Identity & Access Management
Use integrated identity information to create and manage identities and control access to enterprise resources. We provide identity and access management, single sign-on (SSO), access governance, and more. Learn more
Security Management
Detect and respond to all potential threats quickly and decisively. By monitoring user activities, security events, and critical systems, we provide actionable security intelligence to reduce the risk of data breach. Learn more
View More Resources
IT Operations Management
Get a holistic view of your IT environment and business services. We integrate service management, application management and systems management, to help you improve performance and availability. Learn more
Disaster Recovery
Get affordable, high-performance disaster recovery. Our disaster recovery solutions offer warm-backup recovery speeds similar to mirroring, but at low costs similar to tape backup. Learn more
Workload Migration
Migrate workloads and consolidate servers quickly. We provide upfront analysis and planning, and deliver automatic, unattended high-speed Physical-to-Virtual (P2V) or anywhere-to-anywhere workload migrations. Learn more
Unified Communications / VoIP
Ensure high quality of service for your unified communications and VoIP. We provide pre-deployment assessments, UC component monitoring, automated problem diagnostics and analysis for consistent results. Learn more
Industries
Close
Read more
Learn more
Find out more
How we help
IGA Buyers Guide How to select the right IGA solution for your business
Read now ›
On-demand Webinar: The Alternate Truths of Identity Management
View now ›
View all videos ›
All NetIQ news ›
All NetIQ events ›
Thar She Blows: Mitigating Whaling Risk CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme... 19 May 2016 Read now ›
Rockin' Role-Based Security—Least Privilege With over 40,000 attendees, 500 exhibitors, and hundreds of sessions, this year's RSA Security Conference was the place to be for anyone interested... 21 Apr 2016 Read now ›
Are Your Ex-Employees Insider Threats? I was intrigued by Session HUM-R03F at the RSA Security Conference. At first I thought that the HUM session names meant that the conference... 6 Apr 2016 Read now ›
The Next Cyber Security Threat: Export Controls Recently, I was asked to participate in a roundtable discussion on Export Compliance, Intrustion Software, Network Surveillance, and Cybersecurity... 18 March 2016 Read now ›
Successful Social Engineering Attack Targets Two-Factor Authentication It seems that not even strong two-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario... 1 March 2016 Read now ›
What I think of Obama's Cybersecurity National Action Plan On February 9, President Obama published "Protecting U.S. innovation from Cyberthreats" in The Wall Street Journal.... 24 Feb 2016 Read now ›
View our community ›
View all customers ›
Want to talk to someone? Call our Sales team or request a call and we'll get right back to you.
Request a call
live chat software