SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
Building Digital Trust
Ashok Reddy
General Manager, CA Technologies
@AshokTReddy
October 3, 2017
Taking risks with confidence in a Digital Economy,
Where every business is a Digital Enterprise
For Informational Purposes Only
This presentation was based on current information and resource allocations as of October 2017 and is subject to
change or withdrawal by CA at any time without notice. Not withstanding anything in this presentation to the contrary, this
presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future
written license agreement or services agreement relating to any CA software product; or (ii) amend any product
documentation or specifications for any CA software product. The development, release and timing of any features or
functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to
the contrary, upon the general availability of any future CA product release referenced in this presentation, CA will make
such release available (i) for sale to new licensees of such product; and (ii) to existing licensees of such product on a
when and if-available basis as part of CA maintenance and support, and in the form of a regularly scheduled major
product release. Such releases may be made available to current licensees of such product who are current subscribers
to CA maintenance and support on a when and if-available basis. In the event of a conflict between the terms of this
paragraph and any other information contained in this presentation, the terms of this paragraph shall govern.
Certain information in this presentation may outline CA’s general product direction. All information in this presentation is
for your informational purposes only and may not be incorporated into any contract. CA assumes no responsibility for the
accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this presentation “as
is” without warranty of any kind, including without limitation, any implied warranties or merchantability, fitness for a
particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the
use of this document, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost
data, even if CA is expressly advised in advance of the possibility of such damages. CA confidential and proprietary. No
unauthorized copying or distribution permitted.
2
3
Digital Enterprise in a Digital Economy
Made not Born
Use digital technologies such as
Mobile, Social, Web to Innovate,
Improve Productivity and Optimize/
Leverage existing assets to Grow
3
4
80% SHOP
ONLINE
25% CARD
ONLY
Source: “Online Shopping and E-Commerce”, Pew Research
Scale to billions of Users, Apps, API’s, Bots, Algo’s
5
Sell Digital Tickets to
popular Broadway Shows
How to protect fans from
thousands of little scalper bots
trying to scoop up tickets?
Challenge
Digital Enterprise: Example 1
6
Solution: Building Digital Trust
7
Build consumer
confidence in digital
transaction similar to
physical environment
Ensure payments are made
by the rightful owner of the
Visa account?
Challenge
Digital Enterprise: Example 2
8
Solution: Building Digital Trust
Source: usa.visa.com
Additional Challenges on
the Digital Frontier
$16B in Identity Fraud
$3T in business growth could be
slowed due to cyber attacks
$2.5B in avg total cost of unplanned
application downtime per year
Source: Jupiter Research, The Economist, Pew Research,
Business Insider, DevOps.com, McKinsey.com
9
10
DIGITAL TRUST IS
THE CURRENCY OF DIGITAL ENTERPRISE
People
Real and secure?
Data
Safe and Private?
Systems
Reliable and trusted?
Increasingly today
11
Digital Enterprise:
• Visa is the world’s largest retail electronic
payments processing network and increased
revenue by almost double digits last year
• VisaNet handles an average of 150 million
transactions every day and is capable of
handling more than 24,000 transactions per
second
Source: https://usa.visa.com/visa-everywhere/innovation/global-data-centers.html
VERIFY
PEOPLE
PROTECT
DATA
ENSURE
SYSTEMS
How to Build Digital Trust?
12
VERIFY
PEOPLE
How to Build Digital Trust?
13
How do you Verify People are who they say they are?
14
Growing # of
Touches
Hackers Bypassing
Controls
Need for Simple UX
Verify Payments are RealChallenges
PROTECT
DATA
How to Build Digital Trust?
15
How do you Protect Data so that your business runs securely?
16
Maintaining User
Privacy
Managing Data
Stores and Data in
Motion
Avoid Ransomware
Protect DataChallenges
CHALLENGE:
Increased transaction volumes made it difficult to find, classify and
protect all regulated financial data on the mainframe
Initial scans
identified 5%
had unknown
sensitive data
Increased risk
assessment
through
automated efforts
Improved
business agility
by automating
scans
Solution: Protect Enterprise Data
Without CA DCD I was
lost in mountains of data
…now I’m found
17
“
ENSURE
SYSTEMS
How to Build Digital Trust?
18
How do you ensure systems are reliable and
available and self healing?
19
Responding
proactively, not
reactively
Mitigating SLA
risks
Ensure SystemsChallenges
CHALLENGE:
• Being notified after a customer is impacted is too late.
• Static thresholds yield too many false positives and cause a lot of
unnecessary churn to investigate.
Solution: Ensure Systems with Proactive
Operational Intelligence
5X Improvement in
Resolution Time
20
Increased IT
efficiency with
faster problem
triage and
remediation
Improved
customer
experience
through problem
prevention
Reduced
mean time to
resolution
(MTTR)
21
Building Digital Trust with Blockchain
Source:https://www2.deloitte.com/content/dam/Deloitte/au/Images
/infographics/deloitte-au-fs-opportunities-implications-200516.pdf
22
Walmart Supply Chain
Food Safety
Benefits
• Increased trust between suppliers
and Walmart
• Dramatic cost reduction in recalls
($93.2B per year for US economy)
• Walmart Leadership: New
ecosystem with other distributors
(Nestle, Kroger, Tyson, etc.)
What
•Provenance of each product in the supply
chain or sold is tracked
•Origin: Manufacturer, production date, batch
•History: Packing house, importers,
distributor, retail store
How
•Blockchain holds complete provenance details for each
product
•Accessible across Walmart (warehouses, stores, etc.)
•Accessible by suppliers
Why Blockchain?
•Near real-time distributed ledger offers up-to-
date status of products
•Immutability of ledger guarantees accuracy
•Selective access control to ledger information
avoids competitive information to leak
Source: IBM and Walmart: Blockchain for Food Safety, David Galvin
23
6-8 Days
3 Seconds
Digital Trust with Blockchain for
Food Safety
Source: https://www.cnbc.com/2017/08/22/ibm-nestle-
unilever-walmart-blockchain-food-contamination.html
24
Why Blockchain on the Mainframe?
IBM is running its Blockchain as a Service on System z
Several Fortune 500 Enterprises running Blockchain networks on
Mainframe
System of Trust
• Pervasive Encryption and Scale
Encrypt everything, at 18x faster
Hardware attached FIPS 140-2 Level 4 security
2M Docker secure containers per system
• Data Centricity
– 70% of Enterprise data is on the Mainframe
Source: IBM
25
How Can we help you build Digital Trust?
* Source: 1) As per 2016 Fortune 500 list of companies, published 6/6/16; CA data as of 1/31/17
https://www.ca.com/us/company/newsroom/press-releases/2017/ca-technologies-named-as-a-2017-worlds-most-ethical-
company-by-the-ethisphere-institute-for-the-second-time.html
$1T+
of 20 Largest Global Banks
in financial transactions ensured
and protected every day
Co-invented and support Verify by Visa
One of 2017’s Most Ethical Companies
by Ethisphere Institute*
19
Trusted by Fortune 500 for 40+ Years to Verify, Protect & Ensure Systems
Verified, Protected and Ensured by CA
VERIFY
PROTECT
ENSURE
DigitalTrust.ai
Protect Systems
Protect Data
Privacy
Verify Privileged
Users
Verify Identities
Ensure Mission
Critical Systems
Verify Payments
Verify API’s
Verify Applications
Cloud
Mainframe
Mobile
26
Become the
trusted partner
your customer
needs.
VERIFY
PEOPLE
PROTECT
DATA
ENSURE
SYSTEMS
DIGITAL TRUST is the currency of Digital Enterprise
27
Partner with your Line of Business to establish a digital trust
strategy at the core of your organization to capitalize on new
digital business opportunities faster than your competitors,
because it reduces risk and improves your agility to scale to
reach millions and billions of users and things
28
Questions?
@AshokTReddy
General Manager
Ashok.Reddy@ca.com
Ashok Reddy
@AshokTReddy
slideshare.net/CAinc
www.linkedin.com/in/areddy

Contenu connexe

Tendances

Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologiesrobin fay
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...
AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...
AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...Kaleido Insights
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyAtifa Aqueel
 
Emerging Technology
Emerging TechnologyEmerging Technology
Emerging Technologydananass
 
Technology Trends To Use In 2023
Technology Trends To Use In 2023Technology Trends To Use In 2023
Technology Trends To Use In 2023Edology
 
AI.pptx
AI.pptxAI.pptx
AI.pptxGKC
 
What Are The Negative Impacts Of Artificial Intelligence (AI)?
What Are The Negative Impacts Of Artificial Intelligence (AI)?What Are The Negative Impacts Of Artificial Intelligence (AI)?
What Are The Negative Impacts Of Artificial Intelligence (AI)?Bernard Marr
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligenceu053675
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentationlpaviglianiti
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.pptAeman Khan
 
Some Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdf
Some Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdfSome Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdf
Some Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdfKent Bye
 
Challenges of Artificial Intelligence: Consequences and Solutions
Challenges of Artificial Intelligence: Consequences and SolutionsChallenges of Artificial Intelligence: Consequences and Solutions
Challenges of Artificial Intelligence: Consequences and SolutionsAli Mohammad Saghiri
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesSidraAfreen
 
Introduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation SlidesIntroduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation SlidesSlideTeam
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligenceSai Nath
 

Tendances (20)

Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
Wireless USB
Wireless USBWireless USB
Wireless USB
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...
AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...
AI Readiness: Five Areas Business Must Prepare for Success in Artificial Inte...
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
Emerging Technology
Emerging TechnologyEmerging Technology
Emerging Technology
 
Technology Trends To Use In 2023
Technology Trends To Use In 2023Technology Trends To Use In 2023
Technology Trends To Use In 2023
 
AI.pptx
AI.pptxAI.pptx
AI.pptx
 
What Are The Negative Impacts Of Artificial Intelligence (AI)?
What Are The Negative Impacts Of Artificial Intelligence (AI)?What Are The Negative Impacts Of Artificial Intelligence (AI)?
What Are The Negative Impacts Of Artificial Intelligence (AI)?
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Some Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdf
Some Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdfSome Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdf
Some Preliminary Thoughts on Artificial Intelligence - April 20, 2023.pdf
 
Challenges of Artificial Intelligence: Consequences and Solutions
Challenges of Artificial Intelligence: Consequences and SolutionsChallenges of Artificial Intelligence: Consequences and Solutions
Challenges of Artificial Intelligence: Consequences and Solutions
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
Relationship Between Big Data & AI
Relationship Between Big Data & AIRelationship Between Big Data & AI
Relationship Between Big Data & AI
 
Digital twins
Digital twinsDigital twins
Digital twins
 
Introduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation SlidesIntroduction To Artificial Intelligence Powerpoint Presentation Slides
Introduction To Artificial Intelligence Powerpoint Presentation Slides
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Social impact of computers
Social impact of computersSocial impact of computers
Social impact of computers
 

En vedette

Drive Continuous Delivery With Continuous Testing
Drive Continuous Delivery With Continuous TestingDrive Continuous Delivery With Continuous Testing
Drive Continuous Delivery With Continuous TestingCA Technologies
 
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins World
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins WorldFail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins World
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins WorldCA Technologies
 
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything CA Technologies
 
Take Advantage of CA PPM Application Management Services
Take Advantage of CA PPM Application Management ServicesTake Advantage of CA PPM Application Management Services
Take Advantage of CA PPM Application Management ServicesCA Technologies
 
API Academy:マイクロサービス化へのファーストステップ
API Academy:マイクロサービス化へのファーストステップAPI Academy:マイクロサービス化へのファーストステップ
API Academy:マイクロサービス化へのファーストステップCA Technologies
 
Mainframe MRI from CA Technologies
Mainframe MRI from CA TechnologiesMainframe MRI from CA Technologies
Mainframe MRI from CA TechnologiesCA Technologies
 

En vedette (6)

Drive Continuous Delivery With Continuous Testing
Drive Continuous Delivery With Continuous TestingDrive Continuous Delivery With Continuous Testing
Drive Continuous Delivery With Continuous Testing
 
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins World
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins WorldFail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins World
Fail Fast and Win with Continuous Testing: Uri Scheiner – Jenkins World
 
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
Continuous Delivery Pipeline in the Cloud – How to Achieve Continous Everything
 
Take Advantage of CA PPM Application Management Services
Take Advantage of CA PPM Application Management ServicesTake Advantage of CA PPM Application Management Services
Take Advantage of CA PPM Application Management Services
 
API Academy:マイクロサービス化へのファーストステップ
API Academy:マイクロサービス化へのファーストステップAPI Academy:マイクロサービス化へのファーストステップ
API Academy:マイクロサービス化へのファーストステップ
 
Mainframe MRI from CA Technologies
Mainframe MRI from CA TechnologiesMainframe MRI from CA Technologies
Mainframe MRI from CA Technologies
 

Similaire à Building Digital Trust

LoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLinkLoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLinkKristina Quinn
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023Search Engine Journal
 
Connecting Above the Cloud
Connecting Above the CloudConnecting Above the Cloud
Connecting Above the CloudPeter Coffee
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?Kurt Hagerman
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationJay McBain
 
Money 20:20 ibm cognitive engagement raisch
Money 20:20 ibm cognitive engagement   raisch Money 20:20 ibm cognitive engagement   raisch
Money 20:20 ibm cognitive engagement raisch Warren Raisch
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...confluent
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?CA Technologies
 
Can Blockchain Help Fix Supply Chain Problems In 2022?
Can Blockchain Help Fix Supply Chain Problems In 2022?Can Blockchain Help Fix Supply Chain Problems In 2022?
Can Blockchain Help Fix Supply Chain Problems In 2022?thinkwithniche
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfBlockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfaNumak & Company
 
Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain Mohan Venkataraman
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustBenjamin Wyrick
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewSuzanne Livingston
 
apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...
apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...
apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...apidays
 
Tarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web BrowserTarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web BrowserTarun Gaur
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front doorRyan Coleman
 

Similaire à Building Digital Trust (20)

LoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLinkLoansPQ: A Loan Origination System by MeridianLink
LoansPQ: A Loan Origination System by MeridianLink
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Connecting Above the Cloud
Connecting Above the CloudConnecting Above the Cloud
Connecting Above the Cloud
 
Australian Payments Network - Digital Identity
Australian Payments Network  - Digital Identity Australian Payments Network  - Digital Identity
Australian Payments Network - Digital Identity
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Hyperledger - MMA Impact Forum Brasil 2019
Hyperledger - MMA Impact Forum Brasil 2019Hyperledger - MMA Impact Forum Brasil 2019
Hyperledger - MMA Impact Forum Brasil 2019
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and Consumerization
 
Money 20:20 ibm cognitive engagement raisch
Money 20:20 ibm cognitive engagement   raisch Money 20:20 ibm cognitive engagement   raisch
Money 20:20 ibm cognitive engagement raisch
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
A 100% Digital Bank: Using Real-time Data to Enable a New Digital Banking Exp...
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
 
Can Blockchain Help Fix Supply Chain Problems In 2022?
Can Blockchain Help Fix Supply Chain Problems In 2022?Can Blockchain Help Fix Supply Chain Problems In 2022?
Can Blockchain Help Fix Supply Chain Problems In 2022?
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfBlockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdf
 
Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain Trust Your Supplier - trust your product in the supply chain
Trust Your Supplier - trust your product in the supply chain
 
American Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital TrustAmerican Banker Executive Summary - Digital Trust
American Banker Executive Summary - Digital Trust
 
IBM Cloud for Financial Services Overview
IBM Cloud for Financial Services OverviewIBM Cloud for Financial Services Overview
IBM Cloud for Financial Services Overview
 
apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...
apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...
apidays LIVE Australia 2021 - Empowering the fintech ecosystem with APIs by D...
 
Tarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web BrowserTarun Gaur Take On The Qikfox Web Browser
Tarun Gaur Take On The Qikfox Web Browser
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 

Plus de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and RiskCA Technologies
 

Plus de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 
How Components Increase Speed and Risk
How Components Increase Speed and RiskHow Components Increase Speed and Risk
How Components Increase Speed and Risk
 

Dernier

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Building Digital Trust

  • 1. Building Digital Trust Ashok Reddy General Manager, CA Technologies @AshokTReddy October 3, 2017 Taking risks with confidence in a Digital Economy, Where every business is a Digital Enterprise
  • 2. For Informational Purposes Only This presentation was based on current information and resource allocations as of October 2017 and is subject to change or withdrawal by CA at any time without notice. Not withstanding anything in this presentation to the contrary, this presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA will make such release available (i) for sale to new licensees of such product; and (ii) to existing licensees of such product on a when and if-available basis as part of CA maintenance and support, and in the form of a regularly scheduled major product release. Such releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available basis. In the event of a conflict between the terms of this paragraph and any other information contained in this presentation, the terms of this paragraph shall govern. Certain information in this presentation may outline CA’s general product direction. All information in this presentation is for your informational purposes only and may not be incorporated into any contract. CA assumes no responsibility for the accuracy or completeness of the information. To the extent permitted by applicable law, CA provides this presentation “as is” without warranty of any kind, including without limitation, any implied warranties or merchantability, fitness for a particular purpose, or non-infringement. In no event will CA be liable for any loss or damage, direct or indirect, from the use of this document, including, without limitation, lost profits, lost investment, business interruption, goodwill, or lost data, even if CA is expressly advised in advance of the possibility of such damages. CA confidential and proprietary. No unauthorized copying or distribution permitted. 2
  • 3. 3 Digital Enterprise in a Digital Economy Made not Born Use digital technologies such as Mobile, Social, Web to Innovate, Improve Productivity and Optimize/ Leverage existing assets to Grow 3
  • 4. 4 80% SHOP ONLINE 25% CARD ONLY Source: “Online Shopping and E-Commerce”, Pew Research Scale to billions of Users, Apps, API’s, Bots, Algo’s
  • 5. 5 Sell Digital Tickets to popular Broadway Shows How to protect fans from thousands of little scalper bots trying to scoop up tickets? Challenge Digital Enterprise: Example 1
  • 7. 7 Build consumer confidence in digital transaction similar to physical environment Ensure payments are made by the rightful owner of the Visa account? Challenge Digital Enterprise: Example 2
  • 8. 8 Solution: Building Digital Trust Source: usa.visa.com
  • 9. Additional Challenges on the Digital Frontier $16B in Identity Fraud $3T in business growth could be slowed due to cyber attacks $2.5B in avg total cost of unplanned application downtime per year Source: Jupiter Research, The Economist, Pew Research, Business Insider, DevOps.com, McKinsey.com 9
  • 10. 10 DIGITAL TRUST IS THE CURRENCY OF DIGITAL ENTERPRISE People Real and secure? Data Safe and Private? Systems Reliable and trusted? Increasingly today
  • 11. 11 Digital Enterprise: • Visa is the world’s largest retail electronic payments processing network and increased revenue by almost double digits last year • VisaNet handles an average of 150 million transactions every day and is capable of handling more than 24,000 transactions per second Source: https://usa.visa.com/visa-everywhere/innovation/global-data-centers.html
  • 13. VERIFY PEOPLE How to Build Digital Trust? 13 How do you Verify People are who they say they are?
  • 14. 14 Growing # of Touches Hackers Bypassing Controls Need for Simple UX Verify Payments are RealChallenges
  • 15. PROTECT DATA How to Build Digital Trust? 15 How do you Protect Data so that your business runs securely?
  • 16. 16 Maintaining User Privacy Managing Data Stores and Data in Motion Avoid Ransomware Protect DataChallenges
  • 17. CHALLENGE: Increased transaction volumes made it difficult to find, classify and protect all regulated financial data on the mainframe Initial scans identified 5% had unknown sensitive data Increased risk assessment through automated efforts Improved business agility by automating scans Solution: Protect Enterprise Data Without CA DCD I was lost in mountains of data …now I’m found 17 “
  • 18. ENSURE SYSTEMS How to Build Digital Trust? 18 How do you ensure systems are reliable and available and self healing?
  • 20. CHALLENGE: • Being notified after a customer is impacted is too late. • Static thresholds yield too many false positives and cause a lot of unnecessary churn to investigate. Solution: Ensure Systems with Proactive Operational Intelligence 5X Improvement in Resolution Time 20 Increased IT efficiency with faster problem triage and remediation Improved customer experience through problem prevention Reduced mean time to resolution (MTTR)
  • 21. 21 Building Digital Trust with Blockchain Source:https://www2.deloitte.com/content/dam/Deloitte/au/Images /infographics/deloitte-au-fs-opportunities-implications-200516.pdf
  • 22. 22 Walmart Supply Chain Food Safety Benefits • Increased trust between suppliers and Walmart • Dramatic cost reduction in recalls ($93.2B per year for US economy) • Walmart Leadership: New ecosystem with other distributors (Nestle, Kroger, Tyson, etc.) What •Provenance of each product in the supply chain or sold is tracked •Origin: Manufacturer, production date, batch •History: Packing house, importers, distributor, retail store How •Blockchain holds complete provenance details for each product •Accessible across Walmart (warehouses, stores, etc.) •Accessible by suppliers Why Blockchain? •Near real-time distributed ledger offers up-to- date status of products •Immutability of ledger guarantees accuracy •Selective access control to ledger information avoids competitive information to leak Source: IBM and Walmart: Blockchain for Food Safety, David Galvin
  • 23. 23 6-8 Days 3 Seconds Digital Trust with Blockchain for Food Safety Source: https://www.cnbc.com/2017/08/22/ibm-nestle- unilever-walmart-blockchain-food-contamination.html
  • 24. 24 Why Blockchain on the Mainframe? IBM is running its Blockchain as a Service on System z Several Fortune 500 Enterprises running Blockchain networks on Mainframe System of Trust • Pervasive Encryption and Scale Encrypt everything, at 18x faster Hardware attached FIPS 140-2 Level 4 security 2M Docker secure containers per system • Data Centricity – 70% of Enterprise data is on the Mainframe Source: IBM
  • 25. 25 How Can we help you build Digital Trust? * Source: 1) As per 2016 Fortune 500 list of companies, published 6/6/16; CA data as of 1/31/17 https://www.ca.com/us/company/newsroom/press-releases/2017/ca-technologies-named-as-a-2017-worlds-most-ethical- company-by-the-ethisphere-institute-for-the-second-time.html $1T+ of 20 Largest Global Banks in financial transactions ensured and protected every day Co-invented and support Verify by Visa One of 2017’s Most Ethical Companies by Ethisphere Institute* 19 Trusted by Fortune 500 for 40+ Years to Verify, Protect & Ensure Systems
  • 26. Verified, Protected and Ensured by CA VERIFY PROTECT ENSURE DigitalTrust.ai Protect Systems Protect Data Privacy Verify Privileged Users Verify Identities Ensure Mission Critical Systems Verify Payments Verify API’s Verify Applications Cloud Mainframe Mobile 26 Become the trusted partner your customer needs.
  • 27. VERIFY PEOPLE PROTECT DATA ENSURE SYSTEMS DIGITAL TRUST is the currency of Digital Enterprise 27 Partner with your Line of Business to establish a digital trust strategy at the core of your organization to capitalize on new digital business opportunities faster than your competitors, because it reduces risk and improves your agility to scale to reach millions and billions of users and things