SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
World®
’16
Introduction	to	Identity-as-a-Service	
and	Secure	Access	to	SaaS
Paul	Peterson	- Advisor	Product	Management	- CA	Technologies
SCX06S
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
The	rise	in	cloud	and	mobile	apps	is	impacting	organizations	of	all	sizes,	changing	how	
employees	work	and	how	IT	departments	are	expected	to	support	the	business.	Today,	business	
users	can	leverage	rich	capabilities	in	the	cloud	to	enable	better	collaboration,	speed	and	
productivity	than	ever	before.	The	accessibility,	ease	of	use	and	advances	in	cloud	and	mobile	
apps	introduced	immense	pressure	on	IT	to	deliver	modern	applications	faster,	while	creating	an	
exceptional	user	experience.	If	IT	fails	to	accommodate	the	needs	of	users	fast	enough,	they	
simply	use	the	apps	they	need,	often	without	the	knowledge	of	the	IT	department.	In	this	
session,	you’ll	learn	how	to	leverage	identity-as-a-service	to	balance	security,	agility	and	user	
experience	while	staying	ahead	of	shadow	IT.
Paul
Peterson
CA	Technologies
Advisor,	Product	
Management
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
THE	NEW	DIGITAL	WORKPLACE
CHALLENGES
NEXT	GENERATION	IDENTITY-AS-A-SERVICE
DEMO
1
2
3
4
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Explosion	of	SaaS Speed Shadow	IT
New	generation
power	users
LOB	app
ownership
Application	churn
Today’s	Digital	Workplace
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Embracing	the	Digital	Workplace
1. Leverage	shadow	IT	as	an	opportunity	to	empower	LOB
2. Gain	control	and	visibility	over	your	cloud	environment
3. Deliver	a	consumer	grade	workforce	experience	
4. Accelerate	digital	transformation	and	cloud	adoption
5. Bridge	between	new	and	legacy	environments
6. Automate	identity	lifecycle	and	access	management	processes
How	to	Evolve	Quickly	and	Avoid	Getting	Disrupted
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Challenges
Many	applications
everywhere
Many	identities
everywhere
Multiple	access	
methods
Constant	change Many	credentials
No	visibility	
or	control
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Finding	the	Right	Balance
Security Agility User	Experience
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Introducing	CA	Identity	Service
Next	Generation	Identity-as-a-Service	for	the	Modern	Hybrid	Enterprise
Accelerate	digital	transformation	while	delivering	a	
secure	consumer	grade	workforce	experience
User	Provisioning Single	Sign-On Identity	Lifecycle	
Management
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
SaaS-First	and	Hybrid	Deployment	Models
Leverage	Existing	On-Premises	IAM	Investments
Single	Sign-on
Authentication
(SaaS-first	model)
CA	Identity	Service
User	provisioning	and	
deprovisioning
Single	Sign-on
Rogue	and	orphan	account	
detection	and	remediation
CA	Single	Sign-On
On-premises	apps
SaaS Apps
Active	directory
People	source
(optional)
Single	
Sign-on
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
User	Provisioning
Deep	and	Bi-Directional	Provisioning	Integrations
Automate	the	provisioning	and	deprovisioning
of	user	accounts	in	your	
SaaS apps	with	business	friendly rules
Go	deeper	to	manage	the	entitlements	
(groups,	roles,	permissions)	of	your	users
Get	visibility into	existing	accounts	and	
entitlements
Detect	and	remediate	orphan	and	rogue	
accounts
Leverage	predefined	integrations	that	
understand	the	specific	requirements of	
the	target	application
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Single	Sign-On
Unified	Launchpad	Leverages	On-premises	Investments
Rich	out-of-the-box	integrations and a	custom	
SAML connector	enable SSO	to	hundreds	of	
applications	in	minutes
Authenticate	users	using	a	strong	password	
supplemented	by	two-factor	authentication
Reduce	help	desk	overhead	with	self-service	
password	management	and forgotten	
password	recovery
Give	your	users	the	ease	and	convenience	of	
secure	Single	Sign-On	to	SaaS and	on-
premises	apps	with	the	Unified Launchpad	
and CA	SSO	integration
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Identity	Lifecycle	Management
Rule-Based	Provisioning	and	Access	Management
Automated	rule-based	provisioning	and	
deprovisioning of	accounts	with	
entitlements
Ability	to	designate an	application	as	the	
authoritative	people	source
Self-service and	administrative	profile	
management
Administrative	authorization	model	
enables	delegation	of	app	ownership
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Benefits
Reduce	cloud	attack	surface	with	dynamic	provisioning	and	
bidirectional	integrations	minimizing	the	risk	of	over-privileged	
and	orphan	accounts
Improve	workforce	productivity	with	a	dynamic	application	
Launchpad	and	seamless	single	sign-on	across	hybrid	
environments
Improve	business	agility	and	time	to	value	with	fast	and	secure	
rollout	of	cloud	applications	and	rapid	integration	with	on-
premises	investments
3
Security
Agility
User	
Experience
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Key	Benefits
Bidirectional	integrations simplify	account	discovery	and	
reconciliation,	and	enable	orphan	account	detection	and	
remediation
A	superior	user	experience	makes	delegation	of	app	ownership	
to	business	users	possible,	empowering	app	owners	to	onboard	
and	secure	access	to	apps	in	minutes	
Dynamic	integration	with	CA	SSO	enables	agility	and	rapid	time	
to	value	in	enabling	a	consumer	grade	workforce	experience
3
Security
Agility
User	
Experience
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Administrator
• Account	reconciliation	
• SAML	Applications
• CA	SSO	integration
End	User
• Launchpad
• Multifactor	Authentication
App	Owner
• Application	onboarding
• Rules
Demo
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
SCX07S Enabling	a	Hybrid	Enterprise	Application	Launch	Pad 11/16/2016	at	04:30PM
SCT42T
Tech	Talk:	A	"Game	of	Thrones"	introduction	to	identity-
as-a-service
11/17/2016	at	11:30AM
SCT08T Tech	Talk:	Federate	to	an	SAML-Enabled	App	in	Minutes 11/17/2016	at	12:45PM
SCT43T
Tech	Talk:	Make	life	easy	for	your	users	with	a	hybrid	
application	launchpad
11/17/2016	at	3:45PM
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Don’t	Miss	Our	INTERACTIVE
Security	Demo	Experience!
SNEAK
PEEK!
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
We	Want	to	Hear	From	You!
§ IT	Central	is	a	leading	technology	review	site.	CA	has	them	to	
help	generate	product	reviews	for	our	Security	products.
§ ITCS	staff	may	be	at	this	session	now!	(look	for	their	shirts).	If	
you	would	like	to	offer	a	product	review,	please	ask	them	
after	the	class,	or	go	by	their	booth.
Note:
– Only	takes	5-7	mins
– You	have	total	control	over	the	review
– It	can	be	anonymous,	if	required
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
Tech Talk: CA Live API Creator: Modern Integration Strategies—API Integration...
Tech Talk: CA Live API Creator: Modern Integration Strategies—API Integration...Tech Talk: CA Live API Creator: Modern Integration Strategies—API Integration...
Tech Talk: CA Live API Creator: Modern Integration Strategies—API Integration...
 
Applying Data Science to Your Business Problem
Applying Data Science to Your Business ProblemApplying Data Science to Your Business Problem
Applying Data Science to Your Business Problem
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid EnterprisesPre-Con Ed: Privileged Access Management for Hybrid Enterprises
Pre-Con Ed: Privileged Access Management for Hybrid Enterprises
 
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
Tech Talk: Forty2.io: Leveraging Machine Learning to Protect Your Web Applica...
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
 
Securing your API Portfolio with API Management
Securing your API Portfolio with API ManagementSecuring your API Portfolio with API Management
Securing your API Portfolio with API Management
 
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile AppsCase Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
Case Study: How Adobe Secures, Manages and Deploys Enterprise Mobile Apps
 
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSOPre-Con Ed: Multiple Implementation and Access Models for CA SSO
Pre-Con Ed: Multiple Implementation and Access Models for CA SSO
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
 

Destacado

Destacado (20)

Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
 
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part IModernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
 
Tech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity ModelTech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity Model
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
 
Identity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized BenefitsIdentity As A Service Evaluation, Implementation, Realized Benefits
Identity As A Service Evaluation, Implementation, Realized Benefits
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
 
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IIAdvanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IIApplication Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
 
CA IDMS Buffer Tuning
CA IDMS Buffer TuningCA IDMS Buffer Tuning
CA IDMS Buffer Tuning
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and Tuning
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database Navigation
 
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best PracticesAuto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
 
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DBUsing Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
Using Sysview to Monitor and Measure Your CA Datacom Environment – AD and DB
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
 
Advanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUFAdvanced DBA – High Availability for MUF
Advanced DBA – High Availability for MUF
 

Similar a Introduction to Identity-as-a-Service and Secure Access to SaaS

Similar a Introduction to Identity-as-a-Service and Secure Access to SaaS (20)

Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Don't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial ServicesDon't let it PaaS you by - the future of application PaaS in Financial Services
Don't let it PaaS you by - the future of application PaaS in Financial Services
 
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
Case Study: Alliant Technologies Switches to a Utility-Centric Infrastructure...
 
CIO Magazine White Paper
CIO Magazine White PaperCIO Magazine White Paper
CIO Magazine White Paper
 
Intelligent Mainframe Management and the Drive Toward No-Touch Automation
Intelligent Mainframe Management and the Drive Toward No-Touch Automation Intelligent Mainframe Management and the Drive Toward No-Touch Automation
Intelligent Mainframe Management and the Drive Toward No-Touch Automation
 
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
Fred Isbell SAPinsider Projects 2016 Session: Making a Business Case for Clou...
 
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
Tech Vision: Next-Generation Performance Testing With BlazeMeter, Service Vir...
 
The 10 most booming saa s solution providers 2018
The 10 most booming saa s solution providers 2018The 10 most booming saa s solution providers 2018
The 10 most booming saa s solution providers 2018
 
Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...Why Software as a Service (SaaS) requires a new approach to Application Manag...
Why Software as a Service (SaaS) requires a new approach to Application Manag...
 
The ultimate startup guide part2
The ultimate startup guide part2The ultimate startup guide part2
The ultimate startup guide part2
 
Low Code Platforms - Ebook
Low Code Platforms - EbookLow Code Platforms - Ebook
Low Code Platforms - Ebook
 
Idc roi-of-building-apps-on-salesforce
Idc roi-of-building-apps-on-salesforceIdc roi-of-building-apps-on-salesforce
Idc roi-of-building-apps-on-salesforce
 
A Seat at the Table: The Case for Making Professional Services a Strategic Fu...
A Seat at the Table: The Case for Making Professional Services a Strategic Fu...A Seat at the Table: The Case for Making Professional Services a Strategic Fu...
A Seat at the Table: The Case for Making Professional Services a Strategic Fu...
 
Workday s financialapplications_
Workday s financialapplications_Workday s financialapplications_
Workday s financialapplications_
 
Rich internet applications,
Rich internet applications,Rich internet applications,
Rich internet applications,
 
RICH INTERNET APPLICATIONS, PLATFORMS AND TOOLS - A PARADIGM SHIFT IN WEB USE...
RICH INTERNET APPLICATIONS, PLATFORMS AND TOOLS - A PARADIGM SHIFT IN WEB USE...RICH INTERNET APPLICATIONS, PLATFORMS AND TOOLS - A PARADIGM SHIFT IN WEB USE...
RICH INTERNET APPLICATIONS, PLATFORMS AND TOOLS - A PARADIGM SHIFT IN WEB USE...
 
Always-on performance for Always-on Business
Always-on performance for Always-on BusinessAlways-on performance for Always-on Business
Always-on performance for Always-on Business
 
The 10 most innovative saas solution providers september 2017
The 10 most innovative saas solution providers  september 2017The 10 most innovative saas solution providers  september 2017
The 10 most innovative saas solution providers september 2017
 
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information FlowSlaying the Dragons of Agile, DevOps and ITSM Information Flow
Slaying the Dragons of Agile, DevOps and ITSM Information Flow
 

Más de CA Technologies

Más de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Introduction to Identity-as-a-Service and Secure Access to SaaS