Download presentation
Presentation is loading. Please wait.
Published byHilary Ellis Modified over 9 years ago
1
CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 1 CA Security Enabling the Open Enterprise Mike Denning General Manager, Security Business Unit February 4, 2014
2
2 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Key Trends & New Security Mandate Agenda CA Solutions & Customer ValueUser Experience DemoPortfolio Summary & Development DirectionsKey Takeaways
3
3 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Two Main Components To Enterprise Security Strategy INFRASTRUCTURE SECURITY SpywareTrojansSpamWorms Security of NO NO Viruses, Spyware, Vulnerabilities, Intrusions SERVICE SECURITY Server Access Internal Users Security of KNOW KNOW User, Access, Data, Activity External Users Cloud Access Web Mobile API
4
4 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Services Security Enables The Open Enterprise On-premise applications Cloud applications API Web Browser Mobile App Mobile Devices Laptop/Remote Enable the right people (and devices)to secure services & data Employees Administrators Partners Customers Developers …with simple access… Connected Devices IDENTITY Risk Context THE OPEN ENTERPRISE
5
5 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. The Business Is Moving Forward… With or Without IT IT Department Budget 30% IT EXPENDITURES 70% of IT spending being done by business units outside the official IT budget 30% Source: PwC
6
6 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Change The Perception Of IT Security Audit report is the hammer Block almost everything Breach drives awareness Shrinking budgets Security of “NO” ENABLE THE BUSINESS Help the business grow Get a seat at the Board table The business engages Security Growing budgets Security of “KNOW” PROTECT THE BUSINESS Traditional Security Approach Open Enterprise Approach
7
7 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Change The Role Of IT Security CISO must be a service provider to the organization, enabling each group with the IAM capabilities they need DEVELOPERS ARCHITECTS OPERATIONS MARKETING THE OPEN ENTERPRISE
8
8 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. IDENTITY Risk Context Delivering Security To Enable The Business DELIVER SECURE BUSINESS APPS via WEB, MOBILE, API Securely deploy applications across web, mobile and API Enable customers to bring their own identity to access applications Reduce Fraud with Risk Based Authentication SECURE THE MOBILE, CLOUD-CONNECTED ENTERPRISE Secure, simple access to on premise and cloud applications Simplified management of users to least privilege Centralized control of administrative and shared accounts THE OPEN ENTERPRISE
9
9 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Cloud Connected Enterprise By 2015, about 24% of all new business software purchases will be of service-enabled software Attacks & Fraud Trusted insiders or business partners are responsible for 43% of security breaches Compliance & Regulations Large companies spend 13.1% of net revenues on compliance activities Secure The Mobile, Cloud-connected Enterprise Single sign-on to all on premise and SaaS applications Self-service request & auto- provisioning for quick access Risk based certification of user access and removal of orphaned accounts Centralized control and monitoring of shared accounts with fine grained access controls THE SECURE OPEN ENTERPRISE… SECURE THE MOBILE, CLOUD-CONNECTED ENTERPRISE
10
10 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. RESULTS Provide Simple Employee Access While Reducing Risk and Opportunity For Fraud Identity Governance Access Certification Self service request Provisioning Advanced Auth Multi-factor auth Contextual risk analysis Step up authentication Single Sign-0n Secured sessions Federation Centralized policy Enterprise Apps SaaS ON PREMISE Identity Governance PROVISIONING Identity Management SINGLE SIGN-ON Better user experience, faster time to productivity Reduced user lifecycle and compliance costs Improved compliance and reduced risk On/off boarding and continuous certification of thousands of users
11
11 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Identity Governance Self-service request Password reset Provisioning Single Sign-on Simplified access Standards federation On-premise and cloud Advanced Auth ArcotID One time password Risk based access Simplified access for employees, customers, partners Significantly reduced cost of IAM program As a service model to support cloud based enterprise GLOBAL OIL AND GAS COMPANY RESULTS IAM as a Service to Accelerate IT Consumer Partner Use Mobile Employee Internal Employee CloudMinder Bridge CA CLOUDMINDER Advanced Authentication Federated Single Sign-On Identity Management Identity* Governance Privileged* Identity Mgt * Future Direction Cloud Platforms SaaS Apps On-Premise IAM/Private Cloud Access service for employees, customers, partners
12
12 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Shared Account Access Check-out – Check-in Workflow Application accounts Fine Grained Control Granular access model Host lockdown Virtual server controls Reporting & Forensics Session recording Automated discovery Eliminated shared & hard-coded passwords Reduced the risk of insider security breaches Enabled accountability for privileged users RESULTS Control Administrative Access To Shared Accounts CA ControlMinder Secure Password Storage Individual Administrators Shared Privileged Identity Password Check-In & Check-Out Automatic Logins SHARED ACCOUNT MANAGEMENT Manual Logins Database Network Appliance Virtual Server Windows/ UNIX/Linux Application Multiple Device Types 25,000 employees Need to protect HR data, payroll, financial records
13
13 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Manage Identities in the Cloud Connected Enterprise IDENTITY IS THE NEW PERIMETER Enterprise Apps SaaS Administrators Employees Partners On Premise Contractors IDENTITY Cloud Apps/Platforms & Web Services Self Service Advanced Auth Identity Governance Privileged and Shared Account Management Single Sign-on On/off Boarding
14
14 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Mobile spend will reach $1.3 trillion as the mobile apps market reaches $55 billion in 2016 By 2016, half of B2B collaboration will take place through Web APIs Internet of Things will drive 15 billion networked devices by 2015 Enables the business to rapidly deliver new applications across web, mobile and API channels Evaluates user access in context to manage risk and fraud Enables developers with catalogue of APIs and simple security models to abstract complexity of security Simplifies data exchange between partners, internal & cloud systems THE SECURE OPEN ENTERPRISE… DELIVER SECURE BUSINESS APPS via WEB, MOBILE, API Deliver Applications Thru Web, Mobile And API
15
15 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. RESULTS Single Sign-on Multiple applications Works for web and mobile Simple app integration API & Web Security API firewall Secure web sessions Central security policy Password Reset Simple self-service Integrated ID proofing Web and mobile interfaces Single Sign-on across applications Simple security policy across web, API, mobile Accelerated delivery of new applications Expand Consumer Web Applications To Mobile & API Mobile / API Web CA SiteMinder CA Layer 7 API Gateway Online Clients Customer Service Partners Core Applications Communicate with partners and clients over multiple channels
16
16 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Secure API Access Device/app identification Complex access policy Mobile Enablement Simple OAuth libraries Cross app single sign-on Notification services Data Transformation API aggregation Data adaption RESULTS Enable Internet of Things CA LAYER 7 MOBILE ACCESS GATEWAY Mobile App Connected Car Database Application Servers Purchase wifi Enable hotspot Get diagnostic Check recall status Telemetry Remote start Remote lock/unlock User Portal Simplified developer access to systems Positioned to rapidly deliver new features Enhanced customer experience Enable connected car and mobile app communications North American Auto Manufacturer
17
17 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. API Developer Portal Simple catalog of services Developer access control Business level reporting Mobile Enablement Simple OAuth libraries Device validation Notification services API Gateway API aggregation Caching & optimization Access Control Enhanced customer experience Secure delivery of content; protect from piracy Accelerated time to market on new platforms RESULTS Accelerate Delivery with Developer Engagement Mobile Developers Mobile Apps L7 API Developer Portal L7 API Gateway > Runtime > < Design Time < Provide secure, streaming of premium content on multiple platforms
18
18 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Secure Access Multiple applications Works for web and mobile Simple app integration Access Optimization Highly available Massive scalability Low cost of hardware Data Transformation API aggregation Data normalization Simplified model for developers Improved customer response time Common control layer between datacenters RESULTS Leverage Cloud For Critical Applications Online retailer needed capability to burst applications across clouds
19
19 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Secure Access Consistent access control User authentication Data masking Visibility and Reporting API usage reporting Rate limiting Enable chargeback Data Transformation Data connectors Aggregate calls into one API User specific data lenses More efficient supply chain management Maintained security of customer data Streamlined customer management process RESULTS Securely Share Access To Big Data Analytics Internal Users CRM Data CRM Data API User-Specific Data Lenses Data Marketplace DATA ACCESS MANAGEMENT Need to share access to big data analytics across the enterprise
20
20 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Mobile Apps Browser Developer Access Business Partners Business Divisions Cloud Services Smart Devices Open Enterprise Built On Integrated Web, Mobile, API APIs ARE THE GLUE FOR THE NEW DIGITAL ECONOMY Web API Identity / Device Management Single Sign-on Accelerate Data Access Optimize Traffic Protect Data Developer Portal Identity Federation Advanced Auth Mobile SDKs App Wrap Centralized Security Policy
21
CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 21 Product Design
22
22 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Products Built for Flexibility Large enterprise willing to customize to serve technical users Goal: Intuitive, Engaging UX Drive business perspective and value into product experiences Evolving Customer Demands Cloud/mobility driving expectations of a consumer-grade experience Market Trends Changing User Expectations
23
23 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Delivering a Complete User Experience
24
24 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. 1 Cloud First (enable IT as service provider) Multi-tenant, delegated admin, API services Harmonize IAM Architecture (modular, scalable) Reduce TCO for Cloud, Hybrid & Enterprise environments Enhance end user self service experience Secure Users, their Access and how they use Information Enable New Environments: Social, Mobile, BYOI... Integration with Application Delivery, IT Business Management Enable new business channels for our customers Product Strategy for Security 2 3 4 5
25
25 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Deployable in cloud by MSP’s, on premise by large enterprises, or both Carrier grade reliability and scalability Fully integrated solution for multitenant multi-service deployments An integration of products and services for private, public and hybrid clouds Delivering IAM as a Service CA CloudMinder Advanced Authentication Single- Sign-On Identity Management Authorization Identity Governance Data Protection Web Services API Policy Enforcement
26
26 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Security to Enable the Open Enterprise MODULAR, INTEGRATED SOLUTION Data Users ENABLE SINGLE SIGN-0N Federation and agent based Consumer scale user directory Social registration and login DEPLOY & MARKET SECURE APIs API Gateway for SOA API Gateway for Mobile API Portal SECURE SENSITIVE DATA Data discovery and classification Email filtering Mobile content sharing MANAGE USER LIFECYCLE Self-service request & password reset Automated provisioning Governance & certification AUTHENTICATE USERS & REDUCE FRAUD Multi-factor authentication Risk analytics with device linking CONTROL PRIVILEGED USERS Automated check-in/out passwords Fine grained access controls Record sessions for forensic investigation Applications Risk Context IdentityMinder AuthMinder ControlMinder SiteMinder Layer 7 DataMinder
27
27 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Key Takeaways Deep experience in the largest enterprise deployments Flexibility and scalability Fine grained controls & integrations Accelerating organic innovation on full-featured platforms Mobile platforms, cloud integration, bring your own identity Risk based analytics Simplification for faster to value in simple environments Meeting the needs of key IAM stakeholders in the organization Architect, Operations, Developer, Marketing End Users Continue to lead; strategic acquisitions where it makes sense
28
CA Confidential; provided under NDA. © 2014 CA. All rights reserved.2014 Industry Analyst Symposium | 28 Thank You
29
29 | 2014 Industry Analyst SymposiumCA Confidential; provided under NDA. © 2014 CA. All rights reserved. Security To Enable The Open Enterprise ENABLE SINGLE SIGN-ON RESTful APIs for developers to manage SSO Browser forms-fill for broader SSO Additional templates for SaaS partner SSO DEPLOY AND MARKET SECURE APIS Simplify cloud integration for developers Portal API grouping for developer mgmt Mobile client SDK for secure SSO SECURE SENSITIVE DATA Integrated management console Open policy via API for developers Contextual aware API MANAGE USER LIFECYCLE Business user entitlements catalog Business risk dashboard Web services Connector Xpress & SCIM AUTHENTICATE USERS & REDUCE FRAUD Simple deployment with SiteMinder User Behavior profiling to reduce fraud Simple Identity Proofing capability CONTROL PRIVILEGED USERS Proxy deployment model SIEM and Service Desk integration Virtual appliance deployment model DATA USERS RISK CONTEXT APPLICATIONS SiteMinder Layer 7 DataMinder ControlMinder IdentityMinder AuthMinder NEAR-TERM PRODUCT DIRECTIONS
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.