SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
World®
’16
Convenience	and	Security	for	
Banking	Customers
Andrew	Steadman	- Product	Director-Agiliti - Fiserv
SCX50S
SECURITY
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	
of	warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Securing	their	channels,	both	digital	and	staffed,	is	key	for	a	bank	but	that	often	comes	at	the	
price	of	convenience	for	the	bank’s	customer.	
Applying	the	appropriate	level	of	security	at	the	appropriate	time	will	be	both	convenient	for	the	
customer	and	secure	for	the	bank,	satisfying	the	needs	of	both.	We	will	discuss	how	CA	
Advanced	Authentication	and	the	Fiserv	Financial	Crime	and	Risk	Management	solution,	Agiliti,	
allows	banks	to	apply	real	time	risk	assessment	to	determine	the	right	level	of	security	challenge	
to	ensure	the	customer	and	bank	are	protected.
Andrew	
Steadman
Fiserv
Product	Director,	Agiliti
Balancing	Security	and	Convenience	in	Banking
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	problem	were	we	seeking	to	solve?
• Financial	Institution	Customers	interact	across	multiple	channels
• Securely	identifying	customers	has	placed	an	onerous	burden	
on	customers
• ‘Agiliti’	wanted	to	simplify	this	for	customers
• Ever	increasing	compliance	and	onus	on	the	Financial	Institution	to	protect
• PSD2	is	going	to	add	broad	access	requirements
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Making	a	‘Faster	Payments’	transaction
?
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Making	a	‘Faster	Payments’	transaction	- 2 Ways
They	are	different!!
Security	Code
Pay	a	new	
Beneficiary
£250	Limit	for	
1st Payment
No	Limit	for	
2nd Payment
User	ID,
Password	and	PIN
Pay	a	new	
Beneficiary
No	Limit	for
1st Payment
Authorised	by	
Card	Device
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
How	‘Agiliti’	Solves	that	problem
• A	combination	of	components	built	to	a	single	solution
• Services	published	via	a	service	bus	enables	all	channels	
• Real	time	assessment	of	risk	determines	the	level	of	credential	required	by	
the	customer
• User	ID	+	Password
• Temporary	PIN
• One	Time	PIN	delivered	via	SMS
• Cherished	Questions
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Assembling	the	Pieces
Fiserv	Communicator	Advantage
Fiserv	Financial	Crime	Risk	
Management	Platform	(FCRM)
CA	Advanced	Authentication
(CA	AA)
Authentication	Services
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Device	Signatures
• Every	call	to	the	Authentication	Services	carries	a	device	signature
• Generated	by	CA	client	side	libraries	within	Apps
• Generated	by	javascript in	browser
• Value	is	not	store	on	the	device
• Trusted	Devices	are	identified	by	an	Arcot	generated	ID	
which	is	stored	on	the	device
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Typical	Process
Logon
••User	ID
••Static	Password
••Temporary	PIN
••Risk	Analysis	– SMS	
OTP
OTP	required	if	
high	risk
••Sent	to	mobile	device	
known	to	be	
customers
••Dual	factor	
authentication	applied
Customer	
executes	a	
transaction
••Pre	defined	to	have	
permanent	PIN	
required
••User	for	‘high	risk’	
transactions
Transaction	
pattern	is	not	
‘normal’	for	
customer
••CA	AA	OTP	issued	
after	FCRM	identifies	
an	out	of	character	
transaction
••Holistic	risk	
assessment
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Advanced	Authentication
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Financial	Crime	Risk	Management	Platform
• Leverages	organisational	
knowledge	is	assessing	risk
• Assesses	in	real	time	to	
determine	risk
• Creates	a	Customer	Risk	
Score
• Delivers	an	Holistic	View	of	
Fraud
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Which	Channels	are	using	it	in	Agiliti?
• Branch	and	Call	Centre	platform
• Validates	some	numbers	from	PIN
• Neither	password	nor	PIN	require	to	be	fully	disclosed
• Uses	cherished	questions	over	password
• Allows	input	of	OTP	received	by	customer	via	SMS
• Web,	Tablet,	Mobile	and	Apps
• All	4	digital	channels	are	using	the	same	credentials
• Use	of	credentials	is	minimised	for	a	better	user	
experience
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Where	are	we	now?
• Solution	is	live	to	the	public	with	a	number	of	institutions
• It	is	supporting	institutions	with	a	new	digital	experience	
• Customer	and	Member	reaction	has	been	very	positive
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	does	it	mean	for	customers?
• One	set	of	credentials	to	remember
• Only	asked	for	minimal	credentials	based	upon	assessed	risk
• Known	devices	allow	data	display	without	any	input
• Remove	typical	approach	of	lowest	common	denominator	security	model
Thank	you
Andrew.Steadman@Fiserv.com
www.agiliti-fiserv.com
www.fiserv.com
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Don’t	Miss	Our	INTERACTIVE
Security	Demo	Experience!
SNEAK
PEEK!
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD18
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Security
For	more	information	on	Security,	please	visit:	
http://cainc.to/EtfYyw

Contenu connexe

Tendances

Tendances (20)

Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
 
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
 
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid EnterprisesTech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
Tech Talk: Defense In Depth Privileged Access Management for Hybrid Enterprises
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Introducing New Identity as a Service
Introducing New Identity as a ServiceIntroducing New Identity as a Service
Introducing New Identity as a Service
 
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT StrategyCritical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
 
Securing Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real WorldSecuring Mobile Payments: Applying Lessons Learned in the Real World
Securing Mobile Payments: Applying Lessons Learned in the Real World
 
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped InsilicumThe answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
TechTalk: Sometimes Less is More –Visualization Can Reduce your Test Data whi...
 
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
 
Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work Modern System Intelligence: Making the Data Do the Work
Modern System Intelligence: Making the Data Do the Work
 

En vedette

En vedette (19)

Agile Management Opening Keynote
Agile Management Opening KeynoteAgile Management Opening Keynote
Agile Management Opening Keynote
 
Managing Financial Technology Is It An Art Or Science
Managing Financial Technology   Is It An Art Or ScienceManaging Financial Technology   Is It An Art Or Science
Managing Financial Technology Is It An Art Or Science
 
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part IModernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
 
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part IApplication Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
 
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part IAdvanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
 
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC SystemTools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
 
CA IDMS Deadlock Analysis
CA IDMS Deadlock AnalysisCA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
 
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next LevelAPI Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
 
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
Tech Talk: Learn What Flow Analysis Tells Us About Network Usage at CA World ...
 
ANZ- CV
ANZ- CVANZ- CV
ANZ- CV
 
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part IIModernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
 
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part IIAdvanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
 
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
 
CA IDMS Buffer Tuning
CA IDMS Buffer TuningCA IDMS Buffer Tuning
CA IDMS Buffer Tuning
 
What’s new in CA Datacom
What’s new in CA DatacomWhat’s new in CA Datacom
What’s new in CA Datacom
 
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part IIApplication Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
 
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
 
CA IDMS Performance and Tuning
CA IDMS Performance and TuningCA IDMS Performance and Tuning
CA IDMS Performance and Tuning
 
CA IDMS Database Navigation
CA IDMS Database NavigationCA IDMS Database Navigation
CA IDMS Database Navigation
 

Similaire à Convenience and Security for banking customers with CA Advanced Authentication

American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
Benjamin Wyrick
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
Glenn Peake
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
Divya Kothari
 

Similaire à Convenience and Security for banking customers with CA Advanced Authentication (20)

Applying Data Science to Your Business Problem
Applying Data Science to Your Business ProblemApplying Data Science to Your Business Problem
Applying Data Science to Your Business Problem
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release AutomationCase Study: HMS Delivers Sleek Application Deployments via CA Release Automation
Case Study: HMS Delivers Sleek Application Deployments via CA Release Automation
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
Technology Primer: Monitor a Website in Minutes Using Shortcuts for Customer ...
 
Securing your API Portfolio with API Management
Securing your API Portfolio with API ManagementSecuring your API Portfolio with API Management
Securing your API Portfolio with API Management
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
 
MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
We Authenticate the World
We Authenticate the WorldWe Authenticate the World
We Authenticate the World
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention New! Omni-Channel Fraud Prevention
New! Omni-Channel Fraud Prevention
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
 
Accenture Market Pulse Survey 2020 | Insurance in Luxembourg
Accenture Market Pulse Survey 2020 | Insurance in LuxembourgAccenture Market Pulse Survey 2020 | Insurance in Luxembourg
Accenture Market Pulse Survey 2020 | Insurance in Luxembourg
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
The four trends driving the insurance industry
The four trends driving the insurance industry  The four trends driving the insurance industry
The four trends driving the insurance industry
 
Callcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification streamCallcredit's Fraud Summit 2016 - Identity verification stream
Callcredit's Fraud Summit 2016 - Identity verification stream
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
 

Plus de CA Technologies

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Convenience and Security for banking customers with CA Advanced Authentication