Search

1 to 4 of 4
Sort by

Library Entry
Developing and Implementing a Successful Insider Threat Strategy and Plan

Enterprises today face the risk of attacks to their data from the outside and the inside. Employees or employee identities are typical attack vectors for a low-and-slow data exfiltration attack. In this session, CA Technologies CIO, Mahendra Durai, will explore the strategies and approaches an...


Library Entry
July 2016: CA on CA:  Accelerated Application Triage with APM Team Center

Topic:  CA on CA:  Accelerated Application triage with APM Team Center   Abstract: APM Administrators spend a lot of time to design the application relationship, maps and dashboards. Since these are static they need to be updated regularly which takes time and...

383133.mp4