CA Data Content Discovery helps you identify data exposure risks on z Systems by scanning through the mainframe data infrastructure. By discovering where the data is located, classifying the data to determine sensitivity level, and providing comprehensive reporting on the scan results, data can be adequately protected and exposure risks can be mitigated.
For more information, please visit http://cainc.to/Nv2VOe
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...CA Technologies
Software audits. Compliance fines. Are you in complete control of your software licenses? Don't lose sleep or let it impact your life. Hear about what it takes to implement a successful software asset management program and the business and personal value achieved at First Horizon National Corporation.
For more information, please visit http://cainc.to/Nv2VOe
Automated testing is an extreme time-saver, especially when you consider regression testing. Regression testing is the testing and retesting of applications when a new feature is introduced in order to verify the existing functionality is still working. To accomplish this, tests cases need to be executed, taking a lot of time especially if they are done manually. This session will show you how to build API tests that follow the user’s journey through the appellation—creating those headless tests magically. Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect and impact critical applications using ESB services. Determining the root cause of the problem is a challenge for most IT organizations because ESBs appear as a ‘black box,’ providing little insight into the cause of performance problems. Join us to learn how you can use Nastel AutoPilot for WebSphere MQ and CA Cross-Enterprise APM to prevent and resolve performance issues for applications communicating across your ESB, before they impact your users.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
Please join us as we discuss the need for advanced authentication for Mainframe, as well as any concerns and expectations surrounding its use.
For more information, please visit http://cainc.to/Nv2VOe
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Technologies
Hear how integrated modeling and code generation from CA Gen help you to deliver platform-independent applications on distributed and mainframe that run your mission-critical processes. Join us for a technical deep dive, learn about new product enhancements and watch a demo.
For more information, please visit http://cainc.to/Nv2VOe
How to Get the Best User Experience for Your Customers With: CA View® / CA De...CA Technologies
In the application economy, it is a must to quickly drive new business features. As a Solution Administrator or User, report delivery and report access is very critical to your success in today’s business world and for today's mainframe. Please join our session to discuss the new features and functions of output management solutions from CA in the fast-paced world of the application economy that will delight your users. Let CA show you how to reduce product support cost while expanding and exploring new user business value with CA View® and CA Deliver™ featuring the Web interface.
For more information, please visit http://cainc.to/Nv2VOe
Creating an Omnichannel Experience for Your CustomersCA Technologies
Digital business initiatives are at the forefront of enterprise growth strategies in today's application economy. Enterprises are looking to take advantage of new technology and create opportunities to launch innovative new services and open up the enterprise. CA Security and API Management solutions provide the ability to share enterprise data and digital content over the internet securely empowering developers to create apps across all of these new channels.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
This tech talk will dive into CA Service Virtualization on demand and how application development in the cloud can help accelerate your application delivery, improve the quality of your work and overcome development or test constraints.
For more information, please visit http://cainc.to/Nv2VOe
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...CA Technologies
Software audits. Compliance fines. Are you in complete control of your software licenses? Don't lose sleep or let it impact your life. Hear about what it takes to implement a successful software asset management program and the business and personal value achieved at First Horizon National Corporation.
For more information, please visit http://cainc.to/Nv2VOe
Automated testing is an extreme time-saver, especially when you consider regression testing. Regression testing is the testing and retesting of applications when a new feature is introduced in order to verify the existing functionality is still working. To accomplish this, tests cases need to be executed, taking a lot of time especially if they are done manually. This session will show you how to build API tests that follow the user’s journey through the appellation—creating those headless tests magically. Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Corporations increasingly rely on their enterprise services bus (ESB) as the communication center to link multiple IT systems, applications and data. Unfortunately, when something goes wrong in the ESB it can have a cascading affect and impact critical applications using ESB services. Determining the root cause of the problem is a challenge for most IT organizations because ESBs appear as a ‘black box,’ providing little insight into the cause of performance problems. Join us to learn how you can use Nastel AutoPilot for WebSphere MQ and CA Cross-Enterprise APM to prevent and resolve performance issues for applications communicating across your ESB, before they impact your users.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
Please join us as we discuss the need for advanced authentication for Mainframe, as well as any concerns and expectations surrounding its use.
For more information, please visit http://cainc.to/Nv2VOe
CA Gen Exploration – What's New and Cool in Application DevelopmentCA Technologies
Hear how integrated modeling and code generation from CA Gen help you to deliver platform-independent applications on distributed and mainframe that run your mission-critical processes. Join us for a technical deep dive, learn about new product enhancements and watch a demo.
For more information, please visit http://cainc.to/Nv2VOe
How to Get the Best User Experience for Your Customers With: CA View® / CA De...CA Technologies
In the application economy, it is a must to quickly drive new business features. As a Solution Administrator or User, report delivery and report access is very critical to your success in today’s business world and for today's mainframe. Please join our session to discuss the new features and functions of output management solutions from CA in the fast-paced world of the application economy that will delight your users. Let CA show you how to reduce product support cost while expanding and exploring new user business value with CA View® and CA Deliver™ featuring the Web interface.
For more information, please visit http://cainc.to/Nv2VOe
Creating an Omnichannel Experience for Your CustomersCA Technologies
Digital business initiatives are at the forefront of enterprise growth strategies in today's application economy. Enterprises are looking to take advantage of new technology and create opportunities to launch innovative new services and open up the enterprise. CA Security and API Management solutions provide the ability to share enterprise data and digital content over the internet securely empowering developers to create apps across all of these new channels.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
This tech talk will dive into CA Service Virtualization on demand and how application development in the cloud can help accelerate your application delivery, improve the quality of your work and overcome development or test constraints.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
Having the right information at your fingertips at exactly the right moment to get that project approved is critical. Static dashboards are no longer acceptable. In this session you will see an IT service management (ITSM) dashboard being built using Xtraction for CA Service Management. See how it can be modified in seconds, demonstrating the power and value that advanced reporting and dashboards bring to ITSM.
For more information, please visit http://cainc.to/Nv2VOe
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
Let’s take a look at how the CA Identity Portal can provide a centralized point for everything related to user identities and application access. It provides convenient access requests with request tracking, through access to the application itself using the enhanced applications launcher, to certification of the existing access. Most importantly, it also provides an outstanding user experience, along with identity security. Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Hands-On Lab: Using CA Mobile Application Analytics REST APIsCA Technologies
In this API driven world, gaining API access to your enterprise’s app analytics data is critical to being proactive about resolving issues and building tools like your own executive insights dashboard with KPI. In this guided, hands-on lab session, learn how to use the REST APIs provided by CA Mobile App Analytics to access analytics data using command line tools like ‘cURL' or browser based tools like Advanced REST Client. These are the same APIs used by the advanced analytics visualization displayed in the CA Mobile Application Analytics admin console. We will also show an example Android mobile app that consumes these APIs and shows a subset of the CA Mobile App Analytics data in a mobile friendly manner.
For more information, please visit http://cainc.to/Nv2VOe
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...CA Technologies
As data becomes ever more central to daily operations, pressure is mounting on organizations to become fully secure. Legislation is becoming increasingly stringent throughout the world. The common practice of using production data in non-production environments will soon risk fines in the millions of dollars.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: Effective Change/Configuration Management With CA Service...CA Technologies
Learn important IT service management (ITSM) tips and best practices for how to implement CA Service Management's CMDB for maximum change benefit. The session will include such topics as service modeling, discovery, change audit control, federation, reconciliation and synchronization, and will be taught by CA experts in CMDB.
For more information, please visit http://cainc.to/Nv2VOe
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
What's in a test? We invoke an application performance interface (API) test hoping to validate business logic and update the system of record, but why is it so hard to find those systems of record? This introductory session will explain and demonstrate how CA Continuous Application Insight (CA CAI) can observe a manual test and then generate tests for web UI APIs by creating the database validation steps for you. We will also show you how CA CAI can be used to generate 1000s of tests vs. spending days getting the validation right for a single test!
For more information, please visit http://cainc.to/Nv2VOe
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
The CA PPM microsessions offer an opportunity for CA PPM product management to present a perspective on a particular feature or functional area that is currently being considered for an upcoming release with the goal of collecting feedback in an intimate and interactive forum. In this session, the focal point will be CA PPM budgeting and forecasting. CA PPM product management will be available immediately following the session for additional Q&A on the topic at hand. (Due to the nature of these sessions, please limit your organization’s attendance to only one session of this type to allow others the chance to participate.) Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Knowledge Management of the Future for ITSMCA Technologies
Have traditional approaches to knowledge management become unsustainable?
Is there a new or better way to accomplish the same objective?
Join this session to engage in a lively discussion with IT experts from CA Service Management about where knowledge management may be heading.
For more information, please visit http://cainc.to/Nv2VOe
Managing Software Entitlements in Software Asset Management Solutions from CACA Technologies
This session will focus on the process of registering software entitlements in Software Asset Management solutions from CA.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCA Technologies
In this session, you will learn how Molina Medicaid Solutions (MMS) is using CA Release Automation to increase its release capacity by reducing deployment time by more than 75 percent, improving quality by 90 percent and enabling development teams to focus on their core development responsibilities. These benefits have been realized through the implementation of a standard and sustainable automated approach to both deployment and quality assurance.
For more information, please visit http://cainc.to/Nv2VOe
Orchestrating Legacy Services Into Contemporary RESTful WEB APIs With CA App ...CA Technologies
In this, hands-on, collaborative lab we will discuss the vision of CA App Services Orchestrator (CA ASO) and see the advantages of elegant and resilient RESTful APIs compared to legacy SOAP-based web services.
You’ll take pre-built SOAP services and marvel at the beautiful user experience that CA ASO provides to orchestrate them into resource-based APIs.
For more information, please visit http://cainc.to/Nv2VOe
Learn how to easily embed identity and access management capabilities into your mobile apps with CA Secure Cloud and the CA Mobile API Gateway software development kit (SDK).
For more information, please visit http://cainc.to/Nv2VOe
CA Performance Management 2.6 is a next-generation tool for monitoring mega-sized networks. This session, led by CA network monitoring experts, is designed to help new and existing users expand their knowledge of key capabilities and maximize the value of their performance data. The session will focus on foundational features, including understanding the architecture (data collectors, data repository/database, data aggregator, user interface and integration with CA Mediation Manager), leveraging the predefined dashboards and reports, understanding metric families and vendor-specific device certification, creating and deploying discovery and monitoring profiles and eventing. You'll also learn about advanced features, such as customizing dashboards and reports, automating custom groups creation and device population, using the application program interface (API) to integrate CA Performance Management with basic service set (BSS)/configuration management systems and create a zero-touch, automated process flow to on-board monitoring and self-certification procedures for device monitoring.
For more information, please visit http://cainc.to/Nv2VOe
Agility should not be limited to application delivery teams. All technical teams in the organization need to be able to speed delivery, improve quality and provide value to their customers. This is especially true when those customers are other technical teams. Learn how by applying agile principles to operations and architecture you can improve the efficacy of your entire agile organization.
For more information, please visit http://cainc.to/Nv2VOe
Knock, Knock…The Internet of Things wants to come in? CA Technologies
The Internet of Things (IoT) will connect users to the enterprise or just connect to the enterprise independently — but what will be used to secure this access? Come see how CA Security can secure access to and from the IoT.
For more information, please visit http://cainc.to/Nv2VOe
Technology Primer: Customize CA Application Performance Management With Tip...CA Technologies
Bring your monitoring solution to a new level by leveraging APIs and extension points with CA APM. In this session, CA Application Performance Management (CA APM) subject matter experts share examples and guidance to perfectly meet monitoring requirements by combining the intelligence of our APM solution with the extensive extension capabilities offered via new APIs.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...CA Technologies
ING improved time to market from 13 weeks to less than one week with DevOps and continuous delivery practices. According to ING, the process for releasing software must be repeatable and reliable and and software should be released into production as frequently as possible. Join us for this informative session and learn directly from the experiences of one of the world’s leading financial institutions. See how they are using container-based solutions, microservices and APIs along with CA Release Automation to build a flexible, resilient and highly available continuous delivery pipeline with little to no downtime.
For more information, please visit http://cainc.to/Nv2VOe
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorCA Technologies
Leverage the power of CA Gen with CA App Services Orchestrator to capture your business logic and data and transform them into contemporary Web API’s
For more information, please visit http://cainc.to/Nv2VOe
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
As a mobile developer, you understand the pressure to deliver apps faster and of higher quality. Developer solutions must simplify the complexity of creating a great user experience by providing mobile security, interactivity and backend integration with developer-friendly interfaces and APIs. This session steps through the new mobile app services solutions from CA.
For more information, please visit http://cainc.to/Nv2VOe
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...CA Technologies
This session focuses on the new features released with CA Spectrum® 10.0. Participants will get to see in action and also play around the capabilities available with CA Spectrum support for 64-bit computing architectures, network virtualization and other cool features.
For more information, please visit http://cainc.to/Nv2VOe
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
Can you easily identify exactly what files are regulated or sensitive data on the Mainframe? If not, stop by and listen to our experts show you how you can.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
Having the right information at your fingertips at exactly the right moment to get that project approved is critical. Static dashboards are no longer acceptable. In this session you will see an IT service management (ITSM) dashboard being built using Xtraction for CA Service Management. See how it can be modified in seconds, demonstrating the power and value that advanced reporting and dashboards bring to ITSM.
For more information, please visit http://cainc.to/Nv2VOe
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...CA Technologies
Let’s take a look at how the CA Identity Portal can provide a centralized point for everything related to user identities and application access. It provides convenient access requests with request tracking, through access to the application itself using the enhanced applications launcher, to certification of the existing access. Most importantly, it also provides an outstanding user experience, along with identity security. Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Hands-On Lab: Using CA Mobile Application Analytics REST APIsCA Technologies
In this API driven world, gaining API access to your enterprise’s app analytics data is critical to being proactive about resolving issues and building tools like your own executive insights dashboard with KPI. In this guided, hands-on lab session, learn how to use the REST APIs provided by CA Mobile App Analytics to access analytics data using command line tools like ‘cURL' or browser based tools like Advanced REST Client. These are the same APIs used by the advanced analytics visualization displayed in the CA Mobile Application Analytics admin console. We will also show an example Android mobile app that consumes these APIs and shows a subset of the CA Mobile App Analytics data in a mobile friendly manner.
For more information, please visit http://cainc.to/Nv2VOe
Fines in the Millions Levied Every Year Coming Soon! The Business Case for ...CA Technologies
As data becomes ever more central to daily operations, pressure is mounting on organizations to become fully secure. Legislation is becoming increasingly stringent throughout the world. The common practice of using production data in non-production environments will soon risk fines in the millions of dollars.
For more information, please visit http://cainc.to/Nv2VOe
Pre-Con Education: Effective Change/Configuration Management With CA Service...CA Technologies
Learn important IT service management (ITSM) tips and best practices for how to implement CA Service Management's CMDB for maximum change benefit. The session will include such topics as service modeling, discovery, change audit control, federation, reconciliation and synchronization, and will be taught by CA experts in CMDB.
For more information, please visit http://cainc.to/Nv2VOe
It's the 2010's. Why are you Still Manually Writing Tests?CA Technologies
What's in a test? We invoke an application performance interface (API) test hoping to validate business logic and update the system of record, but why is it so hard to find those systems of record? This introductory session will explain and demonstrate how CA Continuous Application Insight (CA CAI) can observe a manual test and then generate tests for web UI APIs by creating the database validation steps for you. We will also show you how CA CAI can be used to generate 1000s of tests vs. spending days getting the validation right for a single test!
For more information, please visit http://cainc.to/Nv2VOe
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
The CA PPM microsessions offer an opportunity for CA PPM product management to present a perspective on a particular feature or functional area that is currently being considered for an upcoming release with the goal of collecting feedback in an intimate and interactive forum. In this session, the focal point will be CA PPM budgeting and forecasting. CA PPM product management will be available immediately following the session for additional Q&A on the topic at hand. (Due to the nature of these sessions, please limit your organization’s attendance to only one session of this type to allow others the chance to participate.) Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Tech Talk: Knowledge Management of the Future for ITSMCA Technologies
Have traditional approaches to knowledge management become unsustainable?
Is there a new or better way to accomplish the same objective?
Join this session to engage in a lively discussion with IT experts from CA Service Management about where knowledge management may be heading.
For more information, please visit http://cainc.to/Nv2VOe
Managing Software Entitlements in Software Asset Management Solutions from CACA Technologies
This session will focus on the process of registering software entitlements in Software Asset Management solutions from CA.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: Molina Medicaid Solutions Transforms Healthcare Through AutomationCA Technologies
In this session, you will learn how Molina Medicaid Solutions (MMS) is using CA Release Automation to increase its release capacity by reducing deployment time by more than 75 percent, improving quality by 90 percent and enabling development teams to focus on their core development responsibilities. These benefits have been realized through the implementation of a standard and sustainable automated approach to both deployment and quality assurance.
For more information, please visit http://cainc.to/Nv2VOe
Orchestrating Legacy Services Into Contemporary RESTful WEB APIs With CA App ...CA Technologies
In this, hands-on, collaborative lab we will discuss the vision of CA App Services Orchestrator (CA ASO) and see the advantages of elegant and resilient RESTful APIs compared to legacy SOAP-based web services.
You’ll take pre-built SOAP services and marvel at the beautiful user experience that CA ASO provides to orchestrate them into resource-based APIs.
For more information, please visit http://cainc.to/Nv2VOe
Learn how to easily embed identity and access management capabilities into your mobile apps with CA Secure Cloud and the CA Mobile API Gateway software development kit (SDK).
For more information, please visit http://cainc.to/Nv2VOe
CA Performance Management 2.6 is a next-generation tool for monitoring mega-sized networks. This session, led by CA network monitoring experts, is designed to help new and existing users expand their knowledge of key capabilities and maximize the value of their performance data. The session will focus on foundational features, including understanding the architecture (data collectors, data repository/database, data aggregator, user interface and integration with CA Mediation Manager), leveraging the predefined dashboards and reports, understanding metric families and vendor-specific device certification, creating and deploying discovery and monitoring profiles and eventing. You'll also learn about advanced features, such as customizing dashboards and reports, automating custom groups creation and device population, using the application program interface (API) to integrate CA Performance Management with basic service set (BSS)/configuration management systems and create a zero-touch, automated process flow to on-board monitoring and self-certification procedures for device monitoring.
For more information, please visit http://cainc.to/Nv2VOe
Agility should not be limited to application delivery teams. All technical teams in the organization need to be able to speed delivery, improve quality and provide value to their customers. This is especially true when those customers are other technical teams. Learn how by applying agile principles to operations and architecture you can improve the efficacy of your entire agile organization.
For more information, please visit http://cainc.to/Nv2VOe
Knock, Knock…The Internet of Things wants to come in? CA Technologies
The Internet of Things (IoT) will connect users to the enterprise or just connect to the enterprise independently — but what will be used to secure this access? Come see how CA Security can secure access to and from the IoT.
For more information, please visit http://cainc.to/Nv2VOe
Technology Primer: Customize CA Application Performance Management With Tip...CA Technologies
Bring your monitoring solution to a new level by leveraging APIs and extension points with CA APM. In this session, CA Application Performance Management (CA APM) subject matter experts share examples and guidance to perfectly meet monitoring requirements by combining the intelligence of our APM solution with the extensive extension capabilities offered via new APIs.
For more information, please visit http://cainc.to/Nv2VOe
Case Study: ING Builds Highly Available Continuous Delivery Pipeline with Mic...CA Technologies
ING improved time to market from 13 weeks to less than one week with DevOps and continuous delivery practices. According to ING, the process for releasing software must be repeatable and reliable and and software should be released into production as frequently as possible. Join us for this informative session and learn directly from the experiences of one of the world’s leading financial institutions. See how they are using container-based solutions, microservices and APIs along with CA Release Automation to build a flexible, resilient and highly available continuous delivery pipeline with little to no downtime.
For more information, please visit http://cainc.to/Nv2VOe
Go Mobile to Mainframe With CA Genand CA App Services OrchestratorCA Technologies
Leverage the power of CA Gen with CA App Services Orchestrator to capture your business logic and data and transform them into contemporary Web API’s
For more information, please visit http://cainc.to/Nv2VOe
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
As a mobile developer, you understand the pressure to deliver apps faster and of higher quality. Developer solutions must simplify the complexity of creating a great user experience by providing mobile security, interactivity and backend integration with developer-friendly interfaces and APIs. This session steps through the new mobile app services solutions from CA.
For more information, please visit http://cainc.to/Nv2VOe
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...CA Technologies
This session focuses on the new features released with CA Spectrum® 10.0. Participants will get to see in action and also play around the capabilities available with CA Spectrum support for 64-bit computing architectures, network virtualization and other cool features.
For more information, please visit http://cainc.to/Nv2VOe
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...CA Technologies
Can you easily identify exactly what files are regulated or sensitive data on the Mainframe? If not, stop by and listen to our experts show you how you can.
For more information, please visit http://cainc.to/Nv2VOe
Ten Things You Should not Forget in Mainframe Security CA Technologies
Given the current state of security and breaches in the news every day, you won’t want to miss this session. We will cover the top 10 areas that you should be reviewing as a security practitioner that most organizations overlook. With the knowledge taken from this session, you will be able to better educate your staff and auditors about how to take security to the next level for your business and protect z/OS®.
For more information, please visit http://cainc.to/Nv2VOe
The identity-as-a-service solutions of today are helping many businesses address the password management problem, enabling a seamless experience to end users and delivering IT efficiencies. But, as more and more enterprises put the cloud at the center of their enterprise IT, is that enough? Join this session to learn about the security challenges of a SaaS-first world, the transformation needed in identity-as-a-service to address these challenges and what CA Technologies is doing to deliver on this transformation. Seating is limited and available first come-first served.
For more information, please visit http://cainc.to/Nv2VOe
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
API’s and Identity: Enabling Optum to become the HealthCare cloudCA Technologies
Brief on how Optum is transforming itself to become the HealthCare Services Cloud and how APIs and Identity are the enablers to make this possible.
For more information, please visit http://cainc.to/Nv2VOe
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?CA Technologies
Cyber-attacks damage an organization far beyond the breached data. The ripple effect is felt on your relations with customers, investors and employees. This security panel will discuss how being compliant doesn’t mean you are secure and how complacency around mainframe security will come back to bite you! Most IT security departments today struggle to meet organizational demands, especially with limited resources and budgets. Yet in todays' interconnected datacenter, we have to ask - is your team unaware of both malicious and accidental attack vectors now targeting mainframe data? Gain some insight from our experts; and come prepared to ask your own questions too!
For more information, please visit http://cainc.to/Nv2VOe
How Can Test Data Management Overcome Mainframe Testing Challenges?CA Technologies
How a sophisticated, end-to-end test data management strategy can be used to reduce infrastructure costs and mitigate risk while providing testers with all the data they need, when they need it.
For more information, please visit http://cainc.to/Nv2VOe
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
This session will cover the “basics” of CA Unified Infrastructure Management (CA UIM)to help you build your knowledge on the general concepts, components and features that CA UIM offers. We will also cover the major features that are now available within our CA UIM 8.35 release.
For more information, please visit http://cainc.to/Nv2VOe
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
Corporate boards and audit committees are taking a greater interest in cybersecurity and plans to mitigate related risks. Headline-grabbing data breaches are prevalent. Shareholders and oversight bodies are concerned about the potential impact to their organizations’ financial well-being and reputation.
Today, cyber adversaries are well-organized and well-funded, and they are more able to enter commercial and governmental organizations than ever before. No company has the capability and capacity to prevent all attacks. The only way to operate securely is to assume a breach has occurred, is occurring and will occur. This requires “complicate, detect and respond” mindset when developing and automating controls.
For more information, please visit http://cainc.to/Nv2VOe
Mobile Risk Analysis: Take Your Mobile App Security to the Next LevelCA Technologies
The mobile application is becoming the primary interface between your enterprise and end users — but what will be used to secure this access? Come learn how to leverage data from mobile devices to help identify the legitimacy of a user attempting to login or perform a sensitive transaction.
For more information, please visit http://cainc.to/Nv2VOe
David Frampton, Cisco Systems
How to position the network as a real-time source of critical security data; get more out of existing IT platforms by serving a wider set of use-cases, especially for mobility and BYOD environments; and translate heterogeneous IT platform capabilities into actionable network access policy.
Splunk's Minister of Defense and security guru, Monzy Merza, shows how to use the Splunk App for Enterprise Security to detect, respond to and mitigate advanced malware through various phases of the threat's lifecycle chain.
For organizations with strict data residency requirements, CipherCloud provides the ability to retain specific sensitive data on-premises while using cloud-based applications. Tokenization substitutes randomly generated values for the original data, which never leaves the enterprise.
Protecting the Software-Defined Data Center from Data BreachCA Technologies
In this session, learn:
Security Requirements for our next generation software defined data centers
VMware NSX™, VMware’s network virtualization platform, and how it protects the software defined data center
CA Privileged Access Manager for VMware NSX™, and how it protects the management plane of VMware NSX™
For more information, please visit http://cainc.to/Nv2VOe
Advanced threat security - Cyber Security For The Real WorldCisco Canada
Cisco delivers intelligent cybersecurity for the real world, providing one of the industry's most comprehensive advanced threat protection portfolio of solutions and services that are integrated, pervasive, continuous and open.
Cisco's threat-centric approach to security reduces complexity, while providing unmatched visibility, continuous control and advanced threat protection across the entire attack continuum, allowing customers to act smarter and more quickly -- before, during, and after an attack.
More information on security here: http://bit.ly/1paUnZV
A Non-Confidential Slide Deck for CSR-Support and its dba Cyber Support Solutions. We have a proprietary solution to stop Data Breaches and allow personal liberties from the same computer terminal.
Digital businesses need to establish trust between customers, suppliers, and services at massive scale, which at the core is about trust in its people, data, and systems. CIO’s running hybrid IT inclusive of the mainframe platform should consider best practices that are based on customer adoption patterns for establishing a system of digital trust leveraging blockchain and machine learning algorithms.
Verify People – How do you verify people are who they say they are?
Protect Data – How do you protect data so that your business runs securely?
Ensure Systems – How do you ensure systems are reliable and available and self healing?
To learn more on how to credibly establish and demonstrate Digital Trust, visit http://www.digitaltrust.ai/
Castle Walls Under Digital Siege: Risk-based Security for z/OSCA Technologies
The mainframe remains more resistant to a malicious breach than any other part of the infrastructure. However, like medieval castles, their walls are no longer impregnable. Just as siege engines brought down walls and traitors opened gates, the mainframe experiences risks from both technical exploits and social engineering. Learn more about how applying risk-based security to z/OS helps you anticipate attacks and compromises before they occur, so you can enhance your walls of protection to your mission-critical data.
For more information, please visit http://cainc.to/Nv2VOe
Similar to Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery (20)
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
In this keynote session, hear from Ashok Reddy, GM for CA Mainframe to learn how you can establish digital trust using the power of the new IBM Z and the Modern Software Factory to become a digital enterprise. CIO’s can deliver better economics and TCO. IT operations teams can enable self-driving mainframe data centers to deliver 100% SLA’s. CISO’s and auditors can protect sensitive data to avoid fines tied to GDPR and regulations. Enterprise Architects and Developers can use the same open, modern DevSecOps toolset, mobile-to-mainframe. And, get a sneak peek at new innovations: Mainframe as a Service and Blockchain which can put you in the driver’s seat to transform the way your company does business. Joining Ashok will be key leaders from IBM, General Motors, and Southwest Gas who will share their perspectives on digital transformation.
Stay connected at http://ow.ly/4NOy50g63Ji
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
1. Locating Unmanaged but Regulated Data
on z Systems: CA Data Content Discovery
Mary Ann Furno
Mainframe
CA Technologies
Director, Software Engineering
MFX25S
16. Existing mainframe content discovery
tools migrate off the mainframe to
PCs or other devices to scan
Why locating data on a mainframe is a problem?
Report writers extract
production data and data exists
in sequential files or JES spool
Copies of sensitive production
data exist
Files with possible sensitive data
are accidentally sent to outside
parties without validation of
content
Once data is extracted, the
target destination doesn’t match
the security characteristics of
source DB
RESULT
Organizations are neither prepared
for, or confident in an audit!
CHALLENGES REALITY
Why locating data on a mainframe is a problem?