NetIQ Views is the home of NetIQ thought leadership around industry trends, technology and the promise of identity-powered solutions. If you’re wondering what the challenges of today mean for tomorrow, you’ll find that, and much more, here in NetIQ Views.

Highlights

Subscribe to our newsletter

Latest Posts

Mobile devices have almost become human appendages. Look around any crowd and you’ll find someone buried in their smartphone or other mobile device, regardless of what’s going on around them. The workplace is no exception. With the adoption of mobile devices across enterprises, users have more flexibility and can potentially be more productive. However, bring-your-own-device…

+ read more

Travis Greene
Mar 26, 2015
8:08 am
Reads:
45
Score:
Unrated

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
74
Score:
5

If there’s any problem that plagues all IT departments—it’s one of relevance. Now before anyone gets upset—I’m not saying IT is irrelevant. However, there’s often a lack of communication between those running the business (CxOs and Line of Business owners) and those that keep the business running (IT). However critical IT is to the success…

+ read more

wheaps
By: wheaps
Mar 19, 2015
2:35 pm
Reads:
351
Score:
Unrated

The day when devices, houses, clothes and many other possessions connect and communicate with the outside world is fast approaching. Also called the Internet of Everything (IoE), this world of connected devices will offer convenient services that operate everywhere around us. Yet the looming presence of IoE brings up issues of control, security and privacy….

+ read more

GeoffWebb
By: GeoffWebb
Mar 19, 2015
9:27 am
Reads:
319
Score:
Unrated

If someone really needs to do something, they will find a way to do it. The wheel. Nails. The compass. Paper. The printing press. Light bulbs. Computers. The Internet. Running your own email server as the US Secretary of State. In the last 40 years, I don’t think there is a business person on the…

+ read more

Rhonda Holloway
Mar 17, 2015
9:02 am
Reads:
583
Score:
Unrated

In the world of physical security, officers and guards are trained to set a baseline. This baseline tells them what is normal for the time and place. Sitting quietly and drinking coffee is normal for a coffee shop, while leaping and screaming may be normal for a rock concert. With this baseline, security professionals can…

+ read more

Travis Greene
Mar 17, 2015
7:12 am
Reads:
503
Score:
5

With the release of the 2015 Cyberthreat Defense Report last week this number nerd took some time to review and collate some of the IT Security statistics and numbers that have piqued his interest or curiosity over the last few months. From protecting user data against the growing number of threats to ensuring the continuity…

+ read more

David Shephard
Mar 16, 2015
1:51 pm
Reads:
767
Score:
4.75

To the casual observer, the Internet of Things (IoT) is just an ultra-convenient world of smart devices and sensors that can communicate. But behind the shiny exterior of do-everything consumer devices is a vast expanse of data that has the power to change the world. To illustrate the power of data, let me tell you…

+ read more

GeoffWebb
By: GeoffWebb
Mar 12, 2015
7:14 am
Reads:
364
Score:
Unrated

No organization is immune from a data breach.  The fact is, your organization probably already has been breached.  A new survey from the CyberEdge Group and NetIQ shows you just where IT teams are finding the security vulnerabilities that can lead to breaches and audit findings.  The good news is it’s not hard to find…

+ read more

Renee Bradshaw
Mar 11, 2015
6:05 am
Reads:
543
Score:
Unrated

While the hackers in movies continue to use brute-force methods to breach security, fingers flying on keyboards as firewalls fall, real attackers today prefer the subtler method of hijacking insider credentials. Frankly, it’s far easier to figure out a user’s password or get them to click a link in a phishing email. To reduce the…

+ read more

Travis Greene
Mar 5, 2015
7:45 am
Reads:
661
Score:
5