CA Agile Central (formerly Rally) is an enterprise-class platform that’s purpose-built for scaling agile development practices. Provide a hub for teams to collaboratively plan, prioritize and track work on a synchronized cadence. Connect your development work to your company’s most important business initiatives. Measure productivity, predictability, quality and responsiveness with real-time performance metrics.
CA Technologies creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. CA’s wide range of DevOps solutions offer the capabilities necessary to accelerate innovation and maximize customer experiences – across mobile, private and public cloud, distributed and mainframe environments.
CA Automic Workload Automation gives you the agility, speed, visibility and scalability needed to respond to the constantly changing technology landscape. It centrally manages and automates the execution of business processes end-to-end; across mainframe, cloud and hybrid environments in a way that never stops even when doing an upgrade to the next version.
CA API Developer Portal simplifies API discovery for developers and provides them with access to enterprise data so they can get to building apps fast. Relationships with developers, partners and third parties are easily managed and analytics provide valuable operational data for optimizing your business
Automate API Management is an API Management Software by CA Technologies that allows to create customized ad hoc reports and view KPIs across multiple dashboards; developer portal to engage, onboard, educate and manage partners and developers.
Database Management for DB2 for z/OS solutions from CA Technologies provide a powerful and flexible set of tools designed to ensure optimal performance, efficient administration and reliable backup and recovery of your DB2® for z/OS databases. With the help of these interoperable solution suites, your enterprise can also improve service levels, data availability and application responsiveness—helping to cut your costs.
CA Deliver helps to optimize report management to save time and money. It can automatically archive and distribute the mainframe reports. It provides a scalable, extensible, single point of management for the reporting.
CA Directory is a battle-tested directory server that provides the scalability and reliability needed to support the most demanding applications with minimal infrastructure and personnel resources. The solution’s innovative design enables ultra-high-speed performance as well as transparent load balancing, true multi-master replication and state-based recovery.
CA Dynamic Capacity Intelligence provides a proactive, predictable capacity management for optimizing system resources for prioritized workloads. This capacity management tool helps to manage and utilize mainframe capacity, thus helping drive down monthly license charges (MLC).
CA Easytrieve Report Generator helps to create and publish comprehensive reports to traditional report images and Web portals _ no matter level of experience. And can do so from enterprise data sources across multiple enterprise platforms.
CA eHealth offers sophisticated performance reporting and out-of-the-box, role-based views, so that your organization can better understand the when, where and how of developing performance degradation.
CA Endevor Software Change Manager provides a standardized automated approach to securing and managing the software assets, automate the development process and change from the very first line of modified code through deployment with change tracking.
CA File Master Plus helps to streamline data assets and procedures, improve the accuracy of the mainframe data, reduce the time associated with test file editing and data creation and reduce training costs.
CA Harvest Software Change Manager (CA Harvest SCM) provides powerful, process-driven capabilities for managing development teams across your enterprise, encompassing multiple platforms and release management tools.
High expectations to deliver at lightning speed is leading to applications being used outside the visibility of IT. Identity-as-a-service (IDaaS) can help you stay on top of cloud adoption and enable an experience your workforce will appreciate.
The CA Identity Suite provides comprehensive identity management and governance capabilities with a simple, intuitive user experience. This user experience can dramatically simplify processes such as user access requests and access certifications, resulting in improved productivity and user satisfaction. In addition, the CA Identity Suite performs risk analysis and certification and enables remediation actions in real-time during the access provisioning steps, thereby improving audit performance and risk posture with preventive policy enforcement
CA MICS manage resources to optimize performance and availability. It provides the metrics need to perform effectively IT financial planning, storage planning, capacity planning and to monitor system performance against existing service levels.
CA MIM (Resource Sharing) to Protect mainframe environments from data integrity exposures while reducing resource costs. Enable sharing of system resources using high-availability and high-performance operating characteristics.
CA Mobile API Gateway extends mobile backend services, legacy infrastructure and enterprise data through scalable REST APIs. It helps enterprises to develop agile architectures that take advantage of Web, mobile, microservices and IoT, while maintaining security from the app to the API. CA Mobile API Gateway speeds mobile API development velocity by providing a central point for securing and managing information assets exposed via open source SDKs and APIs everywhere.
Ca Panvalet is a library management system that centralizes the storage of the source, establishes and maintains a control library of source programs and provides immediate access for maintenance, processing, control and protection against theft, disaster or other loss.
CA Process Automation helps improve productivity while also enforcing standards. With CA Process Automation, you can automate IT processes that span multiple organizations and systems, reduce the time it takes to deliver services and enforce standards and compliance policies across departments.
CA RC/Migrator for DB2 for z/OS to automate administrative tasks to increase database availability and decrease human error. It helps to automate the migration of DB2 objects from one environment to another with features designed to simplify administration tasks, reduce database downtime and increase DBA productivity.
CA RC/Query for DB2 for z/OS provides catalog management capabilities and alleviates the time-consuming task of manually developing and testing specialized queries. It allows taking immediate action during a reporting section, whether that means executing a command, invoking a utility or moving to another CA Database Management product.
CA RC/Update for DB2 for z/OS to automate labor-intensive tasks related to DB2 objects and data. It provides a development environment for the application developer, an editor and data copy feature for the end user, and sophisticated object management facilities for the DBA.
CA Risk Authentication is a powerful risk-based, adaptive authentication solution that works in real time to evaluate context, calculate a risk score, recommend actions and provide alerts/case management. It has a strong set of prebuilt rules to detect risk and an easy-to-use risk management console to adjust parameters or create new rules. The risk engine examines many factors including device identification, geolocation, IP address and user activity to evaluate risk. The calculated risk score is then fed into your policies to decide whether to authorize the current activity, request step-up authentication and/or send an alert or block the activity. This provides your organization with a transparent layer of protection against identity theft, data breaches and fraud.
CA Strong Authentication is a versatile multi-factor authentication system that can help you deploy and manage a wide range of authentication methods, from passwords and knowledge-based authentication (KBA) to two-factor software tokens or hardware credentials. It also can provide out-of-band authentication methods such as SMS, email or voice delivery of one-time passwords (OTP). CA Strong Authentication supports two-factor authentication to VPNs and can protect access and transactions from PCs, laptops, tablets and mobile phones so that organizations can build a cohesive and comprehensive authentication strategy. It also includes free mobile applications to facilitate the use of mobile devices for strong authentication and software development kits (SDKs) to help easily incorporate two-factor authentication into mobile applications
CA Strong Authentication for Payments is a mobile authentication solution that makes banks' and cardholders' lives easier and less frustrating by reducing friction when shopping online. It delivers two-factor authentication via a user-friendly mobile app, linking a card with a device and protecting that association with a credential.
Ca SymDump Batch helps to identify and resolve mainframe batch dumps, promoting increased application stability and reliability, provides reports on program failures and offers insights into the root cause of the problem along with a suggested course of action.
CA Test Data Manager uniquely combines elements of data subsetting, masking, synthetic, cloning and on-demand data generation to enable testing teams to meet the agile testing needs of their organization. This solution automates one of the most time-consuming and resource-intensive problems in Continuous Delivery: the creating, maintaining and provisioning of the test data needed to rigorously test evolving applications.
CA Threat Analytics for Privileged Access Manager provides a continuous, intelligent monitoring capability that helps enterprises detect and stop hackers and malicious insiders before they cause damage. The software integrates a powerful set of user behavior analytics and machine learning algorithms that highlight activities that pose a higher than normal risk of breach
CA Transaction Manager enables you to implement a comprehensive 3D Secure program to provide your cardholders with robust eCommerce payment security, personalized one-to-one marketing and better customer service.
Reduce your storage costs and administration time by simplifying the management of complex enterprise storage environments, maximizing your use of existing storage resources and ensuring the protection and high availability of critical business information.
CA Veracode Developer Training empowers developers, testers and security leads to develop secure applications, providing the critical skills they need to identify and address potential vulnerabilities. CA Veracode offers three styles of teaching that reinforce each other. Instructor-led training offers real-time training that's tailored to your organization. On-demand training is integrated with the CA Veracode Application Security Platform and allows developers to learn when and where they need it. And just-in-time training offers refreshers and contextual recommendations to help developers fix vulnerabilities. Development organizations that leverage CA Veracode eLearning see a 30 percent higher vulnerability fix rate
CA Veracode Greenlight brings security scanning right into your IDE as you are coding, returning most scans in seconds. Think of it as your own personal security coach, highlighting the parts of your code that are vulnerable, and providing helpful tips on how to fix it. Becoming a better developer starts with ensuring that you are committing code with the fewest security flaws possible.
CA Veracode Security Program Management (SPM) helps enterprises map out their strategy and deliver results. CA Veracode has been involved with thousands of application security programs over the past 10 years. We help you with security program readiness and execution so you don���t have to find and retain highly specialized talent. As a result, we see customers who use CA Veracode SPM grow their application coverage by 25% each year, decrease their time to deployment and achieve better scan and remediation metrics. Most importantly, our security program managers ensure that your program stays on track to meet your strategic goals
CA Veracode's State of Software Security Report found that 88% of Java applications had at least one open sourced based vulnerability, one of which leaked the Social Security numbers of 143 million Americans. CA Veracode Software Composition Analysis (SCA) identifies risks from open source libraries early so you can reduce unplanned work, covering both security and license risk. SCA helps Engineering keep roadmaps on track, Security achieve regulatory compliance, and the Business make smart decisions
CA Veracode static analysis enables you to quickly identify and remediate application security flaws at scale and efficiency. Our SaaS-based platform integrates with your development and security tools, making security testing a seamless part of your development process. Once flaws are identified, leverage in-line remediation advice and one-to-one coaching to reduce your mean time resolve. CA Veracode static analysis is the competitive advantage you need to securely bring your applications to market at the speed of DevOps.
CA Veracode Vendor Application Security Testing (VAST) provides a scalable program for managing third-party software risk. Build your program based on a decade’s worth of best practices to ensure success and see a simple pass or fail for each vendor application. Because CA Veracode scans binaries rather than source code, vendors will be more comfortable with the assessments because they don't have to disclose their intellectual property. With CA Veracode, you can scale your program without adding specialized headcount and manage the entire program on a single platform
CA Veracode Web Application Scanning (WAS) offers a unified solution to find, secure, and monitor all of your web applications – not just the ones you know about. First, CA Veracode discovers and inventories all of your external web applications, then performs a lightweight scan on thousands of sites in parallel to find critical vulnerabilities and helps you prioritize your biggest risks. As a second step, you can run authenticated scans on critical applications to systematically reduce risk while continuously monitoring your security posture as part of the SDLC. CA Veracode offers multiple scanning technologies on a single platform, so you get unified results, analytics, and increased accuracy
CA Workload Automation CA7 is a workload automation solution, by automating many of the labor-intensive tasks associated with workload automation and monitoring for z Systems. It helps to development from existing processes, and automates complex performance management to respond faster to changing SLA requirements.