Expert Views

Today’s “always on, always available” business culture has unintended consequences for your IT team.  IT services are expected to be instantly available at all times—and the first line that normally gets hit with complaints and ire is your IT Help Desk.  If your goal is continuous IT service delivery, then surely an important area to…

+ read more

wheaps
By: wheaps
May 19, 2017
2:08 pm
Reads:
382
Score:
Unrated

More and more organizations are digitally transforming their business by moving to the cloud.  This isn’t surprising—but it does present a challenge to the IT team who is increasingly becoming a “broker” for these cloud services.   IT (despite not controlling the underlying infrastructure, platforms, or even applications providing the cloud service) is still on the…

+ read more

wheaps
By: wheaps
May 3, 2017
3:17 pm
Reads:
609
Score:
Unrated

Updated with on-demand webinar links. Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
1,409
Score:
4

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
1,319
Score:
5

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user…

+ read more

Mar 1, 2016
2:09 pm
Reads:
4,258
Score:
Unrated

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
883
Score:
Unrated

If you’re working in an environment with Microsoft servers (and who isn’t these days), you more than likely have some IIS (Internet Information Service) servers running around.  These may be vitally important systems that house your companies external website, they may run some applications that maybe aren’t quite as important to day to day operations…

+ read more

Joe Rogers
Aug 4, 2015
5:25 pm
Reads:
2,284
Score:
Unrated

I’ve recently started a new job here at Micro Focus | NetIQ : Account Manager.  According to my friends in sales roles,  this means that I need to get used to the word “No”.  I get that.  Not everyone that you speak with is going to be looking for the solution to the problem that…

+ read more

Joe Rogers
May 19, 2015
12:48 pm
Reads:
1,393
Score:
4.5

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
2,401
Score:
5

If there’s any problem that plagues all IT departments—it’s one of relevance. Now before anyone gets upset—I’m not saying IT is irrelevant. However, there’s often a lack of communication between those running the business (CxOs and Line of Business owners) and those that keep the business running (IT). However critical IT is to the success…

+ read more

wheaps
By: wheaps
Mar 19, 2015
2:35 pm
Reads:
2,666
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow