Enable and Secure Business Growth in the New Application Economy
-
Upload
ca-technologies -
Category
Technology
-
view
446 -
download
5
description
Transcript of Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
A Guide for the Business and the CIOSteve Firestone, GM, CA SecurityRahim Bhatia, SVP, API Management & Security
SCT01S #CAWorld
ca Securecenter
3 © 2014 CA. ALL RIGHTS RESERVED.
4 © 2014 CA. ALL RIGHTS RESERVED.
Welcome and Thank You!
5 © 2014 CA. ALL RIGHTS RESERVED.
Security & APIs are Critical to the Application Economy
Source: Vanson Borne report commissioned by CA 2014
Security concerns the top obstacle in app economy
#1Overall IT spend devoted to Security over next 3 years
>25%
Security priority for business is improving mobile experience
#2Leaders saw revenue increase for security-
enabled services(18% of Laggards)
47%
Organizations with API program within 5 years
86%Leaders open
access to APIs(59% of Laggards)
93%
6 © 2014 CA. ALL RIGHTS RESERVED.
Mobile App
YES
NO
CONSIDERING
Polling/Voting
1
2
3
Is your organization opening your enterprise to consumers via applications?
7 © 2014 CA. ALL RIGHTS RESERVED.
Mobile App
YES
NO
CONSIDERING
Polling/Voting
1
2
3
Is your organization developing secure mobile applications leveraging APIs?
8 © 2014 CA. ALL RIGHTS RESERVED.
9 © 2014 CA. ALL RIGHTS RESERVED.
CA Enables and Protects the New Open Enterprise
© 2014 CA. ALL RIGHTS RESERVED.
API
App
App
App
Data
Data
Data
10 © 2014 CA. ALL RIGHTS RESERVED.
ACCELERATE SECURE APP DEVELOPMENT
SIMPLIFY ANYWHERE, ANYTHING ACCESS
PROTECT DATA WHILE ENABLING BUSINESS
What you need to be thinking about
11 © 2014 CA. ALL RIGHTS RESERVED.
Accelerate Secure App Development
Externalize data Protect APIs with access controls
Make it easy for developers
What youneed to do
12 © 2014 CA. ALL RIGHTS RESERVED.
Simplify Anywhere, Anything Access
CUSTOMERS, EMPLOYEES, PARTNERS
Enable access from any device
Coordinate security across Web, mobile, APIs
Mobile Apps
APIs/Web Services
Web Apps
From the Cloud On-PremiseOn
Device
Improve customer adoption/experience/loyalty
What youneed to do
13 © 2014 CA. ALL RIGHTS RESERVED.
What youneed to do
Enable security from end-to-end Protect against insider threatsDefend against external
threats
Protect Data While Enabling Business
Device Geolocation Velocity User history Fraud patterns
PROTECT MOBILE APP STRONGLY AUTHENTICATE USERS
CONTROL ACCESS TO WEB APPS
CONTROL ACCESS TO APIS
SECURE PRIVILEGED IDENTITIES
14 © 2014 CA. ALL RIGHTS RESERVED.
CA Security
Solutions to accelerate development & deployment of
your secure applications while improving engagement
with customers and protecting all your critical data
ENABLE AND PROTECT THE OPEN ENTERPRISE IN THE APPLICATION ECONOMY
Balancing business
enablement with protection,
delighting customers
while instilling trust
Unified Access End-to-End Security Trusted Business
Managing user access
across multiple channels for
unified user experience
across web, mobile & APIs
Controlling access end-to-
end from the mobile app
through transmission to the
API & the backend data
15 © 2014 CA. ALL RIGHTS RESERVED.
Announcement
“CA Technologies recognizes that the application economy demands security in the developer and API world.”*
“CA’s solutions protect and control user access to the application at the front end, while controlling application access to the API for a more secure experience.”*
MOBILE API GATEWAY API DEVELOPER PORTALSaaS API DEVELOPER PORTAL
* CA Press release, November 10, 2014
16 © 2014 CA. ALL RIGHTS RESERVED.
Unified Access
© 2014 CA. ALL RIGHTS RESERVED.
Any-App Access
Multi-Device Universe
Dynamic Access
17 © 2014 CA. ALL RIGHTS RESERVED.
Unified Access
© 2014 CA. ALL RIGHTS RESERVED.
Multi-Device Universe
18 © 2014 CA. ALL RIGHTS RESERVED.
What if your virtual life…
19 © 2014 CA. ALL RIGHTS RESERVED.
Moved as fast as you?
20 © 2014 CA. ALL RIGHTS RESERVED.
From device…
…to device
21 © 2014 CA. ALL RIGHTS RESERVED.
Across Vendors
Across Apps
22 © 2014 CA. ALL RIGHTS RESERVED.
This is business,rewritten by software™
23 © 2014 CA. ALL RIGHTS RESERVED.
Discuss Q4 targets with Bob.
Don’t forget to
Discuss Q4 targets with Bob.
Don’t forget to
cover incentives.
24 © 2014 CA. ALL RIGHTS RESERVED.
Dynamic Access
Joe
25 © 2014 CA. ALL RIGHTS RESERVED.
End-to-End Security
26 © 2014 CA. ALL RIGHTS RESERVED.
Trusted Business User experience SaaS Delivery
27 © 2014 CA. ALL RIGHTS RESERVED.© 2014 CA. ALL RIGHTS RESERVED.
TRUSTED BUSINESS
User experience | SaaS Delivery
28 © 2014 CA. ALL RIGHTS RESERVED.© 2014 CA. ALL RIGHTS RESERVED.
TRUSTED BUSINESS
User experience | SaaS Delivery
29 © 2014 CA. ALL RIGHTS RESERVED.
CA World ‘14 Customer VIP Awards
Vision
This award recognizes success in how a customer has developed and moved toward management excellence, while demonstrating a clear vision for how this effort supports the overall success of the enterprise. It celebrates the innovative steps taken to fundamentally change the way business gets done across the enterprise.
Impact
This award recognizes results from improved management, especially in terms of productivity, financial benefits, quality improvements, and/or customer satisfaction. It celebrates how an organization has demonstrated a strategic organizational change in the way work gets done, for the better.
Progress
This award recognizes implementation success and/or process improvements. Initiatives in this category, even if not complete, will demonstrate excellent planning and/or communications and project success.
30 © 2014 CA. ALL RIGHTS RESERVED.
Vision Award
Rob Yeary, Senior Director, OSS Application Development
Mila Crowder, Sr. Manager, App Dev Enabling Systems
Cox Communications is using CA Risk Authentication, along with CA Single Sign-On, to provide convenient, seamless and non-intrusive added security for their customers as they log into the new Cox digital services portal to order new services and expand their relationship with Cox.
31 © 2014 CA. ALL RIGHTS RESERVED.
Vision Award
Dario Trento, Global Outsourcing Governance, Project Manager
After the success of their CA IAM project, UniCredit is now focused on driving business agility and simplicity. UniCredit will deploy CA API Management and CA Secure Cloud on-premise in order to empower employees to make better decision more quickly, as well as engage customers and business partners.
32 © 2014 CA. ALL RIGHTS RESERVED.
Impact Award
Kevin Chase, EVP & CIO
EFH needed to enable their three Lines-of-Business to accelerate business through improved and seamless access to business applications and data by internal users and partners. By enabling the right access to the right data when needed, EFH has improved its business velocity. EFH has not only deployed multiple CA Security solutions as part of a visionary transformation of their business but has done so in one year.
33 © 2014 CA. ALL RIGHTS RESERVED.
Progress Award
Mo Siddiqui, Senior Manager, Architecture and Design
Rogers integrates CA API Management with CA Identity Manager to manage their customers’ identities and entitlements and provide automated provisioning for over 6 million Rogers customers, enabling them to access new content and services.
34 © 2014 CA. ALL RIGHTS RESERVED.
Partner Technologies
8K Miles Software
Radiant Logic
CoreBlox
Axiomatics
Digital Defense
Bio-Key Int.
SimeioSolutions
IDMLogicHoldings
Telesign
Citrix
InnomindsSoftware
Mycroft
Cognizant
ObserveIT
35 © 2014 CA. ALL RIGHTS RESERVED.
CA Securecenter
Mobile Security
Single Sign On
Strong Authentication
Identity Management & Governance
Privileged IdentityManagement
API Management
Payment Security
StrongAuthentication
CA Security Innovations
Internet of Things
CA on CA: Security in GIS
Enterprise MobilityManagement
Cloud IAM
36 © 2014 CA. ALL RIGHTS RESERVED.
CA Securecenter
Mobile Security
Single Sign On
Strong Authentication
Identity Management & Governance
Privileged Identity Management
API Management
Payment Security
Strong Authentication
CA Security Innovations
Internet of Things
CA on CA: Security in GIS
Enterprise MobilityManagement
Cloud IAM
37 © 2014 CA. ALL RIGHTS RESERVED.
For More Information
To learn more about Security,
please visit:
http://bit.ly/10WHYDm
Insert appropriate screenshot and text overlayfrom following “More Info Graphics” slide here;
ensure it links to correct pageSecurity
38 © 2014 CA. ALL RIGHTS RESERVED.
For Informational Purposes Only
© 2014 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Terms of this Presentation