SlideShare a Scribd company logo
CA Security Management Portfolio – Vasu Surabhi
Copyright © 2012 CA. All rights reserved.1
CA AuthMinder™ Strong Authentication
Centralizes authentication and provides unique two-factor credentials to prevent attacks
and inappropriate access
CA ControlMinder™ Privileged Identity Management
Reduces the risks associated with privileged accounts through shared account
management, fine-grained access controls and session recording
CA ControlMinder™ for
Virtual Environments
Virtualization Security
Brings privileged identity management to the hypervisor and strengthens virtual
machine security through automation
Identity and Access Management-
as-a-ServiceCA CloudMinder™
Provides authentication, single sign-on, and identity management as a cloud-based
service
Role Management & Identity
GovernanceCA GovernanceMinder™
Increases compliance efficiency by streamlining entitlement certification processes,
cleaning up orphaned accounts, and providing all users with appropriate entitlements
Identity ManagementCA IdentityMinder™
Automates on-boarding, modification and off-boarding of users and provides self-service
user management for enterprise apps and cloud services
Risk-Based AuthenticationCA RiskMinder™
Evaluates contextual factors to determine a risk score for login attempts or transactions
and recommends the appropriate action: allow, require step-up authentication or deny
Single Sign-OnCA SiteMinder® Provides secure single sign-on and access management for Web & mobile applications
Identity FederationCA SiteMinder® Federation
Enables the users of one organization to easily and securely access the data and
applications of other organizations
Information Classification
and ControlCA DataMinder™ Protects and controls the access and handling of sensitive and regulated information
SOA Security
CA SiteMinder®
Web Services Security
Provides standards-based authentication, authorization, and audit capabilities for SOA
infrastructures
CA Security Product Focus How It Helps Me

More Related Content

What's hot

SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
Arijan Horvat
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
Kalyana Sundaram
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsJohn Bauer
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
Aidy Tificate
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
Bertrand Carlier
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
IBM Danmark
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
ITJobZone.biz
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CloudIDSummit
 
User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415
IsraelGuillen12
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
Quest Software
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
Shiu-Fun Poon
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
Shiu-Fun Poon
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional Access
Jason Condo
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Global Online Trinings
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
SAP Technology
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
Prashanth BS
 

What's hot (20)

SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
eMAS Indentity and Access Management
eMAS Indentity and Access ManagementeMAS Indentity and Access Management
eMAS Indentity and Access Management
 
SSO Strategy Implementation Considerations
SSO Strategy Implementation ConsiderationsSSO Strategy Implementation Considerations
SSO Strategy Implementation Considerations
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
IAM Cloud
IAM CloudIAM Cloud
IAM Cloud
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
Sailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overviewSailpoint Online Training on IAM overview
Sailpoint Online Training on IAM overview
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415User manual of i vms 4200-v2.3.1_20150415
User manual of i vms 4200-v2.3.1_20150415
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
 
APIC/DataPower security
APIC/DataPower securityAPIC/DataPower security
APIC/DataPower security
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Preparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional AccessPreparing your enteprise for Hybrid AD Join and Conditional Access
Preparing your enteprise for Hybrid AD Join and Conditional Access
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 

Viewers also liked

Enterprise ireland North American Fintech Advisory Panel Remarks Scott Wilkinson
Enterprise ireland North American Fintech Advisory Panel Remarks Scott WilkinsonEnterprise ireland North American Fintech Advisory Panel Remarks Scott Wilkinson
Enterprise ireland North American Fintech Advisory Panel Remarks Scott Wilkinson
Scott Wilkinson
 
CV-Adi-Ana-Maria-eng-version
CV-Adi-Ana-Maria-eng-versionCV-Adi-Ana-Maria-eng-version
CV-Adi-Ana-Maria-eng-versionAdi Ana Maria
 
Results
ResultsResults
Results
emiliomerayo
 
Notre offre de soins
Notre offre de soinsNotre offre de soins
Notre offre de soins
floherbillon
 
Nintriva Technology Solutions
Nintriva Technology SolutionsNintriva Technology Solutions
Nintriva Technology Solutions
nintriva
 
Gazette octobre 2015
Gazette octobre 2015Gazette octobre 2015
Gazette octobre 2015
floherbillon
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
hewie
 
Commodities and Blockchain - Distributed Ledger Technology
Commodities and  Blockchain - Distributed Ledger Technology Commodities and  Blockchain - Distributed Ledger Technology
Commodities and Blockchain - Distributed Ledger Technology
GE 94
 
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
Ontico
 
Film magazine research
Film magazine researchFilm magazine research
Film magazine research
AlexWithey
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 

Viewers also liked (11)

Enterprise ireland North American Fintech Advisory Panel Remarks Scott Wilkinson
Enterprise ireland North American Fintech Advisory Panel Remarks Scott WilkinsonEnterprise ireland North American Fintech Advisory Panel Remarks Scott Wilkinson
Enterprise ireland North American Fintech Advisory Panel Remarks Scott Wilkinson
 
CV-Adi-Ana-Maria-eng-version
CV-Adi-Ana-Maria-eng-versionCV-Adi-Ana-Maria-eng-version
CV-Adi-Ana-Maria-eng-version
 
Results
ResultsResults
Results
 
Notre offre de soins
Notre offre de soinsNotre offre de soins
Notre offre de soins
 
Nintriva Technology Solutions
Nintriva Technology SolutionsNintriva Technology Solutions
Nintriva Technology Solutions
 
Gazette octobre 2015
Gazette octobre 2015Gazette octobre 2015
Gazette octobre 2015
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Commodities and Blockchain - Distributed Ledger Technology
Commodities and  Blockchain - Distributed Ledger Technology Commodities and  Blockchain - Distributed Ledger Technology
Commodities and Blockchain - Distributed Ledger Technology
 
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
Распределенный blockchain процессинг / Алексей Трошичев (QiWi, Rakuten)
 
Film magazine research
Film magazine researchFilm magazine research
Film magazine research
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 

Similar to CA security-Management -Vasu Surabhi

Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud Computing
Ciente
 
CA Identity Management
CA Identity ManagementCA Identity Management
CA Identity Management
Farid Schuda Caddeo
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
Anand Dhouni
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
jeffsrosalyn
 
Unlocking Trust: The Crucial Role of KYC Verification in Business
Unlocking Trust: The Crucial Role of KYC Verification in BusinessUnlocking Trust: The Crucial Role of KYC Verification in Business
Unlocking Trust: The Crucial Role of KYC Verification in Business
Any kyc Account
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identity Defined Security Alliance
 
Visitor Management System
Visitor Management SystemVisitor Management System
Visitor Management System
Jane Brewer
 
Guarding Your Cloud Kingdom_ The Five A's Approach to Identity Management
Guarding Your Cloud Kingdom_ The Five A's Approach to Identity ManagementGuarding Your Cloud Kingdom_ The Five A's Approach to Identity Management
Guarding Your Cloud Kingdom_ The Five A's Approach to Identity Management
Caroline Johnson
 
How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...
How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...
How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...
HeenaMehta35
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
Cyber Legend Technologies LLC
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
Pieter Noorlander
 
IDSA at Denver IAM Meetup
IDSA at Denver IAM MeetupIDSA at Denver IAM Meetup
IDSA at Denver IAM Meetup
Identity Defined Security Alliance
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
WSO2
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Ajay Chebbi
 
Mct summit 2021
Mct summit 2021Mct summit 2021
Mct summit 2021
Kushantha Gunawardana
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made Easy
Jason Newell
 
Fortifying Your Digital Identity: The Power of KYC-Verified Accounts
Fortifying Your Digital Identity: The Power of KYC-Verified AccountsFortifying Your Digital Identity: The Power of KYC-Verified Accounts
Fortifying Your Digital Identity: The Power of KYC-Verified Accounts
Any kyc Account
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 

Similar to CA security-Management -Vasu Surabhi (20)

Identity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud ComputingIdentity and Access Management (IAM) in Cloud Computing
Identity and Access Management (IAM) in Cloud Computing
 
CA Identity Management
CA Identity ManagementCA Identity Management
CA Identity Management
 
20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx20170912_Identity_and_Access_Management.pptx
20170912_Identity_and_Access_Management.pptx
 
School of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docxSchool of Computer & Information SciencesITS-532 Cloud C.docx
School of Computer & Information SciencesITS-532 Cloud C.docx
 
Unlocking Trust: The Crucial Role of KYC Verification in Business
Unlocking Trust: The Crucial Role of KYC Verification in BusinessUnlocking Trust: The Crucial Role of KYC Verification in Business
Unlocking Trust: The Crucial Role of KYC Verification in Business
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identiverse Zero Trust Customer Briefing, Identiverse 2019
 
Visitor Management System
Visitor Management SystemVisitor Management System
Visitor Management System
 
Guarding Your Cloud Kingdom_ The Five A's Approach to Identity Management
Guarding Your Cloud Kingdom_ The Five A's Approach to Identity ManagementGuarding Your Cloud Kingdom_ The Five A's Approach to Identity Management
Guarding Your Cloud Kingdom_ The Five A's Approach to Identity Management
 
How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...
How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...
How Digital Identity and Access Management (IAM) Can Unlock Customer Engageme...
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3TrustBuilder IBM TAMeb sales presentation v2.3
TrustBuilder IBM TAMeb sales presentation v2.3
 
IDSA at Denver IAM Meetup
IDSA at Denver IAM MeetupIDSA at Denver IAM Meetup
IDSA at Denver IAM Meetup
 
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
[WSO2Con EU 2017] IAM: Catalyst for Digital Transformation
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
Mct summit 2021
Mct summit 2021Mct summit 2021
Mct summit 2021
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made Easy
 
Fortifying Your Digital Identity: The Power of KYC-Verified Accounts
Fortifying Your Digital Identity: The Power of KYC-Verified AccountsFortifying Your Digital Identity: The Power of KYC-Verified Accounts
Fortifying Your Digital Identity: The Power of KYC-Verified Accounts
 
AM Side details
AM Side detailsAM Side details
AM Side details
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 

CA security-Management -Vasu Surabhi

  • 1. CA Security Management Portfolio – Vasu Surabhi Copyright © 2012 CA. All rights reserved.1 CA AuthMinder™ Strong Authentication Centralizes authentication and provides unique two-factor credentials to prevent attacks and inappropriate access CA ControlMinder™ Privileged Identity Management Reduces the risks associated with privileged accounts through shared account management, fine-grained access controls and session recording CA ControlMinder™ for Virtual Environments Virtualization Security Brings privileged identity management to the hypervisor and strengthens virtual machine security through automation Identity and Access Management- as-a-ServiceCA CloudMinder™ Provides authentication, single sign-on, and identity management as a cloud-based service Role Management & Identity GovernanceCA GovernanceMinder™ Increases compliance efficiency by streamlining entitlement certification processes, cleaning up orphaned accounts, and providing all users with appropriate entitlements Identity ManagementCA IdentityMinder™ Automates on-boarding, modification and off-boarding of users and provides self-service user management for enterprise apps and cloud services Risk-Based AuthenticationCA RiskMinder™ Evaluates contextual factors to determine a risk score for login attempts or transactions and recommends the appropriate action: allow, require step-up authentication or deny Single Sign-OnCA SiteMinder® Provides secure single sign-on and access management for Web & mobile applications Identity FederationCA SiteMinder® Federation Enables the users of one organization to easily and securely access the data and applications of other organizations Information Classification and ControlCA DataMinder™ Protects and controls the access and handling of sensitive and regulated information SOA Security CA SiteMinder® Web Services Security Provides standards-based authentication, authorization, and audit capabilities for SOA infrastructures CA Security Product Focus How It Helps Me