SlideShare uma empresa Scribd logo
1 de 38
Baixar para ler offline
World®
’16
Critical	Considerations	for	
Mobile	and	IoT Strategy
K.	Scott	Morrison	- Distinguished	Engineer	- CA	Technologies	
DO3X80V
DEVOPS
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
In	today's	digital	economy,	when	the	growth	of	mobile	apps	and	Internet	of	Things	
(IoT)	devices	is	exploding	everywhere,	it’s	important	to	understand	how	to	plan	for	
such	growth	within	your	enterprise.	Considerations	range	from	security,	
integration,	identity	management	and	encryption	to	scaling	for	IoT architectures.	
Join	this	session	to	hear	Scott	Morrison	explain	the	seven	critical	considerations	
for	mobile	and	IoT strategy.
K.	Scott	
Morrison
CA	Technologies
Distinguished	Engineer
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mobile	Optimization	Is	Now	a	Given	for	Business	Processes
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD4
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Top	Enterprise	Mobility	Concerns	1
1	SOTI	Survey	results:	118	ITDMs	responded,	September	22-29,	2015
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD6
✓ Network	separation
✓ No	programmatic	access	from	the	public	Internet
✓ Safety	through	total	isolation	and	control
In	the	Old	Days,	Apps	Lived	Inside	the	Firewall
Database
Web	App	
Servers
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD6
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD7
✓ Apps	handle	(and	mishandle)	user	credentials
✓ Firewalls	designed	to	inspect	human-readable	markup	can	miss	API	attack	vectors
✓ Security	standards	designed	for	enterprise	(e.g.	WS-*,	SAML)	are	not	ideal	for	lightweight	mobile	apps
But	Now	Mobile	Apps	Need	Programmatic	Access	to	Business	Services…
Data	TiersBusiness	
Service	APIs
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD7
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
••http://recode.net/2014/10/13/snapchat-blames-third-party-apps-for-hack-raising-questions-about-its-own-api/
••http://www.programmableweb.com/news/why-attack-buffer-was-serious-wake-call-web/analysis/2013/11/04Social	Media	Services
••http://www.programmableweb.com/news/yahoo-breach-involved-api-servers/elsewhere-web/2014/10/07
Leading	Web	Portal
••http://www.shubhro.com/2014/12/18/reverse-engineering-kayak-mitmproxy/
Travel	Broker
••http://www.developer-tech.com/news/2015/jan/08/moonpigs-api-breach-could-cost-its-business/
Dot	Com	Company
••http://www.securityweek.com/api-vulnerability-exposed-accounts-delmarva-power-customers
Energy	Company
••http://www.pcworld.com/article/2138400/hacked-passwords-can-enable-remote-unlocking-tracking-of-tesla-cars.html
Auto	Manufacturer
Old	Perimeter	Security	Mechanisms	Are	Failing
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD9
✓ Adopt	new	access	controls	designed	to	prevent	mishandling	of	user	credentials
✓ Include	API	firewalls
✓ Replace	or	bridge	to	existing	security	systems
But	Now	Mobile	Apps	Need	Programmatic	Access	to	Business	Services…
Data	TiersBusiness	
Service	APIs
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD9
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Top	Enterprise	Mobility	Concerns	1
1	SOTI	Survey	results:	118	ITDMs	responded,	September	22-29,	2015
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Demand	for	Mobile	Apps	Has	Exceeded	It’s	Ability	
to	Deliver
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mobile	Real	Estate	
Inspires	a	Whole	
New	Lifestyle
©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD12
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD13
The	First	Way	Most	Business	Fail	at	Mobility	Is	by	Attempting	to	Stuff	
Their	Customer	and/or	Employee	Portals	Into	a	Mobile	Browser
It	doesn’t	fit…
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD13
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CC#2:	Offering	Apps	That	Suit	the	Mobile	Lifestyle
• Concentrate	on	
focused	experiences
• Plan	to	use	native	
device	capabilities
• Avoid	frustrating	text	
input	(e.g.	for	login)
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
We’re	Totally	Different	People	When	We’re	Mobile
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD15
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mobile	Users	
Are
Busy,	
Distracted	
&	Impatient	
©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD16
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CC#3:	Supporting	Identities	That	the	User	Already	Trusts
Doesn’t	allowing	the	use	of	some	of	these	identities	open	up	new	risks	for	exploits	such	as	identity	theft?	Yes,	
indeed,	but	there	are	ways	to	mitigate	these	risks	in	ways	appropriate	to	your	business…	more	about	that	later.
ü Social	Identities
ü Bank	Cards
ü Phone	numbers
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Top	Enterprise	Mobility	Concerns	1
1	SOTI	Survey	results:	118	ITDMs	responded,	September	22-29,	2015
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Integration	Is	Still	the	Biggest	Cost	in	Mobile	Projects
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
How	Mobility	Is	Used	Today	in	Your	Organization?	1
1	SOTI	Survey	results:	118	ITDMs	responded,	September	22-29,	2015
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CC#4:	Plan	for	Integrations	With	Enterprise	Systems
ü Enterprise	User	Directory
ü Enterprise	Applications
ü Web	Portal	Infrastructure
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Top	Enterprise	Mobility	Concerns	1
1	SOTI	Survey	results:	118	ITDMs	responded,	September	22-29,	2015
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Data	Loss	Is	a	
Serious	Threat	
in	the	Mobile	
World
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD24
✓ On	device
✓ During	transmission
✓ At	rest	in	enterprise	or	cloud
Encrypt	ALL	of	the	Data
Cloud	Storage
On	Prem
Storage
On	Device	
Storage
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD24
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CC#5:	Store	and	Transfer	Enterprise	Data	Securely
ü Consider	using	Private	Clouds
ü Always	encrypt	on-device	data
ü Keep	data	in	motion	encrypted
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Top	Enterprise	Mobility	Concerns	1
1	SOTI	Survey	results:	118	ITDMs	responded,	September	22-29,	2015
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Enabling	
Communication	
&	Collaboration	
Is	the	Next	Big	
Thing
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD27
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CC#6:	Foster	Communication	&	Collaboration
Build	communication	
features	in	your	app
Exchange	your	data	via	
secure channels
Implement	bi-directional	
real-time	notifications
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Future	Is	
Already	Here	– It’s	
Just	Not	Evenly	
Distributed
©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD29
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CC#7:	Start	Planning	for	a	Scalable	IoT Architecture
Plan	for	deploying	IoT	aggregators	/	
Gateways
ü Less	sophisticated	endpoint	devices
ü Consolidate	disparate	endpoint	protocols	into	the	IoT	
platform	protocol
ü Consolidate	and	scale	device	management
ü Add	intelligence	to	perform	analytics
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD31
Our	Enterprise	Mobile	&	IoT	Vision
Simplify	complex	security,	interactivity	and	backend	integration	challenges	using	
developer-friendly	interfaces
Increase the	Speed	of	Enterprise	Mobile	App	Development
Unlock	
Enterprise	DataShare	
Data	
Securely
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD32
Unlock	Enterprise	Data
Rapid	Creation	of	Enterprise-class	APIs	From	Data	Sources
Unlock	
Enterprise	DataShare	
Data	
Securely
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD33
Secure	Mobile	Collaboration
Enterprise	Mobile	&	IoT	Collaboration,	Made	Simple and	Secure
Unlock	
Enterprise	DataShare	
Data	
Securely
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD34
Essential	mobile	services,	delivered	safe	and	secure
✓ Deliver	IoT	and	Mobile	apps	faster
✓ Reduce	security	exposure
✓ Gain	control	over	foundation	services
CA	Mobile	App	Gateway/Mobile	App	Services
Secure	Mass	
Storage
User	
Directory
Secure	
Pub/Sub
SDK
SDK
SDK
• Simplified	authentication	and	token	mgmt.
• Secure	MQTT	Pub/Sub	messaging
• Secure	cloud	and	on-device	storage		
• Dynamic	user/group	mgmt.
Authentication	
and	API	
Security
Device-native	
SDKs
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD34
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Seven	Critical	Considerations	
for	Mobile	and	IoT Strategy
1. Ensuring	the	security	of	enterprise	data	and	services
2. Offering	apps	that	suit	the	mobile	lifestyle
3. Supporting	identities	that	users	already	trust
4. Preparing	for	integration	with	enterprise	systems
5. Encrypting	data	still	and	in	motion
6. Fostering	communication	and	collaboration
7. Planning	for	a	scalable	IoT	architecture
World®
’16©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD35
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
DevOps	– API	Management	and	
Application	Development
For	more	information	on	DevOps	– API	Management	and	
Application	Development,	please	visit:	http://cainc.to/DL8ozQ

Mais conteúdo relacionado

Mais procurados

CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Technologies
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionCA Technologies
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsCA Technologies
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...CA Technologies
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldCA Technologies
 
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container GatewaysTech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container GatewaysCA Technologies
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadCA Technologies
 
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?CA Technologies
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyCA Technologies
 
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5CA Technologies
 
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...CA Technologies
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSCA Technologies
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...CA Technologies
 
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...CA Technologies
 
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®CA Technologies
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentCA Technologies
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? CA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital AgeCA Technologies
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA Technologies
 
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...CA Technologies
 

Mais procurados (20)

CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business IntelligenceCA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
 
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach PreventionPre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
 
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and SolutionsIdentity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
 
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
 
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices WorldStrategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
 
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container GatewaysTech Talk: CA API Gateway: Deploying Docker Container Gateways
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?Tech Talk: Want to get in on the Secret? How fast is your Directory?
Tech Talk: Want to get in on the Secret? How fast is your Directory?
 
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly EasyPre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
 
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
 
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
 
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaSIntroduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
 
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
 
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
 
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
CA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application SecurityCA API Gateway: Web API and Application Security
CA API Gateway: Web API and Application Security
 
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
 

Destaque

IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016Alex G. Lee, Ph.D. Esq. CLP
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2
 
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...Alex G. Lee, Ph.D. Esq. CLP
 
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesThe Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesDeloitte United States
 
Consumer vs industrial IoT
Consumer vs industrial IoTConsumer vs industrial IoT
Consumer vs industrial IoTPlamen Kiradjiev
 
Technology Management and Strategy [Part III]
Technology Management and Strategy [Part III]Technology Management and Strategy [Part III]
Technology Management and Strategy [Part III]Thanakrit Lersmethasakul
 
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17Hakyong Kim
 
Technology Management and Strategy [Part II]
Technology Management and Strategy [Part II]Technology Management and Strategy [Part II]
Technology Management and Strategy [Part II]Thanakrit Lersmethasakul
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyAlex G. Lee, Ph.D. Esq. CLP
 
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가   2015.12.01Io t 디바이스 어떻게 발전하고 무엇을 바꿀가   2015.12.01
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01Hakyong Kim
 
Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]Thanakrit Lersmethasakul
 
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)Hakyong Kim
 
Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]Thanakrit Lersmethasakul
 
사물인터넷, 이제는 서비스다!
사물인터넷, 이제는 서비스다!사물인터넷, 이제는 서비스다!
사물인터넷, 이제는 서비스다!Hakyong Kim
 
ICBM 산업동향과 IoT 기반의 사업전략
ICBM 산업동향과 IoT 기반의 사업전략ICBM 산업동향과 IoT 기반의 사업전략
ICBM 산업동향과 IoT 기반의 사업전략Hakyong Kim
 
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략Hakyong Kim
 
The Age of the IOT & Digital Business
The Age of the IOT & Digital BusinessThe Age of the IOT & Digital Business
The Age of the IOT & Digital BusinessMagnolia
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...Edureka!
 

Destaque (19)

IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
IoT + AI + Big Data Integration Strategy Insights from Patents 3Q 2016
 
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
WSO2Con USA 2017: Building Enterprise Grade IoT Architectures for Digital Tra...
 
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
 
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesThe Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use cases
 
Consumer vs industrial IoT
Consumer vs industrial IoTConsumer vs industrial IoT
Consumer vs industrial IoT
 
Technology Management and Strategy [Part III]
Technology Management and Strategy [Part III]Technology Management and Strategy [Part III]
Technology Management and Strategy [Part III]
 
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
아마존 사례로 살펴보는 사물인터넷 도입 전략 - 2015.04.17
 
Technology Management and Strategy [Part II]
Technology Management and Strategy [Part II]Technology Management and Strategy [Part II]
Technology Management and Strategy [Part II]
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
 
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가   2015.12.01Io t 디바이스 어떻게 발전하고 무엇을 바꿀가   2015.12.01
Io t 디바이스 어떻게 발전하고 무엇을 바꿀가 2015.12.01
 
Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]Technology Management and Strategy [Part IV]
Technology Management and Strategy [Part IV]
 
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
사물인터넷 비즈니스 어프로치 (Internet of Things (IoT) Business Approach)
 
Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]Technology Management and Strategy [Part I]
Technology Management and Strategy [Part I]
 
사물인터넷, 이제는 서비스다!
사물인터넷, 이제는 서비스다!사물인터넷, 이제는 서비스다!
사물인터넷, 이제는 서비스다!
 
ICBM 산업동향과 IoT 기반의 사업전략
ICBM 산업동향과 IoT 기반의 사업전략ICBM 산업동향과 IoT 기반의 사업전략
ICBM 산업동향과 IoT 기반의 사업전략
 
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
사물인터넷 강의 - 사물인터넷 기반의 비즈니스 전략
 
The Age of the IOT & Digital Business
The Age of the IOT & Digital BusinessThe Age of the IOT & Digital Business
The Age of the IOT & Digital Business
 
IoT architecture
IoT architectureIoT architecture
IoT architecture
 
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
What is Artificial Intelligence | Artificial Intelligence Tutorial For Beginn...
 

Semelhante a Critical Considerations for Mobile and IoT Strategy

ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InCA Technologies
 
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...CA Technologies
 
Hr analytics, insights and implementation forum apac 2016
Hr analytics, insights and implementation forum apac 2016Hr analytics, insights and implementation forum apac 2016
Hr analytics, insights and implementation forum apac 2016Jayesh Menon
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotMassTLC
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry
 
Guide to Dreamforce 2016 – Digital Retail Marketing
Guide to Dreamforce 2016 – Digital Retail MarketingGuide to Dreamforce 2016 – Digital Retail Marketing
Guide to Dreamforce 2016 – Digital Retail MarketingCharlotte Brook
 
ComCap: Digital Marketing Overview 2016
ComCap: Digital Marketing Overview 2016ComCap: Digital Marketing Overview 2016
ComCap: Digital Marketing Overview 2016Uren Dhanani
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesimmixGroup
 
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io FlowWebinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io FlowBuiltio
 
The Road to a Cloud-First Enterprise
The Road to a Cloud-First EnterpriseThe Road to a Cloud-First Enterprise
The Road to a Cloud-First EnterpriseLeon Stigter
 
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitCustomer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitForgeRock
 
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...immixGroup
 
Forecast 2017: Tech M&A Monthly
Forecast 2017: Tech M&A MonthlyForecast 2017: Tech M&A Monthly
Forecast 2017: Tech M&A MonthlyCorum Group
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...CA Technologies
 
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitForgeRock
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitectureFrancisco Maroto
 

Semelhante a Critical Considerations for Mobile and IoT Strategy (20)

ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come InPre-Con Ed: Knock, Knock, the IoT Wants to Come In
Pre-Con Ed: Knock, Knock, the IoT Wants to Come In
 
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
 
Hr analytics, insights and implementation forum apac 2016
Hr analytics, insights and implementation forum apac 2016Hr analytics, insights and implementation forum apac 2016
Hr analytics, insights and implementation forum apac 2016
 
Ben goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiotBen goodman cybersecurity in the iiot
Ben goodman cybersecurity in the iiot
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
BlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT ExpoBlackBerry Enterprise of Things presentation - Gartner IT Expo
BlackBerry Enterprise of Things presentation - Gartner IT Expo
 
Guide to Dreamforce 2016 – Digital Retail Marketing
Guide to Dreamforce 2016 – Digital Retail MarketingGuide to Dreamforce 2016 – Digital Retail Marketing
Guide to Dreamforce 2016 – Digital Retail Marketing
 
ComCap: Digital Marketing Overview 2016
ComCap: Digital Marketing Overview 2016ComCap: Digital Marketing Overview 2016
ComCap: Digital Marketing Overview 2016
 
Department of Justice IT Sales Opportunities
Department of Justice IT Sales OpportunitiesDepartment of Justice IT Sales Opportunities
Department of Justice IT Sales Opportunities
 
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io FlowWebinar: How To Build A Bot With Cisco Spark And Built.io Flow
Webinar: How To Build A Bot With Cisco Spark And Built.io Flow
 
The Road to a Cloud-First Enterprise
The Road to a Cloud-First EnterpriseThe Road to a Cloud-First Enterprise
The Road to a Cloud-First Enterprise
 
INGENIA: offshoring software development services for FinTech
INGENIA: offshoring software development services for FinTechINGENIA: offshoring software development services for FinTech
INGENIA: offshoring software development services for FinTech
 
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitCustomer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity Summit
 
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
Tapping into IT Sales Opportunities across Office of the Secretary of Defense...
 
Forecast 2017: Tech M&A Monthly
Forecast 2017: Tech M&A MonthlyForecast 2017: Tech M&A Monthly
Forecast 2017: Tech M&A Monthly
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
 
Presentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise ArchitecturePresentation: Impact of IoT in Enterprise Architecture
Presentation: Impact of IoT in Enterprise Architecture
 

Mais de CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

Mais de CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Último

20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdfJamie (Taka) Wang
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceMartin Humpolec
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxYounusS2
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 

Último (20)

20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
20200723_insight_release_plan_v6.pdf20200723_insight_release_plan_v6.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Things you didn't know you can use in your Salesforce
Things you didn't know you can use in your SalesforceThings you didn't know you can use in your Salesforce
Things you didn't know you can use in your Salesforce
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Babel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptxBabel Compiler - Transforming JavaScript for All Browsers.pptx
Babel Compiler - Transforming JavaScript for All Browsers.pptx
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 

Critical Considerations for Mobile and IoT Strategy