hie

Results 301 - 325 of 2277Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Jul 26, 2017
Extending DevOps to mainframe applications and teams is essential towards the agility and velocity that enterprises require to remain innovative in today’s turbulent digital business environment. Talking Points: • For enterprises with mainframes, trying to achieve the benefits of Digital Transformation without dealing with existing mainframe assets is a fool’s errand. • Breaking down silos and moving to DevOps is central to what it means to undergo Digital Transformation. • Including the mainframe in modern software development approaches can improve quality overall, reduce test cycles and deployment timeframes, and ensure mainframe-based applications support the end-to-end performance requirements that today’s customers demand.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 21, 2017
By necessity, every company is now a software company. By 2017, two-thirds of customer service transactions will no longer require the support of a human intermediary. That means that if you haven’t already done so, you must adapt your business model to meet the needs of online customers. Failure to do so will put you at a severe competitive disadvantage. And chief among those demands is that you provide an exceptional user experience. App speed, reliability and ease of use are the new currency in this fast-changing landscape. In fact, app characteristics such as convenience and the ability to save users time can enhance brand loyalty by 60 percent or more.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
The mobile app has become “the” strategic initiative for all digital organizations attempting to drive business forward. “By 2017, mobile apps will be downloaded more than 268 billion times, generating revenue of more than $77 billion — making apps one of the most popular computing tools for users across the globe.”1 The app has become more than a simple method of communication. It is the new critical point of engagement, the face of the organization, and quite possibly the difference maker in customers staying or leaving. Getting the “user experience” (or UX) right in the eyes of the consumer is no longer a nice to have but fundamental to achieving success.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Today, digital is everywhere—cloud, mobile, social and the Internet of Things are changing the way we all work and play. This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Die Welt ist heute digital – Cloud, Mobilität, Social Media und das Internet of Things verändern Arbeit und Freizeit für jeden. Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
CA Dynamic Capacity Intelligence from CA Technologies is an easy-to-use, fully automated and intelligent capacity management and realtime dynamic capping solution. The solution is designed to streamline your ability to monitor and effectively manage SLAs and improve operational efficiency. It helps IT to achieve rapid value by enabling priority mainframe workloads to the required capacity to meet SLAs while at the same time helps remove the guesswork for MLC pricing.
Tags : 
management, sla, application delivery, workload, mainframe, lpar boundaries, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
This rapidly evolving digital world is also redefining the relationship between your business and your customers, who now expect a convenient, interactive experience from their preferred brands. Security is also a concern. Risk is rising, as both the enterprise and its customers exchange a growing amount of sensitive data.
Tags : 
integration, developers, open enterprise, api, business, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
CA has reevaluated the design methodology behind its PPM tool to deliver an end-user-driven solution that better reflects the goals and motivations of the entire team, helps to ensure project confidence and removes the stress associated with the possibility of project failure. At the core of this new design methodology is our proprietary research, which unquestionably points to the need for an outcome-driven approach to innovation, chiefly concerned with understanding and measuring the customer’s success criteria.
Tags : 
project management, company optimization, execution, product development, research report, web based, business impacts
    
CA Technologies
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
As the threat landscape continues to evolve, you need a practical and robust way to protect privileged access in your enterprise. Analytics that detect new threats and automatically mitigate them are a great way to achieve this. By following these four key steps as you build a PAM threat analytics solution, you’ll be able to establish a more comprehensive and effective approach for addressing internal and external security threats.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
La compliance con il GDPR può essere ottenuta attraverso una combinazione di persone, processi e tecnologia. Questo documento illustra soluzioni che possano aiutare le aziende nel loro percorso verso la compliance con il GDPR. Ma è possibile estendere la protezione e rafforzare ulteriormente i controlli di sicurezza attraverso l'autenticazione forte e del rischio o la workload automation, per automatizzare l'elaborazione dei dati personali, facilitando il rispetto del GDPR e di normative analoghe. Le normative tendono a stabilire i requisiti minimi richiesti ma, nell'application economy, le aziende aperte devono garantire la due diligence per proteggere una delle risorse più importanti e critiche: le informazioni private dei clienti.
Tags : 
crescita esplosiva, silos di identità, nuovi requisiti, avvisi, protezione, ca technologies, gdpr, autenticazione forte
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Oct 20, 2017
Diese sich schnell weiterentwickelnde digitale Welt definiert auch die Beziehung zwischen Ihrem Unternehmen und Ihren Kunden neu. Die Kunden erwarten von ihren bevorzugten Marken heute eine komfortable, interaktive User Experience. Auch die Security ist ein wichtiges Anliegen. Die Risiken wachsen, da Unternehmen und Kunden immer mehr vertrauliche Daten austauschen.
Tags : 
api, application programming interface, psd2, open banking, json, github, secure gateway, microservices
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Nov 16, 2017
Die Application Economy hat sich fest etabliert, denn mittlerweile hängt unser gesamtes Leben von vernetzten Anwendungen ab, die auf einer Vielzahl unterschiedlicher Geräte und Systeme und in On-Premise- wie auch Cloud-basierten Infrastrukturen laufen.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Nov 16, 2017
Um die IT nach geschäftlichen Kriterien zu verwalten, benötigen Sie Tools, mit denen Sie proaktiv die Zuverlässigkeit der IT-Services sicherstellen und zugleich die betriebliche Agilität erhöhen können. Dies erfordert einen neuen Ansatz für das IT-Infrastructure-Management. Hierzu gehört auch die Auswahl eines Infrastructure-Management-Anbieters, der die heutigen Anforderungen von IT und Business erfüllen kann.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Nov 16, 2017
Um die IT nach geschäftlichen Kriterien zu verwalten, benötigen Sie Tools, mit denen Sie proaktiv die Zuverlässigkeit der IT-Services sicherstellen und zugleich die betriebliche Agilität erhöhen können. Dies erfordert einen neuen Ansatz für das IT-Infrastructure-Management. Hierzu gehört auch die Auswahl eines Infrastructure-Management-Anbieters, der die heutigen Anforderungen von IT und Business erfüllen kann.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Today, organizations of all sizes recognize the value of an agile software delivery process. Agility is the foundation for cost–efficiency, competitiveness, high team morale and customer satisfaction. Yet most organizations face an agility paradox in that the more agile their software delivery workflow becomes, the higher the risk that instability or unpredictability will be introduced and undercut the investment they make in software production. Fortunately, there is a solution to this conundrum. It’s called shift–left monitoring, and it allows your company to maximize agility in software delivery without assuming undue risks. This e–book explains how you can achieve agility and stability at the same time to streamline the path to digital transformation and innovation by shifting monitoring to the left of your software delivery workflow.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
A New Security Model Worth Understanding—and Emulating Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nuovo modello di sicurezza che vale la pena di studiare, e di imitare. La sicurezza enterprise si basa, tradizionalmente, su una strategia che blocca gli endpoint degli utenti e posiziona la rete all'interno di una sorta di perimetro fortificato. Oggi, questa strategia non è in grado di supportare né proteggere l'uso di device mobile e le funzionalità SaaS, che esistono al di fuori di quel perimetro. Di conseguenza, i Chief Information Security Officer (CISO) sono alla ricerca di soluzioni nuove, in grado di tutelare queste tecnologie e di adattarsi al modificarsi di minacce ed esigenze di business.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Ein neues Security-Modell, das Sie verstehen und nachahmen sollten. Die Security in Unternehmen ähnelte bisher einer Festungsstrategie, die Anwenderendpunkte abschottete und Mauern um das Netzwerk baute. Heutzutage kann diese Strategie die Nutzung von Mobile Devices und SaaS-Funktionen (Software-as-a-Service), die sich außerhalb der Festung befinden, nicht mehr unterstützen. Daher haben sich Chief Information Security Officers (CISOs) nach neuen Lösungen umgesehen, die diese Technologien heute sichern können und die sich einer Zeit anpassen, in der sich sowohl Bedrohungen als auch Unternehmensanforderungen verändern.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Un nouveau modèle de sécurité qui mérite d’être étudié... et reproduit. Traditionnellement, la sécurité des entreprises a toujours été fondée sur une stratégie de « forteresse », chargée de sécuriser les terminaux utilisateur et de former une barrière de protection autour du réseau. Aujourd’hui, cette stratégie n’est pas en mesure de supporter ou de sécuriser l’utilisation des périphériques mobiles et des fonctionnalités SaaS, qui existent en-dehors de la forteresse. Les responsables de la sécurité des informations (CISO, Chief Information Security Officer) sont donc tenus de trouver de nouvelles solutions à même de sécuriser ces technologies actuelles, et de s’adapter aux menaces et aux besoins métier en évolution.
Tags : 
    
CA Technologies EMEA
Published By: CA Technologies EMEA     Published Date: Apr 10, 2018
Les tests, premier goulet d’étranglement en matière de livraison continue. L’objectif de livraison logicielle en continu a récemment engendré de nombreux changements de paradigme dans le monde des technologies de l’information. Les philosophies et les modèles de fonctionnement agiles et DevOps ont largement contribué à aider les grandes entreprises à accélérer leurs processus de livraison logicielle.
Tags : 
    
CA Technologies EMEA
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.