The document discusses monitoring the performance of a CA Single Sign-On (SSO) solution. It describes the key aspects that impact SSO performance, including the number of agent connections, worker threads, and latency of tasks like user authentication. Mathematical models are presented showing the relationships between throughput, latency, and threads. The document recommends establishing monitoring of key performance indicators (KPIs) like authorization time, transaction counts, and cache performance to optimize and maintain a high-performing SSO solution. Tools mentioned for monitoring SSO include CA Trace Tool, CA OneView Monitor, CA APM for SSO, and Spylogix.
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
This document summarizes a presentation about governing privileged access using CA Identity Suite. It discusses the need for privileged access governance to improve security and compliance. CA Identity Suite provides automated provisioning, access certification, and access requests to help customers implement an enterprise-wide approach to privileged access management. The presentation demonstrates how CA Identity Suite integrates with CA Privileged Access Management to provide a one stop shop for identity services.
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
This document summarizes a presentation about making deployments of the CA Identity Suite incredibly easy. It discusses using the CA Identity Suite Virtual Appliance to install and integrate the full Identity Suite in under 30 minutes. It also discusses using Deployment Xpress to easily deploy use cases within the Identity Suite with just a few clicks by selecting from a marketplace of available use cases. The presentation includes demos of both the virtual appliance and Deployment Xpress.
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
The document discusses the importance of governing privileged user access and reducing security risks. It describes CA's approach to privileged access governance, which involves automating provisioning and de-provisioning of privileged accounts, implementing access requests and access certification processes, and integrating these capabilities with CA Identity Suite for comprehensive user governance across all access types. Integrating identity management and privileged access management allows for improved compliance, security and elimination of product silos.
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
The document summarizes the results of a survey conducted by CA Technologies of over 200 enterprise security executives regarding their identity and access management (IAM) strategies, challenges, and needs. Some key findings include:
- Less than 20% have established automated, standardized IAM processes and only 15% say their current systems fully meet their needs.
- Dissatisfaction with current IAM systems increases substantially for organizations managing over 50,000 user IDs.
- Common challenges reported with existing IAM tools include lack of integration, visibility, and control.
- Organizations relying on manual IAM processes expressed the highest levels of dissatisfaction with their current approaches.
Matthew K. Miller of CA Technologies presented on CA Identity Suite's real-time identity analytics capabilities. The suite provides comprehensive dashboards and reports that give insights into identity lifecycles and processes. This allows managers to analyze performance, identify bottlenecks, and ensure service level goals are met. The analytics features also improve productivity and operational excellence across the enterprise.
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InCA Technologies
The document discusses how CA Advanced Authentication can be integrated with CA API Gateway to secure mobile apps and the Internet of Things (IoT). It begins by outlining trends in IoT and mobile devices, and security challenges posed by increased connectivity and mobility. The presentation then describes CA's risk-based authentication solution, which analyzes risk factors like device identification, location, and user behavior to determine authentication requirements. It demonstrates how mobile apps can integrate the risk engine by collecting device data to evaluate risk without impacting user experience. Based on the risk level, the engine can approve access, require step-up authentication, or deny access in high risk cases.
Pre-Con Ed: Five Easy Steps for Migrating to CA DirectoryCA Technologies
The document discusses the five steps for migrating a user store or policy store from an existing directory, such as LDAP or a database, to CA Directory. The five steps are: 1) architecting the new CA Directory environment; 2) migrating the schema; 3) migrating the data; 4) testing applications; and 5) going live with the new directory. Migrating from a database may involve additional tasks compared to migrating from LDAP, such as converting database fields to attributes and tables to object classes.
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
The document discusses how CA identity and access management solutions can help enable and secure Office 365 environments. It describes how CA Single Sign-On can provide single sign-on to Office 365. It also explains how CA Advanced Authentication can enhance security by adding two-factor authentication or risk-based authentication to Office 365 logins. Finally, it covers how CA Identity Manager can automate user provisioning and deprovisioning between identity sources and Office 365.
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
This document summarizes a presentation about governing privileged access using CA Identity Suite. It discusses the need for privileged access governance to improve security and compliance. CA Identity Suite provides automated provisioning, access certification, and access requests to help customers implement an enterprise-wide approach to privileged access management. The presentation demonstrates how CA Identity Suite integrates with CA Privileged Access Management to provide a one stop shop for identity services.
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
This document summarizes a presentation about making deployments of the CA Identity Suite incredibly easy. It discusses using the CA Identity Suite Virtual Appliance to install and integrate the full Identity Suite in under 30 minutes. It also discusses using Deployment Xpress to easily deploy use cases within the Identity Suite with just a few clicks by selecting from a marketplace of available use cases. The presentation includes demos of both the virtual appliance and Deployment Xpress.
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...CA Technologies
The document discusses the importance of governing privileged user access and reducing security risks. It describes CA's approach to privileged access governance, which involves automating provisioning and de-provisioning of privileged accounts, implementing access requests and access certification processes, and integrating these capabilities with CA Identity Suite for comprehensive user governance across all access types. Integrating identity management and privileged access management allows for improved compliance, security and elimination of product silos.
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
The document summarizes the results of a survey conducted by CA Technologies of over 200 enterprise security executives regarding their identity and access management (IAM) strategies, challenges, and needs. Some key findings include:
- Less than 20% have established automated, standardized IAM processes and only 15% say their current systems fully meet their needs.
- Dissatisfaction with current IAM systems increases substantially for organizations managing over 50,000 user IDs.
- Common challenges reported with existing IAM tools include lack of integration, visibility, and control.
- Organizations relying on manual IAM processes expressed the highest levels of dissatisfaction with their current approaches.
Matthew K. Miller of CA Technologies presented on CA Identity Suite's real-time identity analytics capabilities. The suite provides comprehensive dashboards and reports that give insights into identity lifecycles and processes. This allows managers to analyze performance, identify bottlenecks, and ensure service level goals are met. The analytics features also improve productivity and operational excellence across the enterprise.
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InCA Technologies
The document discusses how CA Advanced Authentication can be integrated with CA API Gateway to secure mobile apps and the Internet of Things (IoT). It begins by outlining trends in IoT and mobile devices, and security challenges posed by increased connectivity and mobility. The presentation then describes CA's risk-based authentication solution, which analyzes risk factors like device identification, location, and user behavior to determine authentication requirements. It demonstrates how mobile apps can integrate the risk engine by collecting device data to evaluate risk without impacting user experience. Based on the risk level, the engine can approve access, require step-up authentication, or deny access in high risk cases.
Pre-Con Ed: Five Easy Steps for Migrating to CA DirectoryCA Technologies
The document discusses the five steps for migrating a user store or policy store from an existing directory, such as LDAP or a database, to CA Directory. The five steps are: 1) architecting the new CA Directory environment; 2) migrating the schema; 3) migrating the data; 4) testing applications; and 5) going live with the new directory. Migrating from a database may involve additional tasks compared to migrating from LDAP, such as converting database fields to attributes and tables to object classes.
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
The document discusses how CA identity and access management solutions can help enable and secure Office 365 environments. It describes how CA Single Sign-On can provide single sign-on to Office 365. It also explains how CA Advanced Authentication can enhance security by adding two-factor authentication or risk-based authentication to Office 365 logins. Finally, it covers how CA Identity Manager can automate user provisioning and deprovisioning between identity sources and Office 365.
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
Greg Vickery from CA Technologies presented on CA Directory performance. He discussed why performance is important for directory services, how CA Directory has consistently outperformed competitors in testing, and factors that influence performance such as hardware, configuration, and operations. Vickery also covered advanced replication features in CA Directory that ensure fast and accurate data synchronization across servers.
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
This document summarizes a presentation about CA Identity Service, which is described as a next generation identity-as-a-service solution for hybrid enterprises. It simplifies the workforce experience through single sign-on and self-service access to applications. It can be deployed in a SaaS-first model or integrate with on-premises identity investments. The presentation demonstrates how to federate an application and provides an overview of user provisioning, access management, and security benefits.
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...CA Technologies
The document discusses how data visualization can help analyze test data quality and coverage. It describes challenges with relying solely on production data for testing. Data visualization allows users to understand what data they have, how attributes relate, and what is missing through visual representations. The document demonstrates CA's Test Data Visualizer tool, which uses techniques like parallel coordinates and scatter plots to compare valid and invalid data sets, identify missing combinations, and measure data coverage. This helps ensure tests have the right data to satisfy all requirements.
The document discusses how security can enable digital transformation while providing digital resilience. It argues that security needs to focus on enabling businesses to securely transform applications for the digital age and foster customer trust, rather than just providing digital resilience. The presentation covers how the digital age has led to fully interconnected systems and users, and the security challenges this brings. It proposes that security become a digital enabler by focusing on better customer experiences through tools like identity federation. Finally, it discusses the need for digital resilience and outlines a cyber reference architecture to help organizations accelerate their security maturity.
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementCA Technologies
The document discusses using CA IT Asset Manager to manage hardware asset lifecycles. It recommends creating asset records when receiving advance shipping notices from vendors to automate data entry. Upon physical receipt, the receive process should validate the shipment against the notice through barcode scanning or mobile lookups. This allows capturing asset details at the source and ensures reconciliation data is available to create meaningful asset records.
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...CA Technologies
This document discusses two approaches to single sign-on (SSO): web access management (WAM) and open standards like SAML and OAuth. WAM uses policy enforcement points to intercept requests and enforce security policies, while open standards pass identity between an identity provider and applications. Both approaches can meet different needs, and choosing the wrong one can increase costs and cause delays. The document provides guidelines for choosing between the approaches and notes that they can be combined to get the benefits of both within a single SSO solution from CA Technologies.
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...CA Technologies
This document discusses how CA Cleanup and CA Identity Governance can help organizations reduce the cost and effort of mainframe security. It provides an overview of how CA Cleanup automates the process of identifying and removing unused and unnecessary access entitlements from the mainframe security database. Implementing CA Cleanup as part of a phased approach is recommended to continuously clean up access rights over time. Role-based access control best practices are also discussed to further streamline access management after an initial cleanup.
Digital transformation in financial services through trusted digital relation...CA Technologies
This document summarizes a presentation about digital transformation in financial services. The presentation discusses how financial services have become digital businesses and must transform digitally to stay competitive against new fintech startups. It highlights how building trusted digital relationships with customers through secure digital identity management can help financial institutions innovate, drive customer acquisition and retention, and grow their business. The presentation provides examples of how some financial institution customers are using CA's digital relationship platform and identity and access management solutions to transform their business through trusted digital relationships.
Kathy Hickey, VP of Product Management at CA Technologies, introduces CA's new Identity Service product. The Identity Service is an identity-as-a-service solution that aims to simplify the user experience, empower application owners, and help control and manage cloud identity sprawl in modern hybrid enterprises. It provides single sign-on, dynamic user provisioning and deprovisioning, and visibility into cloud application accounts and entitlements through bidirectional integrations. The presentation highlights the challenges of securing access in today's digital workplace and how the Identity Service balances security, agility and user experience.
Critical Considerations for Mobile and IoT StrategyCA Technologies
The document discusses seven critical considerations for developing a mobile and IoT strategy: 1) Ensuring security of data and services, 2) Designing apps suited for mobile use, 3) Supporting user identities, 4) Planning integrations with enterprise systems, 5) Encrypting data in transit and at rest, 6) Enabling communication and collaboration, 7) Planning a scalable IoT architecture. It notes the importance of these issues and provides examples of how to address each consideration when building a mobile and IoT strategy.
Securing Mobile Payments: Applying Lessons Learned in the Real WorldCA Technologies
1) The document discusses best practices for securing mobile payments based on lessons learned, including mobile authentication using push notifications and biometrics, securing in-app purchases, leveraging real-time risk analytics, and securely provisioning cards to mobile wallets.
2) It outlines CA's strategy for secure mobile payments which includes solutions for mobile authentication, in-app purchases, mobile wallets, real-time risk scoring, and NFC mobile wallet provisioning with cardholder authentication.
3) The document provides details on CA's mobile authentication solutions, risk analytics network model which considers device reputation across banks, and mobile wallet provisioning flow which incorporates one-time passcodes for authentication.
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentCA Technologies
This document discusses best practices for upgrading a CA Single Sign-On (CA SSO) environment. It recommends thoroughly planning the upgrade, cleaning up and potentially rebuilding the policy store, upgrading policy servers and testing the new environment. Specific steps discussed include involving stakeholders, using CA services for assessments, checking for legacy code, validating platform support, improving monitoring and thoroughly testing the new environment, including applications. The presenter notes their own organization's upgrade resulted in significant performance improvements and lessons learned are being used to improve products and services.
Streamlining Your CA Identity Suite DeploymentCA Technologies
CA Identity Suite is introducing new capabilities to simplify and streamline deployment, including a virtual appliance that provides almost plug-and-play deployment of all Identity Suite components in minutes. It also includes Deployment Xpress, which allows selecting preconfigured use cases for quick and easy initial deployment through a few clicks. The presentation discusses these new capabilities and how they remove the need for installation, integration, and configuration work, making deployment easy, fast, simple, and joyful.
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCA Technologies
The document discusses Adobe's approach to securing, managing, and deploying enterprise mobile apps. It describes Adobe's use of CA Technologies solutions like the CA API Gateway and CA Mobile API Gateway to provide essential developer services and security. The new architecture allows Adobe to enforce comprehensive security while still enabling easy use of enterprise mobile apps. Some challenges discussed are the rapid growth in mobile app demand and keeping up with the fast evolution of mobile technologies.
Agile Communities of Practice: Set Up, Sustain, SucceedCA Technologies
The document discusses how to set up, sustain, and succeed with communities of practice (CoPs). It defines CoPs and provides examples. It outlines 12 steps to create a successful CoP, including identifying the community and members, getting stakeholder buy-in, creating a charter, launching meetings, and evaluating impact. Benefits of CoPs include knowledge sharing, collaboration, and innovation. Current challenges and next steps for the author's CoP at IHS Markit are also reviewed.
The document provides an overview and agenda for a deep dive session on CA Privileged Access Manager (PAM) capabilities for hybrid enterprises. The session will cover topics like interacting with the PAM REST API, integrating PAM with AWS for target server discovery/import and using the AWS API proxy, leveraging PAM with VMware ESX/ESXi and NSX, configuring PAM as an identity provider/relying party, and integrating PAM with PAM Server Control and single sign-on.
Convenience and Security for banking customers with CA Advanced AuthenticationCA Technologies
The document discusses how Fiserv's Agiliti solution, using CA Advanced Authentication, allows banks to balance security and convenience for customers by applying the appropriate level of authentication based on real-time risk assessments. This ensures customers are authenticated securely while minimizing friction in the user experience. The solution uses a combination of credentials like passwords, one-time pins, and security questions across digital and staffed banking channels. It aims to provide customers with a single set of credentials while protecting banks from financial crimes.
The document describes the transformation of TeamQuest Corporation's IT organization through adopting agile practices and implementing CA Agile Central and CA Agility Services. It discusses the challenges they previously faced with six month development cycles and changing requirements. With guidance from CA, they implemented SAFe and restructured into autonomous agile teams. This helped improve productivity, quality, and allow them to deliver features in as little as three months.
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
Greg Vickery from CA Technologies presented on CA Directory performance. He discussed why performance is important for directory services, how CA Directory has consistently outperformed competitors in testing, and factors that influence performance such as hardware, configuration, and operations. Vickery also covered advanced replication features in CA Directory that ensure fast and accurate data synchronization across servers.
Tech Talk: Federate to an SAML-Enabled App in MinutesCA Technologies
This document summarizes a presentation about CA Identity Service, which is described as a next generation identity-as-a-service solution for hybrid enterprises. It simplifies the workforce experience through single sign-on and self-service access to applications. It can be deployed in a SaaS-first model or integrate with on-premises identity investments. The presentation demonstrates how to federate an application and provides an overview of user provisioning, access management, and security benefits.
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...CA Technologies
The document discusses how data visualization can help analyze test data quality and coverage. It describes challenges with relying solely on production data for testing. Data visualization allows users to understand what data they have, how attributes relate, and what is missing through visual representations. The document demonstrates CA's Test Data Visualizer tool, which uses techniques like parallel coordinates and scatter plots to compare valid and invalid data sets, identify missing combinations, and measure data coverage. This helps ensure tests have the right data to satisfy all requirements.
The document discusses how security can enable digital transformation while providing digital resilience. It argues that security needs to focus on enabling businesses to securely transform applications for the digital age and foster customer trust, rather than just providing digital resilience. The presentation covers how the digital age has led to fully interconnected systems and users, and the security challenges this brings. It proposes that security become a digital enabler by focusing on better customer experiences through tools like identity federation. Finally, it discusses the need for digital resilience and outlines a cyber reference architecture to help organizations accelerate their security maturity.
Pre-Con Ed: Taking the "Hard" out of Hardware Asset ManagementCA Technologies
The document discusses using CA IT Asset Manager to manage hardware asset lifecycles. It recommends creating asset records when receiving advance shipping notices from vendors to automate data entry. Upon physical receipt, the receive process should validate the shipment against the notice through barcode scanning or mobile lookups. This allows capturing asset details at the source and ensures reconciliation data is available to create meaningful asset records.
Tech Talk: Web Access Management and Federation – Two Great Tastes that Taste...CA Technologies
This document discusses two approaches to single sign-on (SSO): web access management (WAM) and open standards like SAML and OAuth. WAM uses policy enforcement points to intercept requests and enforce security policies, while open standards pass identity between an identity provider and applications. Both approaches can meet different needs, and choosing the wrong one can increase costs and cause delays. The document provides guidelines for choosing between the approaches and notes that they can be combined to get the benefits of both within a single SSO solution from CA Technologies.
Pre-Con Ed: Reduce Security Cost and Effort with CA Cleanup and Role Based Ac...CA Technologies
This document discusses how CA Cleanup and CA Identity Governance can help organizations reduce the cost and effort of mainframe security. It provides an overview of how CA Cleanup automates the process of identifying and removing unused and unnecessary access entitlements from the mainframe security database. Implementing CA Cleanup as part of a phased approach is recommended to continuously clean up access rights over time. Role-based access control best practices are also discussed to further streamline access management after an initial cleanup.
Digital transformation in financial services through trusted digital relation...CA Technologies
This document summarizes a presentation about digital transformation in financial services. The presentation discusses how financial services have become digital businesses and must transform digitally to stay competitive against new fintech startups. It highlights how building trusted digital relationships with customers through secure digital identity management can help financial institutions innovate, drive customer acquisition and retention, and grow their business. The presentation provides examples of how some financial institution customers are using CA's digital relationship platform and identity and access management solutions to transform their business through trusted digital relationships.
Kathy Hickey, VP of Product Management at CA Technologies, introduces CA's new Identity Service product. The Identity Service is an identity-as-a-service solution that aims to simplify the user experience, empower application owners, and help control and manage cloud identity sprawl in modern hybrid enterprises. It provides single sign-on, dynamic user provisioning and deprovisioning, and visibility into cloud application accounts and entitlements through bidirectional integrations. The presentation highlights the challenges of securing access in today's digital workplace and how the Identity Service balances security, agility and user experience.
Critical Considerations for Mobile and IoT StrategyCA Technologies
The document discusses seven critical considerations for developing a mobile and IoT strategy: 1) Ensuring security of data and services, 2) Designing apps suited for mobile use, 3) Supporting user identities, 4) Planning integrations with enterprise systems, 5) Encrypting data in transit and at rest, 6) Enabling communication and collaboration, 7) Planning a scalable IoT architecture. It notes the importance of these issues and provides examples of how to address each consideration when building a mobile and IoT strategy.
Securing Mobile Payments: Applying Lessons Learned in the Real WorldCA Technologies
1) The document discusses best practices for securing mobile payments based on lessons learned, including mobile authentication using push notifications and biometrics, securing in-app purchases, leveraging real-time risk analytics, and securely provisioning cards to mobile wallets.
2) It outlines CA's strategy for secure mobile payments which includes solutions for mobile authentication, in-app purchases, mobile wallets, real-time risk scoring, and NFC mobile wallet provisioning with cardholder authentication.
3) The document provides details on CA's mobile authentication solutions, risk analytics network model which considers device reputation across banks, and mobile wallet provisioning flow which incorporates one-time passcodes for authentication.
Best Practices for Upgrading Your Mission-Critical CA SSO EnvironmentCA Technologies
This document discusses best practices for upgrading a CA Single Sign-On (CA SSO) environment. It recommends thoroughly planning the upgrade, cleaning up and potentially rebuilding the policy store, upgrading policy servers and testing the new environment. Specific steps discussed include involving stakeholders, using CA services for assessments, checking for legacy code, validating platform support, improving monitoring and thoroughly testing the new environment, including applications. The presenter notes their own organization's upgrade resulted in significant performance improvements and lessons learned are being used to improve products and services.
Streamlining Your CA Identity Suite DeploymentCA Technologies
CA Identity Suite is introducing new capabilities to simplify and streamline deployment, including a virtual appliance that provides almost plug-and-play deployment of all Identity Suite components in minutes. It also includes Deployment Xpress, which allows selecting preconfigured use cases for quick and easy initial deployment through a few clicks. The presentation discusses these new capabilities and how they remove the need for installation, integration, and configuration work, making deployment easy, fast, simple, and joyful.
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCA Technologies
The document discusses Adobe's approach to securing, managing, and deploying enterprise mobile apps. It describes Adobe's use of CA Technologies solutions like the CA API Gateway and CA Mobile API Gateway to provide essential developer services and security. The new architecture allows Adobe to enforce comprehensive security while still enabling easy use of enterprise mobile apps. Some challenges discussed are the rapid growth in mobile app demand and keeping up with the fast evolution of mobile technologies.
Agile Communities of Practice: Set Up, Sustain, SucceedCA Technologies
The document discusses how to set up, sustain, and succeed with communities of practice (CoPs). It defines CoPs and provides examples. It outlines 12 steps to create a successful CoP, including identifying the community and members, getting stakeholder buy-in, creating a charter, launching meetings, and evaluating impact. Benefits of CoPs include knowledge sharing, collaboration, and innovation. Current challenges and next steps for the author's CoP at IHS Markit are also reviewed.
The document provides an overview and agenda for a deep dive session on CA Privileged Access Manager (PAM) capabilities for hybrid enterprises. The session will cover topics like interacting with the PAM REST API, integrating PAM with AWS for target server discovery/import and using the AWS API proxy, leveraging PAM with VMware ESX/ESXi and NSX, configuring PAM as an identity provider/relying party, and integrating PAM with PAM Server Control and single sign-on.
Convenience and Security for banking customers with CA Advanced AuthenticationCA Technologies
The document discusses how Fiserv's Agiliti solution, using CA Advanced Authentication, allows banks to balance security and convenience for customers by applying the appropriate level of authentication based on real-time risk assessments. This ensures customers are authenticated securely while minimizing friction in the user experience. The solution uses a combination of credentials like passwords, one-time pins, and security questions across digital and staffed banking channels. It aims to provide customers with a single set of credentials while protecting banks from financial crimes.
The document describes the transformation of TeamQuest Corporation's IT organization through adopting agile practices and implementing CA Agile Central and CA Agility Services. It discusses the challenges they previously faced with six month development cycles and changing requirements. With guidance from CA, they implemented SAFe and restructured into autonomous agile teams. This helped improve productivity, quality, and allow them to deliver features in as little as three months.
This presentation frames a Microservices Lifecycle Demo given by Jay Thorne at CA World 2016. The presentation discusses Fred Brook's concepts of essential and accidental complexity and how they fit with microservice architecture.
Strategies for DevOps in the API and Microservices WorldCA Technologies
The document discusses strategies for implementing DevOps in an API and microservices environment. It outlines some of the challenges companies face when transitioning to microservices, including lack of agility and dependencies between services. It then provides several strategies for DevOps success, such as starting with a smaller initial project to learn microservices, focusing on reducing the size and dependencies of deliverables to enable faster deployment, and considering replacing rather than upgrading services. The conclusion emphasizes learning to build and deploy small, with attention to dependencies, in order to balance speed, safety and time to market.
Enabling a Hybrid Enterprise Application Launch PadCA Technologies
This document provides an overview of a presentation about enabling a hybrid enterprise application launchpad. The presentation discusses challenges of managing identities and applications across hybrid environments. It introduces CA Identity Service as an identity-as-a-service solution that can accelerate digital transformation while providing a secure and simplified user experience. The presentation demonstrates how the solution enables single sign-on to hundreds of applications and bridges existing on-premises environments through integration with CA Single Sign-On.
Pre-Con Ed: Best Practices for Setting Thresholds in CA SYSVIEW®CA Technologies
The document discusses the process of setting thresholds in CA SYSVIEW Performance Management. It involves evaluating monitoring needs, measuring system performance data over time, analyzing the data to determine appropriate threshold values, updating the thresholds as needed based on changes, and validating that the thresholds remain effective. The process is cyclical and ongoing to continuously monitor performance and refine thresholds.
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...CA Technologies
The document discusses how CA Unified Infrastructure Management can be used to monitor cloud infrastructure, including public clouds like AWS, Azure, and OpenStack as well as private and hybrid cloud environments. It provides an overview of the monitoring capabilities for various cloud platforms and technologies such as Docker and Nutanix. Specific examples are given around configuring monitoring for AWS resources, viewing AWS data in the Unified Service Manager interface, and using dashboards for AWS services.
Pre-Con Ed: Become a Power User of CA Release Automation to Get the Most out ...CA Technologies
This document provides an overview of key features in CA Release Automation, including artifact-driven deployments, shared components, environments, and environment tokens. It demonstrates how these features can be used to optimize continuous delivery practices by providing flexibility, reusability, and environment-specific configuration. The presentation includes definitions of each feature and how they benefit release automation, as well as best practices for implementing them.
Pre-Con Ed: Beyond the AE CLI - Leveraging CA Workload Automation AE Web Serv...CA Technologies
The document discusses CA Workload Automation AE Web Services, which provide a RESTful interface for integrating with and controlling CA Workload Automation. It covers the architecture of the web services, including security implementation using CA EEM. It also demonstrates how to call the web services using the CA WA REST Client and provides examples of retrieving job statuses and performing job actions through the web services.
Pre-Con Ed: CA View and CA Deliver Analytics Deep DiveCA Technologies
This document provides an overview of reporting tools available in CA View and CA Deliver. It discusses SARGRW and RMOGRW, which are reporting tools that can extract data about CA View and CA Deliver respectively. It provides examples of how these tools can be used to report on items like reports stored by application, backdated reports, job run times, and which jobs and reports are associated with different distribution IDs. The document also mentions other tools like SARBCH, CA Metric, SARTCHK, RMORPT, and RMORXB that can also generate reports for monitoring and analytics. An demo of running SARGRW and RMOGRW is included to illustrate sample report outputs.
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...CA Technologies
The document discusses how to simplify mainframe security practices while improving security and compliance. It addresses the challenges of an aging mainframe workforce and internal security risks from employees. It argues for creating a risk-aware culture through both technical measures like monitoring systems and users, and non-technical measures like management support and training. The document also discusses preparing younger employees by emphasizing hands-on security training and case studies.
CA Datacom®/AD Installation/Upgrade and MaintenanceCA Technologies
The document provides an overview of installing and maintaining CA Datacom/AD. It discusses downloading the software package, preparing for installation using either Electronic Software Delivery or CA Chorus Software Manager, and executing the installation jobs. It also covers applying maintenance updates and the post-installation steps including initializing databases and starting the mainframe unit of work. The document recommends additional sessions for learning about CA Datacom strategies, new features, reducing total cost of ownership, and modernizing access to CA Datacom data.
Enterprise Developers, Linux and z Systems - What you Need to KnowCA Technologies
This document discusses Linux on IBM zSystems mainframes. It begins with an overview of Linux, describing its composition of a kernel, operating system, and distribution. It then discusses how Linux can run on zSystems mainframes, providing virtualization benefits like workload isolation and high resource sharing. Some key advantages of running Linux on zSystems include near continuous high utilization, reduced complexity, and reliability with 99.999% availability. The document provides examples of customer use cases and discusses how Docker can also run on these mainframes.
Pre-Con Ed: Implementing EEM with CA Workload Automation AECA Technologies
This document discusses ways to improve performance and structure policies for Embedded Entitlements Manager (EEM) using CA Workload Automation. It recommends defining a security matrix, leveraging naming conventions, implementing group membership, using different policy methodologies, and testing the implementation. The presentation agenda includes defining infrastructure, group membership, policy methodology, and testing. It also recommends related sessions and demos.
Pre-Con Ed: Hack that API—Your Data, Your Way With CA Performance ManagementCA Technologies
The document describes how to use the open API of CA Performance Management to customize data visualization through a hackathon session. It provides step-by-step instructions to deploy apps, configure custom attributes and groups, and leverage open API apps to create geo-location and connection data for a weather map visualization. Participants will learn how to deploy the necessary apps, configure device and interface attributes, validate the settings, and run the weather map app to visualize devices on an interactive map based on their geo-locations and connections. Customizations like map focus and color themes are also possible through app parameters.
Pre-Con Ed: CA Workload Automation DE: Tips and TricksCA Technologies
This document summarizes a presentation about tips and tricks for using CA Workload Automation DE. It discusses customizing the desktop client by setting defaults for objects, using the monitoring view search feature, useful reporting tips, maintaining DE server logs, and recommended documentation. The presentation provides demonstrations of these tips and tricks and recommends related sessions to attend.
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create ReportsCA Technologies
The document discusses new features in CA SYSVIEW Performance Management that allow users to quickly and easily create reports and dashboards. Specifically, it mentions new out-of-the-box dashboards in Mainframe Team Center - Management that provide immediate value. It also demonstrates how to modify sample dashboards and view groups of CICS regions in dashboards. Enhanced documentation for reporting in CA SYSVIEW 14.24 is highlighted as well.
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...CA Technologies
This document describes a hands-on lab session that will cover integrating CA Service Operations Insight and CA Unified Infrastructure Management. The lab will demonstrate how to configure the connector between the two products to define alert mapping, granular CI mapping, launch contexts, and tenant IDs. Attendees will learn how to optimize the integration through settings like queue configuration, alert update intervals, and class mappings.
Similar to Pre-Con Ed: Who's minding the SSO store? (20)
In medicine - an MRI can quickly reveal a hidden ailment and actionable insight to get better. For IT and business leaders whose key concern with the mainframe is the platform costs and lean operations - the CA Mainframe Resource Intelligene reveals multiple sources of hidden mainframe costs and operational inefficiencies along with actionable recommendations.View this slideshare to understand how this new SaaS offering from CA brings together automation, speed, analytics and mainframe expertise of 40+ years. CA Mainframe Resource Intelligence reports answer your CIO’s toughest questions about mainframe optimization and potential for digital transformation.
For more information, please contact your account director or mainframe specialist at:
http://ow.ly/PALG50htHgF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
For more information on Mainframe, please visit: http://ow.ly/GwKO50gkixl
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
Here at CA Technologies, our development teams share many of the same challenges producing quality software as our customers.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
This session will cover how The Home Depot built quality into its software development as it migrated from waterfall to agile delivery.
For more information on DevOps: Continuous Delivery, please visit: http://cainc.to/CAW17-CD
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Privileged Access in a World on TimeCA Technologies
Today there are more privileged users than ever before. Providing access is not optional it is a business necessity. But how do you avoid excessive access? Providing the right access at the right time is the formula for reducing your risk and securing a world of data. At FedEx empowering the right people at the right time is not only good business, but it's also good security.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
As one of the most forward thinking critical infrastructure companies in the UK, SGN is blazing a trail by becoming the first UK critical infrastructure company to run 100% in the cloud and using innovative IoT technologies to revolutionize the management of gas pipelines. To manage the risk, SGN embarked on a mission to shape the attack path of intruders. In this session, Mo Ahddoud, CISO at SGN will share how he used a technique called attack path mapping to put privileged access at the center of SGN's digital transformation.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
Around the globe, citizens are demanding 24/7 access to government, and this is driving a dramatic re-architecture of public services putting citizens in control, increasing participation and access to services. From two different parts of the world, The State of Louisiana & The State of Amazonas in Brazil have both become centers for innovation. In this session, they will share and demonstrate how they are designing a government built to change and breaking down silos to make the citizen the center of government.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Keynote: Making Security a Competitive AdvantageCA Technologies
Keynote: Making Security a Competitive Advantage
For more information on Security, please visit: http://cainc.to/CAW17-Security
For more information on DevSecOps, please visit: http://cainc.to/CAW17-DevSecOps For more information on Veracode, please visit: http://community.veracode.com
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Providers Can Capitalize
For more information on MSP, please visit: http://ow.ly/CrAA50gbyfJ
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational Efficiency and Scalability
For more information on MSP, please visit: http://ow.ly/oQ1o50gby0m
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting Your Customer’s Modern Software Factory
For more information on MSP, please visit: http://ow.ly/kWsH50gbxYh
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformation Play for Service Providers
For more information: Download the white paper, “Five Technologies for the Built-to-Change Business—and How You Can Monetize Them” at: https://www.ca.com/content/dam/ca/us/files/white-paper/five-technologies-built-to- change-business.pdf
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
Join this session for a taste of mainframe excellence deconstructed, with Jean Louis Vignaud, VP of Product Management, sharing the CA Technologies vision for how mainframe as a service breaks silos through a unified, enterprise-grade toolset deployed mobile to mainframe. Learn how a menu of IBM z Systems® services can be intelligently configured and provisioned to deliver at scale delight for the entire IT team—reduced TCO and flawless SLA delivery for CIOs, unparalleled security and compliance management for CISOs, and greater accessibility to mainframe code and data through a redesigned, “cloud-like experience” for enterprise architects and developers.
Stay connected at: http://ow.ly/d0f350g68Bq Thank you.
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
In this roadmap session, join us to explore how bleeding-edge data science algorithms are now being incorporated in real life into CA Mainframe Operational Intelligence to better predict performance issues and prevent costly downtime and capacity spikes across the IT landscape. See how you can get real-time insight to what may happen sooner and in-depth guidance on what you should do about it. And, learn how to use open tools that can pull in data feeders from other systems, to improve results. Whether you’re a mainframe novice or a seasoned operations expert, you'll find new tools can improve your SLA performance, MTTR and more.
For more information on Mainframe, please visit: http://ow.ly/pbDM50g68zT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
With great power comes great responsibility. Mainframes have both: the power of data and transactions that run the application economy, and the responsibility to keep that data protected. Join this roadmap session to learn from CA data privacy leaders and see the future of the data-centric security strategy, covering key products such as CA Data Content Discovery for z/OS, CA Compliance Event Manager and more. Learn how to enhance your data privacy and simplify regulatory compliance, plus get a view into the roadmap of what's to come in the mainframe security and compliance portfolio.
For more information on Mainframe, please visit: http://ow.ly/Ik2H50g66cN
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
The promise of blockchain, or specifically distributed ledger technology, has captured the attention of business and IT leaders across multiple industries. Now is the time to move from hype to reality. This session will examine use cases of pioneering companies that apply blockchain in a multi-party entity environment with immutable smart contracts. We’ll share how some DevSecOps requirements are fundamentally different for blockchain pilots and full deployment—from getting started with the right development environment to concerns of security, encryption and operational visibility. We will also discuss integration of blockchain with existing systems of record and the use of shadow blockchain as an evolutionary step towards adoption. Join this session to learn more about developing, deploying, and securing blockchain.
For more information on Mainframe, please visit: http://ow.ly/VnBh50g66bO
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
The document discusses how establishing digital trust can help companies become digital enterprises. It outlines barriers that companies face in areas like ensuring resources, assuring systems, delivering digital experiences, verifying people, and protecting data. The document provides best practices and CA technologies that can help companies optimize their platforms, assure systems through tools like AI and automation, deliver digital experiences through DevSecOps, verify people with identity management, and protect data with discovery tools. Following these practices can help companies transform to digital enterprises by establishing digital trust.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.