Download presentation
Presentation is loading. Please wait.
Published byCarol Miles Modified over 9 years ago
1
eTrust End to End Security Management Bernd Dultinger Sales Manager South CEE & Turkey
2
1 st Generation Gates, Guns, Guards Evolution of Security Complexity/Management Time Security Today 2 nd Generation Reactive Security 3 rd Generation Security as an Enabler 4 th Generation Proactive Security and Accountability
3
Market Dynamics Risk is higher than ever Doing more with less “still” Accountability is key Fragmented security market Lack of integration
4
Key challenges Vulnerabilities and viruses are out of control Patch Management SPAM is impacting our effectiveness Costly to manage user accounts Too much data, not enough information Need to demonstrate regulatory compliance (HIPAA, Sarbanes-Oxley Act, Basel II, and so on)
5
CA Security Management Vision Deliver security management solutions Enable proactive management of an entire security environment Allowing customers to focus on their business Be the trusted advisor in security management Partner with customers to achieve business efficiencies Ensure continuous business operations Comply with security policies and regulations Reduce overall security risks
6
CA eTrust ™ Security Management Security Management Who has access to what? What is happening in your environment? What should be done about it? Enabled by world-class research team Integration with Network and Systems management On-Demand Security Management
7
eTrust Product Strategy C omplete I ntegrated O pen
8
All the Security Management software you need Identity & Access Management Threat management Security Information Management Identity & Access Management Threat management Security Information Management Supporting the Full IT Stack PDA Desktop Email Gateway Server Mainframe PDA Desktop Email Gateway Server Mainframe Across all of your Major Operating Systems Microsoft Linux Unix zOS Palm Microsoft Linux Unix zOS Palm Complete Who has access to what? What is happening in your environment? What should be done about it? Who has access to what? What is happening in your environment? What should be done about it? To Answer All of the Questions
9
Integrated Integrated with 3 rd party software Integrated Product Suites User Interface Functional Repository Auditing Security Process Views Integrated Management Software
10
Open and Flexible Manage other security software Modular Suites Built on standards We drive standards & we support standards SPML, UDDI, LDAP, SAML, Liberty, OSE, etc Flexible pricing Mapping to how the customer sees the value
11
CA eTrust ™ Security Management
12
At the Core of your Business eTrust Identity & Access Management Key Solutions eTrust Access Control eTrust Admin eTrust CA-ACF2 eTrust CA-Top Secret eTrust Clean-up eTrust Directory eTrust SSO eTrust Web Access Control Complementary Technologies eTrust Security Command Center
13
Identity-Sphere Complete Identity Visualization
14
User & Role Management
15
Policy-based Management Server Access Management Policy
16
End user self management
17
Workflow
18
eTrust Threat Management Proactively Managing Threats Key Solutions eTrust Antivirus eTrust PestPatrol eTrust Examine eTrust EZ Armor eTrust Intrusion Detection eTrust Secure Content Manager eTrust Vulnerability Manager Complementary Technologies eTrust Security Command Center
19
eTrust Threat Research Team Backed by 24x7 Global Research Team
20
eTrust Security Information Management Enabling the right decisions at the right time Key Solutions eTrust 20/20 eTrust Network Forensics eTrust Security Command Center Complementary Technologies eTrust Vulnerability Manager
21
Security Information Management
24
VPN Traffic Events Overlay Intrusion Detection System Alerts Blocked Firewall Traffic Visual Event Correlation
25
eTrust Customers HVB Bank Romania Interamerican Omniasig Cesarom Cargus and many more
26
eTrust End to End Security Management
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.