SlideShare a Scribd company logo
1 of 21
ca Securecenter 
Simplified Identity Management and Governance 
from One UI – The CA Identity Suite 
Joe Burgett, Senior Principal Consultant, CA Technologies 
SCX15E #CAWorld 
Hila Gvir, IDMLogic Inc.
2 
© 2014 CA. ALL RIGHTS RESERVED. 
Abstract 
The direction of the Identity and Access Management market is rapidly changing and its focus has shifted from IT to the business user. There's a growing demand for businesssolutions providing real timeanalytic-based tools,mobility capabilities and expansion of the solutions beyond the corporate firewall to include customers and partners. 
Joe Burgett 
CA Technologies 
Sr. Principal Consultant 
Hila Gvir 
IDMlogic, Inc. 
Senior Architect and Technical Lead
3 
© 2014 CA. ALL RIGHTS RESERVED. 
Agenda 
THE NEW IDENTITY MANAGEMENT & GOVERNANCE (IMAG) SPACE 
DEMO 
CA IDENTITY SUITE ARCHITECTURE & CONCEPTS 
CONFIGURATION/BUILD OUT DEMO 
WRAP-UP & QUESTIONS 
1 
2 
3 
4 
5
The New IMAG Space
5 
© 2014 CA. ALL RIGHTS RESERVED. 
The New IMAG 
Identity Management and Governance 
Business User 
Single interfaces with user experience driven designs 
Collapse of Tech 
Joining of traditional user management activities with compliance and governance 
SRM Ticketing 
Integrations with other requesting vehicles before or after
6 
© 2014 CA. ALL RIGHTS RESERVED. 
CA defining the category with thought leadership 
CA Identity Suite 
Business Portal Policy- Based Provisioning 
2004 -2007 
Customization without Coding 
Governance 
Role Mining 
Configuration Mgmt 
2008 -2012 
IdentityMinder MobileApp 
2013 
Business User Interface 
Access Request 
2014 
Provisioning 
Password Mgmt 
Security Admin 
1999 -2004 
CA rewriting identity management
7 
© 2014 CA. ALL RIGHTS RESERVED. 
CA Identity Suite 
CA IDENTITY SUITE IS COMPRISED OF THREE MAIN COMPONENTS: 
CA Identity Manager -Automated Provisioning, Policy Management & Workflow Processing 
CA Identity Governance -Governance, Compliance & Analysis 
Portal (powered by SIGMA) -Business Application for Business (non-IT) People 
Provides the next Generation of Identity Management and Governance 
CA Identity Manager 
CA Identity Governance
8 
© 2014 CA. ALL RIGHTS RESERVED. 
CA Identity Suite Additions 
Risk-based analytics 
–Risk Analyzer and Simulator 
–Risk Violations including three level Preventative SOD Violations 
Support for long/complex forms 
–Enhanced Forms Capabilities, business-like multi-tab display 
Web mobile interface (support for all mobile devices) 
–Including: Approvals , Bequest tracking, Access certifications, Password reset. 
Configurable modules for external entities 
–Very simple configuration steps for building a management module for new user/entity 
Personalization and user profiles 
Brand your identity 
–Few clicks for customer self-branding configuration
9 
© 2014 CA. ALL RIGHTS RESERVED. 
CA Identity Suite will embed CA NIM and deliver CA NIM as a hidden Common Component (JAR) 
PolicyXpress and NIM integrated and creating tickets for Service Desk Systems 
Typical integration with HR Feed 
Supports: CA Service Desk Manager, CA Cloud Service Management, ServiceNow, BMC Remedy, HP Service Manager 
CA Identity Manager Service Desk Integration with CA NIM 
CA NIM 
CA Identity Suite 
Processes 
Get Incident 
Return URL Link 
CA NIM OData API 
HR System 
In-bound 
Web Services 
TEWSPolicy Xpress 
Service Desk (MDR) Web Services
10 
© 2014 CA. ALL RIGHTS RESERVED. 
iOS 8 TouchID API (Biometric Authentication) 
Implemented three workflows : 
–App launch 
–Single/multiple workflow approvals 
Additional flows to be considered 
–Forgotten password
Demo
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Access request 
Approvals 
Mobile 
Risks 
Onboarding 
User management 
Demo Overview
Architecture & Concepts
14 
© 2014 CA. ALL RIGHTS RESERVED. 
Request Access 
Users Onboarding 
Self Request 
Self Registration 
Certification 
CA Identity Governance 
CA Single Sign-On 
Aggregated Tasks 
Aggregated 
Entitlements 
Aggregated Users 
CA Identity Manager 
Password reset 
Single Sign On 
Action/ Service 
Fulfillment 
Email notification 
Helpdesk tickets 
SIGMA implementation 
Auto Provisioning 
Reconciliation 
Target 
Systems 
LDAP 
DB 
Apps 
Privilegedaccounts 
Mobile 
Onboarding Users 
Access 
Request 
Certification 
Ext. User management 
User 360view 
SSO 
Launch Pad 
Connectors Layer 
data mapping correlation and aggregation 
Logical Layer 
Presentation Layer 
End users 
Business 
Managers 
DelegatedAdmin 
Contract- ors 
BusinessPartners 
UserType 
Application 
Owner 
Risk Analyzer and Simulator 
Approvals/Implementations 
Request Management 
Entitlement Catalog Mng 
Preventative Advice tools 
Managerial Dashboards 
Personalization and Branding 
Advanced Form Generator 
Logical Architecture 
CA Identity Suite
15 
© 2014 CA. ALL RIGHTS RESERVED. 
Identity Governance 
Workflow Engine 
Identity Manager 
Workflow Engine 
Connectors Layer 
data mapping correlation and aggregation 
Main Connector 
for Authentication and Task Invocation 
SIGMA DB: 
Requests & Configurations 
IM User Store: 
Repository of users for SIGMA 
Provisioning / Connector server 
SIGMA 
Aggregated Users, Entitlements and Tasks 
Endpoints 
Secondary Connector 
for Campaigns and Enrichment of Data 
Component Diagram
16 
© 2014 CA. ALL RIGHTS RESERVED. 
CA IdentityManager and CA Identity Suite Objects 
Portal 
Screens 
Forms 
Provisioning Roles/ Groups/Attributes 
Target Permissions 
Portal 
Tasks 
Manager 
Tasks/Workflows
Configuration & Build Out
18 
© 2014 CA. ALL RIGHTS RESERVED. 
Configuration and Build Out 
Access Request 
–Create a form in SIGMA. 
–Link an IM permission to a SIGMA target permission. 
–Add an application to the Access Catalog. 
Risks 
–Build an SoDviolation risk policy. 
–Introduce available violation actions.
19 
© 2014 CA. ALL RIGHTS RESERVED. 
Configuration and Build Out 
Configurable Modules 
–Build a new custom module and map existing forms. 
Branding 
–Custom brand the CA Identity Suite portal 
Logo 
Background 
Continued
20 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
21 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
© 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. 
Terms of this Presentation

More Related Content

What's hot

Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services OrchestratorCA Technologies
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCA Technologies
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...CA Technologies
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...CA Technologies
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Technologies
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementCA Technologies
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryCA Technologies
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...CA Technologies
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...CA Technologies
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring BattlesCA Technologies
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...CA Technologies
 
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...CA Technologies
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....CA Technologies
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementCA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideCA Technologies
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
 

What's hot (20)

Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorGo Mobile to Mainframe With CA Genand CA App Services Orchestrator
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...CA ACF2 and CA Top Secret Part 2:  r16 is Here - More Capabilities to Better ...
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
CA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business UserCA Identity Suite – Extending Identity Management to the Business User
CA Identity Suite – Extending Identity Management to the Business User
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring Battles
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
 
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
 
Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....Freeing the World from Slow: How Service Virtualization and the Concept of S....
Freeing the World from Slow: How Service Virtualization and the Concept of S....
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
The API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital DivideThe API Opportunity: Crossing the Digital Divide
The API Opportunity: Crossing the Digital Divide
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
 

Viewers also liked

Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management SummaryQuest Software
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSal Marcus
 
shinken monitoringについて真剣に調べてみた結果
shinken monitoringについて真剣に調べてみた結果shinken monitoringについて真剣に調べてみた結果
shinken monitoringについて真剣に調べてみた結果Tsuyoshi Torii
 
Links And People God Of Small Things
Links And People God Of Small ThingsLinks And People God Of Small Things
Links And People God Of Small Thingsflybabe316
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...CA Technologies
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementCA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsCA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...CA Technologies
 
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ NeevAdobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ NeevNeev Technologies
 
Cast Of Characters God Of Small Things
Cast Of  Characters God Of Small ThingsCast Of  Characters God Of Small Things
Cast Of Characters God Of Small Thingsflybabe316
 
newsletter sample
newsletter samplenewsletter sample
newsletter sampleAmy Pike
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education CA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...CA Technologies
 
Inspire the world with your movements
Inspire the world with your movementsInspire the world with your movements
Inspire the world with your movementsteja reddy
 
Presentation Abdul rashid
Presentation Abdul rashidPresentation Abdul rashid
Presentation Abdul rashidabdul rashid
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
 
The God of Small Things Presentation
The God of Small Things PresentationThe God of Small Things Presentation
The God of Small Things PresentationJulie Navickas, M.S.
 
Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Techvineet jain
 

Viewers also liked (20)

Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-final
 
shinken monitoringについて真剣に調べてみた結果
shinken monitoringについて真剣に調べてみた結果shinken monitoringについて真剣に調べてみた結果
shinken monitoringについて真剣に調べてみた結果
 
Links And People God Of Small Things
Links And People God Of Small ThingsLinks And People God Of Small Things
Links And People God Of Small Things
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
 
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ NeevAdobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
 
Cast Of Characters God Of Small Things
Cast Of  Characters God Of Small ThingsCast Of  Characters God Of Small Things
Cast Of Characters God Of Small Things
 
newsletter sample
newsletter samplenewsletter sample
newsletter sample
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
 
Inspire the world with your movements
Inspire the world with your movementsInspire the world with your movements
Inspire the world with your movements
 
Presentation Abdul rashid
Presentation Abdul rashidPresentation Abdul rashid
Presentation Abdul rashid
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
The God of Small Things Presentation
The God of Small Things PresentationThe God of Small Things Presentation
The God of Small Things Presentation
 
Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Tech
 

Similar to Simplified Identity Management and Governance from One UI — The CA Identity Suite

SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern ArchitecturesSecureAuth
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...CA Technologies
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application EconomyCA Technologies
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)danb02
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerRajat Vijayvargiya
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud ChallengeVMware Tanzu
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless WorkplaceCA Technologies
 
CA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Technologies
 
Enterprise Mobile Ecosystem
Enterprise Mobile EcosystemEnterprise Mobile Ecosystem
Enterprise Mobile EcosystemAjit Kumar
 
[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAMWSO2
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONInfosec Train
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Technologies
 
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...e-Xpert Solutions SA
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
A Tale of Transformation: Changing the Way We Deliver and Transform Product D...
A Tale of Transformation: Changing the Way We Deliver and Transform Product D...A Tale of Transformation: Changing the Way We Deliver and Transform Product D...
A Tale of Transformation: Changing the Way We Deliver and Transform Product D...VMware Tanzu
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicVMware Academy
 

Similar to Simplified Identity Management and Governance from One UI — The CA Identity Suite (20)

SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Modern Architectures
Modern ArchitecturesModern Architectures
Modern Architectures
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud Challenge
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless Workplace
 
Salesforce platform session 2
 Salesforce platform session 2 Salesforce platform session 2
Salesforce platform session 2
 
CA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app controlCA Mobile Application Management - for granular app control
CA Mobile Application Management - for granular app control
 
Enterprise Mobile Ecosystem
Enterprise Mobile EcosystemEnterprise Mobile Ecosystem
Enterprise Mobile Ecosystem
 
[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM[EIC 2021] The Rise of the Developer in IAM
[EIC 2021] The Rise of the Developer in IAM
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
TOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTIONTOP SAILPOINT INTERVIEW QUESTION
TOP SAILPOINT INTERVIEW QUESTION
 
CA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise MobilityCA Management Cloud - Enterprise Mobility
CA Management Cloud - Enterprise Mobility
 
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
A Tale of Transformation: Changing the Way We Deliver and Transform Product D...
A Tale of Transformation: Changing the Way We Deliver and Transform Product D...A Tale of Transformation: Changing the Way We Deliver and Transform Product D...
A Tale of Transformation: Changing the Way We Deliver and Transform Product D...
 
Identity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - InfographicIdentity Manager & AirWatch Cloud Mobile App - Infographic
Identity Manager & AirWatch Cloud Mobile App - Infographic
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - AvrilIvanti
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 

Recently uploaded (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 

Simplified Identity Management and Governance from One UI — The CA Identity Suite

  • 1. ca Securecenter Simplified Identity Management and Governance from One UI – The CA Identity Suite Joe Burgett, Senior Principal Consultant, CA Technologies SCX15E #CAWorld Hila Gvir, IDMLogic Inc.
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Abstract The direction of the Identity and Access Management market is rapidly changing and its focus has shifted from IT to the business user. There's a growing demand for businesssolutions providing real timeanalytic-based tools,mobility capabilities and expansion of the solutions beyond the corporate firewall to include customers and partners. Joe Burgett CA Technologies Sr. Principal Consultant Hila Gvir IDMlogic, Inc. Senior Architect and Technical Lead
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Agenda THE NEW IDENTITY MANAGEMENT & GOVERNANCE (IMAG) SPACE DEMO CA IDENTITY SUITE ARCHITECTURE & CONCEPTS CONFIGURATION/BUILD OUT DEMO WRAP-UP & QUESTIONS 1 2 3 4 5
  • 4. The New IMAG Space
  • 5. 5 © 2014 CA. ALL RIGHTS RESERVED. The New IMAG Identity Management and Governance Business User Single interfaces with user experience driven designs Collapse of Tech Joining of traditional user management activities with compliance and governance SRM Ticketing Integrations with other requesting vehicles before or after
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. CA defining the category with thought leadership CA Identity Suite Business Portal Policy- Based Provisioning 2004 -2007 Customization without Coding Governance Role Mining Configuration Mgmt 2008 -2012 IdentityMinder MobileApp 2013 Business User Interface Access Request 2014 Provisioning Password Mgmt Security Admin 1999 -2004 CA rewriting identity management
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. CA Identity Suite CA IDENTITY SUITE IS COMPRISED OF THREE MAIN COMPONENTS: CA Identity Manager -Automated Provisioning, Policy Management & Workflow Processing CA Identity Governance -Governance, Compliance & Analysis Portal (powered by SIGMA) -Business Application for Business (non-IT) People Provides the next Generation of Identity Management and Governance CA Identity Manager CA Identity Governance
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. CA Identity Suite Additions Risk-based analytics –Risk Analyzer and Simulator –Risk Violations including three level Preventative SOD Violations Support for long/complex forms –Enhanced Forms Capabilities, business-like multi-tab display Web mobile interface (support for all mobile devices) –Including: Approvals , Bequest tracking, Access certifications, Password reset. Configurable modules for external entities –Very simple configuration steps for building a management module for new user/entity Personalization and user profiles Brand your identity –Few clicks for customer self-branding configuration
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. CA Identity Suite will embed CA NIM and deliver CA NIM as a hidden Common Component (JAR) PolicyXpress and NIM integrated and creating tickets for Service Desk Systems Typical integration with HR Feed Supports: CA Service Desk Manager, CA Cloud Service Management, ServiceNow, BMC Remedy, HP Service Manager CA Identity Manager Service Desk Integration with CA NIM CA NIM CA Identity Suite Processes Get Incident Return URL Link CA NIM OData API HR System In-bound Web Services TEWSPolicy Xpress Service Desk (MDR) Web Services
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. iOS 8 TouchID API (Biometric Authentication) Implemented three workflows : –App launch –Single/multiple workflow approvals Additional flows to be considered –Forgotten password
  • 11. Demo
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Access request Approvals Mobile Risks Onboarding User management Demo Overview
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Request Access Users Onboarding Self Request Self Registration Certification CA Identity Governance CA Single Sign-On Aggregated Tasks Aggregated Entitlements Aggregated Users CA Identity Manager Password reset Single Sign On Action/ Service Fulfillment Email notification Helpdesk tickets SIGMA implementation Auto Provisioning Reconciliation Target Systems LDAP DB Apps Privilegedaccounts Mobile Onboarding Users Access Request Certification Ext. User management User 360view SSO Launch Pad Connectors Layer data mapping correlation and aggregation Logical Layer Presentation Layer End users Business Managers DelegatedAdmin Contract- ors BusinessPartners UserType Application Owner Risk Analyzer and Simulator Approvals/Implementations Request Management Entitlement Catalog Mng Preventative Advice tools Managerial Dashboards Personalization and Branding Advanced Form Generator Logical Architecture CA Identity Suite
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. Identity Governance Workflow Engine Identity Manager Workflow Engine Connectors Layer data mapping correlation and aggregation Main Connector for Authentication and Task Invocation SIGMA DB: Requests & Configurations IM User Store: Repository of users for SIGMA Provisioning / Connector server SIGMA Aggregated Users, Entitlements and Tasks Endpoints Secondary Connector for Campaigns and Enrichment of Data Component Diagram
  • 16. 16 © 2014 CA. ALL RIGHTS RESERVED. CA IdentityManager and CA Identity Suite Objects Portal Screens Forms Provisioning Roles/ Groups/Attributes Target Permissions Portal Tasks Manager Tasks/Workflows
  • 18. 18 © 2014 CA. ALL RIGHTS RESERVED. Configuration and Build Out Access Request –Create a form in SIGMA. –Link an IM permission to a SIGMA target permission. –Add an application to the Access Catalog. Risks –Build an SoDviolation risk policy. –Introduce available violation actions.
  • 19. 19 © 2014 CA. ALL RIGHTS RESERVED. Configuration and Build Out Configurable Modules –Build a new custom module and map existing forms. Branding –Custom brand the CA Identity Suite portal Logo Background Continued
  • 20. 20 © 2014 CA. ALL RIGHTS RESERVED. For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 21. 21 © 2014 CA. ALL RIGHTS RESERVED. For Informational Purposes Only © 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. Terms of this Presentation