eTrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey
1 st Generation Gates, Guns, Guards Evolution of Security Complexity/Management Time Security Today 2 nd Generation Reactive Security 3 rd Generation Security as an Enabler 4 th Generation Proactive Security and Accountability
Market Dynamics Risk is higher than ever Doing more with less “still” Accountability is key Fragmented security market Lack of integration
Key challenges Vulnerabilities and viruses are out of control Patch Management SPAM is impacting our effectiveness Costly to manage user accounts Too much data, not enough information Need to demonstrate regulatory compliance (HIPAA, Sarbanes-Oxley Act, Basel II, and so on)
CA Security Management Vision Deliver security management solutions Enable proactive management of an entire security environment Allowing customers to focus on their business Be the trusted advisor in security management Partner with customers to achieve business efficiencies Ensure continuous business operations Comply with security policies and regulations Reduce overall security risks
CA eTrust ™ Security Management Security Management Who has access to what? What is happening in your environment? What should be done about it? Enabled by world-class research team Integration with Network and Systems management On-Demand Security Management
eTrust Product Strategy C omplete I ntegrated O pen
All the Security Management software you need Identity & Access Management Threat management Security Information Management Identity & Access Management Threat management Security Information Management Supporting the Full IT Stack PDA Desktop Gateway Server Mainframe PDA Desktop Gateway Server Mainframe Across all of your Major Operating Systems Microsoft Linux Unix zOS Palm Microsoft Linux Unix zOS Palm Complete Who has access to what? What is happening in your environment? What should be done about it? Who has access to what? What is happening in your environment? What should be done about it? To Answer All of the Questions
Integrated Integrated with 3 rd party software Integrated Product Suites User Interface Functional Repository Auditing Security Process Views Integrated Management Software
Open and Flexible Manage other security software Modular Suites Built on standards We drive standards & we support standards SPML, UDDI, LDAP, SAML, Liberty, OSE, etc Flexible pricing Mapping to how the customer sees the value
CA eTrust ™ Security Management
At the Core of your Business eTrust Identity & Access Management Key Solutions eTrust Access Control eTrust Admin eTrust CA-ACF2 eTrust CA-Top Secret eTrust Clean-up eTrust Directory eTrust SSO eTrust Web Access Control Complementary Technologies eTrust Security Command Center
Identity-Sphere Complete Identity Visualization
User & Role Management
Policy-based Management Server Access Management Policy
End user self management
Workflow
eTrust Threat Management Proactively Managing Threats Key Solutions eTrust Antivirus eTrust PestPatrol eTrust Examine eTrust EZ Armor eTrust Intrusion Detection eTrust Secure Content Manager eTrust Vulnerability Manager Complementary Technologies eTrust Security Command Center
eTrust Threat Research Team Backed by 24x7 Global Research Team
eTrust Security Information Management Enabling the right decisions at the right time Key Solutions eTrust 20/20 eTrust Network Forensics eTrust Security Command Center Complementary Technologies eTrust Vulnerability Manager
Security Information Management
VPN Traffic Events Overlay Intrusion Detection System Alerts Blocked Firewall Traffic Visual Event Correlation
eTrust Customers HVB Bank Romania Interamerican Omniasig Cesarom Cargus and many more
eTrust End to End Security Management