CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 1 CA Security Enabling the Open Enterprise Mike Denning.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
System Center 2012 R2 Overview
Current impacts of cloud migration on broadband network operations and businesses David Sterling Partner, i 3 m 3 Solutions.
© 2014 Cognizant 4 th March 2015 MBaaS: Mobile Backend as a Service Pablo Gutiérrez / Senior Mobility developer.
CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 1 Evolving Role of Mainframe in the Dynamic Data.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
Citrix Partner Update The Citrix Delivery Centre.
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Piilo Makes HR Easy for Businesses of Any Size, Thanks to the Convenience of Its Mobile App and the Power of the Microsoft Azure Cloud Platform MICROSOFT.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Customer Sales Presentation Stoneware webNetwork Powered by ThinkServer.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Thriving in a Hybrid World Dean J. Marsh Vice President, Client Success IBM Analytic Solutions.
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Unify and Simplify: Security Management
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 Sundara Nagarajan (“SN”) CLOUD SYSTEMS AUTOMATION.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Maximize Return on Engagement via Scalable Omni-Channel Online Services in the Cloud COMPANY PROFILE: XOMNI, INC. Founded in 2011 and headquartered in.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Techcello Provides SaaS Lifecycle Management Solution to “SaaS-ify” Your Application Efficiently on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
WHAT OUR CUSTOMERS ARE SAYING “After thorough market research and a review process, Qorus Breeze Proposals stood out from the competitors because of its.
Actualog Social PIM Helps Companies to Manage and Share Product Information Using Secure, Scalable Ease of Microsoft Azure MICROSOFT AZURE ISV PROFILE:
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Accumulus Delivers Enterprise Class Subscription Billing and Automation Solutions for Gaming, Retail, and More on the Scalable Microsoft Azure Platform.
Corent’s SurPaaS Transforms Your Software into Scalable SaaS on Windows Azure – in Days! COMPANY PROFILE: CORENT TECHNOLOGY INC. Corent’s SurPaaS is a.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Connect Applications and Business Partners in Integration Cloud, the Reliable and Transparent Integration Environment Built on Microsoft Azure MICROSOFT.
User and Device Management
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Built on the Powerful Microsoft Azure Platform, Forensic Advantage Helps Public Safety and National Security Agencies Collect, Analyze, Report, and Distribute.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2014 Cleo. All rights reserved. Company confidential. Managing Chaos: Andy Moir Director, Product Marketing 2 Data Movement in 2015.
Improve the Performance, Scalability, and Reliability of Applications in the Cloud with jetNEXUS Load Balancer for Microsoft Azure MICROSOFT AZURE ISV.
Task Performance Group Provides Cutting-Edge E-Commerce B2B EDI Integration Using MegaXML SaaS Solution on Microsoft Azure Cloud Platform MICROSOFT AZURE.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
DreamFactory for Microsoft Azure Is an Open Source REST API Platform That Enables Mobilization of Data in Minutes across Frameworks and Storage Methods.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
Device Maintenance and Management, Parental Control, and Theft Protection for Home Users Made Easy with Remo MORE and Power of Azure MICROSOFT AZURE APP.
MICROSOFT AZURE ISV PROFILE: BMC SOFTWARE
DocFusion 365 Intelligent Template Designer and Document Generation Engine on Azure Enables Your Team to Increase Productivity MICROSOFT AZURE APP BUILDER.
Free Cloud Management Portal for Microsoft Azure Empowers Enterprise Users to Govern Their Cloud Spending and Optimize Cloud Usage and Planning MICROSOFT.
NeoFirma Taps into the Microsoft Azure Cloud Platform to Deliver Digital Oilfield SaaS to North American Independent Oil and Gas Producers MICROSOFT AZURE.
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Stylelabs Develops the Marketing Content Hub to Offer Enterprises a High-End Marketing Content Management Platform Based on Microsoft Azure MICROSOFT AZURE.
Hosted on Azure, LoginRadius’ Customer Identity
OpenNebula Offers an Enterprise-Ready, Fully Open Management Solution for Private and Public Clouds – Try It Easily with an Azure Marketplace Sandbox MICROSOFT.
Secure & Unified Identity
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Replace with Application Image
Company Overview & Strategy
Interlake Hybrid Cloud Management Suite
Intelledox Infiniti Helps Organizations Digitally Transform Paper and Manual Business Processes into Intuitive, Guided User Experiences on Azure MICROSOFT.
On-Premises, or Deployed in a Hybrid Environment
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
Abiquo’s Hybrid Cloud Management Solution Helps Enterprises Maximise the Full Potential of the Microsoft Azure Platform MICROSOFT AZURE ISV PROFILE: ABIQUO.
Microsoft Data Insights Summit
Presentation transcript:

CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 1 CA Security Enabling the Open Enterprise Mike Denning General Manager, Security Business Unit February 4, 2014

2 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Key Trends & New Security Mandate Agenda CA Solutions & Customer ValueUser Experience DemoPortfolio Summary & Development DirectionsKey Takeaways

3 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Two Main Components To Enterprise Security Strategy INFRASTRUCTURE SECURITY SpywareTrojansSpamWorms Security of NO NO Viruses, Spyware, Vulnerabilities, Intrusions SERVICE SECURITY Server Access Internal Users Security of KNOW KNOW User, Access, Data, Activity External Users Cloud Access Web Mobile API

4 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Services Security Enables The Open Enterprise On-premise applications Cloud applications API Web Browser Mobile App Mobile Devices Laptop/Remote Enable the right people (and devices)to secure services & data Employees Administrators Partners Customers Developers …with simple access… Connected Devices IDENTITY Risk Context THE OPEN ENTERPRISE

5 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. The Business Is Moving Forward… With or Without IT IT Department Budget 30% IT EXPENDITURES 70% of IT spending being done by business units outside the official IT budget 30% Source: PwC

6 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Change The Perception Of IT Security  Audit report is the hammer  Block almost everything  Breach drives awareness  Shrinking budgets Security of “NO” ENABLE THE BUSINESS  Help the business grow  Get a seat at the Board table  The business engages Security  Growing budgets Security of “KNOW” PROTECT THE BUSINESS Traditional Security Approach Open Enterprise Approach

7 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Change The Role Of IT Security CISO must be a service provider to the organization, enabling each group with the IAM capabilities they need DEVELOPERS ARCHITECTS OPERATIONS MARKETING THE OPEN ENTERPRISE

8 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. IDENTITY Risk Context Delivering Security To Enable The Business DELIVER SECURE BUSINESS APPS via WEB, MOBILE, API  Securely deploy applications across web, mobile and API  Enable customers to bring their own identity to access applications  Reduce Fraud with Risk Based Authentication SECURE THE MOBILE, CLOUD-CONNECTED ENTERPRISE  Secure, simple access to on premise and cloud applications  Simplified management of users to least privilege  Centralized control of administrative and shared accounts THE OPEN ENTERPRISE

9 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Cloud Connected Enterprise By 2015, about 24% of all new business software purchases will be of service-enabled software Attacks & Fraud Trusted insiders or business partners are responsible for 43% of security breaches Compliance & Regulations Large companies spend 13.1% of net revenues on compliance activities Secure The Mobile, Cloud-connected Enterprise Single sign-on to all on premise and SaaS applications Self-service request & auto- provisioning for quick access Risk based certification of user access and removal of orphaned accounts Centralized control and monitoring of shared accounts with fine grained access controls THE SECURE OPEN ENTERPRISE… SECURE THE MOBILE, CLOUD-CONNECTED ENTERPRISE

10 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. RESULTS Provide Simple Employee Access While Reducing Risk and Opportunity For Fraud Identity Governance  Access Certification  Self service request  Provisioning Advanced Auth  Multi-factor auth  Contextual risk analysis  Step up authentication Single Sign-0n  Secured sessions  Federation  Centralized policy Enterprise Apps SaaS ON PREMISE Identity Governance PROVISIONING Identity Management SINGLE SIGN-ON Better user experience, faster time to productivity Reduced user lifecycle and compliance costs Improved compliance and reduced risk On/off boarding and continuous certification of thousands of users

11 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Identity Governance  Self-service request  Password reset  Provisioning Single Sign-on  Simplified access  Standards federation  On-premise and cloud Advanced Auth  ArcotID  One time password  Risk based access Simplified access for employees, customers, partners Significantly reduced cost of IAM program As a service model to support cloud based enterprise GLOBAL OIL AND GAS COMPANY RESULTS IAM as a Service to Accelerate IT Consumer Partner Use Mobile Employee Internal Employee CloudMinder Bridge CA CLOUDMINDER Advanced Authentication Federated Single Sign-On Identity Management Identity* Governance Privileged* Identity Mgt * Future Direction Cloud Platforms SaaS Apps On-Premise IAM/Private Cloud Access service for employees, customers, partners

12 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Shared Account Access  Check-out – Check-in  Workflow  Application accounts Fine Grained Control  Granular access model  Host lockdown  Virtual server controls Reporting & Forensics  Session recording  Automated discovery Eliminated shared & hard-coded passwords Reduced the risk of insider security breaches Enabled accountability for privileged users RESULTS Control Administrative Access To Shared Accounts CA ControlMinder Secure Password Storage Individual Administrators Shared Privileged Identity Password Check-In & Check-Out Automatic Logins SHARED ACCOUNT MANAGEMENT Manual Logins Database Network Appliance Virtual Server Windows/ UNIX/Linux Application Multiple Device Types 25,000 employees Need to protect HR data, payroll, financial records

13 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Manage Identities in the Cloud Connected Enterprise IDENTITY IS THE NEW PERIMETER Enterprise Apps SaaS Administrators Employees Partners On Premise Contractors IDENTITY Cloud Apps/Platforms & Web Services Self Service Advanced Auth Identity Governance Privileged and Shared Account Management Single Sign-on On/off Boarding

14 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Mobile spend will reach $1.3 trillion as the mobile apps market reaches $55 billion in 2016 By 2016, half of B2B collaboration will take place through Web APIs Internet of Things will drive 15 billion networked devices by 2015 Enables the business to rapidly deliver new applications across web, mobile and API channels Evaluates user access in context to manage risk and fraud Enables developers with catalogue of APIs and simple security models to abstract complexity of security Simplifies data exchange between partners, internal & cloud systems THE SECURE OPEN ENTERPRISE… DELIVER SECURE BUSINESS APPS via WEB, MOBILE, API Deliver Applications Thru Web, Mobile And API

15 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. RESULTS Single Sign-on  Multiple applications  Works for web and mobile  Simple app integration API & Web Security  API firewall  Secure web sessions  Central security policy Password Reset  Simple self-service  Integrated ID proofing  Web and mobile interfaces Single Sign-on across applications Simple security policy across web, API, mobile Accelerated delivery of new applications Expand Consumer Web Applications To Mobile & API Mobile / API Web CA SiteMinder CA Layer 7 API Gateway Online Clients Customer Service Partners Core Applications Communicate with partners and clients over multiple channels

16 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Secure API Access  Device/app identification  Complex access policy Mobile Enablement  Simple OAuth libraries  Cross app single sign-on  Notification services Data Transformation  API aggregation  Data adaption RESULTS Enable Internet of Things CA LAYER 7 MOBILE ACCESS GATEWAY Mobile App Connected Car Database Application Servers Purchase wifi Enable hotspot Get diagnostic Check recall status Telemetry Remote start Remote lock/unlock User Portal Simplified developer access to systems Positioned to rapidly deliver new features Enhanced customer experience Enable connected car and mobile app communications North American Auto Manufacturer

17 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. API Developer Portal  Simple catalog of services  Developer access control  Business level reporting Mobile Enablement  Simple OAuth libraries  Device validation  Notification services API Gateway  API aggregation  Caching & optimization  Access Control Enhanced customer experience Secure delivery of content; protect from piracy Accelerated time to market on new platforms RESULTS Accelerate Delivery with Developer Engagement Mobile Developers Mobile Apps L7 API Developer Portal L7 API Gateway > Runtime > < Design Time < Provide secure, streaming of premium content on multiple platforms

18 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Secure Access  Multiple applications  Works for web and mobile  Simple app integration Access Optimization  Highly available  Massive scalability  Low cost of hardware Data Transformation  API aggregation  Data normalization Simplified model for developers Improved customer response time Common control layer between datacenters RESULTS Leverage Cloud For Critical Applications Online retailer needed capability to burst applications across clouds

19 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Secure Access  Consistent access control  User authentication  Data masking Visibility and Reporting  API usage reporting  Rate limiting  Enable chargeback Data Transformation  Data connectors  Aggregate calls into one API  User specific data lenses More efficient supply chain management Maintained security of customer data Streamlined customer management process RESULTS Securely Share Access To Big Data Analytics Internal Users CRM Data CRM Data API User-Specific Data Lenses Data Marketplace DATA ACCESS MANAGEMENT Need to share access to big data analytics across the enterprise

20 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Mobile Apps Browser Developer Access Business Partners Business Divisions Cloud Services Smart Devices Open Enterprise Built On Integrated Web, Mobile, API APIs ARE THE GLUE FOR THE NEW DIGITAL ECONOMY Web API Identity / Device Management Single Sign-on Accelerate Data Access Optimize Traffic Protect Data Developer Portal Identity Federation Advanced Auth Mobile SDKs App Wrap Centralized Security Policy

CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 21 Product Design

22 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Products Built for Flexibility Large enterprise willing to customize to serve technical users Goal: Intuitive, Engaging UX Drive business perspective and value into product experiences Evolving Customer Demands Cloud/mobility driving expectations of a consumer-grade experience Market Trends Changing User Expectations

23 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Delivering a Complete User Experience

24 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. 1 Cloud First (enable IT as service provider)  Multi-tenant, delegated admin, API services Harmonize IAM Architecture (modular, scalable)  Reduce TCO for Cloud, Hybrid & Enterprise environments Enhance end user self service experience  Secure Users, their Access and how they use Information Enable New Environments: Social, Mobile, BYOI...  Integration with Application Delivery, IT Business Management Enable new business channels for our customers Product Strategy for Security

25 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Deployable in cloud by MSP’s, on premise by large enterprises, or both Carrier grade reliability and scalability Fully integrated solution for multitenant multi-service deployments An integration of products and services for private, public and hybrid clouds Delivering IAM as a Service CA CloudMinder Advanced Authentication Single- Sign-On Identity Management Authorization Identity Governance Data Protection Web Services API Policy Enforcement

26 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Security to Enable the Open Enterprise MODULAR, INTEGRATED SOLUTION Data Users ENABLE SINGLE SIGN-0N  Federation and agent based  Consumer scale user directory  Social registration and login DEPLOY & MARKET SECURE APIs  API Gateway for SOA  API Gateway for Mobile  API Portal SECURE SENSITIVE DATA  Data discovery and classification  filtering  Mobile content sharing MANAGE USER LIFECYCLE  Self-service request & password reset  Automated provisioning  Governance & certification AUTHENTICATE USERS & REDUCE FRAUD  Multi-factor authentication  Risk analytics with device linking CONTROL PRIVILEGED USERS  Automated check-in/out passwords  Fine grained access controls  Record sessions for forensic investigation Applications Risk Context IdentityMinder AuthMinder ControlMinder SiteMinder Layer 7 DataMinder

27 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Key Takeaways Deep experience in the largest enterprise deployments  Flexibility and scalability  Fine grained controls & integrations Accelerating organic innovation on full-featured platforms  Mobile platforms, cloud integration, bring your own identity  Risk based analytics  Simplification for faster to value in simple environments Meeting the needs of key IAM stakeholders in the organization  Architect, Operations, Developer, Marketing  End Users Continue to lead; strategic acquisitions where it makes sense

CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 28 Thank You

29 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Security To Enable The Open Enterprise ENABLE SINGLE SIGN-ON  RESTful APIs for developers to manage SSO  Browser forms-fill for broader SSO  Additional templates for SaaS partner SSO DEPLOY AND MARKET SECURE APIS  Simplify cloud integration for developers  Portal API grouping for developer mgmt  Mobile client SDK for secure SSO SECURE SENSITIVE DATA  Integrated management console  Open policy via API for developers  Contextual aware API MANAGE USER LIFECYCLE  Business user entitlements catalog  Business risk dashboard  Web services Connector Xpress & SCIM AUTHENTICATE USERS & REDUCE FRAUD  Simple deployment with SiteMinder  User Behavior profiling to reduce fraud  Simple Identity Proofing capability CONTROL PRIVILEGED USERS  Proxy deployment model  SIEM and Service Desk integration  Virtual appliance deployment model DATA USERS RISK CONTEXT APPLICATIONS SiteMinder Layer 7 DataMinder ControlMinder IdentityMinder AuthMinder NEAR-TERM PRODUCT DIRECTIONS