Educational webcasts for the IT Security Professional
The CA Technologies IT Security solutions help CSOs and security professionals move the business forward by facilitating growth, innovation and collaboration, and driving IT operational excellence, all while managing risk and compliance. CA Technologies will show you how businesses can gain the control they need over physical, virtual, and cloud IT environments—so they can protect the business and the information on which it relies.
A Dream or Necessity? Achieving Unified Web and API Access (Global Event)Cheng Jang Thye, Principal Business Tech Architect for CA TechnologiesThe multi-channel organization is here and you can thank the Application Programming Interface (API). While the Web has served as the primary form of user engagement, the mobile channel has expanded how organizations reach consumers and employees, with the API acting as the fundamental connectivity point. As your organization rolls out multi-channel environments, can you avoid siloed management and security, or are there practical steps you can take to achieve unified access?
Please join Cheng Jang Thye, Principal Business Tech Architect for CA Technologies, to discuss how unified access can be achieved by leveraging your existing web application management investment when deploying API security and management solutions. You will learn the opportunities APIs can provide to your business, the required components of an API solution, how CA Layer 7 API solutions integrate with CA SiteMinder web access solutions, and get an overview of the recently available policy integration with the release of CA Layer 7 API Gateway 8.0.Read more >
When requesting access to systems or applications, business users need to know the potential risks of such actions to enable compliance with internal business policies and government regulations. The cost for non-compliance can be high. As a result, organizations are seeking solutions that combine automated Segregation of Duties (SoD) risk analysis with robust capabilities for user provisioning and user management, to manage user access and prevent out-of-policy activities.
Please join Bob Burgess, Solution Strategy Advisor at CA Technologies, and James Rice, Director of Customer Solutions at Greenlight Technologies, to learn how you can obtain better visibility into your SAP/GRC environments and manage the risk of over-privileged users and SoD violations.
Session Hijacking is a serious security threat where the cookie used to authenticate a user to a remote server is stolen and then used by an attacker to assume the victim’s identity and take over their session. Since the user session appears to be valid, it is difficult to detect once the hijacking has occurred, so pre-emptive steps need to be taken upfront.
Please join Chris Wraight, Director, Security Solutions and Aaron Berman, Security Solutions Advisor at CA Technologies to learn why this security gap exists and explore solutions to assist in preventing such attacks.
Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business, intellectual property and customer privacy continues to present new opportunities and challenges for security professionals.
As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, what we learnt from them and also predict what we expect will happen in the world of identity and cyber-security in the next 12 months.
Our takeaways and predictions are based on gathering thoughts and ideas from many customers, practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear and practical guide for your enterprise security strategy and roadmap.
Please join Reuben Koh, Director, Security Strategy for CA Technologies, for a thought provoking, actionable discussion on where we’ve come and where we are heading.
Quite often what makes an organization unique can be found in the volumes of data it has stored and hidden from the outside world. But while access is prevented and data is protected, new revenue streams are prohibited. Please join us to learn how securely externalizing your core Big Data assets through a Secure API Data Lens can result in new business models and revenue streams never attainable until now.
When it comes to managing privileged identities, it’s ok to be a “control freak” in order to prevent harmful results such as data loss and destruction, malicious damage, fines, and lawsuits. Auditors are also requiring that their clients proactively demonstrate the ability to control privileged users and report on their activities. Managing passwords for privileged accounts is a starting point, but there is more you can do to help secure your IT environment.
In this webcast, join Russell Miller, Director, Security Solutions and Steven McCullar, Advisor, Solution Strategy, Security Solutions for CA Technologies, to learn how you can help ensure that your environments are protected by implementing least privilege access and fine-grained access controls.
Webinar 2 builds upon the information presented in the Webinar 1: SaaS Versus On-Premise…What Are My Options? In Webinar 2, we take a deeper dive into the decision making process that leads to the right model for your enterprise systems or utility services.
Some of the issues that need analysis when making a cloud/no-cloud decision include analysis of the costs, understanding the use cases, looking at security and governance, and the value of time-to-market and agility. The idea is to weigh the positives and the negatives, understand the core metrics, and then make a decision based upon the best available information.
We’ll explore how to understand the deployment realities when considering an on-premises versus SaaS solution. We’ll suggest a decision model and step-by-step process to define the core metrics for the decision, and provide some helpful experiences from the trenches from those who have made these critical calls in the last several years.
Topics covered include:
•Step 1: Comparing Costs
•Step 2: Understanding Use Cases
•Step 3: Considering Security and Governance
•Step 4: Considering Time-to-Market and Agility
•Step 5: Pulling the Trigger
•Step 6: Considering Operations
APIs are quickly becoming the hacker’s new favorite attack vector. Why wouldn’t they? They offer a direct path to critical information and business services that can be easily stolen or disrupted. But there’s a new wrinkle. As demonstrated during the widely publicized Snapchat data breach, a private API can be exploited just as easily as a public API. So what measures can you take to strengthen your security position?
In this webcast, Francois Lascelles, Chief Architect, CA Technologies Layer 7, will discuss recent high profile API data breaches, the top 5 API security vulnerabilities that are most impactful to today’s enterprise, and the protective measures that need to be taken to mitigate API and business exposure.
The growth of cloud computing is due largely to the growth of software-as-a-service (SaaS). The SaaS consumption model, in many cases, provides more agility and cost efficiencies than traditional methods of consuming software. While SaaS is indeed a consideration, there are instances where it’s just not a fit. Recognizing when to go SaaS and when to stay on-premise is a problem that enterprises will wrestle with now and into the future, as cloud computing continues to gather momentum.
The truth is that the SaaS model is not always a good fit, and neither are traditional approaches to software deployment and operations. You have to consider many options, requirements, and technologies to understand what’s right for your specific needs.
In this Webinar, we’ll take the mystery out of how to select SaaS-delivered solutions or traditional on-premise approaches. We’ll explore the requirements to consider, and the types of technologies available.
Topic covered, include:
•Defining the options, including SaaS and on-premise
•Understanding the technology options
•Understanding the cost advantages
•Charting a path to the right decision
As the ability to adapt to new trends such as social identity, SaaS and mobile users becomes a competitive differentiator, many organizations are leveraging identity federation to both support new customer engagement and control the sharing of information externally. In this webcast, featured Gartner analyst Mary Ruddy will discuss five key patterns that are driving current trends in identity federation, the effect of those patterns on broader identity and access management (IAM) architecture, and how organizations should be adapting to these changes. In this session, you will learn how to identify which situations would benefit most from identity federation, how to determine the appropriate authentication level and the role that federation standards such as OAuth and OpenID Connect play in your identity federation deployment.
Merritt Maxim, Director, Security Solutions for CA Technologies will also provide key insight on how identity federation can help securely enable your business in the new ‘open’ economy and what you can do to control shared information while maintaining availability and accessibility.
Opening up the enterprise to enable new, revenue generating ways of engaging employees, partners, and customers, while still protecting the business and privacy continues to present new opportunities and evolve in the marketplace. As 2014 starts out, it’s time to review which important trends have emerged or shifted in the last year, and predict what we expect will happen in the world of identity and cyber-security in the coming year. Our takeaways and predictions are based on gathering thoughts and ideas from many practitioners and industry experts, and synthesizing it down to a key set of insights that provide a clear understanding of where the world of identity and security is going. Please join us for a thought provoking, actionable discussion on where we’ve come and where we are heading in the identity marketplace.