Start exploring, experiencing, and engaging with NetIQ customers and commentators in NetIQ Communities! From industry news in NetIQ Views, to technical how-tos in Cool Solutions, to connecting with NetIQ experts in our Support Forums, you can join the conversation today.
With properly implemented access control, organizations can take advantage of the benefits of BYOD while minimizing the risk of data breaches. Learn three important aspects of mobile authentication.
After struggling to manage identity & access rights across applications, Etnic knew they needed a change. Working with NetIQ, they achieved an innovative IDM solution
A few months ago, we introduced you to the ‘Four Lenses of IT Operations’. In this blog, Joe Rogers goes a little more in depth into the questions and surrounding key capabilities that IT Operations needs in order to quickly and confidently answer these questions.
Experts from the healthcare industry will share their unique perspectives at HIMSS from April 12-16. Join us in Chicago
Welcome to part 2 of the Remote Execution Adapter for Aegis. In this second part I provide the server side adapter, instructions on how to install and configure as well as descriptions of each activity.
Steps to get OSP talking to Shibboleth IDP: In the world of federation there are many possible tools and protocols to use. There is an alphabet soup of acronyms like SAML, WS-Fed, WS-*, Shibboleth, Liberty, SOAP or REST, Oauth, etc. There are a host of products that can do this for you. NetIQ has one…
Create a shared vision to guide the way along your IAM program road map. See how in this report from Gartner
Not yet signed up for RSAC? Use promo code X5ENETIQ for a complimentary RSA Exhibit Hall Only pass. (Must redeem by 4/20.)
This Cool solution explains how to create Ajax based form login for user authentication.
If there’s any problem that plagues all IT departments—it’s one of relevance. Now before anyone gets upset—I’m not saying IT is irrelevant. However, there’s often a lack of communication between those running the business (CxOs and Line of Business owners) and those that keep the business running (IT). However critical IT is to the success…
Recently I had the opportunity to collaborate with a customer and NetIQ development in enhancing a regular expression check that allows multiple expressions against multiple files. The check also allows the ability to confirm if a file is present or not, and allow the logic of deciding if the check will have a…
The day when devices, houses, clothes and many other possessions connect and communicate with the outside world is fast approaching. Also called the Internet of Everything (IoE), this world of connected devices will offer convenient services that operate everywhere around us. Yet the looming presence of IoE brings up issues of control, security and privacy….
When one of the company’s server rooms narrowly escaped damage during a winter flood, Craig Group Ltd. realized the necessity of disaster recovery
Designing IT Process Automation workflows very often comprises of taking a manually documented process and converting it into an automated process, maintaining the logical steps and as many of the techniques used in the manual process as possible. Manual processes can include heterogeneous automated steps utilizing customized scripts which may have been in place for…
Federal IT has a lot of demands placed on it—but NetIQ’s identity–powered solutions help the US Government with compliance & security processes.What else can NetIQ do for federal IT? Click & see