CA, Inc.

Our Website: http://www.ca.com/

Latest Content From CA, Inc.

Whitepaper: How the Cloud will Change Application Release Applications

by CA, Inc.Jan 08, 2014

The growing emphasis on application agility requires IT focus on excellence in application release operations. Getting application release operations right streamlines the process of getting an application into the hands of users, providing the business with justification for a move to the cloud.

Whitepaper: A New Vision for High Velocity Application Delivery: How an Automated Lifecycle Approach to DevOps Supports the Agile Business

by CA, Inc.Jan 08, 2014

Execution, combined with innovative thinking and bright ideas, is the key differentiator setting leading companies apart from trailing competitors. This emphasis on execution contributes to the fact that Agile development is becoming increasingly hot.

This white paper discusses key concepts supporting the Agile methodology and the foundational role of enterprise management tools in automating the "ideas to action" cycle. Inside, learn how business' ability to adapt is largely dependent

Whitepaper: How to Engage Mobile Customers While Protecting Sensitive Enterprise Data

by CA, Inc.Jul 01, 2013

New business opportunities are taking shape as consumers across the globe are adopting new mobile devices, high-speed access and innovative mobile applications. But this proliferation of mobile devices, the development of intelligent and composite applications, the number of multi-device users, and the shift to bring your own device (BYOD) has created many challenges for businesses to effectively capitalize on mobile opportunities.

Download this white paper to explore how to:

Whitepaper: Protect Your Enterprise Data Through Privileged Identity Management

by CA, Inc.Jul 01, 2013

Controlling access to privileged accounts by controlling only the password does not limit what malicious users can do once they access a privileged account. This applies both to insider threats as well as external, Advanced Persistent Threats or phishing schemes to reveal key passwords.

Discover how privileged identity management tools can help you:

? Mitigate risk and increase data integrity by securing privileged user passwords
? Track actions of all individuals,

Whitepaper: Reduce Risk Through Privileged Identity Governance and Controls

by CA, Inc.Jul 01, 2013

Failure to govern and control privileged identities could result in data loss or destruction, malicious or inadvertent damage, fines, and even lawsuits. The processes for reviewing and approving administrators' access rights and policies are often manual, labor-intensive and inefficient, making real-time adherence to segregation of duties and other compliance policies very difficult.

Download this white paper to learn how to:

? Regulate and audit privileged user access

Whitepaper: Deploying Effective Mobile Authentication for Your Mobile Enterprise Strategy

by CA, Inc.Jul 01, 2013

To protect your consumer and enterprise data in the fast-growing mobile app and Bring Your Own Device (BYOD) business environment, your enterprise needs a solid security strategy that addresses, and supplies effective mechanisms for, mobile authentication. Deploying access policies that can be applied to multiple interaction methods provides a more user-friendly and consistent experience, while simplifying their administration and reducing support costs.

Download this white paper to

Whitepaper: Cloudy With A Chance Of Configuration Management

by CA, Inc.Nov 01, 2009

Technology evolves, and to remain relevant so must processes. With the rise of cloud computing and the proliferation of virtualization, many question the efficacy of configuration management and the place of the CMDB in the future of IT. How can a discipline based on a methodical process-based approach remain relevant in a world where abstraction and automation lead to minute-by-minute changes in the service infrastructure? This paper attempts to answer these questions by first validating the

Whitepaper: Results Of Validation Testing CA ARCserve Version 12.5

by CA, Inc.Aug 06, 2009

Despite the growing use of traditional tape backup for business continuity, cost-containment, compliance, and other data protection issues, negative perceptions of tape backup persist. This report provides an assessment of tape backup designed to set the record straight about the misperceptions of the medium, demonstrate the value of data deduplication, and prove the merits of its application to data management and recovery in both physical and virtualized IT environments. Toigo Partners

Whitepaper: Managing & Troubleshooting, VoIP

by CA, Inc.Jul 22, 2008

When you hear Quality of Service (QoS) do you focus on "quality" or "service"? QoS is more than MOS and DiffServ. Learn how to deploy and manage VoIP by focusing on voice and network management and capturing key metrics.