NetIQ Views is the home of NetIQ thought leadership around industry trends, technology and the promise of identity-powered solutions. If you’re wondering what the challenges of today mean for tomorrow, you’ll find that, and much more, here in NetIQ Views.

Highlights

Subscribe to our newsletter

Latest Posts

Micro Focus’s Advanced Authentication (AA) is an open framework that allows just about any authentication type to be plugged into it. With its open architecture, AA allows organizations to future proof their environment so they can always have the freedom to adopt the latest without the fear of vendor lock-in. Troy Drewry, product manager for…

+ read more

Kent Purdy
May 21, 2018
9:53 pm
Reads:
595
Score:
Unrated

There is no shortage of opinions about the dynamics of hybrid cloud growth and its effect on IT organizations. As such, I found CRN’s 2017 purchasing survey to be a worthwhile snapshot of priorities placed in front of today’s CIO’s and where they are investing the most in. You’ll notice in the survey that 3…

+ read more

Kent Purdy
Sep 14, 2017
8:35 am
Reads:
1,593
Score:
Unrated

As corporations continue their trend towards hybrid environments, IT organizations are discovering another level of complexity to their any, any, any initiatives. The reality is that for most environments hybrid isn’t as simple as cloud-only architectures. Included in the mix of hybrid complexity are the Identity and Access Management (IAM) capabilities that must span across…

+ read more

Kent Purdy
May 29, 2017
10:34 pm
Reads:
3,632
Score:
Unrated

Today’s “always on, always available” business culture has unintended consequences for your IT team.  IT services are expected to be instantly available at all times—and the first line that normally gets hit with complaints and ire is your IT Help Desk.  If your goal is continuous IT service delivery, then surely an important area to…

+ read more

wheaps
By: wheaps
May 19, 2017
2:08 pm
Reads:
3,474
Score:
Unrated

If your digital assets are valuable…then they are vulnerable. For years, the infrastructure engineers have taken heed of this reality with the notion of a network security layer. For years this organized approach to serve as an outline from which a systematic plan is followed to maximize its services and especially security. The same value…

+ read more

Kent Purdy
May 7, 2017
10:51 pm
Reads:
3,210
Score:
Unrated

More and more organizations are digitally transforming their business by moving to the cloud.  This isn’t surprising—but it does present a challenge to the IT team who is increasingly becoming a “broker” for these cloud services.   IT (despite not controlling the underlying infrastructure, platforms, or even applications providing the cloud service) is still on the…

+ read more

wheaps
By: wheaps
May 3, 2017
3:17 pm
Reads:
2,710
Score:
5

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
2,196
Score:
Unrated