Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.
What’s identity got to do with it? (Online voting, that is.)
Students have enough on their plate without having different usernames and passwords for every online system.
Take advantage of the cloud’s benefits, with solutions like NetIQ CloudAccess.
Some of the most serious threats come from the theft of insider credentials. Identify risks in real time.
“Anything goes” is not a valid BYOD policy. Learn a better way:
Disaster recovery in just 20 minutes is achievable with NetIQ PlateSpin Forge
Redirection, which is required by many applications and services, inherently brings security risks to organizations. For instance, an “un-validated” redirect can allow an unsuspecting user visiting a trusted site to be redirected to a malicious site, therefore exploiting the users’ trust. Using a “whitelist” can help mitigate this vulnerability by…
After the release of IDM 4.5 the first patch came out. One of the components updated is Designer, with an online update (or downloadable ZIP file). When you chose to install the update it shows a list of fixes and enhancements. As I have been wont to do, I decided to go through each item…
In the 2015 Cyberthreat Defense Report, 52% of IT security decision makers and practitioners believed a successful breach is likely this year.
Introduction In order to allow additional users to use GPA, you’ll need to add them to the GPA security framework. Specifically, this means two things; they’ll need a repository user account (actually a SQL account), and they’ll need their AD account given permissions to objects in the GP Repo. How you’ve implemented GPA and where…
I recently implemented the cool solution, “Setting a password in workflow” for one of my clients. This allows us to set userPassword within a workflow. But the source of the password data might often be a form. A common configuration is that when using a password field, you have the ability to provide a…
The IT department for the city of Carlsbad, California, was spending 70% of its time on maintenance tasks before NetIQ Identity Manager. What can it do for you?
Monitoring user activity can include everything from physical security video cameras to active monitoring of how staff utilizes social media on their computers. See how it can help your business in our webcast.
VPNs have a new part to play in the future of access management.
Six facilities and nearly 2,000 users made manual identity management a full-time job for Johnsonville Sausage.