SlideShare a Scribd company logo
1 of 36
Download to read offline
CA	ACF2	and	CA	Top	Secret	Part	2:		r16	
is	Here	- More	Capabilities	to	Better	
Your	Enterprise	Protection	and	Improve	
Breach	Protection	
Paul	Rauchet	– Director,		Software		Engineering
John		Pinkowski	– Senior		Principal	Product	 Manager
Mainframe
CA	Technologies
MFX11E
2 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
For	Informational	Purposes	Only	
Terms	of	this	Presentation
©	2015	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.	The	presentation	provided at	CA	World	2015	
is	intended	for	information	purposes	only	and	does	not	form	any	type	of	warranty.	Some	of	the	specific	slides	with	customer	references	relate	to	
customer's	specific	use	and	experience	of	CA	products	and	solutions	so	actual	results	may	vary.	
Certain	information	in	this	presentation	may	outline	CA’s	general	product	direction.	This	presentation	shall	not	serve	to	(i)	affect	the	rights	and/or	
obligations	of	CA	or	its	licensees	under	any	existing	or	future	license	agreement	or	services	agreement	relating	to	any	CA	software	product;	or	(ii)	
amend	any	product	documentation	or	specifications	for	any	CA	software	product.	This	presentation	is	based	on	current	informationand	resource	
allocations	as	of	November	18,	2015,	and	is	subject	to	change	or	withdrawal	by	CA	at	any	time	without	notice.	The	development,	release	and	timing	
of	any	features	or	functionality	described	in	this	presentation	remain	at	CA’s	sole	discretion.	
Notwithstanding	anything	in	this	presentation	to	the	contrary,	upon	the	general	availability	of	any	future	CA	product	release referenced	in	this	
presentation,	CA	may	make	such	release	available	to	new	licensees	in	the	form	of	a	regularly	scheduled	major	product	release. Such	release	may	be	
made	available	to	licensees	of	the	product	who	are	active	subscribers	to	CA	maintenance	and	support,	on	a	when	and	if-available	basis.	The	
information	in	this	presentation	is	not	deemed	to	be	incorporated	into	any	contract.
CA	does	not	provide	legal	advice.		Neither	this	presentation	nor	any	CA	software	product	referenced	herein	shall	serve	as	a	substitute	for	your	
compliance	with	any	laws	(including	but	not	limited	to	any	act,	statute,	regulation,	rule,	directive,	policy,	standard,	guideline,	measure,	requirement,	
administrative	order,	executive	order,	etc.	(collectively,	“Laws”))	referenced	in	this	presentation.		You	should	consult	with	competent	legal	counsel	
regarding	any	Laws	referenced	herein.
3 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Abstract
CA	ACF2™	and	CA	Top	Secret®	r16	are	here!					
This	session	will	cover	the	new	r16	features		
added	to	help	ease	administration,	and	to	help	
simplify	compliance	and	audit	tasks.			
Paul	Rauchet	–
Sr.	Director,	
Engineering	
John	Pinkowski	–
Product	Owner	
CA	ACF2™	and	CA	Top	
Secret®		Part	2
4 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Agenda
ENHANCEMENT	SELECTION	PROCESS1
2
3
4
CA	ACF2	&	TOP	SECRET	R15		POST	GA	RECAP
CA	TOP	SECRET	R16	SPECIFIC	ENHANCEMENTS
CA	ACF2	R16	SPECIFIC	ENHANCEMENTS
WHY	THE	R16’S	NEED	TO	BE	ON	YOUR	RADAR
FINAL	QUESTIONS/RACAP
2
3
4
5
6
5 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
40	Trillion	mobile	
transactions	
per	day	by	2025
The	Mainframe	Supports	the	Customer	Experience
SOURCES:	IBM,	Gartner,	Aberdeen	Research,	Enterprise	Systems	Media
Increasing	Mobile	
Apps	&	Devices
2/3	transactions
self-serve	by	2017
25%	of	users	abandon	
an	app	after	a	
3	second	delay
71%	of	corporate	
data	sits	on	
mainframe	systems
Rising	
Customer	Expectations
Data	for	
Analytics	&	Apps
6 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	&	ACF2	r15	Release	Updates
We	delivered	innovation….
With	your	ideas	and	help…
Wouldn’t	 it	
be	nice	if…
36	different	customer	sites	participated…
2	½	times	the	r15	Beta	programs!!!
7 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Old	DAR	System?
None	of	that	stuff!!!
x
8 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	ACF2	&	Top	Secret	r16	– “Ideas”	Release
§ Stored	in	CA	Communities	site.
§ Viewable	by	all	customers.
§ Forum	all	customers	can	leverage	to	easily	and	
anonymously	discuss	enhancements	with	CA	
as	well	as	other	CA	security	customers.
§ CA	reviews	all	entries	submitted	and		updates	
with	current	review	status.	
§ Customer	voting/input	heavily	weighted	
in	fulfillment	decision.
9 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Mainframe	Security	Community	Ideas	(as	of	10/17/15)
10 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
ACF2/TSS	r16s	– 100%	Agile	Born	and	Bred		
§ Majority	enhancements	completed	using:
§ “Ideas”	born	on	CA	Communities	site
§ Agile	sprints
§ Engaged	with	multiple	customers	to:
§ Shape	the	feature
§ Gain	agreed	Consensus
TSS ACF2
Time	to	dive	in	
and	take	a	peak	
at	the	GA	r16	
enhancements!
11 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r15	Post	GA	Enhancements
Mirror	Feature.	Creates	a	mirror	of	the	security	file	for	immediate	restart	in	case	of	file	device/channel	failure.	
Enforce	security	administrators	to	follow	NEWPW	rules	when	issuing	password	related	Top	Secret	commands.			
JES2/JES3	shutdown/restart	improvements.
Performance	improvements	as	a	result	of	reduced	storage	obtains.
Enhanced	restricted	password	list.
Expansion	of	COMPARE	command	to	include	other	ACID	types.
Refinement	of	WHOHAS	command.
All	TSS	MODIFY	commands	checked	as	CASECAUT	resources.
FACILITY	tracking	added	to	CA	Cleanup	interface.
Utility	improvements	to	TSSUTIL,	LDAP,	TSSAUDIT,	TSSSIM.		
CHKCERT	and	Certificate	Utility	display	Public/Private	key	size	and	type.
ECC	keys	can	be	stored	and	retrieved	for	ICSF.
Eliminate	need	for	superuser	privilege	for	user	mount	and	unmounts.
12 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	GA	Enhancements
Store	the	FACILITY	definitions	on	the	security	file.		The	Facility	definitions	are	no	long	stored	in	the	TSS	PARMS	file.	
Restrict	who	can	assign	UID(0)	to	an	user	using	the	CASECAUT	authorization.				
Support	AES(256)	for	password	storage	on	the	security	file.	
Increase	all	ACID	types	to	record	size	1024K
Option	to	disable	the	CA	Top	Secret	TRANID	Bypass	list.	
Allow	the	TSSCFILE	utility	to	be	run	against	the	Backup	Security	file	(Planned).
Enhance	the	add	DFLTGRP	command	to	enforce	group	name	is	valid	and	complete	(Planned).	
Release	validated	on	z13	processor.
z/OS	2.2	exploitation	support.
Release	Common	Criteria	certified.
13 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	Enhancement	Details
Store	FACILITY	Parameters	
On	Security	File	
•TSS	Control	option:	FACSTOR(YES|NO)
•Store	facility	matrix	entries	on	the	security	
file	(instead	of	the	parameter	file).	
•When	you	specify	FACSTOR(YES):
•Entries	are	hardened	to	the	security	file	
after	the	product	is	restarted.
•Any	changes	to	the	entries	are:
•automatically	stored	on	the	security	
file
•logged	to	the	recovery	file.	
Benefits:
•Facility	definitions	protected	from	view	
(no	longer	in	TSS	PARMS	file).
•Easier	to	administer	and	maintain	multiple	
LPAR	complexes.	
•Size	of	the	TSS	PARMS	FILE	greatly	
reduced.
14 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	Enhancement	Details
Restrict	UID	0	Assignment	To	Specific	Admins	
• MSCA	exempt	from	UID(0)	restriction	
• Restriction	performed	via	CASECAUT(TSSCMD.ADMIN.UID0)	authority	
checking,	when:
• Admin	(all	types)	has	ACID(MAINTAIN)	authority	
• UID(0)	is	present	within	a	TSS	ADD	or	REPLACE	command	string	
• If	an	ACID	already	has	UID	0,	no	restriction	is	enforced	to	remove	it,	or	
replace	it	with	non-zero	value.	
• Only	if	the	intent	is	to	give	an	ACID	UID	0	does	restriction	occur.	
Benefits:
• Further	restricts	who	can	assign	authorization	for	UID(0).
• Address	compliance	requirements
15 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	Enhancement	Details
AES	256-Bit	Password	Encryption	
• CA	Top	Secret	currently	supports	128-bit	AES	encryption	for	
passwords	and	phrases.	It	requires	a	16	byte	encryption	key	
and	can	be	done	via	software	or	hardware.	IBM	has	provided	
256-bit	AES	encryption	for	RACF	passwords/phrases	in	z/OS	
2.1.	This	enhancement	will	provide	the	same	for	TSS.
Benefits:
• Adds	advanced	password	encryption	algorithm	which	
addresses	current	corporate	as	well	as	government	
compliance	requirements.
16 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	Enhancement	Details
Increased	User	&	Profile	Record	Size	(ACID)	to	1024K
• You	can	now	assign	a	maximum	value	of	1024	using	the	MAXACIDSIZE	Control	Option	
parameter.
Benefits:
• Reduce	complexity	and	cost	to	maintain	security	related	updates.
• Help	to	reduce	security	administration	complexity	for	sites	running	with:
• AUTH(OVERRIDE,ALLOVER)	
• Eliminate/delay	need	to	add	new	Profiles
• Allow	for	profile	consolidation	where	possible	
Role	based	security	improved	
• Reduce	the	number	of	profiles	required	to	build	role	bases	security	profiles.
17 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	Enhancement	Details
Option	to	Disable	CICS	Bypass	Processing
• CA	Top	Secret	CICS	Facility	sub	option:	(BYPLIST=NO|YES|AUDIT)
• BYPLIST=NO	Disables	bypass	list	by	facility	
• BYPLIST=YES	Enables	bypass	list	by	facility	– this	is	the	default	
• BYPLIST=AUDIT	Works	similar	to	Tracking	TRANID	Bypassed	Transactions	Used
feature	without	the	need	to	add	+A	to	transactions	in	the	TRANID	bypass	list.
Benefits:
• Option	to	enforce	defined	security	authorizations	eliminating	use	of	the	BYPASS	list.		
Improve	WHOHAS	UID(0)	Reporting
• Prevents	false	positives	from	UID	persistence	after	ACID	deletion
18 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	enhancement	details	– Status	:	Planned
Execute	TSSCFILE	against	the	Top	Secret	Backup	File
• Leverage	the	TSS	Backup	file	for	TSSCFILE	execution
Benefits:
• Eliminates	the	overhead	of	executing	TSSCFILE	against	the	live	(Primary)	CA	Top	Secret	
security	file.
• Removes	inadvertent	performance	impact	when	TSSCFILE	is	run	during		busy	
workloads.
• Expand	TSSCFILE	execution	window	to	include	prime	time	processing	periods.
• Establishes	a	point	in	time	snapshot:
• Eliminates	output	anomalies	caused	by	Top	Secret	commands	processed	during	
TSSCFILE	execution.
19 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	Top	Secret	r16	enhancement	details	– Status	:	Planned
Enhance	USS	administration	when	adding	DFLTGRP
• Cross	check	to	verify	that	the	GROUP	name	used	in	the	DFTLGRP	field:
• Is	an	existing	valid	GROUP
• that	is	assigned	to	target	ACID’s	GROUP	list.	
• Has	a	GID	assigned	to	it.	
Benefits:
• Ease	of	administration.
• Ensures	valid	usable	Unix	Systems	Services	(O/E)	credentials	are	set.
20 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	ACF2	r15	Post	GA	Enhancements
Role	Based	Security	Refinements:	
• Enhanced	Model	and	Archive	commands	
• Role	records	now	included	
• Builds	ACF	commands	to	generate	a	modeled	user
• Builds	ACF	commands	to	re-add	an	Archived	user	to	role	records
• Clean-up	X-ROL	Role	records	when	a	user	account		is	deleted
• Role	Include/Exclude	fields	updated	for	non-masked	values
• Incorporate	Role	rule	sets	in	CA	ACF	ACCESS	command
• Prevention	of	changing	Role	record	type
• X(ROL)	records	defined	as	‘role’	or	‘group’	record	type
• Role	Based	API	Enhanced	(ACF00RBS)	Improved	Resource	Utilization.
21 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	ACF2	r15	Post	GA	Enhancements
Improved	Usability:
• ACFVSAM	Reserve	Enqueue	Name	
• Improved	CSA	Storage	Utilization
• x(ROL),	x(RGP)	and	x(SGP)	records	increase	for	4K	to	16K
• GSO	INFORDIR	Expanded	
• Additional	IMS	Enhancements.
• New	ACFAESAGE	Unload	Utility.
• Additional	SHOW	Command	Options.
22 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	ACF2	r15	Post	GA	Enhancements
z/OS	2.1	Support:			
• BPX.DEFAULT.USER	no	longer	valid.
• Controlling	Access	to	JobClass
• POSIX	CHOWN	Unrestricted
• Certificate	Protection	after	GENREQ
• Certificate	CHAIN	Support	on	CHKCERT
• Symbolic	in	OMVS	Segment
• TYPE	ENF71	Notification	Event	(ENF)
23 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
New	MSGOPTS	GSO	Record	
• Designate	signon	messages	to	
be	replaced	by	a	generic	
(ACF01125	Logon	Credentials	
Invalid	message.
Benefits:
• The	MSGOPTS	record	also	lets	
you	prevent	the	unintentional	
leaking	of	information	
(existence	of	a	valid	logonid)	
to	malicious	users.	When	
using	MSGOPTS,	you	can	
determine	the	original	cause	
of	the	invalid	signon	by	
viewing	the	ACFRPTPW	
report.	
CA	ACF2	r16	Enhancement	Details
24 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Validate	Sub	Command	
• CA	ACF2	V16.0	introduces	the	
new	validate	subcommand.	The	
subcommand	lets	you	validate	
the	existence	of	logonids	or	
roles	included	or	excluded	in	
the	target	X(ROL)	role	records.	
The	validate	subcommand	must	
be	issued	from	within	the	SET	
X(ROL)	setting	of	the	ACF	
command.	
Benefits:
• Early	detection	of	invalid	data	
entered	by	administrators.
CA	ACF2	r16	Enhancement	Details
25 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
AES	256-Bit	Password	
Encryption	
• CA	ACF2	currently	supports	
128-bit	AES	encryption	for	
passwords	and	phrases.	It	
requires	a	16	byte	
encryption	key	and	can	be	
done	via	software	or	
hardware.	With	this	support	
CA	ACF2	will	now	have	the	
ability	to	supply		256-bit	AES	
encryption.
Benefits:
• Adds	advanced	password	
encryption	algorithm	which	
satisfies	a	current		corporate	
as	well	as	government	
compliance	requirement.			
CA	ACF2	r16	Enhancement	Details
26 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Increase	use	of	64-bit	
CSA	Storage	for	User	
Records
• The	continuation	of	
migrating	data	out	of	
e/CSA	into	64-Bit	
storage.		Now	rule	
objects	are	moved	into	
64-bit	storage.
Benefits:
• Decrease	in	e/CSA	
usage	and	improved	
REFRESH	processing.	
Initial	feedback		is	a	
74%-92%	buy	back.		
Results	may	vary!	
CA	ACF2	r16	Enhancement	Details
27 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Role	Support	for	Logonid	
Access	Report
• ROLE	input	parameter	
added		
• Single	role	or	role	mask	can	
be	specified
• Specifying	ROLE	will	create	
an	access	report	section	
for	each	ROLE	showing								
which	rule	lines	grant	or	
prevent	access.	
Benefits:
• Improved	compliance	
reporting	by	roles.	
CA	ACF2	r16	Enhancement	Details
28 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
New	Retire	Status	for	Users
• There	is	a	need	to	‘retire’	a	
logonid where	the	logonid
value	will	not	be	reused.		
Meaning	the	user	will	be	
removed	of	the	ability	to	
logon/access	a	system	and	
all	privileges	are	removed.			
The	value	of	the	logonid
needs	to	be	retained	so	it	
cannot	be	used	again.	
Benefits:
• Central	Repository	to	Not	
Allowing	the	Re-Use	of	ID.	
• IRS	Pub	1075	Requirement	
CA	ACF2	r16	Enhancement	Details
29 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Why	Should	CA	ACF2	&	CA	Top	Secret	R16	Be	
on	Your	Radar?
30 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
CA	ACF2	&	Top	Secret	r16	Enhancement	Benefits
• Sourced	through	the	last	week	of	the	Beta!
• Get	current	 and	level	set	on	maintenance	as	you	rollout	the	new	release	
All	existing	CA	Top	Secret	r15	
corrective	solutions	incorporated	
into	the	r16	release.
• Majority	of	the	CA	ACF2	&	CA	Top	Secret	r15	&	r16	features	generated	from	
customer	requests
• Many	tied	to	compliance	requirement	needs	(breach	protection)	
45	(and	counting)	new	features	
available
• Get		LPARs	staged	and	ready	to	IPL	and	exploit	newly	introduced	 z	Series	related	
security	features.
Staged	for	future	z	Series	releases
IBM	z13	hardware	certified
Common	Criteria	certified
31 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Recap	
CA	ACF2	&	Top	Secret	r16	GA	Enhancements
• Vast	majority	of	updates	originated	from	customer	enhancement	requests.
• Many	of	the	enhancements	provided	to	address	site	specific	and/or	federal	
regulated	compliance	requirements.		
How	to	get	these	enhancements?	
• Upgrade	to	CA	ACF2	or	CA	Top	Secret	r16
• All	enhancements	discuss	in	this	session	included	at	the	CA	ACF2	&	Top	Secret	r16	
base	installs.
• No	additional	maintenance	required.
• Fully	regression	tested.
• Staged	for	the	next	new	release	of	z/OS.
32 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Summary
A	few	words	to	review
Remember
You	are	only	as	secure	as		your	
least	secure	vendor	(none	are	
too	small	to	consider)
Implementing	a	second	layer	
of	authentication	can	protect	
you	from	things	occurring	
outside	of	your	network
Do
Be	aware	of	recent	breaches	
and	ensure	you	raise	the	bar	
for	attackers
Provide	users	with	flexibility	
and	an	easy	way	to	do	the	right	
thing
Don’t
Be	convinced	that	you	are	
secure	because	your	
infrastructure	has	advanced	
monitoring	and	protection
Cripple	the	business	 with	
cumbersome	processes	they	
will	find	a	way	to	circumvent
33 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Q	&	A
34 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
How	do	I	deliver	a	flawless	experience	every	
time	an	application	touches	the	mainframe?
In	the	application	economy	it’s	all	about	your	customers.
You	need	to	think	about	your	mainframe	reframed.
Connect	mobile-to-
mainframe	applications
Create	mainframe	
infrastructure	flexibility	
for	the	future
Unleash	the	power	of	
data	on	the	mainframe
35 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
Mainframe	
Theater
Castle Walls	Under	Digital	Siege:		Risk-based	Security
11/18	– 1:00pm	
Mainframe	Theater	
MFX25S Locating	Unmanaged	but	Regulated	Data	on	System	z
11/18	– 3:00pm	
Breakers	I	
Mainframe	
Theater
Panel	Discussion:		Is	Complacency Around	Mainframe	Security	
a	Disaster	Waiting	to	Happen?	
11/18	– 3:45pm
Mainframe	Theater	
Tech Talk Isn’t	one	authentication	mechanism	on	z	Systems™	enough?	
11/18	– 4:30pm		
Mainframe	Content	Center	
Tech	Talk	
The	Known	Unknown	– Finding	lost, abandoned,	and	hidden	
regulated	data	on	the	Mainframe
11/19	– 12:15pm
Mainframe	Content	Center
MFX26S
How	to	Increase	User	Accountability	by	Eliminating	the	Default	
User	in	Unix	System	Services
11/19	– 1:00pm
Breakers	I	
MFX47S
Top	10	things you	shout	NOT	forget	when	evaluating	your	
security	implementation	
11/19	– 2:00pm
Breakers	I
36 ©	2015	CA.	ALL	RIGHTS	RESERVED.@CAWORLD #CAWORLD
Follow	Conversations	in	the	Mainframe	Content	Center	
CA	Data	Content	Discovery	
CA	ACF2	™	for	z/OS	
CA	Top	Secret®	for	z/OS	
CA	Cleanup	
CA	Auditor	
Product	X
Theater	#	location
Advanced	Authentication	–
Nov	18th @	4:30pm	
The	Known	Unknown		-
Nov	19th @	12:15pm	
DEMO
S
SMART BAR
TECH
TALKS
Identify	and	Control
Security	Risk
Discover	regulated	data	on	z	
Systems™	and	maintain	a	
secure	infrastructure

More Related Content

What's hot

Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12CA Technologies
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...CA Technologies
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...CA Technologies
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...CA Technologies
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?CA Technologies
 
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...CA Technologies
 
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...CA Technologies
 
Delivering CICS Web Services for CA Gen Applications
Delivering CICS Web Services for CA Gen ApplicationsDelivering CICS Web Services for CA Gen Applications
Delivering CICS Web Services for CA Gen ApplicationsCA Technologies
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementCA Technologies
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...CA Technologies
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceCA Technologies
 
Technology Primer: Customize CA Application Performance Management With Tip...
Technology Primer: Customize CA Application Performance Management  With Tip...Technology Primer: Customize CA Application Performance Management  With Tip...
Technology Primer: Customize CA Application Performance Management With Tip...CA Technologies
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...CA Technologies
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...CA Technologies
 
Track and Monitor the State of Software Development Projects Handily Using C...
Track and Monitor the State of Software Development Projects Handily Using  C...Track and Monitor the State of Software Development Projects Handily Using  C...
Track and Monitor the State of Software Development Projects Handily Using C...CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...CA Technologies
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...CA Technologies
 

What's hot (20)

Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
 
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
Hands-On Labs: Identifying Application Delivery Performance Problems with CA ...
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
 
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
Pre-Con Education: CA SYSVIEW® Technical Deep Dive: New Enhancement and Best ...
 
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...CA InterTest™ : The Answer to Faster Application Development With High Qualit...
CA InterTest™ : The Answer to Faster Application Development With High Qualit...
 
Delivering CICS Web Services for CA Gen Applications
Delivering CICS Web Services for CA Gen ApplicationsDelivering CICS Web Services for CA Gen Applications
Delivering CICS Web Services for CA Gen Applications
 
Get the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset ManagementGet the Most From Your Software Licenses with CA Software Asset Management
Get the Most From Your Software Licenses with CA Software Asset Management
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
 
Tech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database ExperienceTech Talk: Five Simple Steps to a More Powerful Database Experience
Tech Talk: Five Simple Steps to a More Powerful Database Experience
 
Technology Primer: Customize CA Application Performance Management With Tip...
Technology Primer: Customize CA Application Performance Management  With Tip...Technology Primer: Customize CA Application Performance Management  With Tip...
Technology Primer: Customize CA Application Performance Management With Tip...
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
How To Save A Million Dollars in 15 Minutes with Software Asset Management (a...
 
Track and Monitor the State of Software Development Projects Handily Using C...
Track and Monitor the State of Software Development Projects Handily Using  C...Track and Monitor the State of Software Development Projects Handily Using  C...
Track and Monitor the State of Software Development Projects Handily Using C...
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
 

Similar to CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better Your Enterprise Protection and Improve Breach Protection

Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...CA Technologies
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsCA Technologies
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made EasierCA Technologies
 
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.CA Technologies
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesCA Technologies
 
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek CA Technologies
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Technologies
 
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...CA Technologies
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...CA Technologies
 
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...CA Technologies
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...CA Technologies
 
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep DivePre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep DiveCA Technologies
 
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New FeaturesPre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New FeaturesCA Technologies
 
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioVision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioCA Technologies
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumCA Technologies
 
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service VirtualizationPre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service VirtualizationCA Technologies
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...CA Technologies
 
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container GatewaysTech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container GatewaysCA Technologies
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?CA Technologies
 
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityFrom Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityCA Technologies
 

Similar to CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better Your Enterprise Protection and Improve Breach Protection (20)

Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
 
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security ControlsPre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
 
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
 
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
 
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's NewCA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
 
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
 
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep DivePre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep Dive
 
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New FeaturesPre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
 
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery PortfolioVision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
 
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service VirtualizationPre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
 
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container GatewaysTech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
 
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
 
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure VisibilityFrom Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 

Recently uploaded (20)

Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 

CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better Your Enterprise Protection and Improve Breach Protection