pm
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Don’t	Miss	Our	INTERACTIVE
Security	Demo	Experience!
SNEAK
PEEK!
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.27 @CAWORLD					#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com

More Related Content

What's hot

Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentBest Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentCA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
 
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...CA Technologies
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InCA Technologies
 
Improving Delivery and Execution at Vantiv
Improving Delivery and Execution at VantivImproving Delivery and Execution at Vantiv
Improving Delivery and Execution at VantivCA Technologies
 
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Technologies
 
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...CA Technologies
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Technologies
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
 
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...CA Technologies
 
Transforming your organization to be Value Focused
Transforming your organization to be Value FocusedTransforming your organization to be Value Focused
Transforming your organization to be Value FocusedCA Technologies
 
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerCA Technologies
 
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...CA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCA Technologies
 
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesCA Technologies
 
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...CA Technologies
 

What's hot (20)

Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentBest Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
Pre-Con Ed: Workshop on Policy Creation, Management and Support for OAuth and...
 
Cisco’s Agile Journey
Cisco’s Agile JourneyCisco’s Agile Journey
Cisco’s Agile Journey
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
 
Improving Delivery and Execution at Vantiv
Improving Delivery and Execution at VantivImproving Delivery and Execution at Vantiv
Improving Delivery and Execution at Vantiv
 
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
CA Project & Portfolio Management and MS Project Integration: Tips, Tricks an...
 
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
Pre-Con Ed: CA API Gateway: Managing and Migrating Policies with the Gateway ...
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
 
Transforming your organization to be Value Focused
Transforming your organization to be Value FocusedTransforming your organization to be Value Focused
Transforming your organization to be Value Focused
 
Deep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access ManagerDeep Dive: CA Privileged Access Manager
Deep Dive: CA Privileged Access Manager
 
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
Hands-on Lab: Get a Jumpstart on CA Service Management's New Jaspersoft Repor...
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
 
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
 
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...Case Study: Integrating Service Management Processes to Improve Systems Stabi...
Case Study: Integrating Service Management Processes to Improve Systems Stabi...
 

Viewers also liked

Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)Nuno Correia
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computingJorge Sebastiao
 
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기DoHyun Jung
 
처음 시작하는 라라벨
처음 시작하는 라라벨처음 시작하는 라라벨
처음 시작하는 라라벨KwangSeob Jeong
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesCA Technologies
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherSalesforce Admins
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Kelly Grizzle
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOCA Technologies
 
Menu of Betawi (Jakarta) Culture by Wahyu Arief
Menu of Betawi (Jakarta) Culture by Wahyu AriefMenu of Betawi (Jakarta) Culture by Wahyu Arief
Menu of Betawi (Jakarta) Culture by Wahyu AriefWahyu Arief
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy BeyondTrust
 
Medienbildung an Grundschulen in Baden-Württemberg
Medienbildung an Grundschulen in Baden-WürttembergMedienbildung an Grundschulen in Baden-Württemberg
Medienbildung an Grundschulen in Baden-WürttembergUnivention GmbH
 
c.a.p.e. IT KIX4OTRS - Die Service App im UCS
c.a.p.e. IT KIX4OTRS - Die Service App im UCSc.a.p.e. IT KIX4OTRS - Die Service App im UCS
c.a.p.e. IT KIX4OTRS - Die Service App im UCSUnivention GmbH
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsSociety of Women Engineers
 

Viewers also liked (18)

Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
Biologia – 12º Ano (ReproduçãO Humana E ManipulaçãO Da Fertilidade)
 
Día #17
Día #17Día #17
Día #17
 
Día #7
Día #7Día #7
Día #7
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computing
 
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
발렌타인 웨비너 7회 - React를 이용한 웹 앱 개발 살펴보기
 
처음 시작하는 라라벨
처음 시작하는 라라벨처음 시작하는 라라벨
처음 시작하는 라라벨
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
 
Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0Master IAM in the Cloud with SCIM v2.0
Master IAM in the Cloud with SCIM v2.0
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
 
Menu of Betawi (Jakarta) Culture by Wahyu Arief
Menu of Betawi (Jakarta) Culture by Wahyu AriefMenu of Betawi (Jakarta) Culture by Wahyu Arief
Menu of Betawi (Jakarta) Culture by Wahyu Arief
 
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy Defense in Depth: Implementing a Layered Privileged Password Security Strategy
Defense in Depth: Implementing a Layered Privileged Password Security Strategy
 
Ficha 3 tipo de erupções
Ficha 3  tipo de erupçõesFicha 3  tipo de erupções
Ficha 3 tipo de erupções
 
Medienbildung an Grundschulen in Baden-Württemberg
Medienbildung an Grundschulen in Baden-WürttembergMedienbildung an Grundschulen in Baden-Württemberg
Medienbildung an Grundschulen in Baden-Württemberg
 
c.a.p.e. IT KIX4OTRS - Die Service App im UCS
c.a.p.e. IT KIX4OTRS - Die Service App im UCSc.a.p.e. IT KIX4OTRS - Die Service App im UCS
c.a.p.e. IT KIX4OTRS - Die Service App im UCS
 
WE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security ControlsWE16 - Defense in Depth: Top 10 Critical Security Controls
WE16 - Defense in Depth: Top 10 Critical Security Controls
 
Urbanização brasileira
Urbanização brasileiraUrbanização brasileira
Urbanização brasileira
 
Aula metamorfismo
Aula metamorfismoAula metamorfismo
Aula metamorfismo
 

Similar to Pre-Con Ed: Five Easy Steps for Migrating to CA Directory

Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
 
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...CA Technologies
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...CA Technologies
 
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®CA Technologies
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service VirtualizationCA Technologies
 
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep DivePre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep DiveCA Technologies
 
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...CA Technologies
 
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...CA Technologies
 
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowSlaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowCA Technologies
 
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...CA Technologies
 
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...CA Technologies
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadCA Technologies
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldCA Technologies
 
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...CA Technologies
 
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...CA Technologies
 
Microservices Built for Digital Consumption
Microservices Built for Digital ConsumptionMicroservices Built for Digital Consumption
Microservices Built for Digital ConsumptionCA Technologies
 
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementPre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementCA Technologies
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsCA Technologies
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...CA Technologies
 
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementPre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementCA Technologies
 

Similar to Pre-Con Ed: Five Easy Steps for Migrating to CA Directory (20)

Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
 
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
Tech Talk: Coty Transforms from Event Management to Service Operations Manage...
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
 
Introduction to Service Virtualization
Introduction to Service VirtualizationIntroduction to Service Virtualization
Introduction to Service Virtualization
 
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep DivePre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
 
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
Tech Talk: Monitor Cisco ACI Software-Defined Data Center Performance for Max...
 
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
 
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowSlaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
 
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
Pre-Con Ed: Your Voice Counts! Customer Driven Requirements for CA Workload A...
 
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
Pre-Con Ed: Streamline Agile Workload Automation Processes for a Repeatable a...
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
 
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
Hands-On Lab: Get to Know the New Admin Console in CA Unified Infrastructure ...
 
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
 
Microservices Built for Digital Consumption
Microservices Built for Digital ConsumptionMicroservices Built for Digital Consumption
Microservices Built for Digital Consumption
 
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementPre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
 
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
 
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementPre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance Management
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

Pre-Con Ed: Five Easy Steps for Migrating to CA Directory