45
© 2015 CA. All rights reserved. Driving Digital Transformation with Identity-centric Security Santiago Cavanna Security Solution Account Director Argentina, Chile, Bolivia, Uruguay y Paraguay. Twitter https://twitter.com/scavanna Office: +54-11-43-17-15-95 | Mobile: +54-911-41-65-15-47 | [email protected]

Driving Digital Transformation with Identity-centric Security

Embed Size (px)

Citation preview

© 2015 CA. All rights reserved.

Driving Digital Transformation with Identity-centric Security

Santiago CavannaSecurity Solution Account DirectorArgentina, Chile, Bolivia, Uruguay y Paraguay.

Twitter https://twitter.com/scavannaOffice: +54-11-43-17-15-95 | Mobile: +54-911-41-65-15-47 | [email protected]

2 © 2015 CA. ALL RIGHTS RESERVED.

Traditional Approach to Security

3 © 2015 CA. ALL RIGHTS RESERVED.

From sneaker company to data enabled athletic brand.

From book seller to insight driven delivery service, cloud servicer and entertainment hub.

Today, Every Company is a Software Company. Are You?

From UK Grocer to global consumer retailer leveraging data and technology that reframes the shopper experience.

In 2015, CEOs must focus on leading their organizations to think like and become more like “tech” companies, because within a few years, digital business capabilities will dominate every industry. Urgent action is needed because first-mover advantage is common in digital business, and fast followers must be very fast.

4 © 2015 CA. ALL RIGHTS RESERVED.

Digital transformation is underwayHalf of enterprises today say the application economy is significantly disrupting their industry—while 44% say it is doing the same to their own organization.1

-- CA Technologies with Vanson Bourne

Sources: 1. CA Vanson Bourne Study2. eMarketer study3. McKinsey Global Institute, Disruptive Technologies, advances that will transform life, business and the global economy, May 20134. GMSA Intelligence, From Concept to Delivery, the M2M Market Today, Feb. 17, 2014

1.75Bsmartphone users in 2014 1

25Business apps per device2

50BConnected devices (IoT) by 2020 3

>$100Bin cloud spending this year 4

5 © 2015 CA. ALL RIGHTS RESERVED.

Digital transformation drives the need for increased Security

1All data on this slide from CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 2014

2. The 2014 Cost of Cyber Crime Study Reveals Increased Risks, Oct, 2014

3. http://breachlevelindex.com/pdf/Breach-Level-Index-Annual-Report-2014.pdf

Security concerns - the top obstacle in app economy#1

$12.7MAverage cost to the

company for a breach

Overall IT spend devoted to Security

over next 3 years

>25%2

78%Increase in # of breached

records from 2013 to 20143

16,856Number of attacks the average company had

in 2013

6 © 2015 CA. ALL RIGHTS RESERVED.

Future security approach must go beyond the perimeterBusinesses are more open than ever – and subject to attacks

Employees

Connected Devices

On Premise Apps

Cloud Services

Threats/Attacks on Identity

CustomersCitizens

Partners

7 © 2015 CA. ALL RIGHTS RESERVED.

Business drivers & challengesPerimeter security cannot meet current needs

Employees

Connected Devices

On Premise Apps

Cloud Services

Threats/Attacks on Identity

Protect Corporate Information•Account Takeover•Careless/Malicious admins

CustomersCitizens

Partners Engage Customers & Partners•Bring Your Own Identity•Control partner access

Rapidly Adopt Cloud ApplicationsExposed credentials via insecure appsOrphaned user accounts

Simple AccessToo many passwordsDifficult to use multi-factor

8 © 2015 CA. ALL RIGHTS RESERVED.

Digital Transformation requires Identity-Centric Security

On Premise Apps

Cloud Services

Connected Devices

CustomersCitizens

Partners

Employees

9 © 2015 CA. ALL RIGHTS RESERVED.

Now customer experience is paramount

1All data on this slide from CA Application Economy Market Study commissioned by CA, conducted by Vanson Bourne, 20142. Cisco

Security priority for business is improving the user mobileexperience

#2

Connected devices by 2020

50B2

Business apps on each device (average)

25

4. eMarketeer

Companies have increased customer base due to

security initiatives

87%Leaders saw revenue increase for security-

enabled services

47%

10 © 2015 CA. ALL RIGHTS RESERVED.

Security spend must do more than just SecureSell the business on business value

ENABLE THE BUSINESS

Cloud Services

On Premise Apps

Engage with your customers faster & better

Make your employees more productive

CustomersCitizens

Employees / Partners

Connected Apps / Devices

PROTECT THE BUSINESS

Strongly validate each user’s identity

Govern & control user access

Protect privileged identities

11 © 2015 CA. ALL RIGHTS RESERVED.

What you need to be thinking about

ENABLE THE BUSINESS

ENGAGE YOUR CUSTOMERS FASTER AND BETTER

Improve customer adoption/experience/ loyalty

Gain insight into your customer base

ENABLE YOUR EMPLOYEES TO BE MORE PRODUCTIVE

Enable simple, secure access to on-premise & cloud apps

Provide each user has the “right access”, always

12 © 2015 CA. ALL RIGHTS RESERVED.

You need to engage your customers faster and better

REQUIREMENTS

THIS IS JOHN. HE IS YOUR CUSTOMER.

JOHN WANTS:

TO EASILY AND SECURELY CONNECT TO

YOUR APPS AND SERVICES

A PERSONALIZEDEXPERIENCE

THE LATEST SERVICES

ALL WITHOUT THINKING ABOUT

SECURITY

Multi-device Support & Social Login

Customer Insight

Partner Federation

Seamless SSO & Authentication

13 © 2015 CA. ALL RIGHTS RESERVED.

How to engage your customers faster and better

Desktop/Laptop

Mobile

CUSTOMERS

Partner Apps

CONNECTING

Social MediaIdentity

Via Partners

Directly

Cloud Services

On Premise Apps

Federation

Single Sign-on

Strong & Risk-based Authentication

Using Multiple

Platforms

Customer Insight

Where John is

Where he lives

Where he was born

Who his friends are

What his interests are

• Device• Geolocation• TOD• User history• Etc…

14 © 2015 CA. ALL RIGHTS RESERVED.

How to engage your customers faster and better

Desktop/Laptop

Mobile

CUSTOMERS CONNECTING

Social MediaIdentity

Via Partners

Directly

Strong & Risk-based Authentication

Using Multiple

Platforms

CAPABILITIES User behavior profiling Transparent risk scoring & analysis Device fingerprinting

BUSINESS VALUE Improve user experience Reduce risk of fraudulent access Manage authentication strategy

according to business needs

Cloud Services

On Premise Apps

Partner Apps

Federation

Single Sign-on

15 © 2015 CA. ALL RIGHTS RESERVED.

How to engage your customers faster and better

Desktop/Laptop

Mobile

CUSTOMERS CONNECTING

Social MediaIdentity

Via Partners

Directly

Strong & Risk-based Authentication

Using Multiple

Platforms

CAPABILITIES• Session assurance• Seamless federation• Centralized policy enforcement

BUSINESS VALUE• Prevent session theft• Improved user experience• Simplified security management

Cloud Services

On Premise Apps

Partner Apps

Federation

Single Sign-on

16 © 2015 CA. ALL RIGHTS RESERVED.

How to engage your customers faster and betterSaaS deployment

Desktop/Laptop

Mobile

CUSTOMERS CONNECTING

Social MediaIdentity

Via Partners

Directly

Strong & Risk-based Authentication

Using Multiple

Platforms

CAPABILITIES• Standards based federation• Strong & risk-based

authentication

BUSINESS VALUE• Quick time to value• Seamless interaction with on-premise IAM• Leverage partner expertise for managed

services

Managed Service Option

Cloud Services

On Premise Apps

Partner Apps

Federation

Single Sign-on

17 © 2015 CA. ALL RIGHTS RESERVED.

Engaging customers: real world success

Desktop/Laptop

Mobile

CUSTOMERS CONNECTING

Strong & Risk-based Authentication

Using Multiple

Platforms

Cloud Services

On Premise Apps

Single Sign-on

One of CA SSO customers is supporting over 80 million users

The Canada Revenue Agency uses CA SSO to provide secure access for over 70,000 users across

the agency, and to support over 200,000 user authentications per day.

CA SSO is handling 1.5 BILLION transactions per month at a major European Telecom

“CA Advanced Authentication integrates well with our CA SSO environment and has helped us to

provide secure access to our external business partners.” - Global 500 Pharmaceuticals Company

“Setting up federated identities was very simple using CA SSO WAM. We now have a flexible and

scalable model that we will eventually be able to extend to thousands of suppliers and other

partners.” – VP, IT Security, Top 10 Global Telecom

18 © 2015 CA. ALL RIGHTS RESERVED.

You need to make your employees more productive

REQUIREMENTS

THIS IS SARA. SHE IS YOUR EMPLOYEE.

SARA WANTS:

TO GET HER ACCOUNTS SET

UP QUICKLYTO MANAGE HER

OWN PROFILE INFO LOG IN ONCE EASILY GET ACCESS TO NEW SERVICES

Automated on/off-boarding

Self-serviceSeamless SSO & Authentication

Automated access requests

19 © 2015 CA. ALL RIGHTS RESERVED.

How to make your employees more productive

Business Managers

Auditors

IT Manager

EmployeesPartners

IDENTITIES ACCESS

Federation

Mobile

Web

API

Onboarding

Self-service

Certify access

Ongoing refinement

Analytics & privilege cleanup

Single Sign-on

Identity Mgt&

Governance

Cloud Services

On Premise Apps

CAPABILITIES Role mining & analytics Automated access certifications Business-oriented unified interface Deployment tools

BUSINESS VALUE Improved efficiency & productivity Reduced risk of over-privileged users Improved ease of use Much faster time-to-value

Stron

g & R

isk-based

A

uth

enticatio

n

20 © 2015 CA. ALL RIGHTS RESERVED.

How to make your employees more productive

Business Managers

Auditors

IT Manager

EmployeesPartners

IDENTITIES ACCESS

Federation

Mobile

Web

API

Onboarding

Self-service

Certify access

Ongoing refinement

Analytics & privilege cleanup

Single Sign-on

Identity Mgt&

Governance

Cloud Services

On Premise Apps

CAPABILITIES Variety of strong credentials User behavior profiling Unbreachable passwords

BUSINESS VALUE Improve User Experience Reduce risk of fraudulent access Protect employees from account takeover

and social engineering

Stron

g & R

isk-based

A

uth

enticatio

n

21 © 2015 CA. ALL RIGHTS RESERVED.

Stron

g & R

isk-based

A

uth

enticatio

n

How to make your employees more productive

Business Managers

Auditors

IT Manager

EmployeesPartners

IDENTITIES ACCESS

Federation

Mobile

Web

API

Onboarding

Self-service

Certify access

Ongoing refinement

Analytics & privilege cleanup

Single Sign-on

Identity Mgt&

Governance

Cloud Services

On Premise Apps

CAPABILITIES Seamless federation Session assurance Centralized policy enforcement

BUSINESS VALUE Prevent session theft Improved user experience Simplified security management

22 © 2015 CA. ALL RIGHTS RESERVED.

Stron

g & R

isk-based

A

uth

enticatio

n

How to make your employees more productiveSaaS deployment

Business Managers

Auditors

IT Manager

EmployeesPartners

IDENTITIES ACCESS

Federation

Mobile

Web

API

Single Sign-on

Identity Mgt&

Governance

Cloud Services

On Premise Apps

CAPABILITIES• Self service user management• Simple access request & approval process• Hybrid provisioning and de-provisioning• Standards-based federation• Strong & risk-based authentication

BUSINESS VALUE• Quick time to value• Seamless interaction with on-premise IAM• Leverage partner expertise for managed

services

Managed Service Option

23 © 2015 CA. ALL RIGHTS RESERVED.

Streamlining identity managementCase study: A large, multi-national media/broadcasting company

CONTRACTORS

150K+ Users

Challenges:

Fragmented entitlements

lack of visibility of access orphan accounts overlapping access

Manual entitlement reviews

No standardized role definitionsPARTNERS

EMPLOYEES

800+ Apps15K+ Unix servers

31K+ Windows servers55K+ Devices

24 © 2015 CA. ALL RIGHTS RESERVED.

Streamlining identity managementCase study: A large, multi-national media/broadcasting company

CA Identity Suite

CONTRACTORS

PARTNERS

EMPLOYEES

Consistent role definitions Remediated orphan accounts/incorrect access Seamless access to apps and assets Shopping cart experience for access requests

RESULTS:

Reduced onboarding SLAs (5 day to minutes!) Vast improvement in ease of administration “Day 1 Productivity” Reduced time for certification campaigns (50 campaigns went

from 12 weeks to 3)

BENEFITS ACHIEVED:

IdentityPortal

IdentityManagement

IdentityGovernance

Roles

25 © 2015 CA. ALL RIGHTS RESERVED.

Streamlining identity managementCase study: A large, multi-national media/broadcasting company

CONTRACTORS

PARTNERS

EMPLOYEES

Consistent role definitions Remediated orphan accounts/incorrect access Seamless access to apps and assets Shopping cart experience for access requests

RESULTS:

Reduced onboarding SLAs (5 day to minutes!) Vast improvement in ease of administration “Day 1 Productivity” Reduced time for certification campaigns (50 campaigns went

from 12 weeks to 3)

BENEFITS ACHIEVED:

IdentityPortal

IdentityManagement

IdentityGovernance

Roles–Chief Infrastructure and Information Security Officer

“We have been able to help simplify identity management processes and make engagement easy for our business leaders without compromising our security and compliance needs.”

26 © 2015 CA. ALL RIGHTS RESERVED.

What you need to be thinking about

PROTECT THE BUSINESS

COMBAT INTERNAL THREATS & EXTERNAL ATTACKS

Strongly validate each user’s identity

Govern & control user access

Protect privileged identities

27 © 2015 CA. ALL RIGHTS RESERVED.

Your organization can’t afford a large-scale cyber-attack

http://www.businessinsider.com/cyber-attack-utilities-katrina-2013-5http://bit.ly/1FqtGrGhttp://arstechnica.com/security/2014/10/report-cybercrime-costs-us-12-7m-a-year/http://www.zdnet.com/article/average-company-now-compromised-every-four-days-with-no-end-to-the-cybercrime-wave-in-sight/http://www.cnbc.com/id/102234825#http://www.reuters.com/article/2014/06/09/us-cybersecurity-mcafee-csis-idUSKBN0EK0SV20140609

28 © 2015 CA. ALL RIGHTS RESERVED.

You need to combat internal threats & external attacks

REQUIREMENTS

THIS IS TOM. HE IS THE CISO. TOM WANTS:

TO PROTECT CORPORATE &

CUSTOMER INFO

TO DETECT & PREVENT ATTACKS

TO PREVENT PRIVILEGE

ESCALATION

TO VALIDATE USER IDENTITIES

Fine-grained controls for Admin

Shared Account Management

Privileged access governance

Risk-aware authentication

29 © 2015 CA. ALL RIGHTS RESERVED.

Protect the Business – Common threats

AdministratorsEmployees

Privileged Identity

INSIDERS

Common Attack Points

Social engineering

Fake Web sites

Stolen Admin credentials

API attacks

Session hijacking

Common Weaknesses

Weak authentication, no risk analysis

No privileged user governance

Lack of fine-grained Admin controls

Weak API controls

Shared Admin passwords

CUSTOMERS

EXTERNAL THREATS

Systems

Data

Mobile / API / Web

30 © 2015 CA. ALL RIGHTS RESERVED.

How to combat internal threats & external attacks

Privileged Identity

Mgt

INSIDERS

Stron

g & R

isk-base

d

Au

then

tication

SSO w/ Session

Assurance

API Security

AdministratorsEmployees

CUSTOMERS

EXTERNAL THREATS

Systems

Data

Mobile / API / Web

31 © 2015 CA. ALL RIGHTS RESERVED.

AdministratorsEmployees

Privileged Identity

Mgt

CUSTOMERS

EXTERNAL THREATS

INSIDERS

SSO w/ Session

Assurance

CAPABILITIES Variety of strong credentials User behavior profiling Transparent risk scoring & analysis Unbreachable passwords

BUSINESS VALUE Improve User Experience Reduce risk of fraudulent access Apply business policies to

authentication strategy

Stron

g & R

isk-based

Au

then

tication

Systems

Data

Mobile / API / Web

API Security

How to combat internal threats & external attacks

32 © 2015 CA. ALL RIGHTS RESERVED.

How to combat internal threats & external attacks

AdministratorsEmployees

Privileged Identity Mgt

CUSTOMERS

EXTERNAL THREATS

INSIDERS

SSO w/ Session

Assurance

Stron

g & R

isk-base

d

Au

then

tication

CAPABILITIES Fine-grained Admin control Share account password mgt Session recording

BUSINESS VALUE Reduced risk of successful attack Protect critical systems & data Increased accountability

Systems

Data

Mobile / API / Web

API Security

33 © 2015 CA. ALL RIGHTS RESERVED.

Mobile / API / Web

How to combat internal threats & external attacks

AdministratorsEmployees

Privileged Identity

Mgt

CUSTOMERS

EXTERNAL THREATS

INSIDERS

Web, API Security

SSO w/ Session

Assurance

Stron

g & R

isk-base

d

Au

then

tication

Systems

Data

CAPABILITIES Security policy for Web, mobile, API Session assurance

BUSINESS VALUE Prevent session stealing Improved user experience Simplified security management

34 © 2015 CA. ALL RIGHTS RESERVED.

API Security

How to combat internal threats & external attacks

AdministratorsEmployees

Privileged Identity

Mgt

CUSTOMERS

EXTERNAL THREATS

INSIDERS

Web, API Security

SSO w/ Session

Assurance

Stron

g & R

isk-base

d

Au

then

tication

Systems

Data

Mobile / API / Web

CAPABILITIES• Enforce authentication & authorization via APIs

based on user, app, and/or device• Protect exposed APIs from external threats (SQL

injections, x-site scripting, etc)• Enterprise-grade SSO for the user and device

BUSINESS VALUE• Apply appropriate risk-based controls based

on context• Protect sensitive assets from compromise

35 © 2015 CA. ALL RIGHTS RESERVED.

Protecting the business from a breachCase study: A major hotel chain

Customers in Loyalty Program

Customer Data

Access earned points for awards, discounts Stron

g & R

isk-base

d

Au

then

tication

Attempted theft of loyalty points

CAPABILITIES• Strong, flexible authentication methods• Simple user experience• User behavior profiling (geolocation,

device, time, etc)• Unbreachable passwords

Loyalty programs make me more

likely to continue doing business

83%

I will modify the brands I buy to

maximize benefits

64%

36 © 2015 CA. ALL RIGHTS RESERVED.

An “Agile” Digital Platform for the Internet of ThingsAPIs provide connectivity to data stored in internet devices

CAPABILITIES Control access to APIs Threat protection Developer portal

BUSINESS VALUE Secure partner ecosystems Faster development

APIsApplications

API Security

Internet DevicesConsumer Industrial

37 © 2015 CA. ALL RIGHTS RESERVED.

CA Identity & Access ManagementComprehensive & Proven Solution

CA SECURE CLOUD

Mobile Security

AUTHENTICATION

Strong, multi-factor credentials Risk analysis and scoring Behavioral profiling

IDENTITIES

Provisioning & access governance Self-service Password management

ACCESS

Single-Sign-On Web access management Web services security, federation

PRIVILEGED IDENTITIES

Fine-grained access controls Shared account password management Command filtering

CA SECURE CLOUD

Directory Services

IDENTITY as a SERVICE Identity management Authentication SSO

API SECURITY

API gateway, mobile access gateway Developer portal

38 © 2015 CA. ALL RIGHTS RESERVED.

CA Identity & Access ManagementComprehensive & Proven Solution

CA SECURE CLOUD

Mobile Security

AUTHENTICATION

Strong, multi-factor credentials Risk analysis and scoring Behavioral profiling

IDENTITIES

Provisioning & access governance Self-service Password management

ACCESS

Single-Sign-On Web access management Web services security, federation

PRIVILEGED IDENTITIES

Fine-grained access controls Shared account password mgt Hypervisor hardening

CA SECURE CLOUD

API SECURITY

API gateway, mobile access gateway Developer portal

Directory Services

IDENTITY as a SERVICE Identity management Authentication SSO

CA Identity Suite

CA Advanced Authentication

CA Single Sign-On

CA Privileged Access Manager

CA Secure Cloud CA API (Mobile) Gateways, CA API Portal

CA Mobile Application Mgt CA Directory

39 © 2015 CA. ALL RIGHTS RESERVED.

Why CA Identity & Access Management?

LEADERSHIPBest of breed capabilities across a comprehensive, integrated suite of solutions – from mobile to mainframe

DIFFERENTIATIONCA IAM provides unique capabilities to engage with customers across multi-channels; secure APIs; protect against breaches, including session assurance and unbreachable passwords; and scale to consumer-level environments

End-to-end security: from device to datacenter

INNOVATIONInnovation initiatives in areas such as virtual appliances, behavorial analytics, identity custody, IDaaS, secure payments, and mobile SSO.

PROVENSuccessfully deployed in some of the largest and most complex IT environments today. Large customer base across all major verticals.

We know how to make our customers successful.

40 © 2015 CA. ALL RIGHTS RESERVED.

SCALE TO CONSUMER-LEVEL ENVIRONMENTS

DELIVER MULTI-CHANNEL ACCESS ACROSS APPLICATIONS(WEB, MOBILE, APIS) PROVIDE END-TO-END SECURITY

Why CA? – Unique Capabilities

…in a modular, integrated and highly scalable solution

API

Web Apps

Mobile AppsCustomersEmployeesDevelopers

User Transmission Backend

Customers Employees

Partners

Apps(on-prem, Saas)

Servers

41 © 2015 CA. ALL RIGHTS RESERVED.

Why CA? – How we do it

Both CA SSO and CA Identity Manager have been validated (external firm) to support over 100M users.

CA SSO is handling 1.5 BILLION transactions per month at a major European Telecom

A F500 Services company secures over 1 million authentications a day with CA Advanced Authentication

>30 customers are supporting over 10M users with CA SSO

…in a modular, integrated and highly scalable solution

Only vendor providing secure SSO across Web, mobile, and APIs

- With patent-pending session assurance protection

Only vendor that uses dynamic behavioral modeling to confirm the identity of the user.

- Others are rule-based and static, need vendor to update policy

Only suite vendor protecting customer data by controlling privileged user access with deep, fine-grained controls

- others have limited, shallow controls

Only vendor providing developer SDK for mobile app SSO across native, hybrid, & Web apps

Only API & suite vendor with end to end security -- client auth. through API transmission to backend Web services

- others only secure at API or authentication

Secure SSO solution for mobile apps

- others offer flawed browser redirect

SCALE TO CONSUMER-LEVEL ENVIRONMENTS

DELIVER MULTI-CHANNEL ACCESS ACROSS APPLICATIONS(WEB, MOBILE, APIS) PROVIDE END-TO-END SECURITY

42 © 2015 CA. ALL RIGHTS RESERVED.

OUR AUTHENTICATION SOLUTION IS

BEING USED TO SUPPORT OVER 165MCARDHOLDERS

ENABLED MAJOR RETAILER TO PROCESS 240M TRANSACTIONS ON BLACK FRIDAY

15 OF THE TOP 16 GLOBAL BANKS

CA Identity and Access Management – by the numbers

LARGE, DIVERSE CUSTOMER BASE

8 OF THE TOP 10 US MANUFACTURING COMPANIES

21 OF THE TOP 25 FORTUNE 500 COMPANIES

PROVEN SCALABILITY

30 CUSTOMERS ARE USING CA SSO TO SUPPORT WEBSITES WITH OVER 10M USERS

PROVIDING VALUE TO OUR CUSTOMERS

CA IDENTITY MANAGER SAVES TNT OVER $1M ANNUALLY ON PASSWORD RESET COSTS

IN A RECENT SURVEY, 75% OF SURVEYED ORGANIZATIONS IMPROVED USER PRODUCTIVITY “SIGNIFICANTLY” WITH CA IDENTITY MANAGER

79% OF SURVEYED ORGANIZATIONS SIMPLIFIED THEIR COMPLIANCE PROGRAM WITH CA SECURITY SOLUTIONS

44 © 2015 CA. ALL RIGHTS RESERVED.

This is business,rewritten by software™

45 © 2015 CA. ALL RIGHTS RESERVED.

Legal Notice

Copyright © 2015 CA. All rights reserved. Office 365 is either a registered trademark or trademark of Microsoft Corporation in the United States and/or other

countries. All trademarks, trade names, service marks and logos referenced herein belong to their respective companies. No unauthorized use, copying or

distribution permitted.

THIS PRESENTATION IS FOR YOUR INFORMATIONAL PURPOSES ONLY. CA assumes no responsibility for the accuracy or completeness of the information. TO

THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENT “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING, WITHOUT LIMITATION,

ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. In no event will CA be liable for any loss or

damage, direct or indirect, in connection with this presentation, including, without limitation, lost profits, lost investment, business interruption, goodwill, or

lost data, even if CA is expressly advised of the possibility of such damages.

Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations

of CA or its licensees under any existing or future written license agreement or services agreement relating to any CA software product; or (ii) amend any

product documentation or specifications for any CA software product. The development, release and timing of any features or functionality described in this

presentation remain at CA’s sole discretion.

Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation,

CA may make such release available (i) for sale to new licensees of such product; and (ii) in the form of a regularly scheduled major product release. Such

releases may be made available to current licensees of such product who are current subscribers to CA maintenance and support on a when and if-available

basis.

The information and results illustrated here are based upon each identified customer’s unique experiences with the referenced software product in a variety of environments, which may include production and non-production environments. Past performance of the software products in such environments is not necessarily indicative of the future performance of such software products in identical, similar or different environments.