Expert Views

Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Jul 28, 2016
4:34 pm
Reads:
406
Score:
5

You’ve already invested in AppManager—but you’re not running the latest version? It’s somewhat of a conundrum, balancing the time of an upgrade versus the benefits you might get.  This is especially true if you’ve done lots of customization of your AppManager system that might or might not break if you upgrade to latest version.  Despite…

+ read more

wheaps
By: wheaps
Jul 5, 2016
3:50 pm
Reads:
257
Score:
Unrated

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user…

+ read more

Mar 1, 2016
2:09 pm
Reads:
1,412
Score:
Unrated

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
483
Score:
Unrated

If you’re working in an environment with Microsoft servers (and who isn’t these days), you more than likely have some IIS (Internet Information Service) servers running around.  These may be vitally important systems that house your companies external website, they may run some applications that maybe aren’t quite as important to day to day operations…

+ read more

Joe Rogers
Aug 4, 2015
5:25 pm
Reads:
1,420
Score:
Unrated

I’ve recently started a new job here at Micro Focus | NetIQ : Account Manager.  According to my friends in sales roles,  this means that I need to get used to the word “No”.  I get that.  Not everyone that you speak with is going to be looking for the solution to the problem that…

+ read more

Joe Rogers
May 19, 2015
12:48 pm
Reads:
1,089
Score:
4.5

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
1,813
Score:
5

If you have ever watched TV,  you’ve probably seen a detective show or two.  The plot usually involves some kind of crime and then a team of citizens, detectives, coroners or whomever the show is about working for the next 40 minutes to figure out the who, what, when, where and why’s of the crime…

+ read more

Joe Rogers
Jan 14, 2015
9:07 am
Reads:
1,749
Score:
5

If you’ve been in the corporate workforce for more then a few months, you’ve probably heard the term “Breaking down the silos” or something close to that.  Silos are everywhere and you don’t need to be in a giant Fortune 100 organization to experience them. Silos can easily exist in a 15 person startup as well….

+ read more

Joe Rogers
Dec 15, 2014
12:32 pm
Reads:
2,218
Score:
Unrated

Take a few minutes to click around NetIQ Views, and see what’s out there. Play around in Cool Solutions as well — see where we moved all the furniture. Then come back and take this little survey. (7 minutes tops.) You just might win a $10 Amazon gift card, and your insights will help us see where we can make adjustments.

By: ssalgy
Oct 28, 2014
6:00 pm
Reads:
2,254
Score:
4.75
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow