Expert Views

It’s amazing how little clarity and visibility we have into the true state of any IT environment, despite getting more and more monitoring tools looking at them.  Sometimes, a common cause for this is actually too many monitoring tools.  Each one may be great for its specialized task, but they fail to communicate with each…

+ read more

wheaps
By: wheaps
Sep 26, 2016
3:10 pm
Reads:
509
Score:
Unrated

Updated with on-demand webinar links. Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
976
Score:
4

Updated with webinar links. Because certifying individual access is as tedious and inefficient as counting jelly beans, managers often validate every user’s access without really looking closely at it. This lack of attention means that some users might maintain inappropriate levels of access.

Sep 8, 2016
1:34 pm
Reads:
1,010
Score:
5

You’ve already invested in AppManager—but you’re not running the latest version? It’s somewhat of a conundrum, balancing the time of an upgrade versus the benefits you might get.  This is especially true if you’ve done lots of customization of your AppManager system that might or might not break if you upgrade to latest version.  Despite…

+ read more

wheaps
By: wheaps
Jul 5, 2016
3:50 pm
Reads:
656
Score:
Unrated

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user…

+ read more

Mar 1, 2016
2:09 pm
Reads:
2,520
Score:
Unrated

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
605
Score:
Unrated

If you’re working in an environment with Microsoft servers (and who isn’t these days), you more than likely have some IIS (Internet Information Service) servers running around.  These may be vitally important systems that house your companies external website, they may run some applications that maybe aren’t quite as important to day to day operations…

+ read more

Joe Rogers
Aug 4, 2015
5:25 pm
Reads:
1,769
Score:
Unrated

I’ve recently started a new job here at Micro Focus | NetIQ : Account Manager.  According to my friends in sales roles,  this means that I need to get used to the word “No”.  I get that.  Not everyone that you speak with is going to be looking for the solution to the problem that…

+ read more

Joe Rogers
May 19, 2015
12:48 pm
Reads:
1,189
Score:
4.5

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
2,157
Score:
5

If you have ever watched TV,  you’ve probably seen a detective show or two.  The plot usually involves some kind of crime and then a team of citizens, detectives, coroners or whomever the show is about working for the next 40 minutes to figure out the who, what, when, where and why’s of the crime…

+ read more

Joe Rogers
Jan 14, 2015
9:07 am
Reads:
1,849
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow