SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Establish Digital Trust as the
Currency of Digital Enterprise
Ashok Reddy
MFT01S
MAINFRAME
General Manager
CA Technologies
2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Idea: Become a Digital Enterprise
Outcome: By Building Digital Trust
Eliminate Barriers Between Ideas and Outcomes
3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Digital Enterprise in a Digital Economy
Made not Born
Use digital technologies such as
Mobile, Social, Web, AI and IOT to
optimize existing business and
transform to capture new growth
4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Digital Trust is the Currency for Digital Enterprise
To Instill Consumer Confidence & Confidence for You to Take Risk
Ensure apps & systems always work
Deliver digital experience which is
built to change
Verify users, API’s, devices, bots
Protect data and privacy
47%
27%
20%
Traditional Car Company
New Autonomous Company
Existing Tech Company
Other
Source: Global Automotive Car Study, Deloitte
Trust in Autonomous Cars
ServiceIdea
Protect Data and be
compliant with regulations
Deliver Digital Experience
for mission critical apps
Assure Systems
to work always,
anytime, anywhere
Desired Outcomes of a Digital Enterprise
Optimize and Transform
Establish Digital Trust
as the primary currency
of Digital Enterprise
Ensure Resources
for digital business
transformation
Verify People and
access to critical systems
6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
$150M
Outage Costs
38%
Can’t Find Skills
1.5B
COBOL Yearly
$5B
Ransomware
> 1000
Transactions
per second for
permissioned
Blockchain
ENSURE RESOURCES
$3T
Cyber Attacks
ASSURE
SYSTEMS
DELIVER
DIGITAL
EXPERIENCE
VERIFY
PEOPLE
ESTABLISH
DIGITAL TRUST
PROTECT
DATA
78% Growing MIPS
Barriers to Desired Outcomes
7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Assess Where You Are
RESOURCES
SYSTEMS
EXPERIENCE
PEOPLE
DATA
DIGITAL TRUST
ASSESSMENT
Economics
▪ MRI:
Mainframe
Resource
Intelligence
8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Prioritize and Address the Barriers
BEST
PRACTICES
OPTIMIZATION TRANSFORMATION
Verify
People
Protect
Data
Ensure
Resources
Deliver
Digital
Experience
Establish
Digital
Trust
Assure
Systems
Optimize
Platform
Self-Driving
Data Center
DevSecOps
Data-Centric
Security
Digital Trust
at Scale
Identity-Centric
Security
9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Optimize the Platform
Best Practices to free up resources to invest in digital transformation
ENSURE
RESOURCES
▪ 8% out-of-box savings against total MLC
▪ Up to $200K savings per LPAR
▪ 55% – 65% offload saves MLC
▪ $1.4M avg. license savings
▪ Leverage Java
▪ Same development tools mobile to mainframe
Optimize Capacity
Standardize Software
Leverage Specialty Engines
Dynamic Capacity Intelligence
Removes MLC Uncertainty
NEW
10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Self-Driving Datacenter
Best Practices to Manage SLA’s
and Address skills
▪ Modern UX and
Visual Analytics
▪ Augment human intelligence
with machine data-based
intelligence
▪ Leverage experts to
train AI and machine
learning algorithms
▪ Automatic remediation
to create a self
driving datacenter
ASSURE
SYSTEMS
11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Assuring SLA’s with Modern UX
and Visual Analytics
ASSURE
SYSTEMS
Improvement
in Resolution
Time and MTTR
5X
Greg Payne
Southwest Gas
Senior Analyst
Infrastructure
12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Leverage Experts to Train AI
and ML Algorithms
ASSURE
SYSTEMS
Gather Alerts
from Multiple
Sources
Automate
Clustering of
Alerts into Issues
1 2
Provide Incident
Predictions and
Insights
3
Clustered Issue:
Network problem
60 active alerts
within 30 minutes
Apply Sentiment
Analysis4
Tribal Knowledge
Captured
Refines automatic
recommendation
NEW
13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Automate Remediation to Create
Self-Driving Datacenter
Augmented
Intelligence
CA Mainframe Operational Intelligence 2.0
PREDICTIVE
INTELLIGENCE
MULTI-SOURCE DATA FEEDS
CA Products | SMF Data | Open API*
AUTOMATED REMEDIATION
Databases
Transactions
Systems
Networks
Storage
AutomationMachine Learning AlgorithmsData, Sentiment Processing
Collaboration
Anomaly Detection
Dynamic Alerting
Historical Analysis
Alert Clustering
Incident Predictions
ASSURE
SYSTEMS
Blockchain
NEW
14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
DevSecOps
▪ Automate to shift “ops”
left to enable continuous
delivery
▪ Adopt open modern tools
familiar to next gen
developers
▪ Provide everything
as a service
Best Practices for Mission Critical Apps
DELIVER DIGITAL
EXPERIENCE
15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Automate to Shift Ops Left
▪ 6M artifacts
▪ 6K developers
▪ 750K element changes per year
▪ CA Endevor and fully automated
CI/CD pipeline
DELIVER DIGITAL
EXPERIENCE
Deployments a
month using
Agile and weekly
mainframe
release cycles
2K
16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Open, Modern Tools for Millennials
and Everything as a Service
1
DELIVER DIGITAL
EXPERIENCE
Preview*
* Planned
Develop Processes, Culture, Tools
that allow Shift-Left
CAST AIP
17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Identity-Centric Security
Best Practices to Verify Access
VERIFY PEOPLE
▪ Implement multi-
factor advanced
authentication and
identity management
▪ Reduce risk
by trusted user
management
NEW
18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Data-Centric Security
▪ Automate discovery of sensitive
data both at rest and motion
▪ Establish data gravity landscape
and limit data breaches
▪ Assess and remediate for GDPR
and other regulations
PROTECT DATA
*Sample customer results
Initial Scan
Data Had PII5%
19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Towards a Digital Enterprise
Barry
Becker
IBM Global
Technology Services
VP, Systems
Services
TRANSFORM
20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Leverage the power of Cognitive
and Artificial Intelligence
Cognitive, IoT & Blockchain all
delivered through the cloud
Relationships are being redefined
across the value chain
Digital economy depends
on trust
Trust is the foundation of new
digital relationships
20
TRANSFORM
Trust in the Digital Economy
21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Delivering Mainframe
as-a-Service with
CA Technologies
21
Focus on Data Content
Discovery and data
protection
Combined best
practice to deliver a
superior service
Cloud consumption
model drive flexibility
and agility for clients
TRANSFORM
22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
ESTABLISH
DIGITAL TRUST
Visit
Blockchain
Smart Bar
Digital Trust at Scale
▪ Monitor systems
▪ Establish data
provenance
▪ Single source
encryption
Best Practices for Blockchain
23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
A Digital Enterprise TRANSFORM
OPTIMIZATION TRANSFORMATION
Verify
People
Protect
Data
Ensure
Resources
Deliver
Digital
Experience
Establish
Digital
Trust
Assure
Systems
Scale to
150 million
transactions a
day while
growing revenue
Latest generation
Mainframe
datacenters,
fully redundant
systems
Automation to
deliver efficiency
and speed
Redundant layers
of physical / cyber
security
Visa Introduces
International B2B
Payment Solution
Built on Blockchain
Technology
…around the globe
cards
of merchant locations
financial institutions
16,600
Millions
+3 Billion
24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
MRI Mainframe as a
Service Preview
CA Development
Environment for
z Systems
CAST
CA Trusted
Access Manager
for z
CA Data Content
Discovery
Blockchain
Preview
Specialty Engine and z14: CA
Mainframe Products
Verify
People
Protect
Data
Ensure
Resources
Deliver
Digital
Experience
Establish
Digital
Trust
Assure
Systems
CA Dynamic
Capacity
Intelligence
CA Mainframe
Operational
Intelligence
Start Your Journey at CA World ’17
OPTIMIZATION TRANSFORMATION
25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Deliver Digital Trust To Become a Digital Enterprise
Optimize and Transform
Verify
People
Protect
Data
Ensure
Resources
Deliver
Digital
Experience
Establish
Digital Trust
Assure
Systems
OPTIMIZATION TRANSFORMATION
26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Breaking Barriers Awards
▪ Overcoming growth
barrier by standardizing
mainframe solution
portfolio
▪ Efficiency gains creating
capacity to serve larger
customer base
▪ Doing more with less
while achieving SLAs
▪ Pursuing significant
reductions in overhead
▪ Replacing legacy code
by harnessing
mainframe innovations
▪ Unlocking efficiency
through automation
27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
www.digitaltrust.ai
27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
Stay connected at communities.ca.com
Thank you.
29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
For Informational Purposes Only
Terms of this Presentation
© 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at
CA World 2017 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with
customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the
rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any
CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is
based on current information and resource allocations as of November 1, 2017, and is subject to change or withdrawal by CA at any
time without notice. The development, release and timing of any features or functionality described in this presentation remain at
CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release
referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major
product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and
support, on a when and if-available basis. The information in this presentation is not deemed to be incorporated into any contract.

Contenu connexe

Tendances

Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Lokesh Agarwal
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationInnodisk Corporation
 
The IoT Revolution
The IoT RevolutionThe IoT Revolution
The IoT RevolutionAeris
 
SplunkSummit 2015 - IT Service Intelligence
SplunkSummit 2015 - IT Service IntelligenceSplunkSummit 2015 - IT Service Intelligence
SplunkSummit 2015 - IT Service IntelligenceSplunk
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataCloudera, Inc.
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopCloudera, Inc.
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Jon Stevens-Hall
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopGigaom
 
Infrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldInfrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldGlenn Allison
 
AI Microservices APIs and Business Automation as a Service Denis Gagne
AI Microservices APIs and Business Automation as a Service    Denis GagneAI Microservices APIs and Business Automation as a Service    Denis Gagne
AI Microservices APIs and Business Automation as a Service Denis GagneDenis Gagné
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionGigaom
 
ThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the CloudsThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the CloudsThousandEyes
 
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes
 
SOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENT
SOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENTSOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENT
SOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENTKellton Tech Solutions Ltd
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
 
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...Infostretch
 
Dell | Your Path – Our Platform & Great Partnerships
Dell | Your Path – Our Platform & Great PartnershipsDell | Your Path – Our Platform & Great Partnerships
Dell | Your Path – Our Platform & Great PartnershipsDataWorks Summit
 

Tendances (19)

Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021Top 10 tredning technologies to learn in 2021
Top 10 tredning technologies to learn in 2021
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component Integration
 
The IoT Revolution
The IoT RevolutionThe IoT Revolution
The IoT Revolution
 
SplunkSummit 2015 - IT Service Intelligence
SplunkSummit 2015 - IT Service IntelligenceSplunkSummit 2015 - IT Service Intelligence
SplunkSummit 2015 - IT Service Intelligence
 
Innovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big DataInnovation Without Compromise: The Challenges of Securing Big Data
Innovation Without Compromise: The Challenges of Securing Big Data
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache Hadoop
 
Peak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered DesktopPeak 10 Cloud Delivered Desktop
Peak 10 Cloud Delivered Desktop
 
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
Optimizing Service Desk Interactions with Knowledge Management - BMC Engage 2015
 
Structure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshopStructure 2014 - Disrupting the data center - Intel sponsor workshop
Structure 2014 - Disrupting the data center - Intel sponsor workshop
 
Infrastructure 2.0 - Network World
Infrastructure 2.0 - Network WorldInfrastructure 2.0 - Network World
Infrastructure 2.0 - Network World
 
AI Microservices APIs and Business Automation as a Service Denis Gagne
AI Microservices APIs and Business Automation as a Service    Denis GagneAI Microservices APIs and Business Automation as a Service    Denis Gagne
AI Microservices APIs and Business Automation as a Service Denis Gagne
 
Structure 2014 - Launchpad Competition
Structure 2014 - Launchpad CompetitionStructure 2014 - Launchpad Competition
Structure 2014 - Launchpad Competition
 
ThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the CloudsThousandEyes Webinar - Clash of the Clouds
ThousandEyes Webinar - Clash of the Clouds
 
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challengesThousandEyes Webinar: How to see and resolve office 365 performance challenges
ThousandEyes Webinar: How to see and resolve office 365 performance challenges
 
SOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENT
SOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENTSOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENT
SOFTWARE AG’S AGILEAPPS CLOUD- CREATING APPS AND DYNAMIC CASE MANAGEMENT
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...
Hyper-connected apps: Hyper-Connected Apps: Testing Peripherals and Mobile Ap...
 
IoT Data as Service with Hadoop
IoT Data as Service with HadoopIoT Data as Service with Hadoop
IoT Data as Service with Hadoop
 
Dell | Your Path – Our Platform & Great Partnerships
Dell | Your Path – Our Platform & Great PartnershipsDell | Your Path – Our Platform & Great Partnerships
Dell | Your Path – Our Platform & Great Partnerships
 

Similaire à Establish Digital Trust as the Currency of Digital Enterprise

The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software FactoryCA Technologies
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Ping Identity
 
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
Presentation cloud as a growth engine for a smarter enterprise
Presentation   cloud as a growth engine for a smarter enterprisePresentation   cloud as a growth engine for a smarter enterprise
Presentation cloud as a growth engine for a smarter enterprisexKinAnx
 
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM Events
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business AutomationCA Technologies
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business AutomationCA Technologies
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationCA Technologies
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologiesdsapps
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Developing Modern Applications in the Cloud
Developing Modern Applications in the CloudDeveloping Modern Applications in the Cloud
Developing Modern Applications in the CloudCobus Bernard
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV ReadyThousandEyes
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Improving end user experiences with New Relic Browser and Synthetics
Improving end user experiences with New Relic Browser and SyntheticsImproving end user experiences with New Relic Browser and Synthetics
Improving end user experiences with New Relic Browser and SyntheticsNew Relic
 
Transformational IT Management in the Application Economy
Transformational IT Management in the Application EconomyTransformational IT Management in the Application Economy
Transformational IT Management in the Application EconomyCA Technologies
 
Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...
Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...
Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...Amazon Web Services
 
MCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon Alexa
MCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon AlexaMCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon Alexa
MCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon AlexaAmazon Web Services
 

Similaire à Establish Digital Trust as the Currency of Digital Enterprise (20)

The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Automating the Modern Software Factory
Automating the Modern Software FactoryAutomating the Modern Software Factory
Automating the Modern Software Factory
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
Agile Test Data Automation with CA Automic Service Orchestration and CA Test ...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
Presentation cloud as a growth engine for a smarter enterprise
Presentation   cloud as a growth engine for a smarter enterprisePresentation   cloud as a growth engine for a smarter enterprise
Presentation cloud as a growth engine for a smarter enterprise
 
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlancIBM InterConnect 2013 Cloud General Session: Robert LeBlanc
IBM InterConnect 2013 Cloud General Session: Robert LeBlanc
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business Automation
 
CA's Vision for Business Automation
CA's Vision for Business AutomationCA's Vision for Business Automation
CA's Vision for Business Automation
 
Closed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service OrchestrationClosed Loop Remediation with CA Automic Service Orchestration
Closed Loop Remediation with CA Automic Service Orchestration
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Developing Modern Applications in the Cloud
Developing Modern Applications in the CloudDeveloping Modern Applications in the Cloud
Developing Modern Applications in the Cloud
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Improving end user experiences with New Relic Browser and Synthetics
Improving end user experiences with New Relic Browser and SyntheticsImproving end user experiences with New Relic Browser and Synthetics
Improving end user experiences with New Relic Browser and Synthetics
 
Transformational IT Management in the Application Economy
Transformational IT Management in the Application EconomyTransformational IT Management in the Application Economy
Transformational IT Management in the Application Economy
 
Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...
Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...
Ally Bank & Cognizant: Transforming Customer Experience Using Amazon Alexa - ...
 
MCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon Alexa
MCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon AlexaMCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon Alexa
MCL202_Ally Bank & Cognizant Transforming Customer Experience Using Amazon Alexa
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...CA Technologies
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...CA Technologies
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantCA Technologies
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps WorldCA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
Securing Your Enterprise Continuous Delivery Pipelines with CA Automation Sol...
 
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
The CA Technologies | Veracode Platform: A 360-Degree View of Your Applicatio...
 
When You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is ImportantWhen You Test Matters: Why Testing Early in the SDLC is Important
When You Test Matters: Why Testing Early in the SDLC is Important
 
Application Security in a DevOps World
Application Security in a DevOps WorldApplication Security in a DevOps World
Application Security in a DevOps World
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 

Dernier

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Dernier (20)

Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

Establish Digital Trust as the Currency of Digital Enterprise

  • 1. Establish Digital Trust as the Currency of Digital Enterprise Ashok Reddy MFT01S MAINFRAME General Manager CA Technologies
  • 2. 2 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Idea: Become a Digital Enterprise Outcome: By Building Digital Trust Eliminate Barriers Between Ideas and Outcomes
  • 3. 3 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Digital Enterprise in a Digital Economy Made not Born Use digital technologies such as Mobile, Social, Web, AI and IOT to optimize existing business and transform to capture new growth
  • 4. 4 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Digital Trust is the Currency for Digital Enterprise To Instill Consumer Confidence & Confidence for You to Take Risk Ensure apps & systems always work Deliver digital experience which is built to change Verify users, API’s, devices, bots Protect data and privacy 47% 27% 20% Traditional Car Company New Autonomous Company Existing Tech Company Other Source: Global Automotive Car Study, Deloitte Trust in Autonomous Cars
  • 5. ServiceIdea Protect Data and be compliant with regulations Deliver Digital Experience for mission critical apps Assure Systems to work always, anytime, anywhere Desired Outcomes of a Digital Enterprise Optimize and Transform Establish Digital Trust as the primary currency of Digital Enterprise Ensure Resources for digital business transformation Verify People and access to critical systems
  • 6. 6 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS $150M Outage Costs 38% Can’t Find Skills 1.5B COBOL Yearly $5B Ransomware > 1000 Transactions per second for permissioned Blockchain ENSURE RESOURCES $3T Cyber Attacks ASSURE SYSTEMS DELIVER DIGITAL EXPERIENCE VERIFY PEOPLE ESTABLISH DIGITAL TRUST PROTECT DATA 78% Growing MIPS Barriers to Desired Outcomes
  • 7. 7 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Assess Where You Are RESOURCES SYSTEMS EXPERIENCE PEOPLE DATA DIGITAL TRUST ASSESSMENT Economics ▪ MRI: Mainframe Resource Intelligence
  • 8. 8 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Prioritize and Address the Barriers BEST PRACTICES OPTIMIZATION TRANSFORMATION Verify People Protect Data Ensure Resources Deliver Digital Experience Establish Digital Trust Assure Systems Optimize Platform Self-Driving Data Center DevSecOps Data-Centric Security Digital Trust at Scale Identity-Centric Security
  • 9. 9 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Optimize the Platform Best Practices to free up resources to invest in digital transformation ENSURE RESOURCES ▪ 8% out-of-box savings against total MLC ▪ Up to $200K savings per LPAR ▪ 55% – 65% offload saves MLC ▪ $1.4M avg. license savings ▪ Leverage Java ▪ Same development tools mobile to mainframe Optimize Capacity Standardize Software Leverage Specialty Engines Dynamic Capacity Intelligence Removes MLC Uncertainty NEW
  • 10. 10 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Self-Driving Datacenter Best Practices to Manage SLA’s and Address skills ▪ Modern UX and Visual Analytics ▪ Augment human intelligence with machine data-based intelligence ▪ Leverage experts to train AI and machine learning algorithms ▪ Automatic remediation to create a self driving datacenter ASSURE SYSTEMS
  • 11. 11 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Assuring SLA’s with Modern UX and Visual Analytics ASSURE SYSTEMS Improvement in Resolution Time and MTTR 5X Greg Payne Southwest Gas Senior Analyst Infrastructure
  • 12. 12 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Leverage Experts to Train AI and ML Algorithms ASSURE SYSTEMS Gather Alerts from Multiple Sources Automate Clustering of Alerts into Issues 1 2 Provide Incident Predictions and Insights 3 Clustered Issue: Network problem 60 active alerts within 30 minutes Apply Sentiment Analysis4 Tribal Knowledge Captured Refines automatic recommendation NEW
  • 13. 13 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Automate Remediation to Create Self-Driving Datacenter Augmented Intelligence CA Mainframe Operational Intelligence 2.0 PREDICTIVE INTELLIGENCE MULTI-SOURCE DATA FEEDS CA Products | SMF Data | Open API* AUTOMATED REMEDIATION Databases Transactions Systems Networks Storage AutomationMachine Learning AlgorithmsData, Sentiment Processing Collaboration Anomaly Detection Dynamic Alerting Historical Analysis Alert Clustering Incident Predictions ASSURE SYSTEMS Blockchain NEW
  • 14. 14 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS DevSecOps ▪ Automate to shift “ops” left to enable continuous delivery ▪ Adopt open modern tools familiar to next gen developers ▪ Provide everything as a service Best Practices for Mission Critical Apps DELIVER DIGITAL EXPERIENCE
  • 15. 15 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Automate to Shift Ops Left ▪ 6M artifacts ▪ 6K developers ▪ 750K element changes per year ▪ CA Endevor and fully automated CI/CD pipeline DELIVER DIGITAL EXPERIENCE Deployments a month using Agile and weekly mainframe release cycles 2K
  • 16. 16 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Open, Modern Tools for Millennials and Everything as a Service 1 DELIVER DIGITAL EXPERIENCE Preview* * Planned Develop Processes, Culture, Tools that allow Shift-Left CAST AIP
  • 17. 17 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Identity-Centric Security Best Practices to Verify Access VERIFY PEOPLE ▪ Implement multi- factor advanced authentication and identity management ▪ Reduce risk by trusted user management NEW
  • 18. 18 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Data-Centric Security ▪ Automate discovery of sensitive data both at rest and motion ▪ Establish data gravity landscape and limit data breaches ▪ Assess and remediate for GDPR and other regulations PROTECT DATA *Sample customer results Initial Scan Data Had PII5%
  • 19. 19 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Towards a Digital Enterprise Barry Becker IBM Global Technology Services VP, Systems Services TRANSFORM
  • 20. 20 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Leverage the power of Cognitive and Artificial Intelligence Cognitive, IoT & Blockchain all delivered through the cloud Relationships are being redefined across the value chain Digital economy depends on trust Trust is the foundation of new digital relationships 20 TRANSFORM Trust in the Digital Economy
  • 21. 21 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Delivering Mainframe as-a-Service with CA Technologies 21 Focus on Data Content Discovery and data protection Combined best practice to deliver a superior service Cloud consumption model drive flexibility and agility for clients TRANSFORM
  • 22. 22 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS ESTABLISH DIGITAL TRUST Visit Blockchain Smart Bar Digital Trust at Scale ▪ Monitor systems ▪ Establish data provenance ▪ Single source encryption Best Practices for Blockchain
  • 23. 23 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS A Digital Enterprise TRANSFORM OPTIMIZATION TRANSFORMATION Verify People Protect Data Ensure Resources Deliver Digital Experience Establish Digital Trust Assure Systems Scale to 150 million transactions a day while growing revenue Latest generation Mainframe datacenters, fully redundant systems Automation to deliver efficiency and speed Redundant layers of physical / cyber security Visa Introduces International B2B Payment Solution Built on Blockchain Technology …around the globe cards of merchant locations financial institutions 16,600 Millions +3 Billion
  • 24. 24 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS MRI Mainframe as a Service Preview CA Development Environment for z Systems CAST CA Trusted Access Manager for z CA Data Content Discovery Blockchain Preview Specialty Engine and z14: CA Mainframe Products Verify People Protect Data Ensure Resources Deliver Digital Experience Establish Digital Trust Assure Systems CA Dynamic Capacity Intelligence CA Mainframe Operational Intelligence Start Your Journey at CA World ’17 OPTIMIZATION TRANSFORMATION
  • 25. 25 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Deliver Digital Trust To Become a Digital Enterprise Optimize and Transform Verify People Protect Data Ensure Resources Deliver Digital Experience Establish Digital Trust Assure Systems OPTIMIZATION TRANSFORMATION
  • 26. 26 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Breaking Barriers Awards ▪ Overcoming growth barrier by standardizing mainframe solution portfolio ▪ Efficiency gains creating capacity to serve larger customer base ▪ Doing more with less while achieving SLAs ▪ Pursuing significant reductions in overhead ▪ Replacing legacy code by harnessing mainframe innovations ▪ Unlocking efficiency through automation
  • 27. 27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS www.digitaltrust.ai 27 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS
  • 28. 28 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS Stay connected at communities.ca.com Thank you.
  • 29. 29 COPYRIGHT © 2017 CA. ALL RIGHTS RESERVED#CAWORLD #NOBARRIERS For Informational Purposes Only Terms of this Presentation © 2017 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2017 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 1, 2017, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-available basis. The information in this presentation is not deemed to be incorporated into any contract.