CloudAccess

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
150
Score:
Unrated

If someone really needs to do something, they will find a way to do it. The wheel. Nails. The compass. Paper. The printing press. Light bulbs. Computers. The Internet. Running your own email server as the US Secretary of State. In the last 40 years, I don’t think there is a business person on the…

+ read more

Rhonda Holloway
Mar 17, 2015
9:02 am
Reads:
2,422
Score:
Unrated

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
2,755
Score:
5

Last week I attended the NetIQ BrainShare conference in Salt Lake City. In this blog post I’ll reflect on the content and themes – as I experienced them myself. There was a lot to choose from at BrainShare. I built my agenda mainly around IAM and security. Especially I wanted to learn about NetIQ’s vision…

+ read more

By: Petteria
Nov 12, 2014
9:37 am
Reads:
3,039
Score:
5

We’ve all been there. A few times each year IT revisits their shortlist of potential projects to determine what to fund. For many, the list of “to do’s” is longer than their arm, while their budget fits in a shirt pocket. Which inevitably results in prioritizing spend on projects that address risk and compliance first….

+ read more

Kent Purdy
Oct 22, 2014
4:05 pm
Reads:
15,174
Score:
5

One undocumented feature of CloudAccess is support for dynamic groups in policy management. This provides the administrator ability to map policies to essentially any LDAP query.

Matthew Ehle
Mar 14, 2014
11:45 am
Reads:
2,934
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow