SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
CA Identity Suite – Extending Identity
Management to the Business User
2 © 2015 CA. ALL RIGHTS RESERVED.
The World of Identity
Management & Governance
has gotten more complex
3 © 2015 CA. ALL RIGHTS RESERVED.
And, Identity Management is shifting from being
IT-centric to Business-centric…
This evolution creates new requirements for
capabilities and user experience
IT-aware users
Business users & Customers
(Often mobile)
4 © 2015 CA. ALL RIGHTS RESERVED.
Key Demands of the Business User
Support my
device
Business
friendly
Decision
support tools
Unified interface
Productivity
Customized
experience
4
5 © 2015 CA. ALL RIGHTS RESERVED.
CA Changes the Game by Bridging the Gap
between IT and Business Users
IT-aware users Business users
6 © 2015 CA. ALL RIGHTS RESERVED.
Convenient, intuitive, business-oriented user experience
A One-Stop Shop for business user access
to all identity services
User experience that is specifically
designed for business. Uses terms that
business users understand.
– Business-oriented proactive analytical
& advisory tools
– Personalized dashboards
– Business-oriented resource names
7 © 2015 CA. ALL RIGHTS RESERVED.
Automated Provisioning
Wizard-based on-boarding of new users
(including self-registration), such as employees,
business partners and contractors.
Manages identities, roles, and policies across
on-prem & cloud applications
Customizable workflows support the unique
way each organization approves, and schedules
these activities.
Broad set of connectors to target systems
8 © 2015 CA. ALL RIGHTS RESERVED.
Access Requests
Easy-to-use access request process through an
intuitive 'Shopping Cart‘ experience.
Conveniently request roles and entitlements
from a Business Entitlements Catalog, view
current access privileges, track the status of
previous requests, copy users permissions,
compare users and select from saved favorites.
All requests can be checked for segregation of
duties compliance.
9 © 2015 CA. ALL RIGHTS RESERVED.
Business Entitlement Catalog - Moving from
IT terms….. ….to Business terms
DICTIONARY
Internet
Access
SAP
CRM
HR
Portal
Online
Payroll
VPN_TANT01_GROUP2
SVRFin33_Access
SAP_View_Rep_BZ50
SAP_Portal_M45
HR_SEC_SYSJA01_RPTA
IM_PRVN_Portal_002
BIZOBJ_AUDIT_J100I
AD_WEBSEC_INNET
AD_GROUP_002_All
IT-Centric Business-Centric
10 © 2015 CA. ALL RIGHTS RESERVED.
Expedite, track, manage and control your
requests through an intuitive ‘social
network’ like experience.
Improves manager productivity and
provides audit reporting of approvals
Request Tracking
11 © 2015 CA. ALL RIGHTS RESERVED.
Certification Campaigns
Simplifies and centralizes all necessary
compliance activities in one place.
Business entitlements catalogue
simplifies certifications
Risk analysis highlights risky access to:
– enable real-time remediation
– improve policy enforcement
– Simplify regulatory compliance.
CRM
Customer
view
Update HR
reports
View
Billing
Reports
12 © 2015 CA. ALL RIGHTS RESERVED.
Risk Analyzer & Simulator
RISK ANALYZER is based on an advanced,
robust rules engine that calculates user
risk score in real time:
– Calculates and displays users' risk scores and
alerts whenever it detects a risky user.
– Updates risk scores continually based on
changes to user privileges, user attributes
and other contextual factors.
– Simulates in real time the user's risk score
changes in the context of access requests.
13 © 2015 CA. ALL RIGHTS RESERVED.
Launchpad gives the user quick links to other web
applications, internal or external
– Clicking on a link will redirect the user to the
application in another tab/window
CA Identity Portal offers authorization level to
expose Launchpad applications to specific users
based on their permissions
– Users can request for access to web applications and
then get a quick link to open the application
Applications Launchpad
14 © 2015 CA. ALL RIGHTS RESERVED.
Identity on-the-go
Managers can manage identities and
entitlements on-the-go.
Allows the organization to support BYOD
policy, and to improve efficiency,
responsiveness, and user satisfaction
while reducing security risks.
15 © 2015 CA. ALL RIGHTS RESERVED.
But, the IT user has needs too!
Policy
enforcement
Low TCO
Application
connectivity
Fast
provisioning
Fast ROI
Compliance
reporting & auditing
15
16 © 2015 CA. ALL RIGHTS RESERVED.
Business-Oriented
User Experience
CA Identity Management & Governance Capabilities
IDENTITY
MANAGEMENT
& GOVERNANCE
LIFECYCLE
The CA Identity Suite
enables you to manage
the entire user identity
lifecycle, across both on-
premise and Web apps...
…with a simple, intuitive,
business-oriented user
experience
17 © 2015 CA. ALL RIGHTS RESERVED.
Business-Oriented
User Experience
CA Identity Management & Governance Capabilities
IDENTITY
MANAGEMENT
& GOVERNANCE
LIFECYCLE
CAPABILITIES
 Automated provisioning
 User self-service
 Supports on-premise & cloud apps
 Deployment tools
BUSINESS VALUE
 Increased efficiencies
 Reduced Help Desk costs
 Flexibility for your cloud adoption
 Customization without coding
Management
Broad support for
provisioning connectors to
enterprise apps, along with
unique deployment tools….
Helps simplify and reduce the
cost of deployment and
reduce overall Total Cost of
Ownership.
Read the Identity Manager Brief
18 © 2015 CA. ALL RIGHTS RESERVED.
Business-Oriented
User Experience
CA Identity Management & Governance Capabilities
IDENTITY
MANAGEMENT
& GOVERNANCE
LIFECYCLE
CAPABILITIES
 Role mining & analytics
 Privilege clean-up
 Automated access certifications
 Access policy enforcement
BUSINESS VALUE
 Simplify user management
 Highlights improper entitlements
 Simplified compliance
 Prevents policy violations
Governance
Comprehensive role mining
and ongoing privilege
cleanup…
Helps simplify management
and improve the quality of
your user entitlements.
Read the Identity Governance Brief
19 © 2015 CA. ALL RIGHTS RESERVED.
CA Identity Suite
Designed with your IT & Business needs in mind
Deep Provisioning
Access Requests
Certifications
Role Analytics
Self-Service
Access Governance
Privilege Cleanup
Risk Analysis
Policy Enforcement
Deployment Tools
Capabilities
BusinessIT
CA Identity Suite provides capabilities to meet the current
and ongoing needs of both IT staff and Business users…
20 © 2015 CA. ALL RIGHTS RESERVED.
CA Identity Suite
Designed with your IT & Business needs in mind
Great User Experience
Improved Productivity
Customized Experience
Mobile Access
Easy access to all my apps
Identity automation
Reduced entitlement risk
Reduced TCO
Reduced Help Desk costs
Simplified Compliance
Benefits
BusinessIT
…to provide an excellent user experience, resulting in increased
use of identity services, and improved user satisfaction.
21 © 2015 CA. ALL RIGHTS RESERVED.
Why CA Identity Suite?
Business-oriented
user experience
Business-oriented application
simplifies use and improves user
satisfaction. A Business Entitlements
Catalogue greatly simplifies access
requests by business users.
Reduced TCO through
streamlined deployment
Xpress tools simplify connectivity to
homegrown apps, enable business policy
definition without coding, and
streamline migration between
Development-Test-Production
One-stop-shop for access
to all identity services
Simplified, centralized interface
improves productivity and user
satisfaction/loyalty
Risk analysis &
simulation
Advanced, robust rules engine that
calculates user risk score in real time,
and generates alerts on a risky user
access request.
Secures on-premise and
cloud applications
Centralized control of identities,
users, roles and policies across
on-premise and cloud applications.
Proven
Scalability
Supports many large, complex
environments today. Can address
your needs as they grow.
22 © 2015 CA. ALL RIGHTS RESERVED.
Industry awards for CA Identity Management
CA Identity Manager
Best Identity Management Solution of 2015
Winner in 2013, Finalist in 2014
"The Reader Trust Award is unique
because it represents the voice of
the people who are using these
products and services every day.
CA Identity Manager was chosen
as the Best Identity Management
Solution winner for its ability to
meet and exceed the needs of its
customers."
Illena Armstrong, Vice President,
editorial, SC Magazine
23 © 2015 CA. ALL RIGHTS RESERVED.
Want to learn more?
Identity Management
& Governance ebook:
Identity Management
Buyer’s Guide:
Identity Suite
Datasheet:
Read Ebook Read Guide Read Datasheet
24 © 2015 CA. ALL RIGHTS RESERVED.
Legal Notice
Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No
unauthorized use, copying or distribution permitted.
THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO
THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION,
ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or
damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or
lost data, even if CA is expressly advised of the possibility of such damages.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations
of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any
product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this
presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation,
CA may make such release available (i) for sale to new licensees of such product; and (ii) in the form of a regularly scheduled major product release. Such
releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available
basis.
The information and results illustrated here are based upon each identified customer’s unique experiences with the referenced software product in a variety
of environments, which may include production and non-production environments. Past performance of the software products in such environments is not
necessarily indicative of the future performance of such software products in identical, similar or different environments.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
 
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
Centralized, Convenient Application Access–the One Stop Shop for Identity Ser...
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
 
Tech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity ModelTech Talk: Privileged Account Management Maturity Model
Tech Talk: Privileged Account Management Maturity Model
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
 
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
 
Server Monitoring Battles
Server Monitoring BattlesServer Monitoring Battles
Server Monitoring Battles
 
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
 
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced AuthenticationConvenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App EconomyTech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
 

Andere mochten auch

Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
webhostingguy
 
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod Upadhyay
 
Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Tech
vineet jain
 

Andere mochten auch (18)

How to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity SuiteHow to Leverage New Capabilities in the CA Identity Suite
How to Leverage New Capabilities in the CA Identity Suite
 
Quest One Identity Management Summary
Quest One Identity Management   SummaryQuest One Identity Management   Summary
Quest One Identity Management Summary
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-final
 
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ NeevAdobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
Adobe Experience Manager (Adobe CQ) Capabilities and Experience @ Neev
 
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
Case Study - Largest Brazilian Credit and Debtor Operator, A ForgeRock OpenAM...
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
Windows Host Access Management with CA Access Control
Windows Host Access Management with CA Access ControlWindows Host Access Management with CA Access Control
Windows Host Access Management with CA Access Control
 
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)Amod_MCA_M.tech_EXPERT IN CA Security tool _total   9Years+_Exp (2)
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
 
Vineet_Resume_Tech
Vineet_Resume_TechVineet_Resume_Tech
Vineet_Resume_Tech
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
 
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic SolutionsBe the Data Hero in Your Organization with SAP and CA Analytic Solutions
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
 
McKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & AutomationMcKesson Case Study: Pharmacy Systems & Automation
McKesson Case Study: Pharmacy Systems & Automation
 
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
 
THE FORGEROCK PLATFORM BIG PICTURE
THE FORGEROCK PLATFORM BIG PICTURETHE FORGEROCK PLATFORM BIG PICTURE
THE FORGEROCK PLATFORM BIG PICTURE
 
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through ScriptingWebinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
Webinar: Extend The Power of The ForgeRock Identity Platform Through Scripting
 
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
 
The Future is Now: What’s New in ForgeRock Access Management
The Future is Now: What’s New in ForgeRock Access Management The Future is Now: What’s New in ForgeRock Access Management
The Future is Now: What’s New in ForgeRock Access Management
 

Ähnlich wie CA Identity Suite – Extending Identity Management to the Business User

TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
Shobhit Srivastava
 

Ähnlich wie CA Identity Suite – Extending Identity Management to the Business User (20)

Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Creating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your CustomersCreating an Omnichannel Experience for Your Customers
Creating an Omnichannel Experience for Your Customers
 
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
 
Mobility, Self Service and Knowledge Management: A Modern Approach to End-Use...
Mobility, Self Service and Knowledge Management: A Modern Approach to End-Use...Mobility, Self Service and Knowledge Management: A Modern Approach to End-Use...
Mobility, Self Service and Knowledge Management: A Modern Approach to End-Use...
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
Mainframe Software Management Made Easier
Mainframe Software Management Made EasierMainframe Software Management Made Easier
Mainframe Software Management Made Easier
 
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
Case Study: The Business-Focused CIO—Leveraging IT Services for Strategic Adv...
 
Connect 2017 catalyst accelerator for banking
Connect 2017 catalyst accelerator for bankingConnect 2017 catalyst accelerator for banking
Connect 2017 catalyst accelerator for banking
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...How to Get the Best User Experience for Your Customers With: CA View® / CA De...
How to Get the Best User Experience for Your Customers With: CA View® / CA De...
 
The Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case StudyThe Power and Promise of SaaS: CA Cloud Service Management Case Study
The Power and Promise of SaaS: CA Cloud Service Management Case Study
 
Enable and Secure Business Growth in the New Application Economy
 Enable and Secure Business Growth in the New Application Economy Enable and Secure Business Growth in the New Application Economy
Enable and Secure Business Growth in the New Application Economy
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization Adoption
 
Paggas Technologies - Company Overview Presentation
Paggas Technologies - Company Overview PresentationPaggas Technologies - Company Overview Presentation
Paggas Technologies - Company Overview Presentation
 
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
Domenico Maracci, Stefano Sali - Secure Continuous Delivery - Sicurezza e Dev...
 
Ensuring Effective Service Management in the Application Economy
Ensuring Effective Service Management in the Application EconomyEnsuring Effective Service Management in the Application Economy
Ensuring Effective Service Management in the Application Economy
 
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
Digital Assurance: Develop a Comprehensive Testing Strategy for Digital Trans...
 
Adapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & WinAdapting to Digital Change: Use APIs to Delight Customers & Win
Adapting to Digital Change: Use APIs to Delight Customers & Win
 
TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5TechM Ritter Solution Case Study - V1.5
TechM Ritter Solution Case Study - V1.5
 
Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service Virtualization
 

Mehr von CA Technologies

Mehr von CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

CA Identity Suite – Extending Identity Management to the Business User

  • 1. CA Identity Suite – Extending Identity Management to the Business User
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED. The World of Identity Management & Governance has gotten more complex
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED. And, Identity Management is shifting from being IT-centric to Business-centric… This evolution creates new requirements for capabilities and user experience IT-aware users Business users & Customers (Often mobile)
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED. Key Demands of the Business User Support my device Business friendly Decision support tools Unified interface Productivity Customized experience 4
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED. CA Changes the Game by Bridging the Gap between IT and Business Users IT-aware users Business users
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED. Convenient, intuitive, business-oriented user experience A One-Stop Shop for business user access to all identity services User experience that is specifically designed for business. Uses terms that business users understand. – Business-oriented proactive analytical & advisory tools – Personalized dashboards – Business-oriented resource names
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED. Automated Provisioning Wizard-based on-boarding of new users (including self-registration), such as employees, business partners and contractors. Manages identities, roles, and policies across on-prem & cloud applications Customizable workflows support the unique way each organization approves, and schedules these activities. Broad set of connectors to target systems
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED. Access Requests Easy-to-use access request process through an intuitive 'Shopping Cart‘ experience. Conveniently request roles and entitlements from a Business Entitlements Catalog, view current access privileges, track the status of previous requests, copy users permissions, compare users and select from saved favorites. All requests can be checked for segregation of duties compliance.
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED. Business Entitlement Catalog - Moving from IT terms….. ….to Business terms DICTIONARY Internet Access SAP CRM HR Portal Online Payroll VPN_TANT01_GROUP2 SVRFin33_Access SAP_View_Rep_BZ50 SAP_Portal_M45 HR_SEC_SYSJA01_RPTA IM_PRVN_Portal_002 BIZOBJ_AUDIT_J100I AD_WEBSEC_INNET AD_GROUP_002_All IT-Centric Business-Centric
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED. Expedite, track, manage and control your requests through an intuitive ‘social network’ like experience. Improves manager productivity and provides audit reporting of approvals Request Tracking
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED. Certification Campaigns Simplifies and centralizes all necessary compliance activities in one place. Business entitlements catalogue simplifies certifications Risk analysis highlights risky access to: – enable real-time remediation – improve policy enforcement – Simplify regulatory compliance. CRM Customer view Update HR reports View Billing Reports
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED. Risk Analyzer & Simulator RISK ANALYZER is based on an advanced, robust rules engine that calculates user risk score in real time: – Calculates and displays users' risk scores and alerts whenever it detects a risky user. – Updates risk scores continually based on changes to user privileges, user attributes and other contextual factors. – Simulates in real time the user's risk score changes in the context of access requests.
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED. Launchpad gives the user quick links to other web applications, internal or external – Clicking on a link will redirect the user to the application in another tab/window CA Identity Portal offers authorization level to expose Launchpad applications to specific users based on their permissions – Users can request for access to web applications and then get a quick link to open the application Applications Launchpad
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED. Identity on-the-go Managers can manage identities and entitlements on-the-go. Allows the organization to support BYOD policy, and to improve efficiency, responsiveness, and user satisfaction while reducing security risks.
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED. But, the IT user has needs too! Policy enforcement Low TCO Application connectivity Fast provisioning Fast ROI Compliance reporting & auditing 15
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED. Business-Oriented User Experience CA Identity Management & Governance Capabilities IDENTITY MANAGEMENT & GOVERNANCE LIFECYCLE The CA Identity Suite enables you to manage the entire user identity lifecycle, across both on- premise and Web apps... …with a simple, intuitive, business-oriented user experience
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED. Business-Oriented User Experience CA Identity Management & Governance Capabilities IDENTITY MANAGEMENT & GOVERNANCE LIFECYCLE CAPABILITIES  Automated provisioning  User self-service  Supports on-premise & cloud apps  Deployment tools BUSINESS VALUE  Increased efficiencies  Reduced Help Desk costs  Flexibility for your cloud adoption  Customization without coding Management Broad support for provisioning connectors to enterprise apps, along with unique deployment tools…. Helps simplify and reduce the cost of deployment and reduce overall Total Cost of Ownership. Read the Identity Manager Brief
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED. Business-Oriented User Experience CA Identity Management & Governance Capabilities IDENTITY MANAGEMENT & GOVERNANCE LIFECYCLE CAPABILITIES  Role mining & analytics  Privilege clean-up  Automated access certifications  Access policy enforcement BUSINESS VALUE  Simplify user management  Highlights improper entitlements  Simplified compliance  Prevents policy violations Governance Comprehensive role mining and ongoing privilege cleanup… Helps simplify management and improve the quality of your user entitlements. Read the Identity Governance Brief
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED. CA Identity Suite Designed with your IT & Business needs in mind Deep Provisioning Access Requests Certifications Role Analytics Self-Service Access Governance Privilege Cleanup Risk Analysis Policy Enforcement Deployment Tools Capabilities BusinessIT CA Identity Suite provides capabilities to meet the current and ongoing needs of both IT staff and Business users…
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED. CA Identity Suite Designed with your IT & Business needs in mind Great User Experience Improved Productivity Customized Experience Mobile Access Easy access to all my apps Identity automation Reduced entitlement risk Reduced TCO Reduced Help Desk costs Simplified Compliance Benefits BusinessIT …to provide an excellent user experience, resulting in increased use of identity services, and improved user satisfaction.
  • 21. 21 © 2015 CA. ALL RIGHTS RESERVED. Why CA Identity Suite? Business-oriented user experience Business-oriented application simplifies use and improves user satisfaction. A Business Entitlements Catalogue greatly simplifies access requests by business users. Reduced TCO through streamlined deployment Xpress tools simplify connectivity to homegrown apps, enable business policy definition without coding, and streamline migration between Development-Test-Production One-stop-shop for access to all identity services Simplified, centralized interface improves productivity and user satisfaction/loyalty Risk analysis & simulation Advanced, robust rules engine that calculates user risk score in real time, and generates alerts on a risky user access request. Secures on-premise and cloud applications Centralized control of identities, users, roles and policies across on-premise and cloud applications. Proven Scalability Supports many large, complex environments today. Can address your needs as they grow.
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED. Industry awards for CA Identity Management CA Identity Manager Best Identity Management Solution of 2015 Winner in 2013, Finalist in 2014 "The Reader Trust Award is unique because it represents the voice of the people who are using these products and services every day. CA Identity Manager was chosen as the Best Identity Management Solution winner for its ability to meet and exceed the needs of its customers." Illena Armstrong, Vice President, editorial, SC Magazine
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED. Want to learn more? Identity Management & Governance ebook: Identity Management Buyer’s Guide: Identity Suite Datasheet: Read Ebook Read Guide Read Datasheet
  • 24. 24 © 2015 CA. ALL RIGHTS RESERVED. Legal Notice Copyright © 2015 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or distribution permitted. THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised of the possibility of such damages. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available (i) for sale to new licensees of such product; and (ii) in the form of a regularly scheduled major product release. Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis. The information and results illustrated here are based upon each identified customer’s unique experiences with the referenced software product in a variety of environments, which may include production and non-production environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.