Hi [[ session.user.profile.firstName ]]

Enterprise Applications

  • Inherent risks in web, mobile and cloud applications are keeping security practitioners up at night, according to the 2015 SANS survey on application security.

    In this webcast, learn about the growing threats against applications, why applications are so risky, why you need to include application security in your enterprise security program, and how to get started.

    Attend this webcast and be among the first to receive the associated whitepaper written by SANS Dean of Research, Johannes B. Ullrich, Ph.D.
  • Everything is getting digitized - everything is becoming “software empowered”. Who is writing all this software? It is central IT or is it business IT and the third parties they employ? How can central IT ensure that it is relevant this exciting new, software empowered, world?
  • Despite the increasing business pressure to delivery innovative applications, the quality of those applications must be better than ever. Yet the quality of an application depends on the quality of the data used for testing. And creating the right test data, in the right place, at the right time, remains a significant challenge. CA Test Data Manager can help organizations find, create, and provision the data needed for testing — automatically and fast. Test data constraints, which routinely compromise application quality, can be eliminated, accelerating application delivery to market, on time and within budget.

    To better understand the benefits, costs, and risks associated with CA Test Data Manager, Forrester interviewed four existing customers using the solution. The interviews revealed that CA Test Data Manager provided customers with a secure end-to-end test management solution that gave them the flexibility and efficiency required to design and develop test cases to help facilitate bringing IT projects to market faster. The results have been published in a new commissioned Total Economic Impact (TEI) study conducted by Forrester Consulting on behalf of CA Technologies that shows how CA Test Data Manager users could realize a 3-year benefit of $6.9M NPV, ROI of 287%, and a payback period of 6 months.
  • Vonage, which got its start in residential VoIP, is making a major play for business cloud and unified communications customers.

    Channel Partners' Craig Galbraith stopped by the company's office in Scottsdale, Arizona (formerly home to Vonage-acquired Telesphere), to learn more about its growth, the UCaaS market and what it takes to compete in a rapidly growing cloud industry.
  • The new release of Scaled Agile Framework Version 4 features extensive refinements to many elements of the framework, as well as new content and guidance that helps enterprises better organize around value delivery, develop systems that include hardware and software, and improve development, coordination, and delivery of value streams.

    In this webinar, Dean Leffingwell will highlight what’s new in SAFe 4.0:
    • SAFe now supports both software and systems development
    • a new Value Stream Level – including new roles, activities and artifacts – is provided for those building the world’s largest systems
    • Enterprise Kanban systems manage the flow of work across all systems
    • the SAFe Requirements Model has been updated to reflect additional backlog items and to clarify the expression for each
    • built-In Quality practices now support software and systems development
    • and much, much more!

    Register now to hear Dean speak about SAFe 4.0 in this exciting webinar!
  • Flash storage is transforming the data center by enabling new possibilities for big data and all workloads; not only providing performance and consolidation, but now extreme scalability and agility at no compromise. Join SanDisk to learn how flash storage is evolving to enable a new generation of services & applications for an experience never before thought possible!
  • Hear ad-tech leader Sharethrough talk about delivering self-service access to powerful analytics using Snowflake and Looker. Sharethrough Director of Analytics, Joseph Bates will join Snowflake VP of Product and Marketing, Jon Bock and Looker Alliances Analyst, Erin Franz, to chat about the benefits of combining Snowflake’s cloud data warehouse with Looker’s data analytics platform.

    You’ll hear how Sharethrough, a software company that powers in-feed, native ads for premium publishers & brand marketers, has been able to crunch data 300x faster even while giving more users access to analytics on their data.

    In this webinar you’ll learn about the power of combining Snowflake’s elastic architecture and ability to bring together diverse data with Looker’s capabilities that allow users to join and model that data to see the full picture of their business.

    Among the benefits you’ll hear about:

    - In-database scale and performance: how Looker’s direct database interface takes advantage of Snowflake’s power and flexibility

    - Real-time insights: why bringing together diverse data without data movement enables results that are always up to date

    - Integrated access to diverse data: how Looker can take direct advantage of Snowflake’s native support for both structured and semi-structured data (like JSON), even making joins across diverse data possible

    - Self-service access: how Snowflake and Looker make all of your data available to data users in a consistent, user-friendly way without the burden of infrastructure, tuning, and manual optimization
  • In this session we will discuss how state and local government organizations can create modern cloud applications in Microsoft Azure. Learn how you can help modernize your agency and the services you deliver to citizens using:
    •Devices that are sensors, sensor gateways or IoT devices that are publishing events to Event Hub either directly or using Microsoft IoT Hub SDK
    •Gateways - a logical component that groups processing, management of event processors
    •Event processor routes and device actors - Device Actors are chained with various other actor types that are responsible for aggregating, storing, analysis and reporting on device events

    Key takeaways:
    •Initiate a project using Visual Studio Online
    •How an IoT pattern can be used in Azure IoT Hub using a presentation and references to real tenants.
  • DevOps addresses inefficiencies that result from keeping operations and development in separate silos. By connecting development and operations, enterprise IT departments can begin to break down the walls.

    DevOps defines a set of roles and responsibilities focused on reducing risk in IT deployments and projects. The result is maximized automation, elimination of human error, increased consistency, and reduced time spent on the outages, as well as error detection and prevention brought about by unstable environments.

    In this webinar, ODCA president, Gunnar Menzel, will share perspectives on the DevOps concept, focusing on key challenges it can help resolve and the benefits it can provide.
  • Microsoft’s Enterprise Mobility Suite (EMS) allows you to manage devices, applications, and access simply and securely. In this webinar, we will dive deeper into this industry-leading solution and discuss some of the newest features.

    Register for this webcast to learn about:
    •New EMS features, including Advanced Threat Analytics (ATA) and Mobile Application Management (MAM)
    •How to provide remote access and single sign-on to on-premises web applications with Application Proxy
    •Azure AD auditing capabilities, and how you can easily report on security events for any Azure-AD protected application or service

    Register now to watch live or receive notification when this program is available on-demand.
  • APIs have become a strategic necessity for your business because they facilitate agility and innovation. However, the financial incentive associated with this agility is often tempered with the fear of undue exposure of the valuable information that these APIs expose. We will explore in depth the main security concerns API providers and consumers need to consider and how to mitigate them.
  • It’s 2016. If you were born after 1980, you probably don’t remember a time without the Internet and the Web. You reach for your smartphone as your go-to device to answer questions, order pizza, find the score of a football game, and check the address of your child’s next soccer game.

    It should come as no surprise, that you reach for your smart phone or use your browser at work to search for an answer when you have a technical issue. The bottom line is that more and more business users are bypassing the service desk and the self-service portal because they believe they can get answers quicker on the web.

    Could this be the beginning of the end for IT Self Service as we know it? Join George Spalding, EVP, Pink Elephant and Jim Blayney, Sr. Product Marketing Mgr. CA Technologies, as they tackle the thorny and divisive issue of whether it’s actually more productive for users to get their own solutions from the web.
  • Reliance on IT to support business’ strategic goals and objectives are continuing to increase year over year. With this heavy reliance, IT organizations are modernizing and transforming the way they deliver services.

    Join ServiceNow and Okta, as they review the key strategies and solutions for Identity and Service Management that unite and automate IT processes. Watch this webinar and learn how to:

    •Standardize service processes by automating request fulfillment and user provisioning
    •Consolidate redundant legacy IT service tools to a single system of record
    •Secure connections between people and technology
  • Accelerate development to match the speed of digital business.

    Enterprise development teams are faced with continuously building APIs and application back-ends to launch new apps and integrations as business increasingly goes digital. But building a complete back-end including the API, business logic and data access is time-consuming, difficult, and error-prone.

    Join this webinar for a reimagined look into the world of app dev – where entire application back-ends can be created quickly with a point-and-click interface. You'll learn about the new CA Live API Creator and how to:

    - Reduce or eliminate constraints to create and deploy APIs faster than ever.
    - Quickly build standalone application back-ends including API, logic, and data.
    - Securely manage a complex API program with CA API Management.
  • "Alguna vez te preguntaste ¿cómo se puede saber qué usuario realizó una llamada API en particular, cuando se realizó la llamada o qué recursos actuaron? En esta sesión, aprenderá cómo activar AWS CloudTrail para cientos de cuentas de AWS en todas las regiones AWS para asegurar una visibilidad completa de la actividad de la API en todas tus cuentas de AWS. Vamos a demostrar cómo utilizar la búsqueda de CloudTrail en AWS Management Console para solucionar problemas operativos y de seguridad y cómo utilizar la AWS CLI o SDK para integrar tus aplicaciones con CloudTrail .

    También vamos a demostrar cómo se puede monitorear la actividad API específica mediante Amazon CloudWatch y recibir notificaciones por correo electrónico, cuando se produce dicha actividad. Usando CloudTrail búsqueda y CloudWatch alarmas, puedes tomar medidas inmediatas para remediar rápidamente cualquier problema de seguridad o de funcionamiento. También vamos a compartir las mejores prácticas y las secuencias de comandos listas para el uso así como profundizar en nuevas características que le ayudan a configurar capas adicionales de seguridad para los archivos de registro CloudTrail ""."
  • En esta sesión, vamos a presentarles al nuevo servicio AWS WAF. Le mostraremos cómo utilizar el servicio para bloquear las solicitudes Amazon CloudFront que se originan en las direcciones IP que especifique y bloquear solicitudes según su contenido, como por ejemplo los valores de cabecera o consultas SQL. Vamos a profundizar con ejemplos de código de trabajo que automatizan las operaciones de seguridad y demuestran la flexibilidad de ACL web AWS WAF.
  • Esta sesión cubrirá las mejores prácticas AWS Identity y Access Management (IAM) que ayudan a mejorar su situación de seguridad. Cubriremos cómo administrar usuarios y sus credenciales de seguridad. También vamos a explicar por qué borrar las teclas de acceso o de raíz, o al menos cambiarlas regularmente. Usando algunos casos de éxito, vamos a demostrar cuándo elegir entre usuarios IAM y roles de IAM. Por último, vamos a explorar cómo configurar permisos para otorgar privilegios de control de acceso mínimo en una o más de sus cuentas de AWS.
  • La protección de los datos sensibles en la nube por lo general requiere encriptación. La gestión de las claves utilizadas para la encriptación puede ser difícil ya que sus datos sensibles pasan entre los servicios y aplicaciones. AWS ofrece varias opciones para utilizar el cifrado y gestión de claves para ayudar a simplificar la protección de sus datos. Esta sesión le ayudará a entender las funciones que están disponibles y cómo utilizarlas, con énfasis en AWS Servicio de administración de claves y AWS CloudHSM. Además, Adobe Systems Incorporated presentará su experiencia en el uso de servicios de cifrado de AWS para resolver las necesidades de seguridad de datos.
  • La seguridad debe estar a la vanguardia para cualquier negocio online. En AWS, la seguridad es la prioridad número uno. Stephen Schmidt, Vicepresidente y Director de Información de Seguridad, comparte sus conocimientos sobre seguridad en la nube y cómo AWS cumple la demanda de los clientes en tema de seguridad y requisitos legales - y en muchos casos les ayuda a mejorar su situación de seguridad. Esteban, con su experiencia en el FBI y su trabajo con los clientes de AWS en el gobierno, la exploración espacial, la investigación y organización de servicios financieros, comparte una perspectiva de la industria única y valiosa para los tomadores de decisiones de TI de hoy en día.
  • Want the top rated PPM solution, but don't want to spend months implementing? In this webinar, we will demonstrate how to transform your organization in just 30 days by implementing CA PPM.

    More and more companies are finding that informal or decentralized project management just isn’t giving them the information they need to effectively manage their organizations. The need for organization-wide resource, project and portfolio management has led to the decision to implement a PPM solution, but how to harness such a powerful tool on a tight timeframe?

    Join us for a 30 minute webinar where we will explore these topics and more:

    •Why CA PPM is the right solution
    •Can it be done in 30 days?
    •How to prepare for an implementation
    •How a 30 day implementation works
    •Ensuring user adoption in a quick-start implementation
    •Real world success stories

    Who should attend: CIO’s, PMO Leaders. Register today!
  • In recent years, some users have harbored concerns about clouds in general, as well as their use in data warehousing. As the number of user organizations practicing elastic data warehousing on clouds has increased, the track record of success has helped other users get past perceptual barriers and other myths concerning security, multi-tenancy, and interfacing with clouds.

    We all know that data warehouses and users’ best practices for them are changing dramatically today. As users build new data warehouses and modernize established ones, they are turning to cloud-based elastic data warehousing, because the automation of elasticity yields agility, ease of use, scalability, and performance, while reducing maintenance, tuning, capital investments, and other costs.

    This webinar will:

    - Demystify elastic data warehousing by debunking myths about it

    - Define elastic data warehousing and its goals in terms that data management professionals and business users can relate to

    - Show how cloud-based data-driven tools and platforms have proved themselves, such that users are now more comfortable adopting them

    - Discuss the real-world benefits of data warehousing, data management, and analytics on elastic clouds

    - Explain how data warehousing solutions built to leverage the full capabilities of an elastic cloud can satisfy new requirements for analytics, big data, data streams, and multi-structured data
  • Service Virtualization is all about eliminating the constraints to digital innovation. It gives developers and testers the ability to create simulated software application services of production environments in order to code and test against those services without any dependency or duplication of a production environment. This can be especially beneficial in an Agile development and DevOps environment where speed-to-market is critical in delivering new application features and updates more frequently.

    To better understand the benefits, costs, and risks associated with a CA Service Virtualization implementation, CA Technologies commissioned Forrester Consulting to interview several customers with multiple years of experience using CA Service Virtualization. The results have been published in a new Total Economic Impact (TEI) study that shows how CA Service Virtualization users could realize an NPV of $4.5M, ROI of 292%, and payback period of 3 months over a 3 year period.
  • Ever wondered how can you find out which user made a particular API call, when the call was made, and which resources were acted upon? In this session, you will learn how to turn on AWS CloudTrail for hundreds of AWS accounts in all AWS regions to ensure you have full visibility into API activity in all your AWS accounts. We will demonstrate how to use CloudTrail Lookup in the AWS Management Console to troubleshoot operational and security issues and how to use the AWS CLI or SDKs to integrate your applications with CloudTrail.

    We will also demonstrate how you can monitor for specific API activity by using Amazon CloudWatch and receive email notifications, when such activity occurs. Using CloudTrail Lookup and CloudWatch Alarms, you can take immediate action to quickly remediate any security or operational issues. We will also share best practices and ready-to-use scripts, and dive deep into new features that help you configure additional layers of security for CloudTrail log files.