SYDNEY – 17 November 2017 – CA WORLD ’17 — CA Technologies (NASDAQ:CA) today announced an expanded portfolio that allows companies to integrate security into the earliest stages of development and assure security in deployment – an emerging practice known as DevSecOps. CA is uniquely positioned to deliver industry leading capabilities to our customers with new capabilities in the CA Automic, CA Veracode, and Continuous Delivery portfolios.
According to Gartner, “The goal of DevSecOps is to improve the overall security posture by designing a set of integrated controls to deliver DevSecOps without undermining the agility and collaborative aspects of the DevOps philosophy. Simply layering standard security tools and processes onto the DevOps cycle won't work. Security checks, controls and testing need to be applied as automatically and transparently as feasible throughout the development, delivery and operation of applications.”
Improving speed without sacrificing security
Supporting the continuous delivery value stream, CA Continuous Delivery Director SaaS integrates the DevOps toolchain for complete visibility into the planning and troubleshooting of development projects, with the ability to assess pipeline progress and performance. It gives DevOps teams a way to eliminate a manual and burdensome process in release planning and management.
To bring security to the process, integration with CA Veracode makes application security testing a key component of the development process by initiating checks throughout the development pipeline. And additional integration with CA Automic Application Release Automation extends faster deployment capabilities with an automated, agile back end that delivers more reliable releases of code.
Every modern software factory strives to build better apps faster, but requires the right tools and processes across all phases of the software development lifecycle (SDLC). With a DevSecOps approach, integrating tools and processes that encourage better collaboration across development, operations and security teams makes security a natural part of development and operations.
“Companies that embrace DevSecOps deliver better and more-secure software because of the focus on collaboration and alignment across disciplines,” said Ayman Sayed, president and chief product officer, CA Technologies. “In today’s security environment, it is critically important for security to be integrated seamlessly throughout the whole software development lifecycle. We are pleased to be able to provide CA customers with new tools that do just that across our CA Automic, CA Veracode, and Continuous Delivery portfolios.”
CA Technologies is showcasing over twenty innovations and enhancements across the portfolio at CA World ’17. These solutions give companies the ability to respond and adapt to change, as well as evolve existing technology investments for future success. From on-premises to the cloud and everything in between, CA delivers industry-leading products, solutions and expertise that removes the barriers to compete and succeed.
For more information on all news being announced at CA World ‘17, please visit the CA World ‘17 Newsroom. To access replays of the CA World ’17 keynotes, please visit here.
About CA Technologies
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the Application Economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com.
Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Belinda Truong H+K Strategies for CA Technologies Mobile: +61 9286 1243 email@example.com
Email fraud is nothing new, but online criminals have become ever more-effective at spoofing their identities to trick employees into sending them money. The Australian Centre for Cyber Security (ACSC) recorded losses of over $20M to business email compromise (BEC) attacks last year alone, up 230 percent over the previous year – and the full amount is certain to be much larger.
Cybersecurity Insights - Attack
No matter how robust your security, or how diligent your employees, network credentials are a free pass for cybercriminals. This is mostly because employees are relied upon for their own password management. And with more than 4.8 billion sets of stolen credentials said to be available online, odds are that at least a few of your employees’ user IDs and passwords are just waiting to be used by unscrupulous outsiders. Are you ready to stop them?
Cybersecurity Insights - People
Cyber resilience will be particularly important as Australian organisations face increased pressure to quickly detect, respond to, and manage the repercussions of breaches in the wake of 2018’s Notifiable Data Breaches (NDB) scheme.