TECH DIGITAL RESOURCE LIBRARY

CA (Computer Associates)


Latest Content From CA (Computer Associates)

Webcast: The DevOps Virtual Summit

by CA (Computer Associates)Feb 12, 2015

This virtual event puts you in direct contact with experts and leaders in the DevOps space, including noted speakers from InformationWeek, Gartner, Intellyx and CA Technologies -- all without ever having to leave your seat! Learn best practice approaches for DevOps in areas of agile development, continuous delivery, and agile IT operations, and watch an inspiring keynote from Gene Kim.

  • Learn how continuous delivery can deliver value to your organization and customers
  • Apply the agile methodology and principles to your entire organization's processes (beyond development & IT)
  • Remove bottlenecks, trouble spots, unnecessary expenses, risks, and other inefficiencies from your software deployment, support, and IT maintenance processes

The DevOps virtual event goes well past the basics of agile and DevOps, diving deep into how the tandem methodologies can impact and improve your entire organization’s efficiency and collaboration. With the right DevOps tools, support, and expert guidance, both your organization and your customers will benefit from increased collaboration, properly prioritized application feature development, and higher quality applications and support.


Whitepaper: Enterprise Security & the Mainframe: A Holistic Approach

by CA (Computer Associates)Feb 11, 2015

To protect your organization from advanced threats and data breaches, you need a comprehensive, in-depth security strategy. It must cover distributed systems and devices, as well as the mainframes at the core of sensitive data storage structures. This ebook will help you discover the four critical elements of a modern multi-layered, defense-in-depth security strategy.


Whitepaper: Enterprise Security & the Mainframe: A Holistic Approach

by CA (Computer Associates)Feb 11, 2015

To protect your organization from advanced threats and data breaches, you need a comprehensive, in-depth security strategy. It must cover distributed systems and devices, as well as the mainframes at the core of sensitive data storage structures. This ebook will help you discover the four critical elements of a modern multi-layered, defense-in-depth security strategy.


Whitepaper: Enterprise Security & the Mainframe: A Holistic Approach

by CA (Computer Associates)Jan 30, 2015

To protect your organization from advanced threats and data breaches, you need a comprehensive, in-depth security strategy. It must cover distributed systems and devices, as well as the mainframes at the core of sensitive data storage structures. This ebook will help you discover the four critical elements of a modern multi-layered, defense-in-depth security strategy.


Whitepaper: Preparing for the Reality of Virtualization

by CA (Computer Associates)Jan 01, 2008

As a technology, virtualization has been around for quite awhile, but server virtualization, as a tool for maintaining business continuity and managing server cost, has given virtualization technology its second wind. At the same time, while virtualization may be easy to deploy it can create a new level of complexity for IT. Adding clustered environments only compounds the issue. Virtualized environments are different from physically constrained environments and it is important to address the differences from the start.


Whitepaper: The Threats You Face: Why Total Protection Matters

by CA (Computer Associates)Jan 01, 2008

A third of small-sized businesses and mid-sized businesses have suffered at least some disruption due to security issues. Just as threatening are business losses caused by compromised data integrity or privacy - as well as disasters and accidents beyond anyone’s control. This paper published by Computer Associates (CA) describes the dangers business faces as well as the techniques that can help one mitigate or even eliminate them. Because of the Internet, email and instant messaging have become important modes of communication, speeding the exchange of information and tightening the time that?s needed to complete business transactions.


Whitepaper: Best Practices: Backup and Recovery Strategies

by CA (Computer Associates)Jan 01, 2008

This paper published by CA (Computer Associates) examines the kinds of data storage technologies and solutions that are best for all businesses and offers some best practices for ensuring the successful data backup and recovery required to sustain operations - regardless of what happens to business. It’s always a challenge to keep business data readily available when one needs it. And this job gets even tougher with smaller technical staff - assuming that one have a staff at all.


Whitepaper: BrightStor ARCserve Backup: Using Disk-Based Backup With ExaGrid

by CA (Computer Associates)Jan 01, 2008

This white paper published by CA (Computer Associates) provides guidance on integrating BrightStor ARCserve Backup solution with the ExaGrid disk-based backup system to design and optimize a total cost-effective, disk-based backup solution. The paper explains how ExaGrid functions and how the customer will benefit from using it in conjunction with BrightStor ARCserve Backup. It also gives guidance on issues and configuration questions that storage administrators will encounter when deploying the combined solution and addresses common backup and recovery scenarios to assist in disaster recovery planning.


Whitepaper: Managing Access in a Virtualized Environment

by CA (Computer Associates)Jan 01, 2008

This paper published by CA (Computer Associates) explains that organizations are adopting virtualization technology to reduce total cost of ownership and improve quality of service of IT systems. This strategy provides the operational foundation to consolidate critical services and sensitive data that were once scattered amongst distributed system deployments. To reduce virtualization security risks, an independent access enforcement technology must be employed in conjunction with system security measures. Some of the vulnerabilities that were traditionally controlled by the presence of physical security must now be mitigated through the implementation of granular access controls on the virtualization platform


Whitepaper: The Synergy of the Four Elements of Enterprise Security Policy Context

by CA (Computer Associates)Jan 01, 2008

Current methods of managing security are fragmented and incomplete. One approach focuses on the management of users. Another is dedicated to the management of threats on endpoints. Each of these methodologies has an incomplete view of all of the various factors that contribute to an organization’s security risks. Risk management requires a holistic approach to security and control. The emerging paradigm of risk management will evolve from a new approach to security management based on a merger of these two schools of thought.