Continuous Monitoring , Cybersecurity , Data Breach

Securing the Borderless Enterprise
Securing the Borderless Enterprise

As the borders of the enterprise dissolve in the mobile world, security becomes increasingly important and inherently more complex. Single Sign-On becomes the key to providing a convenient experience when accessing enterprise resources across web, mobile and APIs. Join this webinar to learn how the National Rural Electric Association is securing its borderless enterprise, and gain new strategic insights from Greg Thompson of CA Technologies. You will learn:

  • How APIs are fundamental to the accelerated growth in mobile apps;
  • How modern SSO solutions can provide a seamless and secure user experience across web, mobile and APIs;
  • How organizations can leverage existing identity systems in the borderless enterprise;
  • How the NRECA is solving application and security challenges.


More and more, the applications that run your business expand beyond your organization's control to cloud-based services and partner-hosted websites. With so many separate sets of credentials and different login processes to keep track of, users want a simpler, more convenient way to access the applications they need ̶ regardless of where the application resides. Your users put their trust in your organization to ensure that their access is secure and their identity and information is protected. The key: Single Sign-On.

SSO helps organizations accelerate deployment time and reduce the ongoing cost of application and infrastructure management involved in procuring hardware, installing and configuring software and maintaining on-premise security solutions.

In addition, end users receive a more convenient sign-on experience that is consistent with how they access applications within their organization's domain.

In this session, Greg Thompson, Director of API Management, Presales of CA Technologies will discuss how CA provides a solution to deliver unified access and SSO across the borderless enterprise.

Guest speaker Jon Naglieri from NRECA will also discuss how NRECA is using this solution to solve the same application and security challenges.

Around the Network