...
CA Technologies     CA Technologies
Ditton Park, Riding Court Road • SL3 9LL Datchet, Berkshire
Internet: http://www.ca.com/security

CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments—from mainframe and distributed, to virtual and cloud. Our products enable customers to manage and secure IT environments and deliver more flexible IT services. The majority of the Global Fortune 500 relies on CA Technologies to manage their evolving IT ecosystems.

CA Technologies Content-Aware Identity and Access Management (IAM) is a pragmatic and innovative solution that provides the control you need to better protect your valuable assets, while improving responsiveness and efficiency. Our Content-Aware IAM solution not only enables you to control your user identities and their actions, but also to adapt to your users’ situation in real-time by considering the level of risk their actions are posing and the sensitivity of the information they are dealing with. The result? You’ll have the tools you need to enhance security, better support business demands, and drive operational excellence.

Congress: European Identity & Cloud Conference 2012 17.04. – 20.04.2012 , Munich, Germany
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: European Identity Conference 2011 10.05. – 13.05.2011 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Webinar: Virtualization Security Trends & Insights: Results from KuppingerCole�s Recent Survey 26.11.2010 , 17:00 CET, 11am EST
Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like? In this webinar, Martin Kuppinger will show the results of the survey and will give you some background.
Congress: European Identity Conference 2010 04.05. – 07.05.2010 , Munich
With its world class list of speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: CLOUD 2010 04.05. – 07.05.2010 , Munich
Kuppinger Cole are proud to announce the Cloud Computing Flagship Event for Europe: CLOUD 2010. Making Cloud Computing work for your enterprise, how to prepare for it and what the risks involved with a cloud strategy are – Join us in Munich for an exciting event beyond the hype.
Congress: Mittelstandsdialog Informationssicherheit 04.05. – 07.05.2010 , M�nchen
Die Sicherung der IT-Infrastrukturen und Anwendungen, der Datenschutz und die Einhaltung von Richtlinien und Vorschriften ist f�r jedes Unternehmen unverzichtbar, unabh�ngig von dessen Gr��e. Die Methoden und Herangehensweisen an das Thema der Informationssicherheit k�nnen sich jedoch erheblich unterscheiden. Der Mittelstandsdialog Informationssicherheit, der zeit- und ortsgleich mit Europas Leitveranstaltung zum Thema Identity Management, der European Identity Conference (EIC) stattfindet, bietet Ihnen die M�glichkeit, den f�r Ihr Unternehmen optimalen Weg zu einem sinnvollen Mehr an IT-Security zu finden.
Congress: European Identity Conference 2009 05.05. – 08.05.2009 , Munich
With its world class list of 130+ speakers, a unique mix of best practices presentations, panel discussions, thought leadership statements and analyst views, EIC has become an absolute must-attend event for enterprise IT leaders from all over Europe.
Congress: 2nd European Identity Conference 22.04. – 25.04.2008 , Munich
For hundreds of Identity Management professionals, the European Identity Conference provides an unbiased source of new insights and ideas on a broad scale from business-oriented briefings to hands-on like workshop sessions, with a great number of best practices presentations from real world deployments. With its community-like social networking and knowledge sharing opportunities, the European Identity Conference has become an annual must-attend event.
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , M�nchen
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Conference: 1st European Identity Conference 07.05. – 10.05.2007 , Munich
Compliance Trends & Identity Risk Management ? Identity Federation User Centric Identity ? Authentication Trends ? Roles & Provisioning
Vendor Report: CA Technologies Virtualization Security30.11.2010Martin Kuppinger €95.00
Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security has to be well planned and requires a set of well-integrated products to provide the right balance between security and risk mitigation on one hand, and costs and complexity on the other. CA Technologies offers a broad range of products which support customers in implementing Virtualization Security. CA Technologies specific strengths are not only that core security is provided but also IT service automation, assurance, management and other areas are covered as well. Furthermore, CA Technologies has clearly understood that Virtualization Security is not just about having yet another security…

Order the report

Product Report: CA Access Control � Privileged User and Password Management28.09.2010Martin Kuppinger €95.00
CA Access Control Privileged User and Password Management is a solution which addresses a threat which virtually any organization today is facing: The risk of misuse of privileged accounts. Thus it is part of the PxM PxMmarket segment (with PxM being Privileged User/Account/Access/Identity Management, depending on the product specifics and the vendors marketing) within the IAM (Identity and Access Management) and broader IT Security market. The focus of PxM tools is to better manage and audit these accounts and thus mitigate the risks. CA Access Control Privileged User and Password Management (CA Access Control PUPM) is one product in this category that provides a significantly rich feature set to address different requirements of PxM in a heterogeneous IT environment. PxMA specific strength is the integration of this tool with other CA products, as well the other CA Access Control components such as tools like the CA Enterprise Log Manager or CA Service Desk. With this…

Order the report

Virtualization Security Trends & Insights: Results from KuppingerCole’s Recent Survey30.11.2010
Sponsored by CA Technologies, KuppingerCole have conducted a survey, to better understand your views and experiences on security in virtualized environments and the developments happening in this space. How do you secure your virtual environments today? And how does your future roadmap look like? In this webinar, Martin Kuppinger will show the results of the survey and will give you some background. Watch
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.