CA Technologies Whitepapers


Sort by: Date | Company | Title


From Infrastructure to Applications: The Future of IT is On-Demand
By CA Technologies | 29/5/2014

In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.

Download this now


Who’s Minding your Cloud?
By CA Technologies | 29/5/2014

CA commissioned Ponemon Institute to survey 748 IT and IT security practitioners for the 2013 Security of Cloud Computing Users study to see how cloud security has progressed over 2 years. This Infographic will show you the results - while security is improving, lingering doubts remain.

Download this now


Securing the Mobile Cloud Connected Enterprise
By CA Technologies | 29/5/2014

The rise of mobile users and apps, coupled with the continued growth in SaaS, has transformed traditional business environments. Identity is the new perimeter. Learn what you can do with a centralized Identity Access Management (IAM) service across this hybrid IT environment.

Download this now


IAM Across Cloud and On-premise Environments: Best Practices for Maintaining Security and Control
By CA Technologies | 29/5/2014

Many organisations leverage a hybrid cloud & on-premise architecture, but one of their major challenges is ensuring users can seamlessly move around the environment while still maintaining consistent control and security policy between on-premise and cloud services.

Download this now


Enabling and Protecting the Open Enterprise
By CA Technologies | 29/5/2014

A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

Download this now


CA Technologies Strategy and Vision for Cloud Identity and Access Management
By CA Technologies | 29/5/2014

Cloud computing introduces new security challenges for both consumers and providers of cloud services across all types of IT environments. CA’s strategy and vision outlines how to securely provision users, and choose & simplify an IAM deployment models.

Download this now


TechInsights Report: What Smart Businesses Know About DevOps
By CA Technologies | 29/5/2014

Smart companies use DevOps to speed the rollout and quality of new apps and services to market. Read this report to see the findings from a survey of 1300 global IT leaders, including the real benefits a good DevOps strategy can bring to your business.

Download this now


What Smart Businesses Know About DevOps
By CA Technologies | 29/5/2014

Smart companies use DevOps to speed the rollout and quality of new apps and services to market. See the findings from a survey of 1300 global IT leaders in this snack-sized infographic including the real benefits a good DevOps strategy can bring to your business.

Download this now


From Infrastructure to Applications, the Future of IT is On-Demand
By CA Technologies | 29/5/2014

In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.

Download this now


Complexity Ate My Budget
By CA Technologies | 22/11/2013

It’s high time we tamed the monster we created! Against a backdrop of sustained and uncontrollable data growth, most of today’s operational problems revolve around backup and recovery. Understanding the hidden costs and implications for data protection strategies is critical, but the complexity of the nebulous and amorphous cloud can make everything hazy. This white paper breaks it down to different dimensions of virtualisation and how to deliver the productivity and flexibility it promises.

Download this now
[]