Expert Views

It seems that not even strong 2-factor authentication methods are safe from human error. If someone possesses your phone number and username, a scenario can be devised to first login to a website and trigger a verification code sent to your phone. The attacker would then continue with a follow-up SMS message asking the user…

+ read more

Mar 1, 2016
2:09 pm
Reads:
924
Score:
Unrated

Many start the new year hoping for better things. Many could probably learn a lesson or two from the following companies who suffered dearly during 2015. This list does not cover all of the major breaches of the year, but it does underscore the damage that was done with merely a handful of them. We…

+ read more

Feb 1, 2016
11:07 am
Reads:
398
Score:
Unrated

If you’re working in an environment with Microsoft servers (and who isn’t these days), you more than likely have some IIS (Internet Information Service) servers running around.  These may be vitally important systems that house your companies external website, they may run some applications that maybe aren’t quite as important to day to day operations…

+ read more

Joe Rogers
Aug 4, 2015
5:25 pm
Reads:
1,241
Score:
Unrated

I’ve recently started a new job here at Micro Focus | NetIQ : Account Manager.  According to my friends in sales roles,  this means that I need to get used to the word “No”.  I get that.  Not everyone that you speak with is going to be looking for the solution to the problem that…

+ read more

Joe Rogers
May 19, 2015
12:48 pm
Reads:
1,036
Score:
4.5

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
1,744
Score:
5

If you have ever watched TV,  you’ve probably seen a detective show or two.  The plot usually involves some kind of crime and then a team of citizens, detectives, coroners or whomever the show is about working for the next 40 minutes to figure out the who, what, when, where and why’s of the crime…

+ read more

Joe Rogers
Jan 14, 2015
9:07 am
Reads:
1,692
Score:
5

If you’ve been in the corporate workforce for more then a few months, you’ve probably heard the term “Breaking down the silos” or something close to that.  Silos are everywhere and you don’t need to be in a giant Fortune 100 organization to experience them. Silos can easily exist in a 15 person startup as well….

+ read more

Joe Rogers
Dec 15, 2014
12:32 pm
Reads:
2,139
Score:
Unrated

Take a few minutes to click around NetIQ Views, and see what’s out there. Play around in Cool Solutions as well — see where we moved all the furniture. Then come back and take this little survey. (7 minutes tops.) You just might win a $10 Amazon gift card, and your insights will help us see where we can make adjustments.

By: ssalgy
Oct 28, 2014
6:00 pm
Reads:
2,194
Score:
4.75

Disclaimer to the reader: I have known Geoffrey for many years, have recently started working with him more-closely, and consider him a friend. As a result, it is possible that this is a biased review; still, I am trying to be objective in the information shared. Take it or leave it as you see fit.

“IDM Tokens: A definitive guide to NetIQ’s IDM tokens” (hereafter, “IDM Tokens”) is a book that fills in gaps left by every manufacturer of software that ever existed…

By: ab
Sep 11, 2013
11:34 am
Reads:
3,178
Score:
5

NetIQ Operations Center 5.0 Patch Bundle 6 (PB6) contains several new features, as well as fixes to critical, customer identified issues. There are two new features that allow you to navigate with ease when using the Layout portlet… While you can already change the context of this portlet by drilling into a service or clicking…

+ read more

Karen Nemzek
Sep 10, 2013
10:58 am
Reads:
1,973
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow