SlideShare a Scribd company logo
World®
’16
Encryption	and	Hashing	and	Keys	–
Oh,	my!	Demystifying	Interoperable	Encryption	
for	the	Mainframe	and	for	the	Enterprise
Stuart	McIrvine – VP,	Product	Management	- CA	Technologies	
Joe	Sturonas - Chief	Technology	Officer	- PKWARE	Inc.		
MFX119S
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract Increasing	risks	of	accidental	and	intentional	mainframe	data	
compromise	elevates	enterprises’	interest	in	achieving	safe	harbor	
by	encrypting	sensitive	and	regulated	data.	Encryption	introduces	
many	new	elements	of	consideration	to	existing	workflows,	
further	complicated	by	the	need	for	interoperability	between	the	
mainframe	and	other	enterprise	platforms.	Join	this	session	to	
learn	best	practices	for	applying	encryption	to	protect	your	data,	
even	while	ensuring	your	existing	processes	remain	intact.
Topics	include:	
• Types	of	cryptographic	functions	
• Encryption	algorithm	selection	
• Sources	of	encryption	acceleration	on	the	mainframe	
• Considerations	when	encrypted	mainframe	data	must	be	used	
on	other	platforms
• Encryption	key	selection,	management
Stuart	
McIrvine
CA	Technologies
VP,	Product	
Management
Joe	Sturonas
PKWARE,	Inc.
Chief	Technology	
Officer
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
DATA	AND	REGULATIONS
THREAT	LANDSCAPE
DEMO
MANAGING	DATA	ON	THE	MAINFRAME
PROTECTING	DATA	– AN	OVERVIEW
ENCRYPTION	AND	KEY	MANAGEMENT	ON	Z/OS
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Data	and	Regulations
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Data	is	an	Asset
§ Data	is business	value
– Facebook,	Google,	Uber,	Twitter,	….
§ Industries	depend	on	data
– Banking,	Insurance,	Healthcare,	….
§ By	2020	there	will	be:
– 44	zettabytes	of	data
– Over	6	billion	smart	phones
– 50	billion	smart	devices
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Data	is	a	Liability
§ Highly	regulated
– Industry,	State,	National	and	beyond
§ HIPAA,	GLB,	CA	1798,	GDPR,	Privacy	Shield
§ It	gets	personal,	quickly!
– PII	must	be	managed
§ Who	owns	it?	What	are	you	allowed	to	do	with	it?	Delete	it	when	requested
§ Data	- the	keys	to	the	future
– Business	strategy,	digital	secrets,	financial	posture,	….
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	about	those	regulations?
§ PCI	DSS	
– Protect	stored	cardholder	data	
– Encrypt	transmissions
– Maintain	InfoSec	policy
§ SOX	/	HIPAA	&	Hi-Tech	Act
– Policy	Management
– Audit	and	Logging
– Data	Integrity
§ FIPS	140-2
– Making	sure	it’s	done	right§ GDPR
– Prove	that	data	is	being	
protected	
– Appoint	a	data	protection	
officer
– Fines	of	4%	of	annual	turnover
§ EU-U.S.	Privacy	Shield	
– U.S.	Department	of	Commerce	
and	European	Commission
– Individual	choice	&	control
– Security
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Threat	Landscape
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Threat	Landscape	- Thieves,	Snoops	and	Idiots
External	attackers,	internal	rogues
Users,	Administrators,	developers,	vendors…	
basically	everyone		:)
Service	providers,	administrators,	three	letter	agencies,	
etc.
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thieves
§ External	Attackers
– Competitors
– Script	Kiddies
– Nation	States	(OPM	breach)
– Lexis	Nexis	Breach
§ Rogue	Administrators
– Snowden
§ Internal	Bad	Actors
– Espionage
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Snoops
§ Privileged	Administrators
§ Credential	compromise
§ Sony	Attackers
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Idiots
§ Users
– Make	mistakes	(lose	devices)
– Have	poor	security	education	(password=123456)
§ Developers	/	Vendors
– Lenovo
– Fortinet
§ Administrators
– Sony
– Dropbox
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Managing	Data	on	the	Mainframe
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Impact	of	Data	Theft
Health	Insurance
Announced:	March	2015
Records	stolen:	11M
Cost:	TBD.	Facing	a	class-action	lawsuit	&	fines.
Retail	
Announced:	September	2014
Records	stolen:	56M
Cost:	$43M	and	counting.	Estimates	put	this	
as	high	as	$10B	
Health	Systems
Announced:	August	2014
Records	stolen:	4.5M
Cost:	$75M	– $150M
eCommerce	
Announced:	May	2014
Records	stolen:	233M
Cost:	$200M	and	counting.
Retail
Announced:	December	2013
Records	stolen:	70M
Cost:	$162M	and	counting.	Recent	
estimates	put	this	at	well	over	$1B.
Government	
Announced:	May	2015
Records	stolen:	22M
Cost:	To	be	determined.	Likely	facing	a	class	
action	lawsuit	as	well	as	others.
“Data	security	events	increased	by	38%”	“Intellectual	property	theft	increased	56%”
2016	Global	State	of	InfoSec	Survey	Price	Waterhouse	Cooper
“$400	Million	– estimated	losses	from	700	million	compromised	records”
2015	Verizon	Data	Breach	Report
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Mainframe	has	never	been	hacked!
Mainframe	data	stays	on	the	
mainframe;	so	it	is	safe!
Data	is	fluid	in	today’s	world.
Data	analytics;	cloud
Marriage	of	MF	data	and	non	MF	data
Mainframe	is	well	understood	and	
covered	under	three	lines	of		risk	
control– Operational,		Compliance	and	
Internal	audit
Data	on	the	Mainframe
REALITYMYTH
Consider:
Social	engineering	hacks
Human	error	as	MF	experts	retire
Mainframe		is	viewed	as	a	black-box	breeds	complacency	–compounding		
the	risk
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Dealing	With	the	Threat
Information
Applications
Devices
Networks
Advanced Persistent
Threat Detection
Intrusion
Detection
Access
Control
Application
Firewalls
Security
Gateways
VPN
Antivirus
Mobile Device
Management
Firewalls
Stateful Pocket
Inspection
Mobile Application
Management
Data Leakage
Prevention Full Disk
Encryption
Antimalware
Network Access
Control
Endpoint DLP
Access
Brokers
DNS
Security
Incident & Event
Management
Intrusion
Detection
Identity & Access
Management
DATA
CENTRIC
PROTECTION
§ Defense	in	depth
§ Data-centric	protection
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Based	on	regulation	or	
organizational	sensitivity
Data	remains	on	
the	z/OS	platform
Regulated	and	sensitive	data	in	
your	mainframe	data	stores
Protect
Data-Centric	Protection
The	App	Economy	creates	new	risks	of	catastrophic	data	compromise
“With	breaches	in	the	news	every	day,	being	able	to	find	where	regulated	data	resides	- or	ruling	out	the	
existence	of	sensitive	data	- is	a	critical	first	step	in	protecting	your	business.”
X
70%of	the	world	mission	critical	data	
transacts	on	the	mainframe.	
Find ProtectClassify
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Public/Private	Key	Management	on	z/OS
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Public/Private	Key	Pairs
§ Public	Key
– Encrypting	Data
– Authenticating	Data
§ Private	Key
– Decrypting	Data
– Signing	Data
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Symmetric	Encryption
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Asymmetric	Encryption
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Digital	Signing
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Authenticating	Data
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Authenticating	Data
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Encryption	and	Key	Management	on	z/OS
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
z/OS	Crypto	Facilities
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
IBM	Hardware	Crypto
Machine z196
2817
z114
2818
zEC12
2827
zBC12
2828
z13
2964
Algorithm
Supported
DES
3DES
AES 128,
192, 256
DES
3DES
AES 128,
192, 256
DES
3DES
AES 128,
192, 256
DES
3DES
AES 128,
192, 256
DES
3DES
AES 128,
192, 256
Crypto
Hardware
CPACF
CEX3C
CPACF
CEX3C
CPACF
CEX3C
CEX4C
CPACF
CEX3C
CEX4C
CPACF
CEX4C
CEX5C
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Exposures
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Batch	Job	To	Create	Encrypted	ZIP	File
//ZIP1 EXEC PGM=SECZIP
//STEPLIB DD DISP=SHR,DSN=SUPPORT.SZ150R05.LOAD
//SYSPRINT DD SYSOUT=*
//SYSABEND DD SYSOUT=*
//JASOUT DD DSN=JAS.TEXT.LIB.ZIP,DISP=(NEW,CATLG,DELETE),
// UNIT=SYSDA,SPACE=(CYL,(1,1)),
// DCB=(RECFM=FB,LRECL=27998,BLKSIZE=27998)
//SYSIN DD *
-ENCRYPTION_METHOD(AES256)
-PWD(PKWARE)
-INCLUDE_CMD(JAS.MVS810.PROFILE(LDAP2))
-RECIPIENT(LDAP:EM=JOE.STURONAS@PKWARE.COM,R)
-DATA_TYPE(TEXT)
-ARCHIVE_OUTFILE(JASOUT)
-ACTION(ADD)
-VERBOSE
-ZIPPED_DSN(JAS.TEXT.LIB(CRC),crc.txt)
-ZIPPED_DSN(JAS.TEXT.LIB(EBCDIC),ebcdic.txt)
JAS.TEXT.LIB
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Batch	Job	To	Email	Encrypted	ZIP	File
//TSOB EXEC PGM=IKJEFT1B
//SYSEXEC DD DISP=SHR,DSN=USER.CLIST
//SYSPRINT DD SYSOUT=*
//SYSTSPRT DD SYSOUT=*
//DD1 DD DISP=SHR,DSN=JAS.TEXT.LIB.ZIP
//SYSTSIN DD *
%XMITIP JOE.STURONAS@PKWARE.COM +
CC ( JSTURONAS@ME.COM ) +
MSGT 'THIS ATTACHMENT WAS ENCRYPTED WITH SecureZIP' +
SUBJECT 'SENT FROM A ZBC12 FROM A BATCH JOB' +
FROM JOE.STURONAS@PKWARE.COM +
FILEDD DD1 +
Format (BIN) +
Filename jas.zip
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Output	From	Batch	Job
J E S 2 J O B L O G -- S Y S T E M P K W 1 -- N
15.54.04 JOB39394 ---- FRIDAY, 16 SEP 2016 ----
15.54.04 JOB39394 IRR010I USERID JAS IS ASSIGNED TO THIS JOB.
15.54.04 JOB39394 ICH70001I JAS LAST ACCESS AT 15:52:02 ON FRIDAY, SEPTEMB
15.54.04 JOB39394 $HASP373 JASA STARTED - INIT 1 - CLASS A - SYS
15.54.05 JOB39394 HTRT01I CPU (Total)
15.54.05 JOB39394 HTRT02I Program Stepname ProcStep RC I/O hh:mm:ss.th
15.54.05 JOB39394 HTRT03I SECZIP ZIP1 00 686 00.17
15.54.06 JOB39394 HTRT03I IKJEFT1B TSOB 00 499 00.25
15.54.06 JOB39394 HTRT06I
15.54.06 JOB39394 HTRT04I JASA Job Service Totals 1185 00.42
15.54.06 JOB39394 HTRT07I CPU Cost $ 0.10 IO Cost $ 1.18
15.54.06 JOB39394 $HASP395 JASA ENDED
------ JES2 JOB STATISTICS ------
16 SEP 2015 JOB EXECUTION DATE
38 CARDS READ
855 SYSOUT PRINT RECORDS
0 SYSOUT PUNCH RECORDS
39 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Output	From	Batch	Job
- PKWARE Inc.
-
- Program Name SECZIP hh:mm:ss.th
- Step Name ZIP1 Elapsed Time 01.46
- Procedure Step TCB CPU Time 00.15
- Return Code 00 SRB CPU Time 00.02
- Total I/O 686 Total CPU Time 00.17
- I/O Cost $ 0.68 CPU Cost $ 0.04
- Service Units 1154
-
- PKWARE Inc.
-
- Program Name IKJEFT1B hh:mm:ss.th
- Step Name TSOB Elapsed Time 00.73
- Procedure Step TCB CPU Time 00.24
- Return Code 00 SRB CPU Time 00.01
- Total I/O 499 Total CPU Time 00.25
- I/O Cost $ 0.49 CPU Cost $ 0.06
- Service Units 1870
40 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Output	From	Batch	Job
ZPEN309I z/Architecture Hardware Available -zBC12
ZPEN313I CSNBSYE System Capable with ICSF when available.
ZPEN313C AES is available. DES/3DES is available.
ZPEN313C CPACF Protected Keys are available.
ZPEN334I PKA callable services are enabled.
ZPEN315I AES(128, 192, 256) Clear Key Hardware Available -zBC12
ZPEN310I CP Assist For Cryptographic Functions Available
ZPEN205I Cryptographic facility {IBMHardware } is selected for ENCRYPTION_METHO
ZPEN205I Cryptographic facility {IBMHardware } is selected for PseudoRandGen
ZPCM017I A total of 1 ADD/UPDATE candidate data sets were identified.
ZPCM100I Configuration Manager Shutdown. Posting Main Task: 00000000
ZPAM253I ADDED File JAS.TEXT.LIB(CRC)
ZPAM254I as crc.txt
ZPAM255I (DEFLATED 57%/56%) Smartcrypt(tm) AES256 ; DATA SIZE 1,600; ZIP SIZE
ZPAM255C . DEFLATE32; Text ; PDS ; Recs_In/Out( 20 / 20); Encrypt(Password-Key
ZPAM253I ADDED File JAS.TEXT.LIB(EBCDIC)
ZPAM254I as ebcdic.txt
ZPAM255I (DEFLATED 34%/32%) Smartcrypt(tm) AES256 ; DATA SIZE 480; ZIP SIZE 32
ZPAM255C . DEFLATE32; Text ; PDS ; Recs_In/Out( 6 / 6); Encrypt(Password-Key );
ZPAM140I FILES: ADDED EXCLUDED BYPASSED IN ERROR COPIED
41 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo	- Mobile
42 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo	- Mobile
43 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo	- Mobile
44 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo	- Mobile
45 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo	- Mobile
46 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo	- Mobile
47 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
48 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX118S
How	is	Buying	a	Home	Like	Justifying	Data	Security	
Investments?	Developing	Return	on	Security	Investment	
(ROSI)	Analysis
11/16/2016	at	3:00	pm
MFT174S
Mainframe	Security	Strategy	and	Roadmap:	Best	
Practices	for	Protecting	Mission	Essential	Data
11/17/2016	at	12:45	pm
MFT175S Gaps	in	Your	Defense:	Hacking	the	Mainframe	 11/17/2016	at	3:00	pm
49 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Real-Time	Data	
Security	&	Compliance	
CA	Data	Content	
Discovery
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	Top	Secret®
Mainframe	Theatre
Real-Time	Data	
Security	&	Compliance	
CA	Compliance	
Event	Manager
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	ACF2™
Mainframe	Theatre
50 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
51 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

More Related Content

What's hot

TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
CA Technologies
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
CA Technologies
 
Enable End-To-End Enterprise Development With CA Gen
Enable End-To-End Enterprise Development With CA GenEnable End-To-End Enterprise Development With CA Gen
Enable End-To-End Enterprise Development With CA Gen
CA Technologies
 
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
CA Technologies
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
CA Technologies
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
CA Technologies
 
Intelligent Mainframe Management: The Evolution of Expert Systems
Intelligent Mainframe Management: The Evolution of Expert Systems Intelligent Mainframe Management: The Evolution of Expert Systems
Intelligent Mainframe Management: The Evolution of Expert Systems
CA Technologies
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
CA Technologies
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
CA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
 
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
CA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
CA Technologies
 
Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...
Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...
Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...
CA Technologies
 
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
CA Technologies
 
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...
CA Technologies
 

What's hot (20)

TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
TechVision: Avoiding Hefty Fines and Reputational Damage with Test Data Manag...
 
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...Complements Will Get You Everywhere:  How Do CA Workload Automation iDash and...
Complements Will Get You Everywhere: How Do CA Workload Automation iDash and...
 
Enable End-To-End Enterprise Development With CA Gen
Enable End-To-End Enterprise Development With CA GenEnable End-To-End Enterprise Development With CA Gen
Enable End-To-End Enterprise Development With CA Gen
 
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
 
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing ToolEclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
Eclipse-Based User Interfaces for CA Endevor SCM and CA Testing Tool
 
Intelligent Mainframe Management: The Evolution of Expert Systems
Intelligent Mainframe Management: The Evolution of Expert Systems Intelligent Mainframe Management: The Evolution of Expert Systems
Intelligent Mainframe Management: The Evolution of Expert Systems
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...
 
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
Intelligent DevOps - Driving Continuous Delivery by Harnessing the Power of A...
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpadTech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
 
Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...
Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...
Case Study: Al Jazeera Extends its Business and Consumer Reach With Robust, W...
 
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
 
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...
 

Viewers also liked

Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
Amazon Web Services
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
GWAVA
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
Amazon Web Services
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
Mike Spaulding
 
Demystifying Cloud Security
Demystifying Cloud SecurityDemystifying Cloud Security
Demystifying Cloud Security
Ben Clay, CSP (IoT - Expert)
 
Menlo Security Isolation Platform
Menlo Security Isolation PlatformMenlo Security Isolation Platform
Menlo Security Isolation Platform
Marco Scala
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
Digital Guardian
 
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
Itza Carbajal
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
Reza Kopaee
 
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
Spark Summit
 

Viewers also liked (10)

Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Protect your data in / with the Cloud
Protect your data in / with the CloudProtect your data in / with the Cloud
Protect your data in / with the Cloud
 
Data Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud ServicesData Privacy & Compliance Considerations on Using Cloud Services
Data Privacy & Compliance Considerations on Using Cloud Services
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
Demystifying Cloud Security
Demystifying Cloud SecurityDemystifying Cloud Security
Demystifying Cloud Security
 
Menlo Security Isolation Platform
Menlo Security Isolation PlatformMenlo Security Isolation Platform
Menlo Security Isolation Platform
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...Digital Keepers:  Ethics of Saving Online Data About Latin American Social Mo...
Digital Keepers: Ethics of Saving Online Data About Latin American Social Mo...
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
Optimizing Spark Deployments for Containers: Isolation, Safety, and Performan...
 

Similar to Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encryption for the Mainframe and for the Enterprise

Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
CA Technologies
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
CA Technologies
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
CA Technologies
 
Tech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team CenterTech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team Center
CA Technologies
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
CA Technologies
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
CA Technologies
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
CA Technologies
 
Pre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational IntelligencePre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational Intelligence
CA Technologies
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
CA Technologies
 
Getting VMs in Shape with data-driven workflows in CA Process Automation
Getting VMs in Shape with data-driven workflows in CA Process AutomationGetting VMs in Shape with data-driven workflows in CA Process Automation
Getting VMs in Shape with data-driven workflows in CA Process Automation
CA Technologies
 
Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence
CA Technologies
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
CA Technologies
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
 
Crack Open the Big Black Box for Faster Problem Remediation
Crack Open the Big Black Box for Faster Problem RemediationCrack Open the Big Black Box for Faster Problem Remediation
Crack Open the Big Black Box for Faster Problem Remediation
CA Technologies
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
CA Technologies
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS Platform
CA Technologies
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
 
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
CA Technologies
 
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementPre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
CA Technologies
 

Similar to Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encryption for the Mainframe and for the Enterprise (20)

Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Tech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team CenterTech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team Center
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
 
Tech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access ManagementTech Tak: Threat Analytics for Privileged Access Management
Tech Tak: Threat Analytics for Privileged Access Management
 
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
Pre-Con Ed: Operational Intelligence – Monitoring the Past to Better Understa...
 
Pre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational IntelligencePre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational Intelligence
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
Getting VMs in Shape with data-driven workflows in CA Process Automation
Getting VMs in Shape with data-driven workflows in CA Process AutomationGetting VMs in Shape with data-driven workflows in CA Process Automation
Getting VMs in Shape with data-driven workflows in CA Process Automation
 
Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
 
Crack Open the Big Black Box for Faster Problem Remediation
Crack Open the Big Black Box for Faster Problem RemediationCrack Open the Big Black Box for Faster Problem Remediation
Crack Open the Big Black Box for Faster Problem Remediation
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS Platform
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
 
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
Migrating from Redwood to CA Workload Automation AE (AutoSys®) - Drivers, Met...
 
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure ManagementPre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
Pre-Con Ed: Integrate CA Spectrum® and CA Unified Infrastructure Management
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 

Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encryption for the Mainframe and for the Enterprise