SlideShare a Scribd company logo
Business, rewritten by software™
Leveraging Technology for Government
Service Delivery
Prashant Chaudhary
Sr. Director - Government
2 © 2014 CA. ALL RIGHTS RESERVED.
Government and PSU are using digital Transformation to
improve productivity and citizen service
2
3 © 2014 CA. ALL RIGHTS RESERVED.
Trends, Opportunities and Challenges
Infrastructure
• Infrastructure
Performance
Management
• Service Level
Monitoring
Service
Delivery
• Application
Performance &
End User
Experience
• Social Media
Data Security
• Prevention of
Insider /
OutsideThreats
• Strong
authentication
measures
• RiskAnalysis
Manageability
• Effective
Project
Management
• Infra
Consolidation
• Capex to Opex
• Automation &
Cloud based
service delivery
• Contract /
Vendor
Management
Going
Forward
• Mobile Based
Service
Delivery
• Faster service
development
• API
Management
• Rapid
Replication
• Service
Virtualization
4 © 2014 CA. ALL RIGHTS RESERVED.
Residential Industrial Commercial
Buildings
Water Parking
Street
Lighting Waste
Environm
ent People
Street
Furniture
Safety&S
ecurity Traffic
Street
Internet Edge WAN Agg
Wireless WAN
Internet
Cloud Services
Vehicles
Vehicles
Public/Private
WAN
Wired/Wireless Access
Wired/Wireless
Aggregation
Ruggedized Device
Compute/Storage
Security
Internet Edge
WAN Aggregation
Mobility/Location Management
Wireless/Wired Network Management
Video ManagementData Center Resources
Safety&
Security
Data/Event Virtualization/Aggregation
Traffic
ManagementEnvironment
Waste
Management
Lighting
Management
Parking
Management
Water
Management
Transport
Management
Monitoring
Command Control
Centers
City Services
Citizen Services
Apps Portal
Security
Analytics
6 © 2014 CA. ALL RIGHTS RESERVED.
Technology Landscape
IT Hardware
& Assets Mainframe Distributed
High
Density
Operating
Systems & IT
Environments
CloudPhysical Virtual
Time
Environment 81+°F77°F68°F
Power 20 W
per sq. ft.
80 W
per sq. ft.
150+ W
per sq. ft.
Applications
& Business
Services
Data
Processing
Business
Users
Everyone &
Everything
Facility & Data
Center Space
DC, Colo &
Modular
Computer
Room
Data
Centers
7 © 2014 CA. ALL RIGHTS RESERVED.
New Era IT Ecosystem
Monitoring Flexibility
Capacity
Management
Capacity
Systems
Management
System
Traffic
Analysis
Performance Fault
Network
Citizen
Experience
App Perf
Monitoring
Mobile
Monitoring
Applications
Datacenter Infrastructure
Management
Data Center
8 © 2014 CA. ALL RIGHTS RESERVED.
Digital Transformation requires Identity-Centric Security
On Premise Apps
Cloud Services
Connected Devices
Customers
Citizens
Partners
Employees
9 © 2014 CA. ALL RIGHTS RESERVED.
Evaluate, Authenticate, Authorize, Access
Valid ID
Do you have the
right credential? Is your behavior and
history as expected?
Who are you?
Is this your normal
device and geo-
location?
Web
Portal
Mobile
App
VPN Kiosk
Advanced Authentication Authorization
Access
Granted
Are you allowed
to access this
resource?
Is your risk
level acceptable
to access this
resource?
Authenticated
10 © 2014 CA. ALL RIGHTS RESERVED.
Privileged Access
The Emerging Front Line
Hacker Malware/APT
On Premise
Employees/Partners
 Systems Admins
 Network Admins
 DB Admins
 Application Admins
Partners
Systems/NW/DB/Application Admins
Employees
Systems/NW/DB/Applicati
on Admins
Public Cloud
Apps
Apps
VMware
Administrator
AWS Administrator
Microsoft
Office 365
Administrator
INTERNET
ORGANIZATIONS TYPICALLY HAVE 3-4X MORE PRIVILEGED
ACCOUNTS AND CREDENTIALS THAN EMPLOYEES!
11 © 2014 CA. ALL RIGHTS RESERVED.
Privileged Access Management
Helps You Address Five Primary Challenges
PRIVILEGED
ACCESS MGMT.
Enable
Compliance
Stop
Targeted
Attacks
Enable
Operational
Efficiency
Secure the Hybrid
Enterprise
Mitigate
Insider Threats
12 © 2014 CA. ALL RIGHTS RESERVED.
Delivering New Services Over
Internet Used to be All About the Browser
WEB CONTENT EXPOSED
THROUGH PERIMETER DMZ
DATA
13 © 2014 CA. ALL RIGHTS RESERVED.
Focus on APIs
Enable Anything, Everywhere Application Access
OUTSIDE PARTNERS / DIVISIONS
EXTERNAL DEVELOPERS
MOBILE APPS CLOUD SERVICES INTERNET OF THINGS
API Server
Data
14 © 2014 CA. ALL RIGHTS RESERVED.
Provide end-to-end security from
the client to the backend API
 Control access to APIs based on user, app and device
 Protect exposed APIs from external threats such as SQL
injections and x-site scripting attacks
 Use security standards such as OAuth to provide SSO
 Apply appropriate risk based controls based on context
of the situation
 Protect sensitive assets from compromise reducing
impact to brand and regulatory compliance
What you need to do Value to your business
Fine-grained API
Access Control
Threat Protection
Enterprise SSO
API
15 © 2014 CA. ALL RIGHTS RESERVED.
DEVOPS SECURITYMANAGEMENT
The disciplines that enable the
Digital Transformation
Accelerate Innovation Enable GrowthRun IT like a Business
CA Technologies At-a-Glance
• US$ 4.0 + billion revenue
• Leading Enterprise software company
• 35+ years in Enterprise IT management
• Founded in 1976
• Leaders in IT Solutions,
• 15,000+ employees worldwide
• ITC @ Hyderabad
• Serving business in 40+ countries with
150+ offices
• 98% of Fortune 500 Companies & 95% of
Fortune 1000 companies are our Happy
CA Customers
Sr. Director - Government
Prashant.chaudhary@ca.com
@cainc
slideshare.net/CAinc
linkedin.com/company/ca-technologies
ca.com
Prashant Chaudhary

More Related Content

What's hot

Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
MarketingArrowECS_CZ
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
e-Xpert Solutions SA
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Imperva
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
Rahul Neel Mani
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
Rahul Neel Mani
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
AlgoSec
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
Cloudflare
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
Akamai Technologies
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
Akamai Technologies
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
e-Xpert Solutions SA
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
Akamai Technologies
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
Rahul Neel Mani
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
IBM Security
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
Imperva
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
Cloudflare
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security
 

What's hot (20)

Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Zero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fastZero trust for everybody: 3 ways to get there fast
Zero trust for everybody: 3 ways to get there fast
 
3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware3 Reasons You Need Proactive Protection Against Malware
3 Reasons You Need Proactive Protection Against Malware
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?Are Cloud Apps the Invisible Man?
Are Cloud Apps the Invisible Man?
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 

Similar to Leveraging Technology for Government Service Delivery

SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
Andrew Ames
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Amazon Web Services
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Delivery Centric
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless Workplace
CA Technologies
 
Anunta Tech Corporate Presentation (5Feb15)
Anunta Tech Corporate Presentation (5Feb15)Anunta Tech Corporate Presentation (5Feb15)
Anunta Tech Corporate Presentation (5Feb15)
AnuntaTech
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
Delivery Centric
 
Secure Enterprise Mobility
Secure Enterprise MobilitySecure Enterprise Mobility
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
CA API Management
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
Rajat Vijayvargiya
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
Luca Rossetti
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
CA Technologies
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
Imperva
 
Challenges to Integration Strategy - Thompson
Challenges to Integration Strategy - ThompsonChallenges to Integration Strategy - Thompson
Challenges to Integration Strategy - Thompson
Prolifics
 
The Unstoppable Demand for the All-Wireless Workplace
The Unstoppable Demand for the All-Wireless WorkplaceThe Unstoppable Demand for the All-Wireless Workplace
The Unstoppable Demand for the All-Wireless Workplace
Aruba, a Hewlett Packard Enterprise company
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC Software
BMC Software
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
SecureAuth
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
Deivid Toledo
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
CA API Management
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application Fluency
Alcatel-Lucent Enterprise
 

Similar to Leveraging Technology for Government Service Delivery (20)

SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
Architecting Application Services For Hybrid Cloud - AWS Summit SG 2017
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Creating the Borderless Workplace
Creating the Borderless WorkplaceCreating the Borderless Workplace
Creating the Borderless Workplace
 
Anunta Tech Corporate Presentation (5Feb15)
Anunta Tech Corporate Presentation (5Feb15)Anunta Tech Corporate Presentation (5Feb15)
Anunta Tech Corporate Presentation (5Feb15)
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Secure Enterprise Mobility
Secure Enterprise MobilitySecure Enterprise Mobility
Secure Enterprise Mobility
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
CA API Management: A DevOps Enabler
CA API Management: A DevOps EnablerCA API Management: A DevOps Enabler
CA API Management: A DevOps Enabler
 
Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...Enterprise Mobility: winning strategies to get your organization ready for th...
Enterprise Mobility: winning strategies to get your organization ready for th...
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Challenges to Integration Strategy - Thompson
Challenges to Integration Strategy - ThompsonChallenges to Integration Strategy - Thompson
Challenges to Integration Strategy - Thompson
 
The Unstoppable Demand for the All-Wireless Workplace
The Unstoppable Demand for the All-Wireless WorkplaceThe Unstoppable Demand for the All-Wireless Workplace
The Unstoppable Demand for the All-Wireless Workplace
 
Power of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC SoftwarePower of the Platform: Andy Walker, BMC Software
Power of the Platform: Andy Walker, BMC Software
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Soluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE TecnologiaSoluções F5 Networks - FORENSE Tecnologia
Soluções F5 Networks - FORENSE Tecnologia
 
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
Balancing Security & Developer Enablement in Enterprise Mobility - Jaime Ryan...
 
Unified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application FluencyUnified Access from Application Chaos to Application Fluency
Unified Access from Application Chaos to Application Fluency
 

More from eGov Magazine

‘Dell Aarambh’ Transforming e-Education in India
‘Dell Aarambh’ Transforming e-Education in India‘Dell Aarambh’ Transforming e-Education in India
‘Dell Aarambh’ Transforming e-Education in India
eGov Magazine
 
elets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLink
elets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLinkelets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLink
elets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLink
eGov Magazine
 
Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...
Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...
Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...
eGov Magazine
 
"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur
"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur
"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur
eGov Magazine
 
Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...
Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...
Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...
eGov Magazine
 
Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...
Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...
Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...
eGov Magazine
 
National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...
National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...
National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...
eGov Magazine
 
Financial Inclusion for Inclusive Growth – Save the Farmer Campaign
Financial Inclusion for Inclusive Growth – Save the Farmer CampaignFinancial Inclusion for Inclusive Growth – Save the Farmer Campaign
Financial Inclusion for Inclusive Growth – Save the Farmer Campaign
eGov Magazine
 
e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...
e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...
e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...
eGov Magazine
 
Jharkhand Information Highway: A New Horizon
Jharkhand Information Highway: A New HorizonJharkhand Information Highway: A New Horizon
Jharkhand Information Highway: A New Horizon
eGov Magazine
 
e-Court in CERC Transforming the Judicial Process….
e-Court in CERC Transforming the Judicial Process….e-Court in CERC Transforming the Judicial Process….
e-Court in CERC Transforming the Judicial Process….
eGov Magazine
 
Kerala Digital odyssey: Digitally connected and served state
Kerala Digital odyssey: Digitally connected and served stateKerala Digital odyssey: Digitally connected and served state
Kerala Digital odyssey: Digitally connected and served state
eGov Magazine
 
ICT Initiatives in Higher Education Department, GOK
ICT Initiatives in  Higher Education Department, GOKICT Initiatives in  Higher Education Department, GOK
ICT Initiatives in Higher Education Department, GOK
eGov Magazine
 

More from eGov Magazine (13)

‘Dell Aarambh’ Transforming e-Education in India
‘Dell Aarambh’ Transforming e-Education in India‘Dell Aarambh’ Transforming e-Education in India
‘Dell Aarambh’ Transforming e-Education in India
 
elets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLink
elets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLinkelets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLink
elets 2nd eJharkhand Summit 2016 - Amit Chowdry, CEO, PeopleLink
 
Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...
Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...
Digital India Knowledge Exchange Summit 2016 - Atul Rastogi, Deputy General M...
 
"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur
"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur
"CCTV is not Enough Do More"! - Gautam Garodia, CEO, Comsur
 
Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...
Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...
Financial Inclusion for inclusive Growth: Taking FI to Last Mile - S S Bhat, ...
 
Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...
Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...
Financial Inclusion UT Chandigarh - Bhawna Garg, Special Secretary, Departmen...
 
National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...
National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...
National e-Transaction Count - I P S Sethi, Sr Technical Director, National I...
 
Financial Inclusion for Inclusive Growth – Save the Farmer Campaign
Financial Inclusion for Inclusive Growth – Save the Farmer CampaignFinancial Inclusion for Inclusive Growth – Save the Farmer Campaign
Financial Inclusion for Inclusive Growth – Save the Farmer Campaign
 
e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...
e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...
e-Health Care - Gyanesh Pandey, Chairman & Managing Director, HSCC(India) Lim...
 
Jharkhand Information Highway: A New Horizon
Jharkhand Information Highway: A New HorizonJharkhand Information Highway: A New Horizon
Jharkhand Information Highway: A New Horizon
 
e-Court in CERC Transforming the Judicial Process….
e-Court in CERC Transforming the Judicial Process….e-Court in CERC Transforming the Judicial Process….
e-Court in CERC Transforming the Judicial Process….
 
Kerala Digital odyssey: Digitally connected and served state
Kerala Digital odyssey: Digitally connected and served stateKerala Digital odyssey: Digitally connected and served state
Kerala Digital odyssey: Digitally connected and served state
 
ICT Initiatives in Higher Education Department, GOK
ICT Initiatives in  Higher Education Department, GOKICT Initiatives in  Higher Education Department, GOK
ICT Initiatives in Higher Education Department, GOK
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Leveraging Technology for Government Service Delivery

  • 1. Business, rewritten by software™ Leveraging Technology for Government Service Delivery Prashant Chaudhary Sr. Director - Government
  • 2. 2 © 2014 CA. ALL RIGHTS RESERVED. Government and PSU are using digital Transformation to improve productivity and citizen service 2
  • 3. 3 © 2014 CA. ALL RIGHTS RESERVED. Trends, Opportunities and Challenges Infrastructure • Infrastructure Performance Management • Service Level Monitoring Service Delivery • Application Performance & End User Experience • Social Media Data Security • Prevention of Insider / OutsideThreats • Strong authentication measures • RiskAnalysis Manageability • Effective Project Management • Infra Consolidation • Capex to Opex • Automation & Cloud based service delivery • Contract / Vendor Management Going Forward • Mobile Based Service Delivery • Faster service development • API Management • Rapid Replication • Service Virtualization
  • 4. 4 © 2014 CA. ALL RIGHTS RESERVED.
  • 5. Residential Industrial Commercial Buildings Water Parking Street Lighting Waste Environm ent People Street Furniture Safety&S ecurity Traffic Street Internet Edge WAN Agg Wireless WAN Internet Cloud Services Vehicles Vehicles Public/Private WAN Wired/Wireless Access Wired/Wireless Aggregation Ruggedized Device Compute/Storage Security Internet Edge WAN Aggregation Mobility/Location Management Wireless/Wired Network Management Video ManagementData Center Resources Safety& Security Data/Event Virtualization/Aggregation Traffic ManagementEnvironment Waste Management Lighting Management Parking Management Water Management Transport Management Monitoring Command Control Centers City Services Citizen Services Apps Portal Security Analytics
  • 6. 6 © 2014 CA. ALL RIGHTS RESERVED. Technology Landscape IT Hardware & Assets Mainframe Distributed High Density Operating Systems & IT Environments CloudPhysical Virtual Time Environment 81+°F77°F68°F Power 20 W per sq. ft. 80 W per sq. ft. 150+ W per sq. ft. Applications & Business Services Data Processing Business Users Everyone & Everything Facility & Data Center Space DC, Colo & Modular Computer Room Data Centers
  • 7. 7 © 2014 CA. ALL RIGHTS RESERVED. New Era IT Ecosystem Monitoring Flexibility Capacity Management Capacity Systems Management System Traffic Analysis Performance Fault Network Citizen Experience App Perf Monitoring Mobile Monitoring Applications Datacenter Infrastructure Management Data Center
  • 8. 8 © 2014 CA. ALL RIGHTS RESERVED. Digital Transformation requires Identity-Centric Security On Premise Apps Cloud Services Connected Devices Customers Citizens Partners Employees
  • 9. 9 © 2014 CA. ALL RIGHTS RESERVED. Evaluate, Authenticate, Authorize, Access Valid ID Do you have the right credential? Is your behavior and history as expected? Who are you? Is this your normal device and geo- location? Web Portal Mobile App VPN Kiosk Advanced Authentication Authorization Access Granted Are you allowed to access this resource? Is your risk level acceptable to access this resource? Authenticated
  • 10. 10 © 2014 CA. ALL RIGHTS RESERVED. Privileged Access The Emerging Front Line Hacker Malware/APT On Premise Employees/Partners  Systems Admins  Network Admins  DB Admins  Application Admins Partners Systems/NW/DB/Application Admins Employees Systems/NW/DB/Applicati on Admins Public Cloud Apps Apps VMware Administrator AWS Administrator Microsoft Office 365 Administrator INTERNET ORGANIZATIONS TYPICALLY HAVE 3-4X MORE PRIVILEGED ACCOUNTS AND CREDENTIALS THAN EMPLOYEES!
  • 11. 11 © 2014 CA. ALL RIGHTS RESERVED. Privileged Access Management Helps You Address Five Primary Challenges PRIVILEGED ACCESS MGMT. Enable Compliance Stop Targeted Attacks Enable Operational Efficiency Secure the Hybrid Enterprise Mitigate Insider Threats
  • 12. 12 © 2014 CA. ALL RIGHTS RESERVED. Delivering New Services Over Internet Used to be All About the Browser WEB CONTENT EXPOSED THROUGH PERIMETER DMZ DATA
  • 13. 13 © 2014 CA. ALL RIGHTS RESERVED. Focus on APIs Enable Anything, Everywhere Application Access OUTSIDE PARTNERS / DIVISIONS EXTERNAL DEVELOPERS MOBILE APPS CLOUD SERVICES INTERNET OF THINGS API Server Data
  • 14. 14 © 2014 CA. ALL RIGHTS RESERVED. Provide end-to-end security from the client to the backend API  Control access to APIs based on user, app and device  Protect exposed APIs from external threats such as SQL injections and x-site scripting attacks  Use security standards such as OAuth to provide SSO  Apply appropriate risk based controls based on context of the situation  Protect sensitive assets from compromise reducing impact to brand and regulatory compliance What you need to do Value to your business Fine-grained API Access Control Threat Protection Enterprise SSO API
  • 15. 15 © 2014 CA. ALL RIGHTS RESERVED. DEVOPS SECURITYMANAGEMENT The disciplines that enable the Digital Transformation Accelerate Innovation Enable GrowthRun IT like a Business
  • 16. CA Technologies At-a-Glance • US$ 4.0 + billion revenue • Leading Enterprise software company • 35+ years in Enterprise IT management • Founded in 1976 • Leaders in IT Solutions, • 15,000+ employees worldwide • ITC @ Hyderabad • Serving business in 40+ countries with 150+ offices • 98% of Fortune 500 Companies & 95% of Fortune 1000 companies are our Happy CA Customers
  • 17. Sr. Director - Government Prashant.chaudhary@ca.com @cainc slideshare.net/CAinc linkedin.com/company/ca-technologies ca.com Prashant Chaudhary

Editor's Notes

  1. Cooling: Prior to 2002, data centers were typically operated around 68-70oF. When ASHRAE came out with its first specifications, the high end allowable range was just under 80oF (77 oF to be exact). Now, with the new 2011 guidelines, the allowable limit is almost 90 in critical environments, and over 110 in non-critical DC environments (e.g., volume storage). Power:In 2004, average power density of 25 W/sf (Watts per square foot). (that is IT power consumption per gross computer room area) At that time, Lawrence Berkeley Labs said “Not clear that expectation of much higher power densities will come to pass.”! Reasoning: “plenty of empty space and efficiency opportunities.” Yet the median in 2012 is already the Max of 2004 at about 80 W/sf, and we are seeing data centers already above 150W/sf according to the Uptime Institute Data Center Density Report.
  2. Identity must be the control point for managing user access. The key to identity-centric security is that it enables you to connect everyone with everything from everywhere, based on centralized security policies that you create, and that are based on identities. And, identity-centric security provides a point of protection against identity-based attacks, so that you can detect and repel attacks far more easily. Security can also be relatively transparent, so that it isn’t getting in the way. Identity Centric Security is also about the end –user controlling what is shared with a company… so I give you my Facebook account attributes–my name, that I’m female, and I work in IT Security… but not include my home address, my DOB or SS#. It can also provide analytics to protect the consumer from fraud. example: My credit card was used this AM in Boston, so it can’t be used the same day in London or Paris…
  3. Before we go much farther, let’s quickly address the question of just who privileged users are — because it’s a bigger group of individuals, and perhaps more importantly, a larger set of credentials to be protected, than we might think about at first.The reality is that there are privileged users — and accounts and credentials — across your entire organization. We’re all familiar with the classic group of individuals who we think about in the context of privileged users — network, systems, database administrators, operations staff and the like. There are plenty of those individuals, and they use many accounts. And that number has been growing as we adopt technologies like virtualization and the cloud — and I’d point out here that those individuals are gaining even more power and control in those environments because of the powerful management consoles to which they have access.But let’s not forget all the individuals outside the organization who have some level of privileged access to your networks and systems. Here, we’re talking about groups like vendors and outsourced contractors, and perhaps business partners. Many of the breaches I highlighted a few moments ago actually started when credentials belonging to someone in this category of user were compromised and used to gain that initial access into an environment.We’ll mention it in passing for today, although this is an important topic we could dedicate an entire discussion to, but many privileged users aren’t actually users — at least, they’re not people. They are the countless numbers of applications and scripts that contain privileged credentials — often hard-coded and visible to any number of individuals — that exist in your IT infrastructure.Finally, especially with the rise of cloud-based services, we have a whole class of privileged users who we wouldn’t normally think about — end users and employees. I’ll take myself as an example — I’m in marketing, and in a typical discussion of privileged users I probably wouldn’t be the first person you’d think of — but because of the work I do, it turns out I have high level, administrative access to a number of important systems and accounts — marketing and sales automation tools, websites, social media accounts, and more.So, to recap, if you weren’t a believer before, hopefully, I’ve made the point that privileged users and their credentials are a key element in many, of not all, of the damaging data breaches we’re seeing — and as a consequence, that managing, controlling, and protecting those users and their credentials is a critical element of helping to prevent these attacks.
  4. Privileged Identity Management is not simply managing passwords. There are many business and IT challenges that it helps you address, from reducing risk, to enabling cloud computing.
  5. Not all that long ago, if you wanted to access a website on the web, you used a browser. That browser was your “window into the Internet”….BUT….really, the website you visited dictated what you saw out that window – and invariably, those websites didn’t really share (or want to share) information. So if you opened your browser and went to check out the latest and greatest laptops available on Best Buy, Best Buy controlled what you saw, how you saw it, and certainly didn’t share information.
  6. The end result? Through a focus on APIs, you’ve enabled anything everything application access. No longer is the browser your window to the Internet – instead, the application that’s optimized for the device/service that you’re currently using becomes that temporary window. And through an API Server (aka API Gateway), you have a single point of control for all services to securely access the information that they need. The alternative? Each one of these resources requires an Omnipotent One from IT to bless the opening of a port in the firewall. While mobile apps alone, this could be in the 10s of 1000’s. Your choice – one port to a single server, or a swiss cheese firewall? The choice is pretty clear. Now to take the next step to enable the application economy in your enterprise, you’ll probably want to focus on a few initiatives. Let’s take a look at some of the ones that CA has seen.
  7. Crucial for many enterprises is ensuring the integrity of their corporate resources (including data) for all these new data types. Thinking back a few slides, this means tying the identity of the user with the application with the device. The way you would do this is: Fine-grained Access - The full context of each API request should be understood in order to apply the appropriate level of API access CA gathers user, app and device data, and applies to policy in order to properly control each API transaction Mobile users can use standards such as OAuth and OpenID Connect to authenticate and grant access to enterprise data/apps Threat Protection For every API externalized to the outside world results in some level of exposure to the business CA protects these exposed APIs from external attacks including SQL injections and x-site scripting Enterprise SSO Most enterprises have some form of IAM (such as CA SSO) By integrating IAM with the user with the app, the enterprise is assured that only the right user is getting access to the right data on the right device Using new mobile security standards such as OAuth and OpenID Connect help make that integration easier for developers Why would you do this? You can apply appropriate risk-based controls based on context of the situation (which user on which app on which device) And you can protect sensitive assets from compromise, reducing impact to brand, as well as addressing regulatory compliance.
  8. The application economy is here. In this environment, applications drive the relationship between most businesses and their customers, making all businesses a technology or software company. For IT leaders and their workforce, that means the role of IT must evolve to become much more strategic to the business, lessening the amount of resources IT can commit to back-office functions and support. IT must still manage these back-end systems, but considering the speed at which apps are released and the mobile devices and platforms on which end users access them, IT needs more flexibility, agility and ease-of-use than ever before. Management Cloud is a set of integrated business applications delivered as cloud services that enable you to run IT like a business – delivering the insights you need to make the right decisions and enabling you to empower a modern workforce. Also in the application economy, continuous innovation is required. Companies are under greater pressure than ever before to bring new groundbreaking services to market faster and faster. And the quality of what is delivered must be top-notch, as customers have more options and less patience and tolerance for a poor application experience. DevOps is about ensuring that development and operations teams are working together effectively to bring innovation to market quickly and seamlessly. It’s also about delivering higher-quality applications and ensuring operational excellence – and we have the expertise and solutions that can help you implement a DevOps approach. Amongst companies we surveyed recently, security was identified as the top obstacle in the application economy. Applications have become the critical point of engagement with customers and taking an identity-centric approach to security is essential since users today expect to be able to access their applications and data from many different devices and from wherever they are. Furthermore, today’s disruptive and leading-edge applications rely heavily on APIs to share data and integrate with other applications and services. A strategy for managing and securing APIs needs to be implemented as part of the development process. Our approach to Security focuses not just on protecting the business from risk, but even more importantly on enabling business growth. We take an identity-centric approach to security to deliver both the risk-protection companies need and the flexibility and ease-of-use application users expect. Our API management and security offerings give organizations the confidence to publicly open valuable data and application functionality as APIs and help developer teams realize faster delivery of secure mobile apps and cloud services.