Centralized, Convenient Application
Access–the One Stop Shop for
Identity Services
Hila Gvir
Security
CA Technologies
Product Manager
SCT15T
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of
warranty.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
Let’s take a look at how the CA Identity Portal
can provide a centralized point for everything
related to user identities and application access.
It provides convenient access requests with
request tracking, through access to the
application itself using the enhanced
applications launcher, to certification of the
existing access. Most importantly, it also
provides an outstanding user experience, along
with identity security.
Hila Gvir
CA Technologies
Product Manager
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
ACCESS REQUEST
REQUEST TRACKING
REQUEST APPROVAL
ACCESSING AN APPLICATION WITH THE APPLICATION LAUNCHER
CERTIFYING ACCESS
1
2
3
4
5
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Deep Dive Demo
 Actors
– Employee, William
– Manager, Michael
 Scenario
– William to make an access request and track it
– Michael (his manager) to approve the request
– Michael to certify access
– William to access the application that was approved
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
User Experience
The application access and the
one stop shop can all be
achieved without
compromising on user
experience
Application Access
With the many connectors CA
Identity Manager has, user can
request and get access to
applications immediately
One Stop Shop
Everything related to identity
and access can be available to
the end user in one place
Request, Track, Approve,
Certify, Access
Summary
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
We want to hear from you!
 CA has engaged IT Central Station to generate product
reviews for our Security products.
 ITCS staff is at this session now! (look for their shirts). If you
would like to offer a product review, please ask them.
Note:
 Only takes 5-7 mins
 You have total control over the review
 It can be anonymous, if required
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
SCX07S Identity Suite Roadmap & Vision 11/19/2015 at 1:00 PM
SCT29S
Case Study: Digital Transformation through Successful,
Large-scale Identity Management Deployment
11/19/2015 at 11:30 AM
SCT12S Teaching Identity to Sing: A Coca Cola Case Study 11/19/2015 at 3:00 PM
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must See Demos
Enable Employees
and Partners
CA IMAG
Security Theater
Engage
Customers
CA SSO
Security Theater
Innovation – IoT
Slot Car
CA AA, APIM
Security Theater
Accelerate Time
to Value
CA AA, APIM, SSO
Security Theater
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

PDF
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
PDF
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
PDF
Developing Secure Mobile Applications
PDF
CA Single Sign-On (CA SSO), The Innocent Bystander
PDF
Knock, Knock…The Internet of Things wants to come in?
PDF
Freeing the World from Slow: How Service Virtualization and the Concept of S....
PDF
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
PDF
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Go Mobile to Mainframe With CA Gen and CA App Services Orchestrator
Developing Secure Mobile Applications
CA Single Sign-On (CA SSO), The Innocent Bystander
Knock, Knock…The Internet of Things wants to come in?
Freeing the World from Slow: How Service Virtualization and the Concept of S....
How CA Technologies Enables Its Own Employees and Secures Access to Applicati...
Common Challenges of Identity Management and Federated Single Sign-On in a Sa...

What's hot (20)

PDF
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
PDF
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
PDF
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
PDF
Pre-Con Education: CA Service Operations Insight Power User Crash Course
PDF
Simplified Identity Management and Governance from One UI — The CA Identity S...
PDF
How to Leverage New Capabilities in the CA Identity Suite
PDF
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
PDF
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
PDF
Achieving a Successful Identity Management and Governance Deployment The Flor...
PDF
Protecting the Software-Defined Data Center from Data Breach
PDF
Agile in Operations, DevOps and Architecture
PDF
Securing the Award-Winning Digital Banking Services at Bank Hapoalim
PDF
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
PDF
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
PDF
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
PDF
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
PDF
Technology Primer: Building Applications the New-Fashioned Way
PDF
CA Project and Portfolio Management Budgeting & Forecasting
PDF
Tech Talk: Knowledge Management of the Future for ITSM
PDF
Continuous Integration and Orchestration: Putting the AppDev in DevOps
How to Get Your Life Back: Succeeding at Software Asset Management (SAM) at F...
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Simplified Identity Management and Governance from One UI — The CA Identity S...
How to Leverage New Capabilities in the CA Identity Suite
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
Achieving a Successful Identity Management and Governance Deployment The Flor...
Protecting the Software-Defined Data Center from Data Breach
Agile in Operations, DevOps and Architecture
Securing the Award-Winning Digital Banking Services at Bank Hapoalim
Pre-Con Education: How to Deliver a "5-Star" Mobile App Experience With CA ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Technology Primer: Building Applications the New-Fashioned Way
CA Project and Portfolio Management Budgeting & Forecasting
Tech Talk: Knowledge Management of the Future for ITSM
Continuous Integration and Orchestration: Putting the AppDev in DevOps
Ad

Viewers also liked (11)

DOC
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
PDF
Windows Host Access Management with CA Access Control
DOCX
Vineet_Resume_Tech
PDF
Identity As A Service Evaluation, Implementation, Realized Benefits
PDF
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
PDF
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
PDF
CA Identity Suite – Extending Identity Management to the Business User
PDF
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
DOC
Prakhar Sood-Resume-CV
PDF
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
PDF
Identity and Access Management 101
Amod_MCA_M.tech_EXPERT IN CA Security tool _total 9Years+_Exp (2)
Windows Host Access Management with CA Access Control
Vineet_Resume_Tech
Identity As A Service Evaluation, Implementation, Realized Benefits
Be the Data Hero in Your Organization with SAP and CA Analytic Solutions
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Identity Suite – Extending Identity Management to the Business User
Case Study: Digital Transformation Through Successful, Large-scale Identity M...
Prakhar Sood-Resume-CV
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
Identity and Access Management 101
Ad

Similar to Centralized, Convenient Application Access–the One Stop Shop for Identity Services (20)

PDF
Putting Security in Identity-as-a-Service
PDF
Creating an Omnichannel Experience for Your Customers
PDF
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
PDF
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
PDF
API’s and Identity: Enabling Optum to become the HealthCare cloud
PDF
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
PDF
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
PDF
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
PDF
The Why, Where and How of Service Virtualization Adoption
PDF
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
PDF
Case Study: Amping up customer experience with a business centric approach a...
PDF
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
PDF
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
PDF
Build Your Own Virtual API
PDF
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
PDF
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
PDF
CA Gen Exploration – What's New and Cool in Application Development
PDF
Case Study: Rogers Communications Integrates CA API Management and CA Service...
PDF
Introduction to CA Service Virtualization
PDF
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...
Putting Security in Identity-as-a-Service
Creating an Omnichannel Experience for Your Customers
Tech Talk: Preventing Data Breaches with Risk-Aware Session Management
Pre-Con Education: Get the Most Out of CA Service Management Unified Self-s...
API’s and Identity: Enabling Optum to become the HealthCare cloud
Technology Primer: How to Achieve a Customer-Centric View in an Omni-Channel ...
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Survive Industry Disruption and Deliver a Great Customer Experience with APIs...
The Why, Where and How of Service Virtualization Adoption
Mobile Risk Analysis: Take Your Mobile App Security to the Next Level
Case Study: Amping up customer experience with a business centric approach a...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Build Your Own Virtual API
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
CA Gen Exploration – What's New and Cool in Application Development
Case Study: Rogers Communications Integrates CA API Management and CA Service...
Introduction to CA Service Virtualization
Vision and Roadmap: Learn How Application Release Solutions Help You Lead th...

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise

Recently uploaded (20)

PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
sbt 2.0: go big (Scala Days 2025 edition)
Microsoft User Copilot Training Slide Deck
Rapid Prototyping: A lecture on prototyping techniques for interface design
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Consumable AI The What, Why & How for Small Teams.pdf
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Early detection and classification of bone marrow changes in lumbar vertebrae...
NewMind AI Weekly Chronicles – August ’25 Week IV
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Module 1 Introduction to Web Programming .pptx
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
4 layer Arch & Reference Arch of IoT.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
Custom Battery Pack Design Considerations for Performance and Safety
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Comparative analysis of machine learning models for fake news detection in so...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Improvisation in detection of pomegranate leaf disease using transfer learni...

Centralized, Convenient Application Access–the One Stop Shop for Identity Services

  • 1. Centralized, Convenient Application Access–the One Stop Shop for Identity Services Hila Gvir Security CA Technologies Product Manager SCT15T #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Let’s take a look at how the CA Identity Portal can provide a centralized point for everything related to user identities and application access. It provides convenient access requests with request tracking, through access to the application itself using the enhanced applications launcher, to certification of the existing access. Most importantly, it also provides an outstanding user experience, along with identity security. Hila Gvir CA Technologies Product Manager
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda ACCESS REQUEST REQUEST TRACKING REQUEST APPROVAL ACCESSING AN APPLICATION WITH THE APPLICATION LAUNCHER CERTIFYING ACCESS 1 2 3 4 5
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deep Dive Demo  Actors – Employee, William – Manager, Michael  Scenario – William to make an access request and track it – Michael (his manager) to approve the request – Michael to certify access – William to access the application that was approved
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD User Experience The application access and the one stop shop can all be achieved without compromising on user experience Application Access With the many connectors CA Identity Manager has, user can request and get access to applications immediately One Stop Shop Everything related to identity and access can be available to the end user in one place Request, Track, Approve, Certify, Access Summary
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We want to hear from you!  CA has engaged IT Central Station to generate product reviews for our Security products.  ITCS staff is at this session now! (look for their shirts). If you would like to offer a product review, please ask them. Note:  Only takes 5-7 mins  You have total control over the review  It can be anonymous, if required
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCX07S Identity Suite Roadmap & Vision 11/19/2015 at 1:00 PM SCT29S Case Study: Digital Transformation through Successful, Large-scale Identity Management Deployment 11/19/2015 at 11:30 AM SCT12S Teaching Identity to Sing: A Coca Cola Case Study 11/19/2015 at 3:00 PM
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must See Demos Enable Employees and Partners CA IMAG Security Theater Engage Customers CA SSO Security Theater Innovation – IoT Slot Car CA AA, APIM Security Theater Accelerate Time to Value CA AA, APIM, SSO Security Theater
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15