SlideShare a Scribd company logo
World®
’16
Reduce	Security	Cost	and	Effort	with	
CA	Cleanup	and	Role	Based	Access	Control
Carla	Flores,	CA	Technologies	 John	Pinkowski,	CA	Technologies	
Sr.	Principal	Consultant	 Sr.	Principal	Product	Owner	
MAINFRAME	AND	WORKLOAD	AUTOMATION
MFX41E
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Cost,	effort	and	time	are	the	biggest	challenges	customers	face	
when	it	comes	to	mainframe	security.	
This	session	will	provide	an	overview	of	how	CA	Cleanup	
reduces	the	effort	and	pressures	associated	with	maintaining	
current	regulatory,	statutory	and	audit	requirements.	
We’ll	cover	how	simple	it	is	to	use	CA	Cleanup	as	the	first	step	
to	getting	to	a	role-based	access	control	implementation	that	
reduces	the	cost	of	administering	mainframe	security.
Carla	Flores	
CA	Technologies	
Sr.	Principal	Consultant	
John	Pinkowski
CA	Technologies	
Sr.	Principal	Consultant
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
CLEAN-UP	IS	YOUR	FIRST	LINE	OF	DEFENSE	
HOW	CA	CLEANUP	WORKS	
OPEN	DISCUSSION	/	Q&A		
PHASED	IMPLEMENTATION	RECOMMENDATIONS	
WHAT’S	NEXT?
ROLE	BASED	ACCESS	CONTROL	BEST	PRACTICES	
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Business	Challenges
What	do	you	want	to	do?	
MITIGATE	RISK SUPPORT	THE	BUSINESS	REDUCE	COST	OF	
COMPLIANCE		
Automate	for	efficiency	
(e.g.	certification)
Centralized	visibility
Reduce	exception	processing
Least	privileged	access	
and	SOD	violations	
Enable	business	to	be	accountable	
(while	minimizing	their	effort)
Enable	quick	and	secure	access	
Improve	security,	not	just	pass	the	audit	
On-going	remediation	and	
improvement	of	compliance	
Eliminate	terminated	users,	
orphan	accounts
Reduce	excessive	entitlements
Delete	inactive	accounts
Improve	role	quality	(redundancy)
Automate	HR	changes	related	
to	role	assignments
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	financial	benefit	for	this	risk	
mitigation	approach	is	to	avoid	the	
cost	of	a	data	breach,	which	averages	
$5.9	million for	a	class	action	law	suit	
settlement	(Target	settled	at	$39M,	
Sony	Playstation	$171M,	Sony	
Entertainment	$100M,	Anthem	BCBS	
$100M	and	still	growing).
Key	Benefits:
§ Protect	against	both	external	and	
internal	threats
§ Enable	compliance	for	access	
across	the	Mainframe	environment
§ Reduce	costs	and	improve	
efficiency	through	automated	
security	controls
Securing	employee	and	customer	
data	and	access	to	the	Mainframe	is	
key	for	protecting	brand	and	
reputation.	
Discovering	and	managing	access	is	a	
starting	point	toward	securing	the	
Mainframe	environment.
A	consolidated	solution	with	
preventive	and	detective	controls	to	
reduce	the	likelihood	of	unauthorized	
access	is	key	to	ensure	security	as	
well	as	streamlining	the	
administration	and	auditing	of	all	
Mainframe	access.	
Mitigate	the	risks	of	external	attacks,	
insider	threat	and	lateral	movement	within	
the	Mainframe	environment.	
Key	drivers:		
§ Highly	publicized	security	breaches	(e.g.,	
Sony,	Anthem,	Target,	Fed	Govt OPM),	
mostly	a	result	of	privileged	user	account	
compromise,	driving	broad	demand
§ Regulation	and	compliance	driven	needs	
are	expanding	with	latest	mandates	
§ Threat	surface	is	expanding	with	
transition	to	evolving	technology	stack
§ Lack	of	automated	capabilities	to	
discover	access	and	entitlements	and	
limited	visibility	into	user	activities	on	
the	mainframe.
Business	Challenges	
What	do	you	want	to	do?			
CHALLENGE BENEFITSSOLUTION
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Opportunities	for	Improvement
Efficacy,	Efficiency,	Cost	Reduction	and	Cost	Avoidance
American	Express	could	face	devastating	losses	
in	the	event	of	unauthorized	access.		There	is	a	
need	to	establish	unique	preventive	and	
detective	controls	to	reduce	the	likelihood	of	
unauthorized	access	and	limit	the	impact	of	
such	an	event.
Reduce	Risk	
Growing	regulatory	concerns	stemming	from	recent	
security	breaches	are	driving	new	security	
requirements.	Discovering	and	cleaning	access	is	
the	first	step	to	better	manage	both	current	and	
future	compliance	requirements.
Improve	Compliance
Errors	and	mistakes	made	by	administrators	can	lead	to	
system	outages	and	SLA	violations	and	are	costly	to	
triage.	Enhanced	auditing	and	session	recording	
capabilities	can	solve	the	attribution	problem	and	help	
the	engagement	team	address	issues	before	they	
negatively	impact	operations.		
Improve	Operational	Efficiency
American	Express	has	many	manual	or	ad-hoc	
processes	to	grant	and	manage	access	on	the	
Mainframe.	This	leads	to	administrators	either	
spending	more	time	than	necessary	to	grant	
access	or	taking	shortcuts	to	impact	the	
security	posture	of	the	entire	organization.	A	
consolidated	platform	to	simplify	
administrator	access	can	also	enforce	
accountability	and	compliance.
Increase	Productivity
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Quick	Assessment	
REDUCE	RISK	OF	OVER-PRIVILEGED	USERS
§ Do	I	have	Segregation	of	Duties	violations	right	now?
§ Do	all	my	users	have	the	correct	access	for	their	role(s)?
AUTOMATE	IDENTITY	PROCESSES
§ Are	my	processes	too	manual?		Are	they	inefficient?
§ Do	I	have	inconsistent	security	policies	due	to	human	error?
§ Can	I	reduce	the	time	&	effort	it	takes	to	submit	audit	
reports?
§ Can	I	easily	show	“who	has	access	to	what”?
SIMPLIFY	COMPLIANCE	AUDITS
IMPROVE	EMPLOYEE	PRODUCTIVITY
§ How	much	time	do	my	managers	spend	in	access	
certifications?
§ How	long	does	it	take	a	new	employee	to	have	ALL	
their	access	and	accounts	available?
INCREASE	USER	PARTICIPATION
§ Can	I	provide	a	one-stop-shop	where	my	users	can	easily	
access	all	identity	services	in	one	place?
§ Can	I	reduce	the	need	of	IT	to	manage	identity	processes?
PROVIDE	OUTSTANDING	USER	EXPERIENCE	
§ Can	the	system	interact	with	my	users	with	Business	terms	
that	they	understand?
§ Can	I	improve	my	user	productivity	and	satisfaction?
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Where	Does	Your	Organization	Stand?				
Continuous	compliance
Systematic	identification	of	
access	risk
Streamlining	existing	processes
Repeatable	security	practice
Incorporated	business	
relevance
Intelligent	decision	support
Identity	intelligence
Content-aware
Security	in	the	Cloud
Manual	
Integrated	and
Automated
Business	
Optimized
Reacting	to	audits	with	
spreadsheets
Compliance	teams	in	silos	
with	overlap
Best	effort	security	policy	
enforcement
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Cleanup	
for	z/OS	&	
CA	Identity	
Governance	
A	winning	
combination…
- IT Specialist, Fortune 500 Banking Company
“CA Mainframe Security solutions provide us with
a high level of confidence that access to sensitive
data is secured and properly managed.”
Source: TechValidate., TVID: C58 – OCD – C5E
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Governing	Access	on	the	Mainframe
(CA	Cleanup	+	CA	Identity	Governance)
Reduce	time	and	cost	of	compliance,	mitigate	risk	and	support	the	business
50%+
of	mainframe	security	databases	contain	
orphaned,	obsolete	or	redundant	identities	and	
entitlements.		
Automated	removal	of	wrong	
entitlements	and	access	groups
Restrict	privileged	access	rights	to	
minimum	requirements
Gain	rapid	insight	- Who	has	
access	to	what
Identify	exposures	- wrong	
entitlements,	inactive	accounts,	
etc
Continuously	monitor	system	
usage	over	time
Automate	and	streamline	
compliance	processes	and	
establish	detective	controls
Consolidate	
Entitlements
Repeatable	
Processes	
Cleanup	
Access
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Cleanup	for	z/OS
How	It	All	Works
Tracking
Database
Security
Database
Report	and	
Command	
Generator
Report	File
Command	Files DBRPTCMD
CA	ACF2,	
CA	Top	Secret
Or	IBM	RACF
Database
Load	Utility CA	
Cleanup
Started	Task
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Cleanup	unreferenced	summary	report	(TSS)
Typical	use	case:		+50%	unused
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Cleanup	unreferenced	summary	report	(ACF2)
Typical	use	case:		+50%	unused	
Record Type Total Unreferenced
--------------- --------- ------------
USER 15,865 7,637 48%
DSN Rule Sets 9,031 4,605 50%
DSN Rule Lines 103,308 79,177 76%
RATX Rule Sets 1 1 100%
RATX Rule Lines 2 2 100%
RBBM Rule Sets 1 1 100%
RBBM Rule Lines 1 1 100%
RBCM Rule Sets 55 33 60%
RBCM Rule Lines 209 178 85%
RBJT Rule Sets 1 1 100%
RBJT Rule Lines 3 3 100%
RCAC Rule Sets 10 10 100%
RCAC Rule Lines 79 79 100%
RCAT Rule Sets 13 10 76%
RCAT Rule Lines 77 69 89%
RCBI Rule Sets 1 1 100%
RCBI Rule Lines 2 2 100%
RCCM Rule Sets 55 44 80%
RCCM Rule Lines 209 194 92%
RCKC Rule Sets 1 1 100%
RCKC Rule Lines 1 1 100%
RCKP Rule Sets 6 6 100%
RCKP Rule Lines 6 6 100%
RCKZ Rule Sets 18 18 100%
RCKZ Rule Lines 21 21 100%
RCMN Rule Sets 265 154 58%
RCMN Rule Lines 1,195 764 63%
RCP1 Rule Sets 2 2 100%
RCP1 Rule Lines 127 127 100%
RCSM Rule Sets 1 1 100%
RDTA Rule Sets 4 4 100%
RDTA Rule Lines 199 199 100%
RDTR Rule Sets 53 53 100%
RDTR Rule Lines 144 144 100%
RECM Rule Sets 55 36 65%
RECM Rule Lines 209 182 87%
REJB Rule Sets 1 1 100%
REJB Rule Lines 1 1 100%
RESP Rule Sets 4 0 0%
RESP Rule Lines 341 250 73%
RFAC Rule Sets 15 12 80%
RFAC Rule Lines 66 63 95%
--------------- --------- ------------ ----
Totals 131,658 94,094 71%
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Phased	Clean-up	Steps
§ Run	DBRPT	unref=999
§ Review	summary	report	
§ Start	with	100%	non-use	
§ Run	DBRPTC	with	selected	
resource	types*	
*ACF2	=	OPTION(commentaccessnone)	
§ Review	output	
§ Schedule	cleanup	cycle	
§ Execute	deletes	via	batch	
§ Maintain	delete/recovery	
command	files	as	GDG(s)
§ Consider	update	‘reload’	job	
to	run	nightly	(off-hours)
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Phased	Clean-up	Steps
§ Re-run	DBRPT	unref=999
§ Review	summary	report	
§ Now	with	80-99%	non-use		
§ Run	DBRPTC	with	selected	
resource	types*	
*ACF2	=	OPTION(commentaccessnone)	
§ Review	output	
§ Schedule	cleanup	cycle	
§ Execute	deletes	via	batch	
§ Maintain	delete/recovery	
command	files	as	GDG(s)
§ Consider	update	‘reload’	job	
to	run	nightly	(off-hours)
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
On-going	Cleanup	
§ Run	DBRPT	or	DBRPTC	
weekly	to	meet	SLA	for	
account/entitlement	
removals	
– Best	practice	=	400	days	
§ Execute	deletes	via	batch	
§ Maintain	delete/recovery	
command	files	via	GDG	 Time
Level of
privilege
Employee is hired
and ID is provisioned
Not all entitlements are
removed ~
This creates a security
risk!
Orphan Accounts
& Entitlements
New entitlements
Employee leaves and
ID is de-provisioned
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Case	Study:	Large	Retailer
Streamlining	Mainframe	access
CONTRACTORS
Fragmented	entitlements
§ lack	of	visibility	of	access
§ un-optimized	group	access
§ orphan	accounts
§ overlapping	access
Manual	entitlement	reviews
No	standardized	role	definitions
PARTNERS
EMPLOYEES
Proven	highly	scalable	solution
Analyzed	250,000	accounts,	66	million	access	rights	and	discovered	200	roles	within	3	minutes
“CA	Identity	Governance	provided	the	most	rapid	TTV	of	any	IAM	product	I’ve	ever	used…”	- VP	of	IT
Challenges:
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
“Who	has	access	to	what?”			Example	assessment
Email
Mainframe
Customer
Database
Directory
HR
UNIX
Corporate
Network
Sally	Brown
Finance
Bob	Thomas
Payments	
Hiroki	Shimada
IT
Harold	Fletcher
Finance
Jane	Coors
Payments	
Morgan	Smith
IT
Carlos	Bayez
IT
Laura	Dempsey
Payments	
1,000,000’s	Entitlements15,000+	People	 100’s	Applications
Finance	
ü 1,123	combinations	
of	UID	string	values,	
minus	the	LID.
ü 443	refer	to	only	1	
LID,	76	refer	to	2,	42	
refer	to	3,	32	refer	to	
4	and	29	refer	to	5.
ü 662	unique	
combinations,	or	a	
little	more	than	half,	
refer	to	5	or	less	LIDs.
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Typical	Findings/Recommendations		
Sensitive	Data	
Discovery		
Phased	Cleanup				
Compliance	
Monitoring	
§ Leverage	CA	Identity	Governance	
role	mining		recommendations		and	
attestation
§ Steps:			
- Determine	acceptable	level	of		
role	matching	via	surveys
- Identity	SoD violation	
- Identify	where	people	fall																			
outside	the	normal	access			
structure	
- Definition	of	Role	groupings	in				
ESM
Role	survey	/	
RBAC		
§ Phased	implementation		
- Define	everyone	based	on																		
new		role		
- Migrate	based	on	business																																	
tolerance	
6-8	weeks		
1-2	weeks			
4-6	weeks		
12+	weeks
§ Findings:		
- Reporting	is	cluttered	due	to			
excessive	security	data	that	is	
obsolete
• Steps:			
- Purge	obsolete	rule	lines		
- Leverage	ACFRULCU	(ACF2	only)
- Rule	nextkey consolidation	
(ACF2	only)	
- Ongoing	cleanup	
§ Findings:		
- Difficult	to	identify	sensitive	data						
with	100%	certainty	
- Reporting	process	is	cluttered	
due	to	excessive	inclusion	
• Steps:			
- Implement	CA	Data	Content												
Discovery	to	identify	sensitive	
data	
- Implement	CA	Compliance	Event	
Manager	for	on-going	real	time	
alerts
§ Findings:		
- Need	more	detailed	data	on	
current	entitlement	reports
- Ongoing	entitlement	certification	
process	could	be	enhanced
- Integrity	monitoring	not	in	place	
• Steps:			
- Explore	Compliance	
Information	Analysis	(CIA)	as	
part	of	base	prodcut
(ACF2	&	Top	Secret	only)
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Role	Based	Access	Control	- Best	Practice	Approach
Phase	1:
Planning
Phase	2:
Foundation
Phase	3:
Automation
Phase	4:
Optimization
Gap	Analysis
Visibility,	Audit	&		
Clean-Up
Role	Modeling
Business	Case	
Development
Project	Planning
Ongoing	
Refinement
Executive	Sponsorship	&	Business	Acceptance	
Data	Discovery	
Entitlements	
Certification
Role	Management
User	Provisioning
Segregation	of	
Duties	Policies
User	Activity	
Monitoring
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Defense	in	Depth	Strategy	for	z	Systems™
Full	identity	lifecycle	
management
CA	Identity	Suite	
Manage	your	privileged	account	
access	across	both	physical	and	
virtual	systems
CA	Privileged	Access	Manager	
Role	discovery	and	
entitlement	certification	for	
all	end-points			
CA	Identity	Governance
Sensitive	data	discovery	tool	for	
z/OS	to	identity,	classify	and	
protect	mainframe	data		
CA	Data	Content	Discovery	
Identify	and	remove	obsolete,	
redundant,	unused	IDs	and	
entitlements		
CA	Cleanup
z/OS	integrity	monitoring	and	
security	information	event	
management	
CA	Auditor/
CA	Compliance	Event	Manager	
70%
of	mission	
critical	data
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME/ROOM
MFX119S	 Encryption	and	Hashing	and	Keys	– Oh,	my!		 11/16/2016	at	1:45pm		Jasmine	E
MFX118S
How	is	Buying	a	Home	Like	Justifying	Data	Security	
Investments?		Developing	Return	on	Security	Investment	
(ROSI)	Analysis
11/16/2016	at	3:00pm		Jasmine	E
MFX173S The	Importance	of	Mainframe	Security	Education	 11/16/2016	3:45pm	Jasmine	E
MFX172S
The	Key	to	Complying	With	New	Regulations	and	
Standards:	Comprehensive	Mainframe	Security
11/16/2016	at	4:30pm	Jasmine	E	
MFT174S Mainframe	Security	Strategy	and	Roadmap:	Best	Practices	
for	Protecting	Mission	Essential	Data
11/17/2016	12:45pm	
Mainframe	Theater	
MFT175S Gaps	in	Your	Defense:	Hacking	the	Mainframe	
11/17/2016	3:00pm	
Mainframe	Theater
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Tech	Talks	and	Demos	– Expo	Floor	
MFT53T
How	Can	
Mainframe	Security	
be	Made	Easier?	
11/16/2016	@	
12:45pm	
Mainframe	Theater
Mainframe	
Security	and	
Enterprise	
Security	
Demos
SCT38T SCX05E
PAM	Threat	
Analytics	
11/17/2016	@	
4:00pm	
Security	Theater	
Governing	Your	
Privileged	Users	
11/16/2016	@	
3:45pm
Security	Theater
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Summary
§ Protects	against	both	external	and	internal	
threats
§ Enables	compliance	for	privileged	identity	and	
administrative	access	across	the	Mainframe
§ Reduces	costs	and	improve	efficiency	through	
automated	security	controls
§ Leverage	existing	negotiated	rates	on	license	for	
aggressive	discounts	and	product	value
§ Offers	the	most	comprehensive	solution,	
providing	both	preventive	&	detective	controls
§ Provides	defense	in	depth	for	privileged	account	
management:
– Comprehensive	credential	management
– Least-privilege,	policy-based	SSO	access	control	with	
command	filtering
– Privileged	session	monitoring	and	recording
– Fine-grained	server	access	controls
§ Rated	Best-of-breed	solution	by	leading	industry	
analysts
§ Proven	scalability	in	some	of	the	largest	and	
most	complex	IT	environments	in	the	world
THE	VALUE WHY	CA	TECHNOLOGIES
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.28 @CAWORLD					#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

More Related Content

What's hot

Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
CA Technologies
 
TechTalk: API Management and Service Virtualization Working Hand in Hand
TechTalk: API Management and Service Virtualization Working Hand in HandTechTalk: API Management and Service Virtualization Working Hand in Hand
TechTalk: API Management and Service Virtualization Working Hand in Hand
CA Technologies
 
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
CA Technologies
 
Case Study: American Family Insurance Leverages CA Service Virtualization to ...
Case Study: American Family Insurance Leverages CA Service Virtualization to ...Case Study: American Family Insurance Leverages CA Service Virtualization to ...
Case Study: American Family Insurance Leverages CA Service Virtualization to ...
CA Technologies
 
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
CA Technologies
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
CA Technologies
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
 
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesPre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
CA Technologies
 
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
CA Technologies
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
CA Technologies
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
 
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
CA Technologies
 
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
CA Technologies
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
CA Technologies
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
CA Technologies
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
CA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
CA Technologies
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
CA Technologies
 

What's hot (20)

Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
 
TechTalk: API Management and Service Virtualization Working Hand in Hand
TechTalk: API Management and Service Virtualization Working Hand in HandTechTalk: API Management and Service Virtualization Working Hand in Hand
TechTalk: API Management and Service Virtualization Working Hand in Hand
 
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
TechTalk: Going Full Circle - Linking Code to Tests to Requirements and Back ...
 
Case Study: American Family Insurance Leverages CA Service Virtualization to ...
Case Study: American Family Insurance Leverages CA Service Virtualization to ...Case Study: American Family Insurance Leverages CA Service Virtualization to ...
Case Study: American Family Insurance Leverages CA Service Virtualization to ...
 
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
Pre-Con Education: Changing End Points Getting You Down While Trying to Creat...
 
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and AgentsHands-On Lab: CA Workload Automation Advanced Integrations and Agents
Hands-On Lab: CA Workload Automation Advanced Integrations and Agents
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job TypesPre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
 
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
Pre-Con Ed: CA Workload Automation ESP Edition: SLA Management and Business C...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
Case Study: GM Financial Builds a Sustainable, Holistic, Continuous Delivery ...
 
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
Pre-Con Ed: Automated Application Deployment 101—Getting Started and Best Pra...
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
 
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
 
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and TricksPre-Con Ed: CA Workload Automation AE: Tips and Tricks
Pre-Con Ed: CA Workload Automation AE: Tips and Tricks
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and TricksPre-Con Ed: CA Workload Automation DE: Tips and Tricks
Pre-Con Ed: CA Workload Automation DE: Tips and Tricks
 
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System AgentPre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
Pre-Con Ed: Upgrading UUJMA (CA 7 Agent) to CA Workload Automation System Agent
 

Viewers also liked

IBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systemsIBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systems
IBM z Systems Software - IT Service Management
 
Short Overview
Short OverviewShort Overview
Short Overview
EmpowerID
 
Solutions
SolutionsSolutions
Solutions
EmpowerID
 
La educacion contemporanea_IAFJSR
La educacion contemporanea_IAFJSRLa educacion contemporanea_IAFJSR
La educacion contemporanea_IAFJSR
Mauri Rojas
 
The gates of paradise are opened...
The gates of paradise are opened...The gates of paradise are opened...
The gates of paradise are opened...FAHIM AKTHAR ULLAL
 
Strand Associates Engineering
Strand Associates EngineeringStrand Associates Engineering
Strand Associates EngineeringSomesimon
 
Emmanuel yassogna t final integrador
Emmanuel yassogna t final integradorEmmanuel yassogna t final integrador
Emmanuel yassogna t final integrador
Emanuel Yassogna
 
CargoTrailersUSA.com
CargoTrailersUSA.comCargoTrailersUSA.com
CargoTrailersUSA.comAdam Dowe
 
Presentación wi-fi
Presentación wi-fiPresentación wi-fi
Presentación wi-fi
alpaza27
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
CA Technologies
 
Be kind en
Be kind enBe kind en
Be kind en
MyWonderStudio
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
CA Technologies
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access Control
EmpowerID
 
Ortografia de la O i la U atones
Ortografia de la O i la U atonesOrtografia de la O i la U atones
Ortografia de la O i la U atones
Pere MiG
 
Exercicis Tecno[1]
Exercicis Tecno[1]Exercicis Tecno[1]
Exercicis Tecno[1]
laietatm
 
Diario Resumen 20141007
Diario Resumen 20141007Diario Resumen 20141007
Diario Resumen 20141007
Diario Resumen
 
Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011
Netzwerk-Verlag
 
Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012
Artez Artes Escénicas
 

Viewers also liked (20)

IBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systemsIBM IT Operations Analytics for z systems
IBM IT Operations Analytics for z systems
 
Short Overview
Short OverviewShort Overview
Short Overview
 
Solutions
SolutionsSolutions
Solutions
 
La educacion contemporanea_IAFJSR
La educacion contemporanea_IAFJSRLa educacion contemporanea_IAFJSR
La educacion contemporanea_IAFJSR
 
The gates of paradise are opened...
The gates of paradise are opened...The gates of paradise are opened...
The gates of paradise are opened...
 
Strand Associates Engineering
Strand Associates EngineeringStrand Associates Engineering
Strand Associates Engineering
 
P4
P4P4
P4
 
Emmanuel yassogna t final integrador
Emmanuel yassogna t final integradorEmmanuel yassogna t final integrador
Emmanuel yassogna t final integrador
 
CargoTrailersUSA.com
CargoTrailersUSA.comCargoTrailersUSA.com
CargoTrailersUSA.com
 
Presentación wi-fi
Presentación wi-fiPresentación wi-fi
Presentación wi-fi
 
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
 
Be kind en
Be kind enBe kind en
Be kind en
 
Estudios de-la-biblia-para-niños-maestro
Estudios de-la-biblia-para-niños-maestroEstudios de-la-biblia-para-niños-maestro
Estudios de-la-biblia-para-niños-maestro
 
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...Best Practices for Optimizing Mainframe Application Performance with CA Cross...
Best Practices for Optimizing Mainframe Application Performance with CA Cross...
 
Role-Based Access Control
Role-Based Access ControlRole-Based Access Control
Role-Based Access Control
 
Ortografia de la O i la U atones
Ortografia de la O i la U atonesOrtografia de la O i la U atones
Ortografia de la O i la U atones
 
Exercicis Tecno[1]
Exercicis Tecno[1]Exercicis Tecno[1]
Exercicis Tecno[1]
 
Diario Resumen 20141007
Diario Resumen 20141007Diario Resumen 20141007
Diario Resumen 20141007
 
Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011Gesundheit Beilage Erfolg 03 2011
Gesundheit Beilage Erfolg 03 2011
 
Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012Suplemento Revista Artez 183, San javier 2012
Suplemento Revista Artez 183, San javier 2012
 

Similar to Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Access Control

Reliability World Caribbean 2015
Reliability World Caribbean 2015Reliability World Caribbean 2015
Reliability World Caribbean 2015
Vibra
 
The case against streamlined rcm
The case against streamlined rcmThe case against streamlined rcm
The case against streamlined rcm
Robert GoForth
 
Cluster DT sample report
Cluster DT sample reportCluster DT sample report
Cluster DT sample report
anil parmar
 
Design & Process FMEA Manual
Design & Process FMEA ManualDesign & Process FMEA Manual
Design & Process FMEA Manual
J. García - Verdugo
 
SMAC Switch Test Solutions
SMAC Switch Test SolutionsSMAC Switch Test Solutions
SMAC Switch Test Solutions
Electromate
 
Evolution of RCM
Evolution of RCMEvolution of RCM
Evolution of RCM
SandraDiMatteo
 
Presentation Compliance Software En
Presentation Compliance Software EnPresentation Compliance Software En
Presentation Compliance Software En
baalbers
 
RCFA Pro Brochure ver1
RCFA Pro Brochure ver1RCFA Pro Brochure ver1
RCFA Pro Brochure ver1
Ron Doucet P. Eng., MMP
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
CA Technologies
 
20160704 rv presentation rca versus rcm
20160704 rv presentation rca versus rcm20160704 rv presentation rca versus rcm
20160704 rv presentation rca versus rcm
RonVonk
 
Presentation compliance software events and internet en
Presentation compliance software events and internet enPresentation compliance software events and internet en
Presentation compliance software events and internet en
heico_nienhaus
 
SMAC Thread Checking
SMAC Thread CheckingSMAC Thread Checking
SMAC Thread Checking
Electromate
 
Terminal Automation - Evolution & challenges
Terminal Automation - Evolution & challengesTerminal Automation - Evolution & challenges
Terminal Automation - Evolution & challenges
Naimish Raval
 
Failure mode
Failure modeFailure mode
Failure mode
Gia Lara
 
lista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUES
lista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUESlista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUES
lista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUES
EMERSON EDUARDO RODRIGUES
 
Cmaa 70
Cmaa 70Cmaa 70
Cmaa 70
JLuis Cordoba
 
FMEA_Guide-Q1.ppt
FMEA_Guide-Q1.pptFMEA_Guide-Q1.ppt
FMEA_Guide-Q1.ppt
UttakanthaDixit1
 
Flink Snapshots: A Comprehensive Guide for New Users
Flink Snapshots: A Comprehensive Guide for New UsersFlink Snapshots: A Comprehensive Guide for New Users
Flink Snapshots: A Comprehensive Guide for New Users
HostedbyConfluent
 
Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...
Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...
Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...
Charlie Reith
 
Presentation Compliance Software Events And Internet En
Presentation Compliance Software Events And Internet EnPresentation Compliance Software Events And Internet En
Presentation Compliance Software Events And Internet En
foeppie
 

Similar to Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Access Control (20)

Reliability World Caribbean 2015
Reliability World Caribbean 2015Reliability World Caribbean 2015
Reliability World Caribbean 2015
 
The case against streamlined rcm
The case against streamlined rcmThe case against streamlined rcm
The case against streamlined rcm
 
Cluster DT sample report
Cluster DT sample reportCluster DT sample report
Cluster DT sample report
 
Design & Process FMEA Manual
Design & Process FMEA ManualDesign & Process FMEA Manual
Design & Process FMEA Manual
 
SMAC Switch Test Solutions
SMAC Switch Test SolutionsSMAC Switch Test Solutions
SMAC Switch Test Solutions
 
Evolution of RCM
Evolution of RCMEvolution of RCM
Evolution of RCM
 
Presentation Compliance Software En
Presentation Compliance Software EnPresentation Compliance Software En
Presentation Compliance Software En
 
RCFA Pro Brochure ver1
RCFA Pro Brochure ver1RCFA Pro Brochure ver1
RCFA Pro Brochure ver1
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
 
20160704 rv presentation rca versus rcm
20160704 rv presentation rca versus rcm20160704 rv presentation rca versus rcm
20160704 rv presentation rca versus rcm
 
Presentation compliance software events and internet en
Presentation compliance software events and internet enPresentation compliance software events and internet en
Presentation compliance software events and internet en
 
SMAC Thread Checking
SMAC Thread CheckingSMAC Thread Checking
SMAC Thread Checking
 
Terminal Automation - Evolution & challenges
Terminal Automation - Evolution & challengesTerminal Automation - Evolution & challenges
Terminal Automation - Evolution & challenges
 
Failure mode
Failure modeFailure mode
Failure mode
 
lista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUES
lista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUESlista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUES
lista de falhas fanuc r-30ib EMERSON EDUARDO RODRIGUES
 
Cmaa 70
Cmaa 70Cmaa 70
Cmaa 70
 
FMEA_Guide-Q1.ppt
FMEA_Guide-Q1.pptFMEA_Guide-Q1.ppt
FMEA_Guide-Q1.ppt
 
Flink Snapshots: A Comprehensive Guide for New Users
Flink Snapshots: A Comprehensive Guide for New UsersFlink Snapshots: A Comprehensive Guide for New Users
Flink Snapshots: A Comprehensive Guide for New Users
 
Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...
Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...
Reliable Subsea Oil& Gas Transportation Paper - Presentation Slides 6 Novembe...
 
Presentation Compliance Software Events And Internet En
Presentation Compliance Software Events And Internet EnPresentation Compliance Software Events And Internet En
Presentation Compliance Software Events And Internet En
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 

Recently uploaded (20)

QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 

Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Access Control