Security Manager

There was a time in my life when I got so far into the weeds of wife-ing, mothering, and working, that in desperation I began categorizing my day’s activities into three categories: Near Misses, Fails, and Epic Fails. The thinking was that if I could prioritize reducing the number of “near misses,” I could ultimately…

+ read more

Rhonda Holloway
Feb 13, 2015
12:03 pm
Reads:
1,124
Score:
5

Enterprise IT teams use perimeter technologies like firewalls and intrusion detection to defend against potential attacks on sensitive information. They provide an ocean of data that security teams must wade through. IT security teams work to respond, but because of the information deluge they receive from their defensive technology and log analyses, it can be…

+ read more

Travis Greene
Jan 7, 2015
7:52 am
Reads:
587
Score:
Unrated

It has long been said that information is the lifeblood of the organization, and it must be protected. But when your data is flowing freely between myriad unmanaged mobile computing devices and networks—the hurdle for IT Security Pros to keep sensitive information safe just keeps getting higher and higher. Fortunately, NetIQ and Cisco are here…

+ read more

Brennan
By: Brennan
Oct 1, 2014
7:24 am
Reads:
13,725
Score:
Unrated

This document provides information about including the ability to capture ticket number information as well as authorization for the change so this information is written to the application events generated via DRA and ultimately can be queried via forensic queries in Security Manager. NetIQ does not test or validate any software, code or other materials…

+ read more

jacksonse
By: jacksonse
Jan 8, 2007
8:10 am
Reads:
844
Score:
Unrated