{"id":1327,"date":"2004-09-06T00:00:00","date_gmt":"2004-09-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/06\/ca-adds-workflow-tool-to-suite\/"},"modified":"2021-12-30T11:39:10","modified_gmt":"2021-12-30T11:39:10","slug":"ca-adds-workflow-tool-to-suite","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/06\/ca-adds-workflow-tool-to-suite\/","title":{"rendered":"CA Adds Workflow Tool to Suite"},"content":{"rendered":"<p>Computer Associates International Inc. will increase IT managers&#8217; ability to automate services with a new workflow engine the company is adding to its IT Service Management Suite.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The workflow engine, which will enable IT to horizontally integrate management functions, will be added to five of CA&#8217;s eight IT Service Management Suite components, and the data generated will be available with the suite&#8217;s IT services cataloging, fulfillment, metering, assurance and accounting modules.  The engine will automate the processes of ordering, delivering and measuring IT services as well as provide a streamlined way to charge for the services based on usage, officials said.<\/p>\n<p>The suite is designed to better align technical operations management with the business.  Toward that end, the new workflow engine also creates linkages between service delivery and Unicenter infrastructure management systems, CA officials said.<\/p>\n<p>&#8220;To the extent you can connect the metering application to the actual network and system management and actual applications that are running,&#8221; Lamm said, &#8220;you can get quicker and better measurement of whether you are making the SLA [service-level agreement] commitment.&#8221;  &#8220;If you want to deliver security services, it can connect directly to security services [applications] through this workflow engine,&#8221; Lamm said.<\/p>\n<p>While the new workflow engine may enhance the ability of IT to horizontally integrate its management functions, how flexible it is remains to be seen, said industry analyst Rick Ptak, of Ptak &#038; Associates, in Amherst, N.H.<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,1759,1642711,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1327","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1327"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1327\/revisions"}],"predecessor-version":[{"id":3814,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1327\/revisions\/3814"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}