Secure your IT and online business to reduce the risks of improper access and fraud
Business demand is increasing. To deliver business services cheaper, faster, and safer, you need to enable your customers to securely connect to business applications that will help you to grow your business. The CA Expo '12 Secure IT Track will show you how to:
- Provide easy but secure access to your key internal resources for your employees and partners
- Automate key identity-related processes to improve efficiencies and reduce security costs
- Ensure that your key applications and data are protected from breach, improper access, and fraud.
This track will focus on securely connecting customers and citizens to online business applications, governing access for employees and partners to extend your enterprise resources and controlling privileged users and data in the datacenter. Learn how we are helping customers leverage virtualisation and cloud - securely - to provide the agility you need to improve your competitive position.
Security as an Enabler
Michael Denning, CA Technologies
Information security was a fairly calm and quiet space a few years ago. Firewalls, tokens, intrusion detection software, virtual private networks and anti-virus software seemed to be basically doing the job. But then internet protocols, the cloud, mobile devices and successful attacks against many of the foundational technologies like tokens changed it to an "all bets are off" environment. Many existing solutions, including Hardware tokens, are being replaced and upgraded with more modern and, typically, multiple technologies. The Security of TODAY, in a NEW World has to be a Business Enabler.
Recently we have heard from several very large enterprises and government agencies that they are revamping their entire information security infrastructure. In some cases, they are fairly far along and have another year or two of major spending but others haven't even begun. In simple terms, online thieves are easily incorporating malware to take advantage of weakly or unprotected users. This fact has started the wheels turning in both enterprise budgets and consumer thinking. In terms of spending, enterprises started increasing their security budgets and putting information security improvements back on the top of their lists in 2011. This elevated spending will continue in 2012 and may remain elevated for the next 3 to 5 years.
Mobile devices have been part of the problem so far, but going forward they will be a key component of the solution as enterprises move to multi-factor authentication and exploit voice, SMS, location data and image recognition that has become possible thanks to the era of the smart phone. SECURITY HAS TO BE the Enabler for Business Growth.
Enabling Secure Business with CA Solutions
Phil Tidmarsh, CA Technologies
This session will provide valuable insights into what are some of our customers' most daunting technical requirements and how CA Technologies' integrated solutions had helped them overcome those challenges. In addition, we will also showcase the leading edge technological advances in enabling you to secure your business now and into the future.