CA

Displaying 1-40 of 264 results

  • White Papers // Oct 2011

    Recommendations for risk management

    As IT infrastructures become more complex, managing who, what, where, when and how IT resources and data are being accessed has never been more important. The IT department has a big job in managing technology, but today's businesses want IT to act more as a service provider ? one that...

    Provided By CA

  • White Papers // Aug 2011

    Cloud computing and virtualisation: Why IT automation matters.

    IT organisations can obviously see potential benefits from using cloud computing and virtualisation, from cost savings to a flexible infrastructure. But research from UBM TechWeb for CA shows that many IT administrators are struggling to realise this potential without the use of IT services automation. Can you remember why you...

    Provided By CA

  • White Papers // Aug 2011

    Establish and automate an end-to-end framework

    Despite its many departments and services, an enterprise can still work cohesively if it has a comprehensive process and the linked tools to support it. Good procedures and tools to manage processes can improve an organisation's agility, while also answering the immediate call from internal customers who might find the...

    Provided By CA

  • White Papers // Jul 2011

    Innovations in managing IT service quality

    The ongoing global economic recession has left no business, budget, or IT organization unscathed. Corporations, forced to do more with fewer resources, are demanding greater economies of scale. That sets expectations that IT organizations will remain lean yet deliver high-quality services and support. This requires IT organizations to develop more...

    Provided By CA

  • White Papers // Jul 2011

    How to assure customers of the quality and availability of business services

    As IT organisations are increasingly measured by their relationship to revenue, employee productivity and business success, the more they need to visualise, analyse and manage how the components in their IT environment impact business services. Read how CA Service Assurance addresses these key challenges and provides a comprehensive, unified understanding...

    Provided By CA

  • Case Studies // Jun 2011

    PGi Halves the Time-to-Market for New Products With Cloud Infrastructure Solutions From CA Technologies

    Premier Global Services, Inc. (PGi) is a software and services company delivering real-time virtual meetings, conferencing and collaboration solutions. Their challenge is To maintain its competitive advantage, PGi needs to continuously reinvent its solutions. However, lengthy IT provisioning processes were impacting the time-to-market for new customer offerings. Using CA 3TeraAppLogic...

    Provided By CA

  • Webcasts // Mar 2011

    Webinar: Powerful Control of Privileged Users

    In this webinar learn about Privileged User Management and why organizations need it. The challenges of Privileged User Management will be discussed as well as the CA Technologies solution for overcoming them. Please watch to learn more.

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can I Overcome the Security Challenges of Today's Virtualized Infrastructures?

    According to Gartner, "through 2012, 60% of virtualized servers will be less secure than the physical servers they replace, dropping to 30% by Year End 2015." So regardless of how "physical" or "virtual" an infrastructure is, it's clear that the need for complete security management is paramount. Organizations hoping to...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can Identity and Access Management Help Improve My Compliance Programs?

    With the right technology in place, companies can provide evidence that their controls are effective, and compliance audits may thus be a less painful and expensive process. Organizations hoping to achieve this can begin by: Understanding the compliance lifestyle Implementing Content-aware IAM solution Leveraging compliance to improve business efficiency...

    Provided By CA

  • White Papers // Mar 2011

    CA Technology Brief: Content-aware IAM

    There are several key drivers for most IT organizations today. First, they must reduce risk, and maintain privacy of corporate and customer information. Second, they must comply with regulatory and industry mandates. Third, they must improve operational efficiencies. And, finally, they must enable the business for growth. A key...

    Provided By CA

  • White Papers // Mar 2011

    CA Solution Brief: Content Aware Identity and Access Management

    CA Content-Aware Identity and Access Management (IAM) solutions enable you to control user identities, access, and information use. You can achieve more effective compliance, reduce IT risk, and expand your customer and partner relationships to help grow your business. Managing the identities and access rights of those inside and...

    Provided By CA

  • White Papers // Mar 2011

    Success Story: DBS IAM Success

    DBS enhances its competitive advantage with CA Identity and Access Management platform Business: DBS is one of the largest financial services groups in Asia with operations in 16 markets. Headquartered in Singapore, DBS provides the full range of services in corporate, small and medium enterprises (SME), consumer and wholesale banking...

    Provided By CA

  • White Papers // Mar 2011

    Success Story: ING Australia IAM

    Business: ING is one of Australia's leading providers of fund management, life insurance and superannuation accounts. It has more than $45 billion in assets under management. Its services are provided via a network of financial advisers and institutions. Challenge: ING is increasingly using the Internet to deliver customer services....

    Provided By CA

  • White Papers // Mar 2011

    Workload Automation for the Cloud

    As cloud computing has become a strategic initiative for large enterprises, the new method of delivering and consuming IT services has forces its user to rethink domains like job scheduling that have long been considered mature and stable. This paper discusses workload automation and job scheduling as it pertains to...

    Provided By CA

  • White Papers // Mar 2011

    Getting Virtualization Back in Gear: Overcoming VM Stall Through 1:1 Virtualization

    The potential benefits of virtualization are well documented: increased agility, improved disaster recovery capability, and significant cost savings due to server consolidation. However, many companies experience political and cultural barriers after virtualizing 15-30% of IT processes. IT leaders often cite security, compliance, and visibility as the primary concerns behind these...

    Provided By CA

  • White Papers // Mar 2011

    Increase Operational Efficiency - Enabling End-to-End Change Automation

    Because it often includes several siloed groups and responsibilities within the larger IT organization, comprehensive IT change configuration and release management (CCRM) continues to confound and frustrate both IT and the business units for which it provides services. Many companies struggle to quickly and flexibly respond to change requests and...

    Provided By CA

  • Webcasts // Mar 2011

    Velocity Event: Accelerate your Journey to Virtualization and the Cloud

    Accelerate your Journey to Virtualization and the Cloud Published: 28 Dec 2010 CA Technologies recently invited four industry experts on virtualization and cloud computing to participate in a panel discussion. This executive seminar was beamed live in high definition to audiences in 30 cities across the US. This exceptional panel...

    Provided By CA

  • Webcasts // Mar 2011

    The Evolution of Workload Automation

    This video discusses the benefits of workload automation such as reduced costs, improved agility and a more granular use of resources. Please view to learn more.

    Provided By CA

  • White Papers // Mar 2011

    Cloud Cross-CSU white paper: Can You Harness Cloud without Creating Storms?

    The role of IT isn't about to change ? it is already changing and at lightning speed. So how do you capitalize on powerful new technologies like cloud computing without the turbulence of rapid change? You start by gaining exceptional insight and control over your current physical and virtual environments....

    Provided By CA

  • White Papers // Mar 2011

    Catholic Health East Customer Success

    Business: Catholic Health East (CHE) includes 34 acute care hospitals, 14 assisted living facilities and 32 home health/hospice agencies as well as numerous other health services and centers. Co-sponsored by nine religious congregations and Hope Ministries, CHE is a US-based multi-institutional Catholic health system. Challenge: To ensure the effectiveness of...

    Provided By CA

  • Webcasts // Mar 2011

    Donors Choose 3Tera Video

    Learn more at www.donorschoose.org. Oliver Hurst-Hiller, CTO of DonorsChoose.org talks about why they moved to the cloud.

    Provided By CA

  • White Papers // Mar 2011

    Forrester - You're Not Ready for Internal Cloud

    Cloud computing ? a standardized, self-service, pay-per-use deployment model ? provides companies with rapid access to powerful and more flexible IT capabilities and at price points unreachable with traditional IT. Although many companies are benefitting from public cloud computing services today, the vast majority of enterprise infrastructure and operations (I&O)...

    Provided By CA

  • White Papers // Mar 2011

    Layered Tech Case Study

    Business: Layered Tech is a leader in managed hosting services with data centers in the US, Europe and Japan and clients ranging from Web startups to some of the world's largest consultancy firms. Challenge: As Layered Tech customers required more complex services, the cost of servicing them increased. They needed...

    Provided By CA

  • White Papers // Mar 2011

    White Paper: Five Keys to a Successful Identity & Access Management Implementation

    Using these five best practices to guide an IAM implementation brings numerous benefits. For one, the phased approach enables you to quickly realize value from your investment, rather than waiting for many months or years. As you implement more phases, you continually add to that value. With an effective internal...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can IAM Improve IT Security and Reduce Risk to Help Drive my Business?

    Understanding the limitations of traditional IAM Providing the ability to automate and improve the process of managing users, their roles and their access to applications and information has always been the primary focus-and benefit-of traditional IAM solutions. But what happens once users get access to the information? How can they...

    Provided By CA

  • White Papers // Mar 2011

    Executive Brief: How can I Adopt Cloud Computing While Maintaining Strong Security?

    In today's business landscape, enterprises are increasingly consuming IT services from the cloud, but even as they do, they're becoming more concerned with how they can ensure effective security of their data and services in the cloud-especially since they have limited direct control or visibility over them. At the same...

    Provided By CA

  • White Papers // Mar 2011

    The Arrival of 'Cloud Thinking': How and Why Cloud Computing Has Come of Age In Large Enterprises" (White paper, Management Insight Technologies)

    Much is being made of the "the cloud." The money it will save. The agility it will bring to computing. What is less obvious is how IT departments are actively employing cloud services today. How they are reacting to both public and private cloud initiatives. What it will mean over...

    Provided By CA

  • White Papers // Mar 2011

    Gartner Newsletter

    Cloud computing signifies a transformational approach in the way businesses consume and utilize IT resources. Based on the efficient use of on-demand computing, cloud computing is the logical evolution of efficiencies IT managers strive for as they manage the IT infrastructures they own today. In the future, virtualization and cloud...

    Provided By CA

  • Webcasts // Mar 2011

    ROI and Happy Online Customer Webcast

    Online customers are demanding a greater amount of Web services, delivered at faster speeds. But how do you balance the needs of these customers with shrinking IT budgets? Application Performance Management (APM) is the answer. Join CA and guest speaker Forrester Research, Inc. consultant Jonathan Lipsitz for this exclusive...

    Provided By CA

  • White Papers // Mar 2011

    CIOs Feel the pressure to optimize online experience

    In an exclusive survey, members of the CIO Forum on LinkedIn have weighed in on the business impact of application performance. These CIOs and IT leaders say they directly associate application performance with end-user and customer satisfaction, along with the potential to increase productivity and lower costs. Based on this...

    Provided By CA

  • Webcasts // Mar 2011

    Reporter Analyzer Webcast

    Traffic Analysis gives IT Professionals insight into how applications are impacting network performance. View this webcast to learn about Traffic Analysis as a vital component of service assurance.

    Provided By CA

  • White Papers // Mar 2011

    APM for IM x-sell whitepaper - Linking infrastructure management and application performance

    It is a common goal of IT departments across enterprises, government agencies and service providers to determine the most effective way to identify, locate and resolve problems affecting critical business applications. One way IT has attempted to achieve this goal is by forging a tighter bond between the activities of...

    Provided By CA

  • White Papers // Mar 2011

    NetQoS to IM and APM whitepaper

    IT professionals tasked with managing today's dynamic and increasingly complex local- and wide-area networks are often judged by how well they can optimize availability and performance to provide a high-quality user experience. Thanks in large part to advances in the areas of dual power supplies, failover technologies and redundant routes,...

    Provided By CA

  • Webcasts // Mar 2011

    IDC Webcast: Automation: Prerequisite for Cloud

    The promise and benefits of Cloud are impossible without automation. Join our moderator, Ryan Shopp and industry experts Mary Johnston Turner, Research Director - IDC and Stephen Elliot, VP Strategy - CA Technologies in an open discussion walking through the challenges, explaining pragmatic approaches to increase the odds of success...

    Provided By CA

  • White Papers // Mar 2011

    Webcast: Role of Automation in Cloud Computing. Featured analyst from RedMonk

    This webcast provides an analyst's perspective on cloud computing and the role of automation. It will discuss how to leverage both Public and Private Clouds with a Hybrid Cloud. Additionally it will introduce CA's new automation suite. View to learn more.

    Provided By CA

  • White Papers // Mar 2011

    Computer World Executive Report: The Best of Both Worlds: The Hybrid Cloud

    To handle the demands of modern business, CIOs must manage their internal data centers more effectively and learn how to leverage public cloud resources. The solution: a hybrid cloud strategy facilitated by a dynamic data center. Who knew that a video marketing campaign featuring a donkey, a baby and a...

    Provided By CA

  • White Papers // Mar 2011

    Ponemon Survey: Security of Cloud Computing Users

    CA and Ponemon Institute are pleased to present the results of the Security of Cloud Computing Users study. This paper represents the first of a two-part series on security of cloud applications, infrastructure and platforms. We also have a second study that focuses on cloud computing providers located in the...

    Provided By CA

  • White Papers // Mar 2011

    Forrester Paper: The Total Economic Impact of CA Identity Manager

    In January 2010, CA commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying CA Identity Manager (CA IM). CA IM is used by organizations to provide automated user provisioning, user self-service for password resets, workflows for submitting and...

    Provided By CA

  • White Papers // Mar 2011

    The Emergence of SA in Enterprise IT - WP

    In June 2010, CA Technologies commissioned Forrester Consulting to evaluate issues surrounding the assurance of critical business services and applications. In surveying more than 150 IT professionals with direct responsibility for network, systems, and/or application delivery, Forrester found that all of these enterprises had fundamental issues around managing the performance...

    Provided By CA

  • White Papers // Mar 2011

    Vendor Report: CA Technologies Virtualization Security (KuppingerCole)

    Virtualization Security is not a single product category but comprises several different types of solutions from different categories, including IAM (Identity and Access Management), information protection, service automation, service assurance, service management, as well as system security solutions for hardening and monitoring resources. In order to be effective, Virtualization Security...

    Provided By CA

  • White Papers // Apr 2009

    Integrated Infrastructure and Performance Management for Virtualized Environments

    In addition to its commitment to supporting multiplatform, multivendor, multiprotocol infrastructures, CA has implemented a long-term strategic focus on virtualization. This corporate priority has enabled CA to become the leader in management solutions for virtual environments. The company's virtualization focus and its tight relationship with virtual technology providers, such as...

    Provided By CA

  • White Papers // Apr 2009

    Role Management and Identity Compliance: The Business Imperatives

    There is a good chance that Role Management and Identity Compliance processes are already in place in organization. Roles are a fundamental element which most identity management and enterprise IT systems already depend on to determine what users should be able to do. Meanwhile, compliance regulations and security requirements are...

    Provided By CA

  • White Papers // Apr 2009

    Mainframe Security and Compliance - Getting It "RIGHT" the First Time

    The move from a reactive posture to a proactive one that is characterized by automated, repeatable processes for security management is the key to reducing the total cost and complexity of compliance - "Doing the right things, and doing things right". To achieve it, one must go beyond the minimum...

    Provided By CA

  • White Papers // Apr 2009

    APM: The Key to EITM Success

    Running a streamlined and efficient IT organization that is aligned with the goals of the business is critical for today's leading-edge companies. However, IT must not simply support the business; it must generate value and improve revenue by becoming a source of innovation. To do this, the IT organization must...

    Provided By CA

  • White Papers // Aug 2008

    BSM: Delivering on Business Goals - The True Value Proposition of Business Service Management Begins With Practical IT Strategies to Support Business Goals

    In a recent online survey of 111 senior IT managers, Computerworld asked respondents about their strategies for aligning IT with the business. Survey results show that for many IT leaders, alignment with the business no longer means just cutting costs or rolling out strategic applications. Increasingly, CIOs define alignment in...

    Provided By CA

  • White Papers // Nov 2008

    Improving IT Economics With Enterprise IT Management to Realize Greater Value

    As Information Technology (IT) has become a key driver of business growth and profitability, the challenges CIOs face are more strategic and business-focused than ever before. CIOs must constantly show the value of IT. Fundamentally, CIOs have become the stewards of IT economics. They are expected to meet the seemingly...

    Provided By CA

  • White Papers // Nov 2008

    Improving IT Economics: Thinking 'Lean'

    Applying 'Lean' principles originally designed in manufacturing and perfected by the likes of Toyota and Motorola better enables IT to identify and eradicate anything that is wasteful within IT management. In the words of 'Lean', anything wasteful is work that adds no value to a product or service that organizations...

    Provided By CA

  • White Papers // Mar 2009

    IPTV: More Than a Pretty Picture

    IPTV is a game-changing technology. But for telecommunications providers to successfully roll out and drive customer adoption of IPTV services, they must leverage the interactivity delivered by the IP side of the equation. This means developing, delivering and supporting new types of complex software applications that are delivered along with...

    Provided By CA

  • White Papers // Feb 2009

    Application Performance Management Tips: Simple Ways to Enhance Your CA Wily Deployment

    The Application Performance Management Maturity Model provides guidance to many CA Wily customers on how to improve the value and capability of their CA Wily deployments. While many enhancements may require additional monetary and time investments, some are relatively straight-forward as described in this paper. There are many more tips...

    Provided By CA

  • White Papers // Sep 2007

    Best Practice Methodologies for the Project Management Office (PMO)

    This paper, the third in a four-part series from CA, discusses the three leading formalized project management methodologies - the Project Management Institute's (PMI) Management Book of Knowledge (PMBOK), the UK-born Projects in Controlled Environments (PRINCE2), and Control Objectives for Information and Related Technology (COBIT), from the Information Systems Audit...

    Provided By CA

  • White Papers // Apr 2009

    Data Loss Prevention Requirements Roadmap

    The creation and sharing of digital information within the typical enterprise continues to accelerate. Being able to effectively and efficiently exchange this information to and from any location or person is a prerequisite for every successful company today. There is an opportunity to raise awareness about the value and proper...

    Provided By CA

  • White Papers // Oct 2008

    Discovery and the Configuration Management Database (CMDB)

    A Configuration Management Database (CMDB) forms the foundation for many processes that contribute to running, growing, and transforming the business. When running the business, a CMDB can reduce costs by helping to contain the effects of incidents, improve the process of change, and provide governance and predictability to operations. However,...

    Provided By CA

  • White Papers // Mar 2009

    Enabling Business-Driven Automation for Business Advantage

    Today's businesses demand more from IT than ever before. IT is expected to help the business innovate and grow, regardless of the difficult economic times. Business-Driven Automation (BDA) enables IT to reduce costs and increase agility and service quality by enabling dynamic, real-time response to changing business demands - allowing...

    Provided By CA

  • White Papers // Mar 2009

    Enabling Effective Change Management With an Integrated Change Control Mechanism

    Altering IT systems is a key capability enterprises must possess if they wish to effectively keep pace with an evolving business landscape. Managing this process with the help of a comprehensive, fully integrated change management solution allows organizations to exert a higher degree of control over when, why and by...

    Provided By CA

  • White Papers // Jan 2009

    Got Value? Getting the Most Out of Mainframe Software

    This white paper provides an examination of how Dr. Covey's ideas in The 7 Habits of Highly Effective People can help make IT managers become highly effective business people by understanding the power in the habits that can rule peoples' lives. These habits consist of knowledge, skill and desire and...

    Provided By CA

  • White Papers // May 2009

    Adopting Server Virtualization for Business Continuity and Disaster Recovery: CA ARCserve Backup and CA XOsoft Replication and High Availability Software With Hyper-V Technology - A Powerful Combination

    Server virtualization technology helps significantly reduce overall IT capital expense and operational costs. Hyper-V virtualization technology, a feature of the Windows Server 2008 operating system, is an enterprise-class virtualization solution that can be quickly deployed in any business environment. By using Hyper-V with BC/DR solutions from CA such as CA...

    Provided By CA

  • White Papers // Apr 2009

    Innovations in Managing IT Service Quality: Managing Service Quality and Risk to Service Delivery in a Lean Economy

    The ongoing global economic recession has left no business, budget or IT organization unscathed. Corporations, forced to do more with fewer resources, are demanding greater economies of scale. That sets expectations that IT organizations will remain lean, yet deliver high-quality services and support. This service-centric visibility will give them the...

    Provided By CA

  • White Papers // Jun 2008

    IT Service Management Process Maps: Select Your Route to ITIL Best Practices

    The goal of IT Service Management is to improve service by optimizing technology, controlling costs and maximizing the time and talent of an organization's most valuable resource - its people. As such, ITIL provides an excellent vehicle for tackling the journey to service excellence. However, as a notoriously complex framework,...

    Provided By CA

  • White Papers // Jun 2008

    Essential ITIL: What You Need to Succeed

    ITIL is about process. There are different approaches to process implementation based on which "Version" of ITIL one is inclined to adopt. But without debating the merits of ITIL "Versions," let's presume that any ITIL implementation discussion ultimately has roots in the principle of Process Improvement. Besides, ITIL v2 and...

    Provided By CA

  • White Papers // Jan 2009

    The Greening of IT

    Green IT, by most accounts, is not a frontline initiative by corporate IT departments, but rather a positive side effect of what IT departments are already being tasked to do given current economic conditions. In fact, the slowdown in the economy and overall IT spending presents ideal conditions for moving...

    Provided By CA

  • White Papers // Feb 2009

    Getting Started Guide: GreenIT Policy Kit V1.0

    The GreenIT policy kit supports information about power efficient usage of IT resources. It contributes data about the utilization of a server by the installed services and, based on the monitored server resources; it indicates if the demand for the services has decreased under a given threshold. The GreenIT policy...

    Provided By CA

  • White Papers // Feb 2009

    Releasing the Latent Value of CA TLMS Tape Management

    For over 30 years, CA TLMS Tape Management (CA TLMS) has delivered rock-solid tape data protection, library management and automation to enterprises that process thousands of tape files daily. It enables a higher level of integrity for data residing on tape and streamlines the process of protecting this vital resource....

    Provided By CA

  • White Papers // Mar 2009

    The Infrastructure Management Challenges Associated With Virtual Servers

    Although virtualization is important to IT organizations, it certainly isn't new: IT organizations have been implementing virtualized technologies such as Virtual LANs (VLANs) and Virtual Private Networks (VPNs) for at least 20 years. Most of the current interest in virtualization revolves around virtual servers. Although many benefits are associated with...

    Provided By CA

  • White Papers // Jan 2009

    The Role of IT Management Software in the Greening of IT

    Going green represents a company's mission to support environmental sustainability. Whether it's socially inspired or economically driven - it simply makes good business sense. In most cases the initial driver of a Green IT strategy is the cost savings that can be attained through increased efficiencies in energy usage. Achieving...

    Provided By CA

  • Webcasts // Apr 2010

    CA Workload Automation (EE) (formerly Known as 'ESP') - Don't Just Swap Job Schedulers, Accelerate Your Automation Capabilities

    Customers have enjoyed the flexibility and automation capabilities of CA ESP Workload Automation for decades. The rebranded CA Workload Automation r11.3 introduces new capabilities to meet the random needs for immediate processing of critical business data, improves the visibility of cross-application dependencies and brings many enhancements from the passionate customer...

    Provided By CA

  • White Papers // Feb 2009

    Enterprise Integration: The Secret to ITIL Success

    In the face of unprecedented financial challenges and increasing business-value concerns, many IT organizations have adopted best-practice methodologies to align their capabilities and investments with critical aspects of the business mission. One of the most widely adopted methodologies has been the Information Technology Infrastructure Library (ITIL) v3, a customizable framework...

    Provided By CA

  • White Papers // May 2010

    The Role of Identity and Access Management in Achieving "Continuous Compliance"

    Security-related governmental regulations generally have many common requirements. The most common ones relate to the concept of knowing who users are, what applications and resources they are entitled to access, and what (and when) they actually have done. The most effective way to achieve this level of control is through...

    Provided By CA

  • White Papers // May 2010

    Identity and Access Management for the Cloud: CA's Strategy and Vision

    The cloud presents organizations and service providers alike with tremendous value and opportunity. When one considers the loss of control that is inherent in the move to the cloud, questioning security readiness is entirely reasonable. As a component of CA's corporate Cloud Connected Enterprise strategy, CA is tackling these issues...

    Provided By CA

  • White Papers // Feb 2010

    Cloudy With a Chance Of... Great Service!: Fair Weather in the Cloud Requires Management of the Service Value Chain

    With the evolution of the cloud-connected enterprise, Service Value Chain Management becomes a crucial component of success. Now that multiple service providers - whether from within the cloud, from internal IT, or from traditional outsourcers - are lining up to deliver value to businesses, it is more critical than ever...

    Provided By CA

  • White Papers // Feb 2010

    Service Portfolio Management: Manage IT for Business Value

    Years of acquiring and managing IT from a problem-fix and techno-speak perspective put the technology function at odds with what business customers expect - demonstrable business value. Business understands and relates to services, not technology piece-parts, so it makes perfect sense that by understanding the cost, quality, function and benefit...

    Provided By CA

  • White Papers // Jan 2010

    Knowledge Management: A CA Service Management Process Map

    The objective of Knowledge Management is to provide the right information to the right place or person at the right time. By embedding Knowledge Management into other ITIL processes, knowledge becomes a by-product which is in context, timely and relevant to the organization. Technology can play a critical role in...

    Provided By CA

  • White Papers // Mar 2010

    Securing Virtualized Environments and Accelerating Cloud Computing

    There is no question that virtualization offers compelling tangible benefits for an IT organization. Virtualization is inevitable, and cloud computing is a new opportunity. It will mean entering the environment either from VMware or Microsoft, Intel or Cisco. If it is going to happen, the best thing one can do...

    Provided By CA

  • White Papers // Apr 2010

    Awareness, Trust and Security to Shape Government Cloud Adoption

    The awareness, trust and security issues that have limited federal government adoption of cloud computing appear to be more perceptual than prohibitive, according to the Lockheed Martin Cyber Security Alliance survey on cloud computing and cyber security conducted by Market Connections, Inc. Professionals who are most aware of and involved...

    Provided By CA

  • White Papers // Jan 2010

    Service Level Management: A CA Service Management Process Map

    The main objective of Service Level Management is to build and maintain a customer oriented focus, moving away from traditional based thinking in "Systems" to "Service" based thinking. This often includes organizational and cultural change. On the other side, SLM plays a key role in defining IT service (delivery) standards,...

    Provided By CA

  • White Papers // Feb 2010

    CA IT Client Manager: Microsoft Windows 7 Deployment Methodology

    To minimize costs, downtime, and disruption to business operations, IT organizations need an automated, tested, and proven solution that allows them to make changes in their infrastructure easily and securely. CA solutions and a service-based methodology fulfill this requirement by delivering a comprehensive solution for cost-effectively planning, managing, and supporting...

    Provided By CA

  • White Papers // Mar 2010

    CA SiteMinder Prepares You for What's Ahead

    WAM systems perform a vital role in today's business environment by securing the delivery of information and applications over the Web. At first glance, there may appear to be a number of WAM solutions available with similar features and capabilities. However, a closer look reveals why CA SiteMinder remains the...

    Provided By CA

  • Webcasts // Jul 2010

    SOA Architecture and Engineering Framework

    This session will describe an architecture and engineering framework for Service Oriented Architecture (SOA) based on a detailed reference model that underpins and integrates reference architecture, life cycle processes including governance and organization. Following such a framework reduces risk and improves results for implementing SOA.

    Provided By CA

  • Webcasts // Jul 2010

    SOA for CA Gen

    CA Gen possesses unique capabilities for implementing CA Gen applications in a service oriented architecture. This session will describe key concepts and principles of a Service Oriented Architecture (SOA) and where CA Gen capabilities can be applied most effectively. Following such an architecture reduces risk and improves results for implementing...

    Provided By CA

  • Webcasts // Jul 2010

    Web Site Story - A CA Gen Love Story

    In 5 elapsed months, the presenter converted 400 GUI screens to 3500 web objects including integrating to the anti-hacking software and incorporating different skins/themes per client as well as incorporating the CA Gen Web Generation pages into the existing >3000 JSP, ASP web pages, menu flows and integration with JAVA...

    Provided By CA

  • Webcasts // Jul 2010

    Backing Out DB2 for z/OS Transactions

    When unwanted changes make their way into the DB2 for z/OS production environment, whether malicious or accidental, the challenge is to find the fastest, easiest, and most effective way to restore the system. While there are many ways this can be done, CA Log Analyzer can make backing out unwanted...

    Provided By CA