Enable and Secure Business Growth 
in the New Application Economy 
A Guide for the Business and the CIO 
Steve Firestone, GM, CA Security 
Rahim Bhatia, SVP, API Management & Security 
SCT01S #CAWorld 
ca Securecenter
3 
© 2014 CA. ALL RIGHTS RESERVED.
4 
© 2014 CA. ALL RIGHTS RESERVED. 
Welcome and Thank You!
5 
© 2014 CA. ALL RIGHTS RESERVED. 
Security & APIs are Critical to the Application Economy 
Source: VansonBorne report commissioned by CA 2014 
Security concerns the top obstacle in app economy 
#1 
Overall IT spend devoted to Security over next 3 years 
>25% 
Security priority for business is improving mobileexperience 
#2 
Leaders saw revenue increase for security- enabled services(18% of Laggards) 
47% 
Organizations with API program within 5 years 
86% 
Leaders open access to APIs(59% of Laggards) 
93%
6 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile App 
YES 
NO 
CONSIDERING 
Polling/Voting 
1 
2 
3 
Is your organization opening your enterprise to consumers via applications?
7 
© 2014 CA. ALL RIGHTS RESERVED. 
Mobile App 
YES 
NO 
CONSIDERING 
Polling/Voting 
1 
2 
3 
Is your organization developing secure mobile applications leveraging APIs?
8 
© 2014 CA. ALL RIGHTS RESERVED.
9 
CA Enables and Protects the New Open Enterprise 
© 2014 CA. ALL RIGHTS RESERVED. 
API 
App 
App 
App 
Data 
Data 
Data
10 
© 2014 CA. ALL RIGHTS RESERVED. 
ACCELERATE SECURE APP DEVELOPMENT 
SIMPLIFY ANYWHERE, ANYTHING ACCESS 
PROTECT DATA WHILE ENABLING BUSINESS 
What you need to be thinking about
11 
© 2014 CA. ALL RIGHTS RESERVED. 
Accelerate Secure App Development 
Externalize data 
Protect APIs with access controls 
Make it easy for developers 
What you 
need to do
12 
© 2014 CA. ALL RIGHTS RESERVED. 
Simplify Anywhere, Anything Access 
CUSTOMERS, EMPLOYEES, PARTNERS 
Enable access from any device 
Coordinate security across Web, mobile, APIs 
Mobile Apps 
APIs/Web Services 
Web Apps 
From the Cloud 
On-Premise 
On Device 
Improve customer adoption/experience/loyalty 
What you 
need to do
13 
© 2014 CA. ALL RIGHTS RESERVED. 
What you 
need to do 
Enable security from end- to-end 
Protect against insider threats 
Defend against external threats 
Protect Data While Enabling Business 
Device 
Geolocation 
Velocity 
User history 
Fraud patterns 
PROTECT MOBILE APP 
STRONGLY AUTHENTICATE USERS 
CONTROL ACCESS TO WEB APPS 
CONTROL ACCESS TO APIS 
SECURE PRIVILEGED IDENTITIES
14 © 2014 CA. ALL RIGHTS RESERVED. 
CA Security 
Solutions to accelerate development & deployment of 
your secure applications while improving engagement 
with customers and protecting all your critical data 
ENABLE AND PROTECT THE OPEN ENTERPRISE IN THE APPLICATION ECONOMY 
Balancing business 
enablement with protection, 
delighting customers 
while instilling trust 
Unified Access End-to-End Security Trusted Business 
Managing user access 
across multiple channels for 
unified user experience 
across web, mobile & APIs 
Controlling access end-to-end 
from the mobile app 
through transmission to the 
API & the backend data
15 
© 2014 CA. ALL RIGHTS RESERVED. 
Announcement 
“CA Technologies recognizes that the application economy demands security in the developer and API world.”* 
“CA’s solutions protect and control user access to the application at the front end, while controlling application access to the API for a more secure experience.”* 
MOBILE API GATEWAY 
API DEVELOPER PORTAL 
SaaS API DEVELOPER PORTAL 
* CA Press release, November 10, 2014
16 
Unified Access 
© 2014 CA. ALL RIGHTS RESERVED. 
Any-App Access 
Multi-Device Universe 
Dynamic Access
17 
Unified Access 
© 2014 CA. ALL RIGHTS RESERVED. 
Multi-Device Universe
18 
© 2014 CA. ALL RIGHTS RESERVED. 
What if your virtual life…
19 
© 2014 CA. ALL RIGHTS RESERVED. 
Moved as fast as you?
20 
© 2014 CA. ALL RIGHTS RESERVED. 
From device… 
…to device
21 
© 2014 CA. ALL RIGHTS RESERVED. Across VendorsAcross Apps
22 
© 2014 CA. ALL RIGHTS RESERVED. 
This is business, 
rewritten by software™
23 
© 2014 CA. ALL RIGHTS RESERVED. 
Discuss Q4 targets with Bob. 
Don’t forget to 
Discuss Q4 targets with Bob. 
Don’t forget to 
cover incentives.
24 
© 2014 CA. ALL RIGHTS RESERVED. 
Dynamic Access 
Joe
25 
© 2014 CA. ALL RIGHTS RESERVED. 
End-to-End Security
26 
© 2014 CA. ALL RIGHTS RESERVED. 
Trusted Business 
User experience 
SaaS Delivery
27 
© 2014 CA. ALL RIGHTS RESERVED. 
TRUSTED BUSINESS 
User experience | SaaSDelivery
28 
© 2014 CA. ALL RIGHTS RESERVED. 
TRUSTED BUSINESS 
User experience | SaaSDelivery
29 
© 2014 CA. ALL RIGHTS RESERVED. 
CA World ‘14 Customer VIP Awards 
Vision 
This award recognizes success in how a customer has developed and moved toward management excellence, while demonstrating a clear vision for how this effort supports the overall success of the enterprise. It celebrates the innovative steps taken to fundamentally change the way business gets done across the enterprise. 
Impact 
This award recognizes results from improved management, especially in terms of productivity, financial benefits, quality improvements, and/or customer satisfaction. It celebrates how an organization has demonstrated a strategic organizational change in the way work gets done, for the better. 
Progress 
This award recognizes implementation success and/or process improvements. Initiatives in this category, even if not complete, will demonstrate excellent planning and/or communications and project success.
30 
© 2014 CA. ALL RIGHTS RESERVED. 
Vision Award 
Rob Yeary, Senior Director, OSS Application Development 
Mila Crowder, Sr. Manager, App Dev Enabling Systems 
Cox Communications is using CA Risk Authentication, along with CA Single Sign-On, to provide convenient, seamless and non-intrusive added security for their customers as they log into the new Cox digital services portal to order new services and expand their relationship with Cox.
31 
© 2014 CA. ALL RIGHTS RESERVED. 
Vision Award 
Dario Trento, Global Outsourcing Governance, Project Manager 
After the success of their CA IAM project, UniCreditis now focused on driving business agility and simplicity. UniCreditwill deploy CA API Management and CA Secure Cloud on-premisein order to empower employees to make better decision more quickly, as well as engage customers and business partners.
32 
© 2014 CA. ALL RIGHTS RESERVED. 
Impact Award 
Kevin Chase, EVP & CIO 
EFH needed to enable their three Lines-of-Business to accelerate business through improved and seamless access to business applications and data by internal users and partners.By enabling the right access to the right data when needed, EFH has improved its business velocity. EFH has not only deployed multiple CA Security solutions as part of a visionary transformation of their business but has done so in one year.
33 
© 2014 CA. ALL RIGHTS RESERVED. 
Progress Award 
Mo Siddiqui, Senior Manager, Architecture and Design 
Rogers integrates CA API Management with CA Identity Manager to manage their customers’ identities and entitlements and provide automated provisioning for over 6 million Rogers customers, enabling them to access new content and services.
34 
© 2014 CA. ALL RIGHTS RESERVED. 
Partner Technologies 
8K Miles Software 
Radiant Logic 
CoreBlox 
Axiomatics 
Digital Defense 
Bio-Key Int. 
SimeioSolutions 
IDMLogicHoldings 
Telesign 
Citrix 
InnomindsSoftware 
Mycroft 
Cognizant 
ObserveIT
35 © 2014 CA. ALL RIGHTS RESERVED. 
CA Securecenter 
Mobile Security 
Single Sign On 
Strong 
Authentication 
Identity Management 
& Governance 
Privileged Identity 
Management 
API Management 
Payment Security 
Strong 
Authentication 
CA Security Innovations 
Internet 
of Things 
CA on CA: 
Security in GIS 
Enterprise Mobility 
Management 
Cloud IAM
36 © 2014 CA. ALL RIGHTS RESERVED. 
CA Securecenter 
Mobile Security 
Single Sign On 
Strong 
Authentication 
Identity Management 
& Governance 
Privileged Identity 
Management 
API Management 
Payment Security 
Strong 
Authentication 
CA Security Innovations 
Internet 
of Things 
CA on CA: 
Security in GIS 
Enterprise Mobility 
Management 
Cloud IAM
37 
© 2014 CA. ALL RIGHTS RESERVED. 
For More Information 
To learn more about Security, please visit: 
http://bit.ly/10WHYDm 
Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page 
Security
38 
© 2014 CA. ALL RIGHTS RESERVED. 
For Informational Purposes Only 
© 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. 
This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. 
Terms of this Presentation

Enable and Secure Business Growth in the New Application Economy

  • 1.
    Enable and SecureBusiness Growth in the New Application Economy A Guide for the Business and the CIO Steve Firestone, GM, CA Security Rahim Bhatia, SVP, API Management & Security SCT01S #CAWorld ca Securecenter
  • 2.
    3 © 2014CA. ALL RIGHTS RESERVED.
  • 3.
    4 © 2014CA. ALL RIGHTS RESERVED. Welcome and Thank You!
  • 4.
    5 © 2014CA. ALL RIGHTS RESERVED. Security & APIs are Critical to the Application Economy Source: VansonBorne report commissioned by CA 2014 Security concerns the top obstacle in app economy #1 Overall IT spend devoted to Security over next 3 years >25% Security priority for business is improving mobileexperience #2 Leaders saw revenue increase for security- enabled services(18% of Laggards) 47% Organizations with API program within 5 years 86% Leaders open access to APIs(59% of Laggards) 93%
  • 5.
    6 © 2014CA. ALL RIGHTS RESERVED. Mobile App YES NO CONSIDERING Polling/Voting 1 2 3 Is your organization opening your enterprise to consumers via applications?
  • 6.
    7 © 2014CA. ALL RIGHTS RESERVED. Mobile App YES NO CONSIDERING Polling/Voting 1 2 3 Is your organization developing secure mobile applications leveraging APIs?
  • 7.
    8 © 2014CA. ALL RIGHTS RESERVED.
  • 8.
    9 CA Enablesand Protects the New Open Enterprise © 2014 CA. ALL RIGHTS RESERVED. API App App App Data Data Data
  • 9.
    10 © 2014CA. ALL RIGHTS RESERVED. ACCELERATE SECURE APP DEVELOPMENT SIMPLIFY ANYWHERE, ANYTHING ACCESS PROTECT DATA WHILE ENABLING BUSINESS What you need to be thinking about
  • 10.
    11 © 2014CA. ALL RIGHTS RESERVED. Accelerate Secure App Development Externalize data Protect APIs with access controls Make it easy for developers What you need to do
  • 11.
    12 © 2014CA. ALL RIGHTS RESERVED. Simplify Anywhere, Anything Access CUSTOMERS, EMPLOYEES, PARTNERS Enable access from any device Coordinate security across Web, mobile, APIs Mobile Apps APIs/Web Services Web Apps From the Cloud On-Premise On Device Improve customer adoption/experience/loyalty What you need to do
  • 12.
    13 © 2014CA. ALL RIGHTS RESERVED. What you need to do Enable security from end- to-end Protect against insider threats Defend against external threats Protect Data While Enabling Business Device Geolocation Velocity User history Fraud patterns PROTECT MOBILE APP STRONGLY AUTHENTICATE USERS CONTROL ACCESS TO WEB APPS CONTROL ACCESS TO APIS SECURE PRIVILEGED IDENTITIES
  • 13.
    14 © 2014CA. ALL RIGHTS RESERVED. CA Security Solutions to accelerate development & deployment of your secure applications while improving engagement with customers and protecting all your critical data ENABLE AND PROTECT THE OPEN ENTERPRISE IN THE APPLICATION ECONOMY Balancing business enablement with protection, delighting customers while instilling trust Unified Access End-to-End Security Trusted Business Managing user access across multiple channels for unified user experience across web, mobile & APIs Controlling access end-to-end from the mobile app through transmission to the API & the backend data
  • 14.
    15 © 2014CA. ALL RIGHTS RESERVED. Announcement “CA Technologies recognizes that the application economy demands security in the developer and API world.”* “CA’s solutions protect and control user access to the application at the front end, while controlling application access to the API for a more secure experience.”* MOBILE API GATEWAY API DEVELOPER PORTAL SaaS API DEVELOPER PORTAL * CA Press release, November 10, 2014
  • 15.
    16 Unified Access © 2014 CA. ALL RIGHTS RESERVED. Any-App Access Multi-Device Universe Dynamic Access
  • 16.
    17 Unified Access © 2014 CA. ALL RIGHTS RESERVED. Multi-Device Universe
  • 17.
    18 © 2014CA. ALL RIGHTS RESERVED. What if your virtual life…
  • 18.
    19 © 2014CA. ALL RIGHTS RESERVED. Moved as fast as you?
  • 19.
    20 © 2014CA. ALL RIGHTS RESERVED. From device… …to device
  • 20.
    21 © 2014CA. ALL RIGHTS RESERVED. Across VendorsAcross Apps
  • 21.
    22 © 2014CA. ALL RIGHTS RESERVED. This is business, rewritten by software™
  • 22.
    23 © 2014CA. ALL RIGHTS RESERVED. Discuss Q4 targets with Bob. Don’t forget to Discuss Q4 targets with Bob. Don’t forget to cover incentives.
  • 23.
    24 © 2014CA. ALL RIGHTS RESERVED. Dynamic Access Joe
  • 24.
    25 © 2014CA. ALL RIGHTS RESERVED. End-to-End Security
  • 25.
    26 © 2014CA. ALL RIGHTS RESERVED. Trusted Business User experience SaaS Delivery
  • 26.
    27 © 2014CA. ALL RIGHTS RESERVED. TRUSTED BUSINESS User experience | SaaSDelivery
  • 27.
    28 © 2014CA. ALL RIGHTS RESERVED. TRUSTED BUSINESS User experience | SaaSDelivery
  • 28.
    29 © 2014CA. ALL RIGHTS RESERVED. CA World ‘14 Customer VIP Awards Vision This award recognizes success in how a customer has developed and moved toward management excellence, while demonstrating a clear vision for how this effort supports the overall success of the enterprise. It celebrates the innovative steps taken to fundamentally change the way business gets done across the enterprise. Impact This award recognizes results from improved management, especially in terms of productivity, financial benefits, quality improvements, and/or customer satisfaction. It celebrates how an organization has demonstrated a strategic organizational change in the way work gets done, for the better. Progress This award recognizes implementation success and/or process improvements. Initiatives in this category, even if not complete, will demonstrate excellent planning and/or communications and project success.
  • 29.
    30 © 2014CA. ALL RIGHTS RESERVED. Vision Award Rob Yeary, Senior Director, OSS Application Development Mila Crowder, Sr. Manager, App Dev Enabling Systems Cox Communications is using CA Risk Authentication, along with CA Single Sign-On, to provide convenient, seamless and non-intrusive added security for their customers as they log into the new Cox digital services portal to order new services and expand their relationship with Cox.
  • 30.
    31 © 2014CA. ALL RIGHTS RESERVED. Vision Award Dario Trento, Global Outsourcing Governance, Project Manager After the success of their CA IAM project, UniCreditis now focused on driving business agility and simplicity. UniCreditwill deploy CA API Management and CA Secure Cloud on-premisein order to empower employees to make better decision more quickly, as well as engage customers and business partners.
  • 31.
    32 © 2014CA. ALL RIGHTS RESERVED. Impact Award Kevin Chase, EVP & CIO EFH needed to enable their three Lines-of-Business to accelerate business through improved and seamless access to business applications and data by internal users and partners.By enabling the right access to the right data when needed, EFH has improved its business velocity. EFH has not only deployed multiple CA Security solutions as part of a visionary transformation of their business but has done so in one year.
  • 32.
    33 © 2014CA. ALL RIGHTS RESERVED. Progress Award Mo Siddiqui, Senior Manager, Architecture and Design Rogers integrates CA API Management with CA Identity Manager to manage their customers’ identities and entitlements and provide automated provisioning for over 6 million Rogers customers, enabling them to access new content and services.
  • 33.
    34 © 2014CA. ALL RIGHTS RESERVED. Partner Technologies 8K Miles Software Radiant Logic CoreBlox Axiomatics Digital Defense Bio-Key Int. SimeioSolutions IDMLogicHoldings Telesign Citrix InnomindsSoftware Mycroft Cognizant ObserveIT
  • 34.
    35 © 2014CA. ALL RIGHTS RESERVED. CA Securecenter Mobile Security Single Sign On Strong Authentication Identity Management & Governance Privileged Identity Management API Management Payment Security Strong Authentication CA Security Innovations Internet of Things CA on CA: Security in GIS Enterprise Mobility Management Cloud IAM
  • 35.
    36 © 2014CA. ALL RIGHTS RESERVED. CA Securecenter Mobile Security Single Sign On Strong Authentication Identity Management & Governance Privileged Identity Management API Management Payment Security Strong Authentication CA Security Innovations Internet of Things CA on CA: Security in GIS Enterprise Mobility Management Cloud IAM
  • 36.
    37 © 2014CA. ALL RIGHTS RESERVED. For More Information To learn more about Security, please visit: http://bit.ly/10WHYDm Insert appropriate screenshot and textoverlayfrom following“More Info Graphics” slide here; ensure it links to correct page Security
  • 37.
    38 © 2014CA. ALL RIGHTS RESERVED. For Informational Purposes Only © 2014CA. All rights reserved. All trademarks referenced herein belong to their respective companies. This presentation provided at CA World 2014 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutionssoactual results may vary. Terms of this Presentation