CA Technologies Whitepapers


Sort by: Date | Company | Title


From Infrastructure to Applications: The Future of IT is On-Demand
By CA Technologies | 29/5/2014

In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.

Download this now


Who’s Minding your Cloud?
By CA Technologies | 29/5/2014

CA commissioned Ponemon Institute to survey 748 IT and IT security practitioners for the 2013 Security of Cloud Computing Users study to see how cloud security has progressed over 2 years. This Infographic will show you the results - while security is improving, lingering doubts remain.

Download this now


Securing the Mobile Cloud Connected Enterprise
By CA Technologies | 29/5/2014

The rise of mobile users and apps, coupled with the continued growth in SaaS, has transformed traditional business environments. Identity is the new perimeter. Learn what you can do with a centralized Identity Access Management (IAM) service across this hybrid IT environment.

Download this now


IAM Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
By CA Technologies | 29/5/2014

Many organisations leverage a hybrid cloud & on-premise architecture, but one of their major challenges is ensuring users can seamlessly move around the environment while still maintaining consistent control and security policy between on-premise and cloud services.

Download this now


Enabling and Protecting the Open Enterprise
By CA Technologies | 29/5/2014

A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

Download this now


CA Technologies Strategy and Vision for Cloud Identity and Access Management
By CA Technologies | 29/5/2014

Cloud computing introduces new security challenges for both consumers and providers of cloud services across all types of IT environments. CA’s strategy and vision outlines how to securely provision users, and choose & simplify an IAM deployment models.

Download this now


CSO Spotlight on Mobile & Cloud Security
By CA Technologies | 7/11/2012

Sponsored by CA Technologies. The bring-your-own-device (BYOD) movement has proven to be both a godsend for workers and a nightmare for CIOs, especially when it comes to securing the data they carry. Read more.

Download this now