SlideShare a Scribd company logo
World®
’16
Real-Time	Data	Audit	and	Security:	Find,	Classify	
and	Protect	Sensitive	Data	on	the	Mainframe
Chip	Mason,	Senior	Principal	Product	Manager,	CA	Technologies
Sai	Gujja,	Manager,	Software	Engineering,	CA	Technologies	
MFX40E
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
For	Informational	Purposes	Only	
Terms	of	this	Presentation
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.	The	presentation	provided at	CA	
World	2016	is	intended	for	information	purposes	only	and	does	not	form	any	type	of	warranty.	Some	of	the	specific	slides	with customer	
references	relate	to	customer's	specific	use	and	experience	of	CA	products	and	solutions	so	actual	results	may	vary.	
Certain	information	in	this	presentation	may	outline	CA’s	general	product	direction.	This	presentation	shall	not	serve	to	(i)	affect	the	rights	
and/or	obligations	of	CA	or	its	licensees	under	any	existing	or	future	license	agreement	or	services	agreement	relating	to	any	CA	software	
product;	or	(ii)	amend	any	product	documentation	or	specifications	for	any	CA	software	product.	This	presentation	is	based	on current	
information	and	resource	allocations	as	of	November	1,	2016,	and	is	subject	to	change	or	withdrawal	by	CA	at	any	time	without notice.	The	
development,	release	and	timing	of	any	features	or	functionality	described	in	this	presentation	remain	at	CA’s	sole	discretion.	
Notwithstanding	anything	in	this	presentation	to	the	contrary,	upon	the	general	availability	of	any	future	CA	product	release referenced	in	
this	presentation,	CA	may	make	such	release	available	to	new	licensees	in	the	form	of	a	regularly	scheduled	major	product	release.	Such	
release	may	be	made	available	to	licensees	of	the	product	who	are	active	subscribers	to	CA	maintenance	and	support,	on	a	when and	if-
available	basis.	The	information	in	this	presentation	is	not	deemed	to	be	incorporated	into	any	contract.
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Data	usage	is	more	rapid	than	ever	in	today's	application	economy.	Are	
you	able	to	tell	who	is	accessing	your	data,	when	its	being	accessed,	and	
where	the	data	is	located	even	if	it	is	already	protected?	While	most	IT	
departments	have	tools	to	manage	and	protect	data	on	enterprise	
systems,	the	Mainframe	is	often	missing	this	awareness	and	protection.	
This	session	will	show	you	how	CA	can	easily	help	cover	this	gap	with	an	
easy-to-use	solution	that	finds,	classifies	and	protects	sensitive	
personally	identifying	information	(PII)	and	meets	regulated	data	
requirements	in	PCI	DSS,	HIPAA,	and	other	compliance	situations.	CA	
Data	Content	Discovery	and	CA	Compliance	Event	Manager	real-time	
data	audit	and	security	solution	can	help	you	track	privileged	user	
activity,	find	missing	or	unknown	data,	and	perform	DLP	functions	and	
alerts	for	the	mainframe.
Chip	Mason
CA	Technologies
Director,	Product	
Management
Sai	Gujja
CA	Technologies
Manager,	Software	
Engineering
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
CA	DATA	CONTENT	DISCOVERY	BUSINESS	VALUE
CA	COMPLIANCE	EVENT	MANAGER	BUSINESS	VALUE
ROADMAP
CA	DATA	CONTENT	DISCOVERY	ARCHITECTURE
CA	COMPLIANCE	EVENT	MANAGER	ARCHITECTURE
LIVE	DEMO
1
2
3
4
5
6
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Data	Content	Discovery	Business	Value
Stay	connected	at	communities.ca.com
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Reducing	the	likelihood	of	catastrophic	data	breaches	
in	the	data	center	– Complementing	IAM	with	data-centric
Situation
Risk
What’s	
Broken	
The	Solution		
Mainframe	still	transacts	~70%	of	mission	essential	data
Sensitive	and	Regulated	data	is	stored	on	the	mainframe	
Accidental	orphaned	data	disclosure	by	an	employee	
Intentional	data	leakage	via	a	breach	
“We	take	data	off	the	mainframe	for	classification	and	audit	
reporting	– risky,	expensive…”
“We	have	home-grown,	time	consuming	processes	–
very	expensive…”
Improving	compliance	by	locating	the	orphaned	or	hidden	
&	unprotected	regulated	data
Scanning	and	classification	remain	on	the	mainframe	
“With	breaches	in	the	
news	every	day,	being	
able	to	find	where	
regulated	data	resides	-
or	ruling	out	the	
existence	of	sensitive	
data	- is	a	critical	first	
step	in	protecting	your	
business.”
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	Impact	of	Data	Theft
Health	Insurance
Announced:	March	2015
Records	stolen:	11M
Cost:	To	be	determined.	Facing	a	class	action	
lawsuit	as	well	as	potential	regulatory	violation	fines.
Retail	
Announced:	September	2014
Records	stolen:	56M
Cost:	$43M	and	counting.	Estimates	put	this	
as	high	as	$10B	(includes	all	remediation	
costs	borne	by	the	company	and	consumers)
Health	Systems
Announced:	August	2014
Records	stolen:	4.5M
Cost:	$75M	– $150M
eCommerce	
Announced:	May	2014
Records	stolen:	233M
Cost:	$200M	and	counting.
Retail
Announced:	December	2013
Records	stolen:	70M
Cost:	$162M	and	counting.	Recent	
estimates	put	this	at	well	over	$1B.
Government	
Announced:	May	2015
Records	stolen:	22M
Cost:	To	be	determined.	Likely	facing	a	class	action	
lawsuit	as	well	as	others.
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Based	on	regulation	or	
organizational	sensitivity
Data	remains	on	
the	z/OS	platform
Regulated	and	sensitive	data	in	
your	mainframe	data	stores
Protect
CA	Data	Content	Discovery	
Reducing	the	likelihood	of	a	catastrophic	data	breach
The	App	Economy	creates	new	risks	of	catastrophic	data	compromise
“With	breaches	in	the	news	every	day,	being	able	to	find	where	regulated	data	resides	- or	ruling	out	the	
existence	of	sensitive	data	- is	a	critical	first	step	in	protecting	your	business.”
X
70%of	the	world	mission	critical	data	
transacts	on	the	mainframe.	
Find ProtectClassify
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
10+	Filetypes
CA	Data	Content	Discovery
FIND
Set	up	the	scan
Initiate	the	scan
Provide	discovered	
results	to	Security	
Administrator
Security	Operations
110+	Classifiers	
out	of	the	box:
§ PCI,	HIPPA,	PII,	etc.
Custom	classifiers
CLASSIFY
Review	compliance	
results	and	label	
sensitive	data	
Provide	compliance	
report	to	Internal	Auditor	
Internal	Auditor
§ Identify	Who	Has	Access	
to	What	Data
§ Identify	Who	Accessed	
Data
PROTECT
Modify	access		based	
on	scan	results		
Confirm	successful	
audit	against	
industry	regulations
Security	Administrator
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
File	Types
Available In Development
Physical	sequential	(including	access	
methods: QSAM,	BSAM,	BDAM)
Data	in	Motion:	Connect:	Direct	
PDS	/	PDSe
DB2	tables
USS	(	HFS	&	zFS)
VSAM
Datacom
IMS
Data	in	Motion:	FTP
Data	in	Motion:	SMTP
Find	It:	Data	Types
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Data	Content	Discovery	and	Data-in-motion
Payments	
database
Malicious	system	
programmer	– JSCBPASS
Enterprise	Perimeter
File	Transfer	
Protocol CA	DCD
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Account	Data
Cardholder Data Sensitive	Authentication	Data
Primary	Account	Number	(PAN) Magnetic	stripe	data	
Cardholder	Name CAV2/CVC2/CVV2/CID
Expiration Date PINs/PIN	blocks
Service	Code
Classify	It:	PCI	Data
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Classify	It:	PII	Data
PII	Attributes
Full	Name Date	of	birth
Home	Address Email	address
National	Identification	Number Passport	number
Drivers	License	Number Vehicle	registration
Birthplace Genetic	information
Telephone	number Login	name,	screen	name,	nickname,	handle
Face,	fingerprints,	handwriting IP	Address
Credit	Card	Numbers Digital	identity
First	Name Last	Name
State Age
Gender Race
Schools	attended Criminal	record
Country US Zip	Code
C
C
C
C
C
C
C
Custom	
Classifier	
Quick	
Picks
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Classify	It:	PHI	Data
PHI	Attributes
Full	Name Geographic subdivision
Data	elements Telephone	number
Fax	number Electronic	mail address
SSN Medical	record	number
Health	Plan beneficiary	number Account	number
Certificate/license	number Vehicle	ID/Serial number/license	plate	number
Device	identifier/serial	number Biometric	identifier
Full face	photograph	or	image Other	unique	identifying	element
C
Custom	
Classifier	
Quick	
Picks	
C
C
C
C
C
C
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Compliance	Event	Manager	Business	Value
Stay	connected	at	communities.ca.com
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Alert:	Bring	real-time	awareness	of	critical	MF	security	issues
§ Monitor	Security	details	direct	from	ESM	and	control	points	in	z/OS
§ Detection	of	security	system	changes	and	policy	violations
§ Built	for	high	volume	security	events	(router	sends	events	to	various	components,	
lightening	load	on	system	and	ESMs)	proven	at	millions	of	events.
Inspect:	With	comprehensive	Auditing	and	Forensics	support
§ Policy-base	filtering	and	real-time	recording	of	critical	security	for	actions.
§ Provides	ability	to	‘replay’	all	security	events,	supporting	forensic	analysis	of	security	
situations	with	High-volume	raw	security	data	recording.	
§ Search,	filter	and	analyze	recorded	historical	data,	with	automatic	tape	retrieval	and	load
Protect:	Ensure	Mainframe	integrity	and	bring	Data	Centric	awareness
§ Designed	for	Security:	Immune	from	Exits	placed	in	SMF	and	configuration	files,	meant	to	hide	activity.	Uses	‘superset’	of	SMF	Security	data.
§ Real-time	monitoring	of	critical	z/OS	configuration	files	detect	potentially	malicious	changes	before	IPL	executes	them.
§ Analyze	users	accessing	critical	sensitive	and	regulated	datasets,	via	integration	with	Data	Content	Discovery
CA	Compliance	Event	Manager:
Mainframe	Security	Vulnerability	Platform
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Compliance	Event	Manager	v5:	What’s	New
CA	Compliance	Event	Manager	gathers	security	events	from	ESM,	z/OS	functions	
and	files.	The	solution	can	determine	what	was	changed,	who	made	the	change	
and	when,	as	well	as	monitor	changes	and	run	compares	for	compliance	changes	
and	changes	to	access	permissions.
Differentiators:	Runs	exclusively	on	Mainframe,	no	need	to	move	mainframe	
data,	PDS	monitor
CA	Compliance	Event	Manager	v5	brings:
§ Improved	Time	to	Value with	new	installation,	deployment	and	configuration	
architecture	
§ Simplified	User	Experience	with	new	Web	User	Interface	and	an	intuitive	
policy	administration	UI		
§ Reduced	footprint	with	lighter	weight	alternative	to	previous	CA	Chorus	for	
Security	and	Compliance	Management
§ Improved	performance	with	Real	Time	Alerting	and	Monitoring	for	
identifying	potential	breaches	or	violations	of	policy
§ High	Availability	with	support	for	Sysplex
§ Integration with	DCD	for	Data	centric	security
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Compliance	Event	Manager:	Alert
Alerts	and	Monitoring
CA	Compliance	Event	Manager	Capability Business Benefit
Monitors	security	details	direct	from	ESM	and	control	
points	in	z/OS
Immune	from	Exits	placed	in	SMF	and	configuration	
files,	meant	to	hide	activity.	Uses	‘superset’	of	SMF	
Security	data.
Monitor	critical	security	system	PDS	changes	for	
security	issues
Discover	changes	to	files	used	when	IPLing the	
mainframe	that	might	load	unwanted	routines
Built	for	high	volume	security	events	(router	sends	
events	to	various	components,	lightening	load	on	
system	and	ESMs)	proven	at	millions	of	events
Scales	for	our	largest	customers
Out	of	box	policies	for	critical	vulnerabilities	and	
configurations:	ex:	JSCBPASS,	sys1.parmlib
Deploying	CEM	improves	base	security	posture
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Compliance	Event	Manager:	Inspect
Audit
CA	Compliance	Event	Manager	Capability Business Benefit
Detection	of	security	system	changes	and	policy	
violations
Alerts	in	near	real-time	(5	minutes)	to	changes	to	
configuration	files,	preventing	errors	or	worse
Data	warehouse	for	real-time	event	management,	
and	auditing
Stores	policy	filtered	events	in	database	for	queries,	
forwarding,	analysis	and	auditing	purposes.	
Advanced	reporting Build	reports	around	security	policies	and	compliance	
rules
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Compliance	Event	Manager:	Inspect
Forensics
CA	Compliance	Event	Manager	Capability Business Benefit
CA	CEM	has	a	high-volume	recording	of	raw	security	
data,	creating	a	historical	record	of	all	security	data	
over	long	periods	of	time	for	future	investigation.	This	
provides	the	ability	to	automatically	archive	to	tape.	
Provides	ability	to	‘replay’	all	security	events,	
supporting	forensic	analysis	of	security	situations.
Datamart	utility allows	for	search,	filtering	and	
analysis	of	recorded	historical	data,	with	automatic	
tape	retrieval	and	load	
Help identify	issues	quickly	by	querying	time-frames	
and	Targeting	specific	security	events,	creating	a	
subset	of	the	full	data	stream	for	detailed	analysis.
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Compliance	Event	Manager:	Protect
CA	Compliance	Event	Manager	Capability Business Benefit
Monitor	Security	details	direct	from	ESM	and	control	
points	in	z/OS
Immune	from	Exits	placed	in	SMF	and	configuration	
files,	meant	to	hide	activity.	Uses	‘superset’	of	SMF	
Security	data.
Monitor	PDS	and	other	critical	configuration	files Real-time	monitoring	of	critical	z/OS	configuration	
files	detect	potentially	malicious	changes	before	IPL	
executes	them.
Understand	Who	has	accessed	sensitive	and	
regulated	data,	including	last	access	and	how	often,	
building	policies	to	monitor	further	access.
Analyze	users	accessing	critical	sensitive	and	
regulated	datasets,	via	integration	with	Data	Content	
Discovery.
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Product	Architecture	
Stay	connected	at	communities.ca.com
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Data	Content	Discovery	Architecture
Web	UI
(Controls	Scans
Reporting)
DCD	Controller
DCD	Controller	Address	
Space
Batch	Client	
Utility
WLM	on	z/OS
DCD	Repository
Classification	
Engine
(DCD	Server	
Address	Space)
Data	
Sources
Sequential
PDS/E
VSAM
DB2
Datacom
IMS
Any	Browser
USS	(HFS	
&	zFS)
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Compliant	Event	Manager	Architecture
CEM	Repository
CEM	Address	Space	
(Tomcat	Server)
CEM	UI	(Policy,	
Reporting)
Any	Browser
z/OS
CEM	Control	
Points
ESM
CEM Router
Alert	
(optional)
Monitor	
(optional)
Logger	
(optional)
Warehouse	
(optional)
Event	
Policy
Log	stream
Data	Mart
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Demo!
§ CA	Data	Content	Discovery	– product	overview
§ Custom	classifiers	in	CA	DCD
§ Who	has	Access/	Who	Accessed
§ CA	Compliance	Event	Manager	– product	overview
§ Policy	overview
§ Splunk App	preview
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Roadmap
Stay	connected	at	communities.ca.com
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Data	Content	Discovery	Promise
FIND	IT CLASSIFY	IT	 PROTECT	IT
For	CISOs	and	Mainframe	
Security	Directors
For	CISOs,	Internal	Auditors	and
Risk	Officers
For	Mainframe	Security	analysts	and	
Mainframe	Data	analysts
The	first	data-pattern	scanning	
capability	uniquely	natively	on	
mainframe	in	the	market
Simple	and	Modern	GUI	along	with	
Flexible	scheduling	designed	for	both	z	
and	non-IBM	z	personnel	
Eliminate	risky	offloading- with	data	
security	right	on	the	mainframe.		Only	
Data	security	product	currently	on	the	
market	for	mainframe	to	use	specialty	
engines	to	reduce	upgrade	costs
Gain	quick	and	critical	insight	about	
the	potential	and	magnitude	of	data	
exposure	on	the	mainframe
Prove	to	auditors	that	controls	are	
checked	by	data-types	to	satisfy	
regulations
Stay	in	control	– eliminate	risk	while	
reducing	costs	of	data	protection	
processes
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CA	Compliance	Event	Manager	Promise
ALERT INSPECT PROTECT
CISO,	Compliance	Officer
Security	Architect,	Auditor,	IT	
Operations
Mainframe	Security	Analysts,	
Mainframe	Data	Analyst
CA	Compliance	Event	Manager	helps	
mitigate	security	events	through	more	
detailed	and	real-time	alerting	100%	
on	the	mainframe
Real-time	alerting	to	critical	security	
situations	combined	with	deeper	insight	
into	security	and	compliance	issues,	
leading	to	an	improved	risk	posture.	
CA	enables	deeper	insight	for	data	
security	and	compliance,	allowing	
customers	to	find	where	data	is	
located,	when	it	moves	and	who	has	
access	to	it
Gain	immediate	and	critical	insight	
about	the	potential	and	magnitude	of	
data	exposure	on	the	mainframe
Prove	it	to	auditors	that	controls	are	
checked	by	data-types	to	satisfy	
regulations	and	quickly	communicate	
compliance	posture
Stay	in	control	of	the	most	mission	
essential	assets	in	the	business	to	act	
quickly	&	eliminate	risk	while	reducing	
costs	of	data	protection	processes
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFT53T
In	the	Voice	of	a	Mainframe	Millennial:	How	Can	
Mainframe	Security	Be	Made	Easier?	
11/16/2016	at	12:45	pm
MFT174S
Mainframe	Security	Strategy	and	Roadmap:	Best	
Practices	for	Protecting	Mission	Essential	Data
11/17/2016	at	12:45	pm
MFT175S Gaps	in	Your	Defense:	Hacking	the	Mainframe	 11/17/2016	at	3:00	pm
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Real-Time	Data	
Security	&	Compliance	
CA	Data	Content	
Discovery
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	Top	Secret
Mainframe	Theatre
Real-Time	Data	
Security	&	Compliance	
CA	Compliance	
Event	Manager
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	ACF2
Mainframe	Theatre
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
@CAWORLD					#CAWORLD ©	2016	CA.	All	RIGHTS	RESERVED.33 @CAWORLD					#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

More Related Content

PDF
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
PDF
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...
PDF
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
PDF
Pre-Con Ed: CA Spool Analytics Deep Dive
PDF
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
PDF
Pre-Con Ed: CA OPS/MVS and the Power of Integration
PDF
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
PDF
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: CA Testing Tools Educational Session (Part 1 of 3): Learn, Engage...
Pre-Con Ed: Webhooks & Continuous Feedback with CA Application Lifecycle Cond...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...

What's hot (20)

PDF
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
PDF
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
PDF
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
PDF
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
PDF
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
PDF
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
PDF
Pre-Con Ed: Ideation: Intelligent Mainframe Management—Understanding Automati...
PDF
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
PDF
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
PDF
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
PDF
Mainframe Application Modernization for Enterprise Developers
PDF
Tracking Message Flows in DataPower With CA APM
PDF
Introducing New Identity as a Service
PDF
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
PDF
What's New in CA Agile Requirements Designer?
PDF
Pre-Con Ed: Migrating to COBOL 5 and Beyond
PDF
Pre-Con Ed: What's New in Service Virtualization V10.0?
PDF
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
PDF
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
PDF
Pre-Con Ed: Managing Test Data Across Distributed and Mainframe Systems
Pre-Con Ed: CA Testing Tools Educational Session (Part 3 of 3): CA Mainframe ...
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: CA View and CA Deliver Analytics Deep Dive
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Ideation: Intelligent Mainframe Management—Understanding Automati...
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Mainframe Application Modernization for Enterprise Developers
Tracking Message Flows in DataPower With CA APM
Introducing New Identity as a Service
Pre-Con Ed: Who Moved My UI? API Testing in a Headless World.
What's New in CA Agile Requirements Designer?
Pre-Con Ed: Migrating to COBOL 5 and Beyond
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: Best practices for setting up CA Workload Automation ESP Applicat...
Pre-Con Ed: Introduction to CA Datacom Key Concepts and Facilities Part II
Pre-Con Ed: Managing Test Data Across Distributed and Mainframe Systems
Ad

Viewers also liked (15)

ODT
Grandes matematicos
PPTX
Short Sales Overview of EmpowerID
PDF
Jesusisthe word en
PPTX
Masters of Machines II: Conquering complexity with operational intelligence
PPTX
The prophet’s character part 5 page 02
PDF
Desapariciones forzadas
PPT
Prueba de competanecia basicas
DOC
02.01.14.licitação para obra do General Osório será no dia 7
PDF
midhun (1)
PPTX
Micro Niche Experiment #4 – The 60 Day Blogging Authority Rule
PPT
Websphere on z/OS and RACF security
PDF
EGREG Process Workflows
PDF
Pray away mealtime
PPTX
LOS DERECHOS DE LOS ANIMALES
Grandes matematicos
Short Sales Overview of EmpowerID
Jesusisthe word en
Masters of Machines II: Conquering complexity with operational intelligence
The prophet’s character part 5 page 02
Desapariciones forzadas
Prueba de competanecia basicas
02.01.14.licitação para obra do General Osório será no dia 7
midhun (1)
Micro Niche Experiment #4 – The 60 Day Blogging Authority Rule
Websphere on z/OS and RACF security
EGREG Process Workflows
Pray away mealtime
LOS DERECHOS DE LOS ANIMALES
Ad

Similar to Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sensitive Data on the Mainframe (20)

PDF
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
PDF
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
PDF
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
PDF
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
PDF
CA Gen Updates: Application Modernization and What's New
PDF
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
PDF
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
PDF
Securing Mobile Payments: Applying Lessons Learned in the Real World
PDF
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
PDF
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
PDF
What's New in CA Test Data Manager 4.0?
PDF
Auto Integrate – DevTest Automation and Integration Best Practices
PDF
CA Project & Portfolio Management Resource Management Best Practices
PDF
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
PDF
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
PDF
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
PDF
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
PDF
Mainframe Software Management Made Easier
PDF
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
PDF
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Pre-Con Ed: Deep Dive into CA Workload Automation ESP 11.4
CA Gen Updates: Application Modernization and What's New
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 2: Advanced Security Controls
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
Securing Mobile Payments: Applying Lessons Learned in the Real World
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Integrate Your Monitoring Tools Into an Automated Service Impact ...
What's New in CA Test Data Manager 4.0?
Auto Integrate – DevTest Automation and Integration Best Practices
CA Project & Portfolio Management Resource Management Best Practices
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Tech Talk: CA API Gateway: Deploying Docker Container Gateways
CA ACF2 and CA Top Secret Part 2: r16 is Here - More Capabilities to Better ...
Mainframe Software Management Made Easier
CA ACF2™ and CA Top Secret® Part 1: The Road Leading to r16 and Capabilities ...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise

Recently uploaded (20)

PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
Empathic Computing: Creating Shared Understanding
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Advanced methodologies resolving dimensionality complications for autism neur...
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
Reach Out and Touch Someone: Haptics and Empathic Computing
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
sap open course for s4hana steps from ECC to s4
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sensitive Data on the Mainframe