John Hawley, Director, Business Unit Strategy, Security Solutions at CA Technologies
Enterprises are continuing to adopt cloud services, including software, infrastructure and platform as a service. Many times the purchase is done by the business leaders without involving the Security, or even the IT Operations, teams. The business value is great, but IT Security and Operations are struggling to figure out how to secure the new, distributed application environment. In this session we will discuss how to make “identity the new perimeter” and manage control of access to distributed applications. A new model for identity management and authentication can prepare IT and Security to enable access to new business services quickly and efficiently.