Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005

Similar presentations


Presentation on theme: "Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005"— Presentation transcript:

1 Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005 catalin.matei@dnasw.com

2 DNA Software 1998 – DNA Software - Business Partner for Computer Associates in Romania : Premier Partner 2003 – DNA Software – Regional Representative Computer Associates for Romania and Bulgaria; CA Competence Center 2004 – DNA Software development and integration for CA solutions DNA email Scanner: ca smart

3

4

5

6 Management Portal Provides Intelligent, Secure and Personalized Visualization of Business Information Direct integration provides consolidated view of infrastructure management with event console, Business Process Views™ & other solutions Role-based management provides default views and commands defined by user responsibilities

7

8

9 Desktop and Servers Self manage IT resources across the entire lifecycle: Plan, Acquire, Deploy, Maintain, Retire Provide business relevant services Financial analysis—total cost of ownership Manage contracts, vendor relationships and software licenses Inventory and track assets Deploy and maintain software

10 Business Purpose IT AssetsEnd Users Financials Procurement Accounts Payable Fixed Asset Human Resources Business Applications (SAP,PeopleSoft, Oracle, etc.) ca.com Copyright 2002, Computer Associates International, Inc Takes advantage of: Service & Warranty Information Detailed Hardware, Software & Configuration Information Takes advantage of: Service & Warranty Information Detailed Hardware, Software & Configuration Information Desktop and Servers Repository links technical (usage) and business (ownership) information to find over and under utilization: What do we own but see no evidence of usage? What do we use, but see no evidence of owning? Active and ongoing reconciliation Repository links technical (usage) and business (ownership) information to find over and under utilization: What do we own but see no evidence of usage? What do we use, but see no evidence of owning? Reconciliation Evidence of Usage Unicenter Asset Management Software Metering Software Delivery Network Discovery Unicenter ServicePlus Problem Management Self-support Knowledge Management Who Supports It Unicenter Argis Financial Contractual SW Licensing Proof of Ownership

11 Key Features Unicenter Asset Management Comprehensive Management Hardware and Software Inventory Software Metering and Auditing Configuration Management Scripting Tools WBEM/WMI Inventory Network Inventory Unique Scalable Architecture Simplified Management Management by Policies Dynamic Groups

12

13 Key Features Unicenter Software Delivery Packaging & registration Libraries & distribution Installation & maintenance Security Boot server

14

15 Optimizing and self-managing networks and systems Business perspective Root-cause analysis and policy based event notifications Automatic recovery Delivering IT as a Service Business-relevant views Portal, BPV, and administrator console Extended enterprise Providing a Service-Oriented Architecture Role-based management views Built-in integration with 3 rd party vendors Wizards and templates for easy configuration Unicenter NSM Management On-Demand

16

17 Unicenter ServicePlus 6.0

18 Service Desk 6.0 Look and Feel Main Menu Tailorable tree Single click navigation Preview Drag and drop Customizable

19 CA TOTAL PROTECTION SECURITY & STORAGE

20

21 Security Compliance Building Blocks Policy

22 Identity & Access Management Threat Management Security Information Management Security Management Process 1. Automated User Provisioning and Administration 1. Automated User Provisioning and Administration 3. Protect IS Infrastructure, Detect Vulnerabilities, Profile Risk and Automate Response 3. Protect IS Infrastructure, Detect Vulnerabilities, Profile Risk and Automate Response 2. Role Based Access Control across Web, Applications and Servers 2. Role Based Access Control across Web, Applications and Servers 4. Integrate Security Data Manage Incidents, Audit and Monitor Compliance, Forensic Analysis 4. Integrate Security Data Manage Incidents, Audit and Monitor Compliance, Forensic Analysis Security Information Management

23

24 Backup

25 THANK YOU catalin.matei@dnasw.com DNA Software


Download ppt "Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005"

Similar presentations


Ads by Google