Computer Associates 2006 Annual Report Download - page 28

Download and view the complete annual report

Please find page 28 of the 2006 Computer Associates annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 172

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

customers’ needs, drive more accountability for the performance of each software area, and to be more responsive to
the changing dynamics of the IT management software marketplace. We do not presently maintain profit and loss
data on a business unit basis, and therefore they are not considered business segments.
Enterprise Systems Management
Our products for Enterprise Systems Management optimize the availability and performance of IT assets and
provide a complete, integrated and open solution for policy-driven, dynamic IT management. This means customers
can manage their IT resources in a way that allows them to be more flexible in responding to changing business
dynamics. Our comprehensive set of solutions is built on a framework of common services so the solutions work
together to simplify the complexity present in medium to large enterprises, telecommunications service providers
and public sector organizations.
Our Enterprise Systems Management products manage assets and processes across the entire IT environment
including networks, servers, storage, databases, applications and desktops or client devices, on both mainframe and
distributed platforms. We offer our Enterprise Systems Management solutions in the following three categories:
Service Availability — these products monitor and optimize the health, availability and performance of the
infrastructure and the technologies critical to our customer’s business operations to make sure they are always
up and running.
Resource Optimization — these products, which include configuration management, provisioning and
capacity management, provision assets dynamically according to business priorities or consumption rates,
and help customers make sure they maximize their IT resources.
Process Automation these products, which include workload automation, automate tedious or error-prone
manual procedures to reduce infrastructure downtime and allow customers to redeploy their valuable IT
resources in more strategic ways.
The acquisition of Concord significantly strengthened our network management offering. The acquisition of Wily
gave us an important added depth in application management. Both further augment our comprehensive Enterprise
Systems Management portfolio.
Security Management
Our solutions for Security Management provide an innovative and comprehensive approach to IT security. Our
products protect information assets and resources; provide appropriate system and information access to
employees, customers and channel partners; and centrally manage security-related administration. We offer
Security Management products in the following three categories:
Identity and Access Management — these products empower IT organizations to manage growing internal
and external user populations, secure an increasingly complex array of resources and services and comply with
critical regulatory mandates.
Threat Management — these products are designed to help customers identify and eliminate internal and
external threats such as harmful computer viruses and security weaknesses associated with operating systems,
databases, networks and passwords.
Security Information Management — these products help to integrate and prioritize security information
created by CA and third-party security products, enable customers to increase operational efficiencies, help
ensure business continuity, help customers adhere to regulatory compliance, and mitigate risks.
Storage Management
Our Storage Management solutions simplify the protection and management of business information, data and
storage resources to support business priorities. Customers use our solutions to proactively optimize storage
8