Welcome!

Related Topics: @DevOpsSummit, Java IoT, Mobile IoT, Microservices Expo, Linux Containers, @CloudExpo

@DevOpsSummit: Blog Post

New CA Layer 7 Mobile Access Gateway 2.1

Simplifies the process of adapting internal data, applications and security infrastructure for mobile use

Thank you for taking the time to answer my questions. Please tell us, what is CA Technologies all about and what do you do?

Tyson Whitten: We deliver IT Management and Security solutions for distributed, cloud, mobile, and mainframe platforms.

What are you showing at RSA?

Whitten: We are announcing the CA Layer 7 Mobile Access Gateway 2.1. It simplifies the process of adapting internal data, applications and security infrastructure for mobile use. The CA Layer 7 Mobile Access Gateway provides a centralized way to maintain and control security and management policies for information assets exposed via APIs while delivering a consistent level of performance for the app end user. It was the first API Gateway to provide an out-of-the box security software development kit (SDK) to speed incorporating token handling and single sign-on in mobile apps for secure authorization of users, apps and devices. New functionality includes:

  • Integration of CA SiteMinder® session cookies within the Mobile SDK to extend the SiteMinder SSO credentials with native mobile apps.
  • Social login to enterprise mobile apps, providing convenience for the user while maintaining security and governance.
  • Mobile app security support for the Adobe PhoneGap cross-platform mobile development framework.

Who is your target audience and how do you intend to reach them? What is the biggest challenge you face right now in telling your story and winning over new clients?

Whitten: The CA Layer 7 Mobile Access Gateway is primarily used and sold to enterprise and security architects who are responsible for securely externalizing data to mobile apps through APIs. As the leading vendor in API Security & Management we've established a strong foothold within this market segment.

Given the product benefits such a broad set of mobile app constituents there's plenty of opportunity to win over new clients and grow our business. It's really the Swiss Army Knife of mobility products. Organizations purchase the Mobile Access Gateway to help them accelerate development and deliver new mobile apps to their customers, optimize app performance in high load environments and protect their apps end-to-end from the mobile client to the backend API all while meeting the user experience needs the business and user requires. The business, developers, operations and security all reap the rewards of the Mobile Access Gateway.

I'd be curious to hear any general thoughts you have on market trends...

Whitten: Organizations have opened their businesses to drive growth and operational improvements. They've done this by incorporating cloud services and mobility, by opening their business to partners and customers and by externalizing APIs to accelerate application delivery. All of this demands security, and CA believes the best way to manage and secure today's open enterprise is by focusing on identity.

Who are your competitors?

Whitten: When it comes to mobile security and our Mobile Access Gateway our competitors vary: IAM suite vendors such as IBM and Oracle, API Management competitors such as Apigee, Intel and IBM DataPower, and Identity Service providers such as Ping, SecureAuth, Okta and Centrify.

How do you differentiate from your competitors?

Whitten: Very simply we provide the most comprehensive solution no matter what type of app you need to deploy.

  • Broad App Support. Whether it's browser-based, native or hybrid we deliver a solution for all use cases while our competitors solve partial elements of the mobile app problem.
  • Multi-channel. CA delivers a unified access solution across Web, APIs and mobile, improving administration as well as the user's experience when moving across device channels.
  • End-to-end. For native mobile apps we deliver an end-to-end solution that secures the mobile app client to the backend API. While some API vendors secure the API and some Identity Service Providers secure the app, none bring it together and secure the entire channel.
  • Not Just Run but Build. The DevOps-focused enterprise is consistently attempting to accelerate mobile app release cycles while improving performance, availability and service levels. We accelerate the development cycle while improving availability and uptime, meeting the needs of DevOps focused organizations.

What is your distribution model? Where to buy your product?
Whitten: Our products are sold direct and through a robust partner ecosystem.

Current annual revenue: $4.5 billion

CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services.  Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud.  Learn more about CA Technologies at www.ca.com.

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...