Computer Associates 2007 Annual Report Download - page 6

Download and view the complete annual report

Please find page 6 of the 2007 Computer Associates annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 144

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144

4
CA ca.com/catoday/2007ar
Moving Ahead: Delivering on EITM
Key to the future success of CA is the creation and execution of a durable
and differentiated business strategy. At my fi rst CA World in Las Vegas in
November of 2005, we announced EITM: CAs industry vision for unifying
and simplifying complex IT management for greater business results. The
reaction was polite, but not overwhelming.
The value proposition we proposed was not complicated, even though the
problem we promised to solve is anything but simple.
For 30 years, large IT users have been creating an ever more complex
infrastructure, comprising hardware, software and networking products
from many different vendors.
At the same time, IT has become the lifeblood of most large companies and government entities, and
all of the critical information in a business — both fi nancial and personal — is now managed by the IT
organization, and this information needs to be secured and protected.
Managing this complex environment in a holistic way has become increasingly diffi cult, especially when
the business is making steadily increasing demands on IT. IT organizations have been struggling to provide
improved service, security and regulatory compliance.
People were skeptical of EITM’s promise to make the management of IT simpler. It sounded good, but
some complained that it sounded a lot like the promises the industry had been making for the last decade,
and asked why this time was going to be different.
With both products and service offerings to help large IT users deal with the complexity, and deliver the
services that their businesses want and need, we knew that CA possessed the breadth and depth to realize
the EITM vision.
Eighteen months later, at CA World in April 2007, customers started to see the results, and the excitement
was palpable. More than 5,000 customers, hundreds of press and media, and a couple of thousand CA
people got together and spent four days talking about EITM, discussing signifi cant IT trends and sharing
success stories.
We also were able to align sales, marketing and development to bring EITM to market through 16 well-defi ned
Capability Solutions. These solutions, which debuted during CA World, are supported with marketing
collateral and education that give our sales teams the tools they need to engage customers around EITM.
With more than 200 new releases and upgrades of our products in the last year and our Capability
Solutions, there was a lot to talk about at CA World. It became clear that EITM is making a difference
in the way people govern, manage and secure their complex IT environment. EITM is real.
EITM is making a
difference in the
way people govern,
manage and secure
their complex IT
environment.