SlideShare a Scribd company logo
1 of 41
Download to read offline
1 © 2015 CA. ALL RIGHTS RESERVED.
Security
Steve Firestone, General Manager, Security
Nick Nikols, SVP, Product Management and Strategy
Security Drives
DIGITAL TRANSFORMATION
in the Application Economy
Securely Empower Business
© 2015 CA. ALL RIGHTS RESERVED.
telco
Sony Online
Entertainment
Adobe
152,000,000
AOL
2,400,000
JP Morgan
Chase
76,000,000
Community
Health
Services
Gmail
Sony
AOL
92,000,000
Ebay
145,000,000
Home
Depot
56,000,000
Mozilla
Evernote
50,000,000
Nieman
Marcus
Korea
Credit
Bureau
European
Central
Bank
telco
telco
telco
telco
telco
telco
telco
telco
Living
Social
50,000,000
Massive
American
Business Hack
160,000,000
Sony
PSN
77,000,000
Ubisoft
Court Ventures
200,000,000
Compass
Bank
Citigroup
TJ Maxx
94,000,000
Monster.com
KDDI
Fidelity
Bank
US Military
76,000,000
AOL
20,000,000
Cardsystems
Solutions
AT&T
telco
Jefferson
County
Apple
NHS
telco
Heartland
130,000,000
RockYou!
32,000,000
telco
CheckFree
telco
telco
telco
telco
telco
telco
Ameritrade
Inc.
Automatic
Date
Processing
Countrywide
FinancialCorp.
City and
Hackney
Teaching
Primary Care
Trust
Dai Nippon
Printing
Driving
Standards
Agency
Fidelity
National
Information
Services
Gap Inc.Gap Inc.
Hannaford
Brothers
Supermarket
Chain
TD
Ameritrade
Stanford
University
Auction.co.kr
T-Mobile
Deutsche
telco
Chile
Ministry of
Education
Ohio State
University
Triple-S Salud
Inc.
South
Shore Hospital
Massachusetts
Network
Solutions
telco
Service Personnel
and Veterans
Agency (UK)
Steam
35,000,000
Japan
Airlines
OVH
Apple
California
Department of
Child Support
Central Hudson
Gas and
Electric
Crescent
Health Inc.,
Walgreens
Dunn &
Bradstreet
Facebook
Drupa
Dominoes
Pizza
(France)
Global
Payments
LinkedIn,
eHarmony,
Last.fm
Kissinger
Cables
Florida
Courts
LexisNexis
Florida
Department of
Juvenile Justice
Dropbox
Emory
Healthcare
178.com Blizzard
KT
Corp.
Accendo
Insurance Co.
RBS Worldpay
JP Morgan
Nexon
Korea
Corp.
GS Caltex
Driving Standards
Agency
BNY Mellon
Shareowner
Services
AvMed.
Inc.
Betfair
AT&T
Bethesda
Game
Studios
Colorado
Government
Ankle & Foot
Care Center of
Tampa Bay,
Inc.
Classified
Iraq War
Documents
Embassy
Cables
China
Software
Developer
Network
Countrywide
FinancialEisenhower
Medical Center
Gawker.com
Emergency
Healthcare
Physicians Ltd.
Health Net -
IBM
Memorial
Healthcare
System
telco Greek
Government
Gamigo
Citigroup
Nemours
Foundation
Lincoln
Medical &
Mental Health
Center
New York City
Health &
Hospitals
Corp.
Puerto Rico
Dept. of
Health
Southern California
Medical-Legal
Consultants
Spartanburg
Regional Healthcare
System
Office of the
Texas Attorney
General
Oregon Dept. of
Motor Vehicles Sega
New York State
Electric & Gas
Militarysingles
.com
Target
70,000,000
Staples
UPS
NASDAQ
telco
telco
telco
Ubuntu
telco
Zappos
24,000,000
VA
26,500,000 telco
telco
VA Dept
of HealthUS Nat’l
Guard
telco telco
US
Military
UK
Revenue
and
Customs
University
of Miami
Texas Lottery
telco
UK Home
Office
University of
California
Berkeley
University of
Wisconsin
Milwaukee
Tricare
Yahoo
Japan
Twitter
Snapchat
Tianya
8,000,000
Yahoo Voices
US Law
Enforcement
South Carolina
Government
Yale University
US Federal
Reserve Bank
Cleveland Sutter Medical
Foundation
State of
Texas
US Army
Writerspace
.com
Washington
Post
Stratford
Restaurant
Depot
San Francisco
Public Utilities
Commission
Data
Processors
International
telco
* Source: informationisbeautiful.net
2004
telco
telco
2014
telco
telco
telco telco
© 2015 CA. ALL RIGHTS RESERVED.
telco
Sony Online
Entertainment
Adobe
152,000,000
AOL
2,400,000
JP Morgan
Chase
76,000,000
Community
Health
Services
Gmail
Sony
AOL
92,000,000
Ebay
145,000,000
Home
Depot
56,000,000
Mozilla
Evernote
50,000,000
nieman
Marcus
Korea
Credit
Bureau
European
Central
Bank
telco
telco
telco
telco
telco
telco
telco
telco
Living
Social
50,000,000
Massive
American
Business Hack
160,000,000
Sony
PSN
77,000,000
Ubisoft
Court Ventures
200,000,000
Compass
Bank
Citigroup
TJ Maxx
94,000,000
Monster.com
KDDI
Fidelity
Bank
US Military
76,000,000
AOL
20,000,000
Cardsystems
Solutions
AT&T
telco
Jefferson
County
Apple
NHS
telco
Heartland
130,000,000
RockYou!
32,000,000
telco
CheckFree
telco
telco
telco
telco
telco
telco
Ameritrade
Inc.
Automatic
Date
Processing
Countrywide
FinancialCorp.
City and
Hackney
Teaching
Primary Care
Trust
Dai Nippon
Printing
Driving
Standards
Agency
Fidelity
National
Information
Services
Gap Inc.Gap Inc.
Hannaford
Brothers
Supermarket
Chain
TD
Ameritrade
Stanford
University
Auction.co.kr
T-Mobile
Deutsche
telco
Chile
Ministry of
Education
Ohio State
University
Triple-S Salud
Inc.
South
Shore Hospital
Massachusetts
Network
Solutions
telco
Service Personnel
and Veterans
Agency (UK)
Steam
35,000,000
Japan
Airlines
OVH
Apple
California
Department of
Child Support
Central Hudson
Gas and
Electric
Crescent
Health Inc.,
Walgreens
Dunn &
Bradstreet
Facebook
Drupa
Dominoes
Pizza
(France)
Global
Payments
LinkedIn,
eHarmony,
Last.fm
Kissinger
Cables
Florida
Courts
LexisNexis
Florida
Department of
Juvenile Justice
Dropbox
Emory
Healthcare
178.com Blizzard
KT
Corp.
Accendo
Insurance Co.
RBS Worldpay
JP Morgan
Nexon
Korea
Corp.
GS Caltex
Driving Standards
Agency
BNY Mellon
Shareowner
Services
AvMed.
Inc.
Betfair
AT&T
Bethesda
Game
Studios
Colorado
Government
Ankle & Foot
Care Center of
Tampa Bay,
Inc.
Classified
Iraq War
Documents
Embassy
Cables
China
Software
Developer
Network
Countrywide
FinancialEisenhower
Medical Center
Gawker.com
Emergency
Healthcare
Physicians Ltd.
Health Net -
IBM
Memorial
Healthcare
System
telco Greek
Government
Gamigo
Citigroup
Nemours
Foundation
Lincoln
Medical &
Mental Health
Center
New York City
Health &
Hospitals
Corp.
Puerto Rico
Dept. of
Health
Southern California
Medical-Legal
Consultants
Spartanburg
Regional Healthcare
System
Office of the
Texas Attorney
General
Oregon Dept. of
Motor Vehicles Sega
New York State
Electric & Gas
Militarysingles
.com
Target
70,000,000
Staples
UPS
NASDAQ
telco
telco
telco
Umbuntu
telco
Zappos
24,000,000
VA
26,500,000 telco
telco
VA Dept
HealthUS Nat’l
Guard
telco telco
US
Military
UK
Revenue
and
Customs
University
of Miami
Texas Lottery
telco
UK Home
Office
University of
California
Berkeley
University of
Wisconsin
Milwaukee
Tricare
Yahoo
Japan
Twitter
Snapchat
Tianya
8,000,000
Yahoo Voices
US Law
Enforcement
South Carolina
Government
Yale University
US Federal
Reserve Bank
Cleveland Sutter Medical
Foundation
State of
Texas
US Army
Writerspace
.com
Washington
Post
Stratfor
Restaurant
Depot
San Francisco
Public Utilities
Commission
Data
Processors
International
telco
* Source: informationisbeautiful.net
2004
telco
telco
2014
telco
telco
telco telco
Billions of Identities Exposed
$3 Trillion Spent
© 2015 CA. ALL RIGHTS RESERVED.
Do you know
someone in your
industry that has had
a major breach?
© 2015 CA. ALL RIGHTS RESERVED.
Cyber Crime Identity Theft Espionage Terrorism
© 2015 CA. ALL RIGHTS RESERVED.
How easy do you think
it is to get an identity
that can be the source
of a breach?
© 2015 CA. ALL RIGHTS RESERVED.
Finding the Right Identity
Sophisticated Malware with a Very Familiar Pattern
Simple Search on LinkedIn Admins
Pull Personal Data from FaceBook
Now, Send a Simple Email or
‘Friend’ Request to the Admin
Now You Have CONFIRMATION
Simple Search on LinkedIn Admins
Pull Personal Data from FaceBook
Now, Send a Simple Email or
‘Friend’ Request to the Admin
Now You Have CONFIRMATION
Get in and Wait for the Opportunity
Simple Search Leveraging Social Media
© 2015 CA. ALL RIGHTS RESERVED.
Security for the Modern Era
© 2015 CA. ALL RIGHTS RESERVED.
10 © 2015 CA. ALL RIGHTS RESERVED.
 Engineer
 Executive at Novell and Quest
 Analyst at Gartner and Burton Group
 Author of numerous IAM patents
Security
Nick Nikols
SVP of Product Management & Strategy
© 2015 CA. ALL RIGHTS RESERVED.
How many
identities are you
managing in your
business today?
© 2015 CA. ALL RIGHTS RESERVED.
12 © 2015 CA. ALL RIGHTS RESERVED.
1,000,000,000s IoT
100,000,000s Consumer
100,000s Employee
1,000s Privileged
IDENTITIES
© 2015 CA. ALL RIGHTS RESERVED.
13 © 2015 CA. ALL RIGHTS RESERVED.
IDENTITY
© 2015 CA. ALL RIGHTS RESERVED.
New Acquisition – CA Privileged Access Manager
(Xceedium)
Risk containment and breach protection
Quick time to value with simple, easy to deploy solution
Comprehensive Privileged Access Management
Future proof architecture with leadership in cloud environments
© 2015 CA. ALL RIGHTS RESERVED.
Unifies identity management & governance
Simple, intuitive user experience
Transformation layer empowers business users
Support for web & mobile
Simple customization & branding of user interface
New Acquisition – CA Identity Suite
(IdMlogic)
© 2015 CA. ALL RIGHTS RESERVED.
16 © 2015 CA. ALL RIGHTS RESERVED.
Announcement
* CA Press release, November 18, 2015
“The privileged user security
capabilities in CA Privileged
Access Manager will
complement the strong security
services provided by VMware
NSX. It enables control over
operational tasks and can give
customers added confidence
that they have the best of both
– VMware NSX network and
security micro-segmentation
and granular access control.”
Scott Clinton
Senior Director, Partner Product Mgmt.
Networking & Security Business, VMware
“CA’s technology makes identity
management simple by putting
technical language into business
terms any employee can
understand, and effectively
helping protect member
information by controlling who
can access what.”
Linley Ali
Lead Enterprise Architect, Florida Blue
Florida’s Blue Cross & Blue Shield Company
© 2015 CA. ALL RIGHTS RESERVED.
This is Security in the Modern Era…
In today’s world, breaches are the norm, information is
everywhere, people need to access from anywhere -
Identity is key
© 2015 CA. ALL RIGHTS RESERVED.
This is Security in the Modern Era…
Identity-centric Security empowers your business so
the right people can securely access the right information
when and where they need it
STOP BREACHES
Deliver secure mobile access, risk-
based authentication and privileged
identity access.
PROTECT IDENTITIES EMPOWER BUSINESS
Give your customers a friction-free
user experience with the
confidence of built-in security.
Protect sensitive data from insider
threats and external attacks by
controlling users and their access.
© 2015 CA. ALL RIGHTS RESERVED.
CA’s Identity-centric Security
Identity
Management
Access
Management
Advanced
Authentication
Mobile /API
Gateway
Privileged
Access
Management
Identity
Analytics
Enhance the customer
digital experience with
adaptive, frictionless
security
Enable employees &
contractors with simple,
secure access to
enterprise applications
Control administrator
access and system
accounts plus deep
forensic monitoring
Identify things in the
operation environment
and the related data
that is collected
© 2015 CA. ALL RIGHTS RESERVED.
CA’s Identity-centric Security
Enable employees &
contractors with simple,
secure access to
enterprise applications
Identity
Management
Access
Management
Advanced
Authentication
Mobile /API
Gateway
Privileged
Access
Management
Identity
Analytics
© 2015 CA. ALL RIGHTS RESERVED.
CA’s Identity-centric Security
Enhance the customer
digital experience with
adaptive, frictionless
security
Identity
Management
Access
Management
Advanced
Authentication
Mobile /API
Gateway
Privileged
Access
Management
Identity
Analytics
© 2015 CA. ALL RIGHTS RESERVED.
CA’s Identity-centric Security
Control administrator
access and system
accounts plus deep
forensic monitoring
Identity
Management
Access
Management
Advanced
Authentication
Mobile /API
Gateway
Privileged
Access
Management
Identity
Analytics
© 2015 CA. ALL RIGHTS RESERVED.
CA’s Identity-centric Security
Identify things in the
operation environment
and the related data
that is collected
Identity
Management
Access
Management
Advanced
Authentication
Mobile /API
Gateway
Privileged
Access
Management
Identity
Analytics
© 2015 CA. ALL RIGHTS RESERVED.
Use Case
MECHANIC
Enable access for diagnostics
DRIVER
Enable access to operate the car
HACKER
PREVENT Access!
© 2015 CA. ALL RIGHTS RESERVED.
CA’s Identity-centric Security
Identity
Management
Access
Management
Advanced
Authentication
Mobile /API
Gateway
Privileged
Access
Management
Identity
Analytics
Enhance the customer
digital experience with
adaptive, frictionless
security
Enable employees &
contractors with simple,
secure access to
enterprise applications
Control administrator
access and system
accounts plus deep
forensic monitoring
Identify things in the
operation environment
and the related data
that is collected
© 2015 CA. ALL RIGHTS RESERVED.
Simplified Deployment
& Lower Cost of Ownership
App-Like User Experience
Advanced Security Insight and Control
© 2015 CA. ALL RIGHTS RESERVED.
Identity
Management
 Container
deployment model
 App-like user
experience
Privileged
Access
 Extended
protection for cloud
Infrastructure
 Advanced real-time
threat analytics
Advanced
Authentication
& SSO
 Container
deployment model
 Contextual user
behavioral risk
analytics
© 2015 CA. ALL RIGHTS RESERVED.
Business Transformation
© 2015 CA. ALL RIGHTS RESERVED.
CA World ‘15
Customer VIP Awards
 VISION - Customers who have developed and moved toward management excellence,
while demonstrating a clear vision for how this effort supports the overall success of
the enterprise.
 IMPACT - Customers who have demonstrated a strategic organizational change in the
way work gets done, highlighting the positive impact they have had, not only within
their business but amongst their peers.
 PROGRESS - Customers who have made progress through successful implementation
or process improvements, demonstrating excellent planning and project success.
© 2015 CA. ALL RIGHTS RESERVED.
VIP Award
Sandra Stonham
Managing Director
Technology & Operations
© 2015 CA. ALL RIGHTS RESERVED.
Tobey Gossen
Disney Technology
Shared Services
VIP Award
© 2015 CA. ALL RIGHTS RESERVED.
Mike Shakespeare
Product Owner
Tesco Identity Service
VIP Award
© 2015 CA. ALL RIGHTS RESERVED.
The Future is NOW
© 2015 CA. ALL RIGHTS RESERVED.
CA Security
CA PARTNERS
in the Exhibition Center
© 2015 CA. ALL RIGHTS RESERVED.
38 © 2014 CA. ALL RIGHTS RESERVED.
Defend the Hybrid
Enterprise from Breach
Protect Against
Fraud and Breaches
Secure Omni-Channel Access
Enable a Secure Digital Workspace
Security Innovations
Accelerate IAM Time to Value
Secure Mission Critical Data
Enable Employees
and Partners
Secure Access to SaaS Apps
Engage Customers
Demos
CA Security
© 2015 CA. ALL RIGHTS RESERVED.
Our promise…
To consistently deliver a superior experience by putting your organization
at the center of all we do. The ultimate measure of our success is through
your success and earning your trust as a strategic partner.
Invest to build
long-term relationships
Deliver innovative
business outcomes
Commit to each
customer’s success
© 2015 CA. ALL RIGHTS RESERVED.
Closing Thoughts
© 2015 CA. ALL RIGHTS RESERVED.
Securely Empower Business
© 2015 CA. ALL RIGHTS RESERVED.

More Related Content

What's hot

Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...CA Technologies
 
Identity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsIdentity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsCA Technologies
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....CA Technologies
 
Case Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCase Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCA Technologies
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsCA Technologies
 
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...CA Technologies
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...CA API Management
 
Securing the Award-Winning Digital Banking Services at Bank Hapoalim
Securing the Award-Winning Digital Banking Services at Bank HapoalimSecuring the Award-Winning Digital Banking Services at Bank Hapoalim
Securing the Award-Winning Digital Banking Services at Bank HapoalimCA Technologies
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementCA Technologies
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryCA Technologies
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinCA API Management
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...CA Technologies
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...CA API Management
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideCA Technologies
 
How to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteHow to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteCA Technologies
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...CA Technologies
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellCA API Management
 

What's hot (20)

Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
 
Identity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsIdentity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized Benefits
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
Case Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service VirtualizationCase Study: American Airlines Takes Flight With Service Virtualization
Case Study: American Airlines Takes Flight With Service Virtualization
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
 
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
Drones, Phones & Pwns the Promise & Dangers of IoT APIs: Use APIs to Securely...
 
Securing the Award-Winning Digital Banking Services at Bank Hapoalim
Securing the Award-Winning Digital Banking Services at Bank HapoalimSecuring the Award-Winning Digital Banking Services at Bank Hapoalim
Securing the Award-Winning Digital Banking Services at Bank Hapoalim
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
 
Secure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API ManagementSecure the Open Enterprise with CA API Management
Secure the Open Enterprise with CA API Management
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
Managing Identity by Giving Up Control - Scott Morrison, SVP & Distinguished ...
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
 
How to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteHow to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity Suite
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
 
OAuth in the Real World featuring Webshell
OAuth in the Real World featuring WebshellOAuth in the Real World featuring Webshell
OAuth in the Real World featuring Webshell
 

Similar to Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in the Application Economy

kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE - ATT&CKcon
 
Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxssuserba2d14
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Andreas M. Oswald
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...Amazon Web Services
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021CIO Look Magazine
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.Merry D'souza
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享m12016changTIIMP
 
10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdfCIO Look Magazine
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security DemistyifiedMicrosoft UK
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteMobiloitte
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNAMatteo Masi
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalCal Net Technology Group
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
 

Similar to Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in the Application Economy (20)

kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
Presentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptxPresentation- SecurID presentation for the Channel (1).pptx
Presentation- SecurID presentation for the Channel (1).pptx
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019Cybersecurity Snapshot December_2019
Cybersecurity Snapshot December_2019
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
 
The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021The 10 most trusted authentication solution providers of 2021
The 10 most trusted authentication solution providers of 2021
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN Build Automate and Test Strategies - BATMAN
Build Automate and Test Strategies - BATMAN
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf10 Most Influential Leaders in Cybersecurity 2022.pdf
10 Most Influential Leaders in Cybersecurity 2022.pdf
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - Mobiloitte
 
Cisco Security DNA
Cisco Security DNACisco Security DNA
Cisco Security DNA
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Cloud Computing and the Culture of Innovation
Cloud Computing and the Culture of Innovation Cloud Computing and the Culture of Innovation
Cloud Computing and the Culture of Innovation
 
Security event presentation 3.4.2016-final
Security event presentation 3.4.2016-finalSecurity event presentation 3.4.2016-final
Security event presentation 3.4.2016-final
 
How Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber SecurityHow Machine Learning & AI Will Improve Cyber Security
How Machine Learning & AI Will Improve Cyber Security
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in the Application Economy

  • 1. 1 © 2015 CA. ALL RIGHTS RESERVED. Security Steve Firestone, General Manager, Security Nick Nikols, SVP, Product Management and Strategy Security Drives DIGITAL TRANSFORMATION in the Application Economy
  • 2. Securely Empower Business © 2015 CA. ALL RIGHTS RESERVED.
  • 3. telco Sony Online Entertainment Adobe 152,000,000 AOL 2,400,000 JP Morgan Chase 76,000,000 Community Health Services Gmail Sony AOL 92,000,000 Ebay 145,000,000 Home Depot 56,000,000 Mozilla Evernote 50,000,000 Nieman Marcus Korea Credit Bureau European Central Bank telco telco telco telco telco telco telco telco Living Social 50,000,000 Massive American Business Hack 160,000,000 Sony PSN 77,000,000 Ubisoft Court Ventures 200,000,000 Compass Bank Citigroup TJ Maxx 94,000,000 Monster.com KDDI Fidelity Bank US Military 76,000,000 AOL 20,000,000 Cardsystems Solutions AT&T telco Jefferson County Apple NHS telco Heartland 130,000,000 RockYou! 32,000,000 telco CheckFree telco telco telco telco telco telco Ameritrade Inc. Automatic Date Processing Countrywide FinancialCorp. City and Hackney Teaching Primary Care Trust Dai Nippon Printing Driving Standards Agency Fidelity National Information Services Gap Inc.Gap Inc. Hannaford Brothers Supermarket Chain TD Ameritrade Stanford University Auction.co.kr T-Mobile Deutsche telco Chile Ministry of Education Ohio State University Triple-S Salud Inc. South Shore Hospital Massachusetts Network Solutions telco Service Personnel and Veterans Agency (UK) Steam 35,000,000 Japan Airlines OVH Apple California Department of Child Support Central Hudson Gas and Electric Crescent Health Inc., Walgreens Dunn & Bradstreet Facebook Drupa Dominoes Pizza (France) Global Payments LinkedIn, eHarmony, Last.fm Kissinger Cables Florida Courts LexisNexis Florida Department of Juvenile Justice Dropbox Emory Healthcare 178.com Blizzard KT Corp. Accendo Insurance Co. RBS Worldpay JP Morgan Nexon Korea Corp. GS Caltex Driving Standards Agency BNY Mellon Shareowner Services AvMed. Inc. Betfair AT&T Bethesda Game Studios Colorado Government Ankle & Foot Care Center of Tampa Bay, Inc. Classified Iraq War Documents Embassy Cables China Software Developer Network Countrywide FinancialEisenhower Medical Center Gawker.com Emergency Healthcare Physicians Ltd. Health Net - IBM Memorial Healthcare System telco Greek Government Gamigo Citigroup Nemours Foundation Lincoln Medical & Mental Health Center New York City Health & Hospitals Corp. Puerto Rico Dept. of Health Southern California Medical-Legal Consultants Spartanburg Regional Healthcare System Office of the Texas Attorney General Oregon Dept. of Motor Vehicles Sega New York State Electric & Gas Militarysingles .com Target 70,000,000 Staples UPS NASDAQ telco telco telco Ubuntu telco Zappos 24,000,000 VA 26,500,000 telco telco VA Dept of HealthUS Nat’l Guard telco telco US Military UK Revenue and Customs University of Miami Texas Lottery telco UK Home Office University of California Berkeley University of Wisconsin Milwaukee Tricare Yahoo Japan Twitter Snapchat Tianya 8,000,000 Yahoo Voices US Law Enforcement South Carolina Government Yale University US Federal Reserve Bank Cleveland Sutter Medical Foundation State of Texas US Army Writerspace .com Washington Post Stratford Restaurant Depot San Francisco Public Utilities Commission Data Processors International telco * Source: informationisbeautiful.net 2004 telco telco 2014 telco telco telco telco © 2015 CA. ALL RIGHTS RESERVED.
  • 4. telco Sony Online Entertainment Adobe 152,000,000 AOL 2,400,000 JP Morgan Chase 76,000,000 Community Health Services Gmail Sony AOL 92,000,000 Ebay 145,000,000 Home Depot 56,000,000 Mozilla Evernote 50,000,000 nieman Marcus Korea Credit Bureau European Central Bank telco telco telco telco telco telco telco telco Living Social 50,000,000 Massive American Business Hack 160,000,000 Sony PSN 77,000,000 Ubisoft Court Ventures 200,000,000 Compass Bank Citigroup TJ Maxx 94,000,000 Monster.com KDDI Fidelity Bank US Military 76,000,000 AOL 20,000,000 Cardsystems Solutions AT&T telco Jefferson County Apple NHS telco Heartland 130,000,000 RockYou! 32,000,000 telco CheckFree telco telco telco telco telco telco Ameritrade Inc. Automatic Date Processing Countrywide FinancialCorp. City and Hackney Teaching Primary Care Trust Dai Nippon Printing Driving Standards Agency Fidelity National Information Services Gap Inc.Gap Inc. Hannaford Brothers Supermarket Chain TD Ameritrade Stanford University Auction.co.kr T-Mobile Deutsche telco Chile Ministry of Education Ohio State University Triple-S Salud Inc. South Shore Hospital Massachusetts Network Solutions telco Service Personnel and Veterans Agency (UK) Steam 35,000,000 Japan Airlines OVH Apple California Department of Child Support Central Hudson Gas and Electric Crescent Health Inc., Walgreens Dunn & Bradstreet Facebook Drupa Dominoes Pizza (France) Global Payments LinkedIn, eHarmony, Last.fm Kissinger Cables Florida Courts LexisNexis Florida Department of Juvenile Justice Dropbox Emory Healthcare 178.com Blizzard KT Corp. Accendo Insurance Co. RBS Worldpay JP Morgan Nexon Korea Corp. GS Caltex Driving Standards Agency BNY Mellon Shareowner Services AvMed. Inc. Betfair AT&T Bethesda Game Studios Colorado Government Ankle & Foot Care Center of Tampa Bay, Inc. Classified Iraq War Documents Embassy Cables China Software Developer Network Countrywide FinancialEisenhower Medical Center Gawker.com Emergency Healthcare Physicians Ltd. Health Net - IBM Memorial Healthcare System telco Greek Government Gamigo Citigroup Nemours Foundation Lincoln Medical & Mental Health Center New York City Health & Hospitals Corp. Puerto Rico Dept. of Health Southern California Medical-Legal Consultants Spartanburg Regional Healthcare System Office of the Texas Attorney General Oregon Dept. of Motor Vehicles Sega New York State Electric & Gas Militarysingles .com Target 70,000,000 Staples UPS NASDAQ telco telco telco Umbuntu telco Zappos 24,000,000 VA 26,500,000 telco telco VA Dept HealthUS Nat’l Guard telco telco US Military UK Revenue and Customs University of Miami Texas Lottery telco UK Home Office University of California Berkeley University of Wisconsin Milwaukee Tricare Yahoo Japan Twitter Snapchat Tianya 8,000,000 Yahoo Voices US Law Enforcement South Carolina Government Yale University US Federal Reserve Bank Cleveland Sutter Medical Foundation State of Texas US Army Writerspace .com Washington Post Stratfor Restaurant Depot San Francisco Public Utilities Commission Data Processors International telco * Source: informationisbeautiful.net 2004 telco telco 2014 telco telco telco telco Billions of Identities Exposed $3 Trillion Spent © 2015 CA. ALL RIGHTS RESERVED.
  • 5. Do you know someone in your industry that has had a major breach? © 2015 CA. ALL RIGHTS RESERVED.
  • 6. Cyber Crime Identity Theft Espionage Terrorism © 2015 CA. ALL RIGHTS RESERVED.
  • 7. How easy do you think it is to get an identity that can be the source of a breach? © 2015 CA. ALL RIGHTS RESERVED.
  • 8. Finding the Right Identity Sophisticated Malware with a Very Familiar Pattern Simple Search on LinkedIn Admins Pull Personal Data from FaceBook Now, Send a Simple Email or ‘Friend’ Request to the Admin Now You Have CONFIRMATION Simple Search on LinkedIn Admins Pull Personal Data from FaceBook Now, Send a Simple Email or ‘Friend’ Request to the Admin Now You Have CONFIRMATION Get in and Wait for the Opportunity Simple Search Leveraging Social Media © 2015 CA. ALL RIGHTS RESERVED.
  • 9. Security for the Modern Era © 2015 CA. ALL RIGHTS RESERVED.
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.  Engineer  Executive at Novell and Quest  Analyst at Gartner and Burton Group  Author of numerous IAM patents Security Nick Nikols SVP of Product Management & Strategy © 2015 CA. ALL RIGHTS RESERVED.
  • 11. How many identities are you managing in your business today? © 2015 CA. ALL RIGHTS RESERVED.
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED. 1,000,000,000s IoT 100,000,000s Consumer 100,000s Employee 1,000s Privileged IDENTITIES © 2015 CA. ALL RIGHTS RESERVED.
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED. IDENTITY © 2015 CA. ALL RIGHTS RESERVED.
  • 14. New Acquisition – CA Privileged Access Manager (Xceedium) Risk containment and breach protection Quick time to value with simple, easy to deploy solution Comprehensive Privileged Access Management Future proof architecture with leadership in cloud environments © 2015 CA. ALL RIGHTS RESERVED.
  • 15. Unifies identity management & governance Simple, intuitive user experience Transformation layer empowers business users Support for web & mobile Simple customization & branding of user interface New Acquisition – CA Identity Suite (IdMlogic) © 2015 CA. ALL RIGHTS RESERVED.
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED. Announcement * CA Press release, November 18, 2015 “The privileged user security capabilities in CA Privileged Access Manager will complement the strong security services provided by VMware NSX. It enables control over operational tasks and can give customers added confidence that they have the best of both – VMware NSX network and security micro-segmentation and granular access control.” Scott Clinton Senior Director, Partner Product Mgmt. Networking & Security Business, VMware “CA’s technology makes identity management simple by putting technical language into business terms any employee can understand, and effectively helping protect member information by controlling who can access what.” Linley Ali Lead Enterprise Architect, Florida Blue Florida’s Blue Cross & Blue Shield Company © 2015 CA. ALL RIGHTS RESERVED.
  • 17. This is Security in the Modern Era… In today’s world, breaches are the norm, information is everywhere, people need to access from anywhere - Identity is key © 2015 CA. ALL RIGHTS RESERVED.
  • 18. This is Security in the Modern Era… Identity-centric Security empowers your business so the right people can securely access the right information when and where they need it STOP BREACHES Deliver secure mobile access, risk- based authentication and privileged identity access. PROTECT IDENTITIES EMPOWER BUSINESS Give your customers a friction-free user experience with the confidence of built-in security. Protect sensitive data from insider threats and external attacks by controlling users and their access. © 2015 CA. ALL RIGHTS RESERVED.
  • 19. CA’s Identity-centric Security Identity Management Access Management Advanced Authentication Mobile /API Gateway Privileged Access Management Identity Analytics Enhance the customer digital experience with adaptive, frictionless security Enable employees & contractors with simple, secure access to enterprise applications Control administrator access and system accounts plus deep forensic monitoring Identify things in the operation environment and the related data that is collected © 2015 CA. ALL RIGHTS RESERVED.
  • 20. CA’s Identity-centric Security Enable employees & contractors with simple, secure access to enterprise applications Identity Management Access Management Advanced Authentication Mobile /API Gateway Privileged Access Management Identity Analytics © 2015 CA. ALL RIGHTS RESERVED.
  • 21. CA’s Identity-centric Security Enhance the customer digital experience with adaptive, frictionless security Identity Management Access Management Advanced Authentication Mobile /API Gateway Privileged Access Management Identity Analytics © 2015 CA. ALL RIGHTS RESERVED.
  • 22. CA’s Identity-centric Security Control administrator access and system accounts plus deep forensic monitoring Identity Management Access Management Advanced Authentication Mobile /API Gateway Privileged Access Management Identity Analytics © 2015 CA. ALL RIGHTS RESERVED.
  • 23. CA’s Identity-centric Security Identify things in the operation environment and the related data that is collected Identity Management Access Management Advanced Authentication Mobile /API Gateway Privileged Access Management Identity Analytics © 2015 CA. ALL RIGHTS RESERVED.
  • 25.
  • 26.
  • 27. MECHANIC Enable access for diagnostics DRIVER Enable access to operate the car HACKER PREVENT Access! © 2015 CA. ALL RIGHTS RESERVED.
  • 28. CA’s Identity-centric Security Identity Management Access Management Advanced Authentication Mobile /API Gateway Privileged Access Management Identity Analytics Enhance the customer digital experience with adaptive, frictionless security Enable employees & contractors with simple, secure access to enterprise applications Control administrator access and system accounts plus deep forensic monitoring Identify things in the operation environment and the related data that is collected © 2015 CA. ALL RIGHTS RESERVED.
  • 29. Simplified Deployment & Lower Cost of Ownership App-Like User Experience Advanced Security Insight and Control © 2015 CA. ALL RIGHTS RESERVED.
  • 30. Identity Management  Container deployment model  App-like user experience Privileged Access  Extended protection for cloud Infrastructure  Advanced real-time threat analytics Advanced Authentication & SSO  Container deployment model  Contextual user behavioral risk analytics © 2015 CA. ALL RIGHTS RESERVED.
  • 31. Business Transformation © 2015 CA. ALL RIGHTS RESERVED.
  • 32. CA World ‘15 Customer VIP Awards  VISION - Customers who have developed and moved toward management excellence, while demonstrating a clear vision for how this effort supports the overall success of the enterprise.  IMPACT - Customers who have demonstrated a strategic organizational change in the way work gets done, highlighting the positive impact they have had, not only within their business but amongst their peers.  PROGRESS - Customers who have made progress through successful implementation or process improvements, demonstrating excellent planning and project success. © 2015 CA. ALL RIGHTS RESERVED.
  • 33. VIP Award Sandra Stonham Managing Director Technology & Operations © 2015 CA. ALL RIGHTS RESERVED.
  • 34. Tobey Gossen Disney Technology Shared Services VIP Award © 2015 CA. ALL RIGHTS RESERVED.
  • 35. Mike Shakespeare Product Owner Tesco Identity Service VIP Award © 2015 CA. ALL RIGHTS RESERVED.
  • 36. The Future is NOW © 2015 CA. ALL RIGHTS RESERVED.
  • 37. CA Security CA PARTNERS in the Exhibition Center © 2015 CA. ALL RIGHTS RESERVED.
  • 38. 38 © 2014 CA. ALL RIGHTS RESERVED. Defend the Hybrid Enterprise from Breach Protect Against Fraud and Breaches Secure Omni-Channel Access Enable a Secure Digital Workspace Security Innovations Accelerate IAM Time to Value Secure Mission Critical Data Enable Employees and Partners Secure Access to SaaS Apps Engage Customers Demos CA Security © 2015 CA. ALL RIGHTS RESERVED.
  • 39. Our promise… To consistently deliver a superior experience by putting your organization at the center of all we do. The ultimate measure of our success is through your success and earning your trust as a strategic partner. Invest to build long-term relationships Deliver innovative business outcomes Commit to each customer’s success © 2015 CA. ALL RIGHTS RESERVED.
  • 40. Closing Thoughts © 2015 CA. ALL RIGHTS RESERVED.
  • 41. Securely Empower Business © 2015 CA. ALL RIGHTS RESERVED.