Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist

Slides:



Advertisements
Similar presentations
Xavier Verhaeghe Vice President Oracle Security Solutions
Advertisements

© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Why Kony for Your Multi-Channel Strategy. Founded in 2007 First product released in employees 350 customers 600% growth in past two years (fastest.
Don’t Let Anybody Slip into Your Network! Using the Login People Multi-Factor Authentication Server Means No Tokens, No OTP, No SMS, No Certificates MICROSOFT.
Gartner Magic Quadrant
Unified Logs and Reporting for Hybrid Centralized Management
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Optimizing Business Operations Business Priorities Presentation.
Microsoft Identity and Access Solutions Market Trends and Futures
Solution Briefing Business Productivity in Action Keynote.
1. 2 Oracle + Hyperion Integrated Enterprise Performance Management System Provides industry’s first EPM System Align operational intelligence with strategy:
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Identity and Access Management Business Ready Security Solutions.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 1 CA Security Enabling the Open Enterprise Mike Denning.
SQL Server 2014 Standard Edition SQL Server 2014 Standard Edition delivers business-class data management for a wide variety of database applications,
Unify and Simplify: Security Management
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Rafael Hiciano Business Development Manager, Applications Platform, Enterprise & Partner Group, Microsoft Corporation Deb Mukhopadhyay Specialized Business.
Almost 4 decades of Advanced Analytics & DM expertise.
Preparing your Fabric & Apps for Windows Server 2003 End of Support Jeff Woolsey Principal Program Manager.
Empowering Your Users-Security & Mobility Bil Martin 1.
…. PrePlanPrepareMigratePost Pre- Deployment PlanPrepareMigrate Post- Deployment First Mailbox.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Teradata Overview. Teradata Highlights Teradata Corporation >Global Leader in Enterprise Data Warehousing and Analytics –EDW/ADW Database Technology –Analytic.
Identity Assurance Emory University Security Conference March 26, 2008.
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication.
Copyright © 2015 Rockwell Automation, Inc. All Rights Reserved. Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. Empowering Smart Machines.
Building a Fully Trusted Authentication Environment
The conversation just gets better CIO to CEO The power of collaboration Luis Alvarez BT Global Services.
“HP has best-in-class capabilities across the board.” “HP’s functional testing solution…turned in the best scores in four of our five major evaluation.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Microsoft Unified Communications Partner Business Value 1.
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
Availability for the modern datacenter. The Era of the “Always-On Business” ™
Mail2Cloud Case Study Crescent Electric Supply Company mxHero Solves for Large s & Drives Cloud Adoption 1 Copyright 2016, mxHero Inc.March 8, 2016.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Workshifting Transform your business – empower your people.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
IDC Says, "Don't Move To The Cloud" Richard Whitehead Director, Intelligent Workload Management August, 2010 Ben Goodman Principal.
Gartner Magic Quadrants
Forrester and Novell Novell ® Identity Manager 4 Webcast I Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Enterprise Linux Servers Solution Overview Kerry Kim Enterprise Linux Servers Solution Manager.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
THE COMMVAULT PORTFOLIO
ABC Company Positioned as a Magic Quadrant Leader
Transform IT with networking innovation Dell Networking
Reduce Risk Across Hybrid IT
Reduce Risk Across Hybrid IT
Market Growth Context – Where would you bet your company’s future?
Reduce Risk Across Hybrid IT
Partners with Dynamics practices are showing an upward trend in both services (+17%) and software (+29%) revenues, compared with partners who.
Power BI and SharePoint – the road ahead
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Helping You Be What’s Next Eric Boustouller President
OU BATTLECARD: Oracle Identity Management Training
Presentation transcript:

Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist Oktober 2012

Key technology trends 2 Copyright © 2012 CA. All rights reserved. No unauthorized copying or distribution permitted. Consumerization of IT is driving “bring your own device” The perimeter is disappearing with new cloud models Optimizing online customer interactions is a business imperative Data Protection (from theft or carelessness) is required for compliance & customer loyalty

+PURPOSE SECURELY ENABLE ONLINE BUSINESS PROTECT THE BUSINESS Reduce risk Simplify compliance The “new balance” of security GROW THE BUSINESS Improve customer experience Increase customer loyalty IMPROVE EFFICIENCY

Combat insider threat Protect sensitive information Govern user access Control access How do I turn business imperatives into IT projects? 4 Copyright © 2012 CA. All rights reserved. No unauthorized copying or distribution permitted. Deploy online services quickly Improve user experience Expand partner eco-systems Embrace mobile users GROW THE BUSINESS PROTECT THE BUSINESS Automate security processes Adopt cloud models Expanded virtualization – securely Improve collaboration IMPROVE EFFICIENCY

Connect Customers and Citizens to business applications Control privileged users & data Govern employee & partner access to the extended enterprise

Connect Customers and Citizens to business applications ENABLE GROWTH, INNOVATION & COLLABORATION “Make Money”

How do I make more money? Capabilities 1.Authentication 2.Single sign-on 3.Policy-based authorization Customer Citizen Websites Back-end Transactions Audit LogsPartner Website Benefits  Improved user experience  Reduced risk  Greater administrative efficiency  Increased agility Products 1.SiteMinder 2.AuthMinder 3.RiskMinder 4.Web service security 5.Logging & auditing 6.Identity federation

How do I make more money? Today 1.Good integration Websites Back-end Transactions Audit LogsPartner Website 1236 Future  Enhanced, out-of-the-box integration (Q4, CY12) Products 1.SiteMinder 2.AuthMinder 3.RiskMinder Customer Citizen 45

Connect Customers and Citizens to business applications Govern employee & partner access to the extended enterprise DRIVE IT OPERATIONAL EXCELLENCE “Save Money” “Make Money”

How do I save money? Easily enable end-users access to resources ACCESS DENIED Answer question of who has access to what Ensure proper access Validate access to meet auditor’s demands Track access? CapabilitiesBenefits Automated user provisioning User self-service Identity governance Entitlement certification Easier employee enablement Empowering users reduced help-desk costs Automate compliance processes Implement controls to prevent policy violations Products 1.IdentityMinder 2.GovernanceMinder

How do I save money? Easily enable end-users access to resources ACCESS DENIED Answer question of who has access to what Ensure proper access Validate access to meet auditor’s demands Track access? TodayFuture Integrated components On-Premise offering Enhanced IdentityMinder (Q2CY12) Enhanced GovernanceMinder (Q4CY12) Integrated Cloud Service (H1CY13) Products 1.IdentityMinder 2.GovernanceMinder

Control privileged users & data Govern employee & partner access to the extended enterprise MANAGE RISK & COMPLIANCE Connect Customers and Citizens to business applications “Save Money” “Make Money”

How do I reduce risk? Physical and Virtual Environments rity Many Insiders Shared Admin Identities Sensitive DataCompliance CapabilitiesBenefits Privileged User Password Management & Segregation of Duties Information Classification and Control Virtualization Security Reduced risk & simplify compliance Reduced data risks Consistent security across all platforms 1.ControlMinder 2.DataMinder Products Windows Administrators UNIX Administrators Virtualization Administrators

How do I reduce risk? Physical and Virtual Environments rity Many Insiders Shared Admin Identities Sensitive DataCompliance TodayFuture On-premise components Enhanced integration (H1CY13) Cloud Service offering (H1CY13) 1.ControlMinder 2.DataMinder Products Windows Administrators UNIX Administrators Virtualization Administrators

Connect Customers and Citizens to business applications Control privileged users & data Govern employee & partner access to the extended enterprise Identities Access Data

CA Identity and Access Management solutions Customer success 6 out of the top 7 global Financial Services 8 out of the top 10 US Insurance 7 out of the top 8 US Gov Agencies 8 out of the top 10 US Manufacturing 21 out of the top 25 Fortune out of the top 7 Global Manufacturing 14 out of the top 15 US Commercial Banks 4 out of the top 5 US Oil & Gas 10 out of the top 10 Global Banks!! 5 out of the top 5 Telecommunications

CA Security solutions are recognized as market leaders ‡ Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose User Authentication Ant Allan, 17 January 2012 User Administration/Provisioning Perry Carpenter & Earl Perkins, 22 December 2011 Identity & Access Governance Earl Perkins & Perry Carpenter, 15 December 2011 Content-Aware Data Loss Prevention Eric Ouellet & Rob McMillan, 10 August 2011 CA IdentityMinder – Best Identity Management Solution of 2012 Best IAM Solution of 2011 CA is named a leader in the following Gartner Magic Quadrants ‡ CA is named a leader in the following Forrester Wave reports: Risk-based Authentication Q1 2012; February

Vielen Dank!