NetIQ Views is the home of NetIQ thought leadership around industry trends, technology and the promise of identity-powered solutions. If you’re wondering what the challenges of today mean for tomorrow, you’ll find that, and much more, here in NetIQ Views.

Highlights

Subscribe to our newsletter

Latest Posts

How is managing user access to IT resources like managing customer access to movies at a megaplex theater? Both megaplex managers and IT managers must weigh the cost of enforcing access rules. Megaplex rules generally prohibit theater hopping, the practice of paying to see one movie, then sampling other movies in the megaplex for free….

+ read more

Travis Greene
Apr 16, 2015
7:27 am
Reads:
392
Score:
Unrated

If the rate and intensity at which my identity has been stolen in the past three years keeps pace, by 2017, I might as well advertise my personally identifiable information (PII) in blinking neon pink sky-writing and throw Mardi Gras beads from the airplane. First, my grocery store’s loyalty program was breached. Then I was…

+ read more

Rhonda Holloway
Apr 14, 2015
11:47 am
Reads:
851
Score:
5

The absolute best part of my job is being with customers.  I love it.  Whether I’m presenting to one customer, 500 or anything in between, I love spreading the good word of how Micro Focus | NetIQ solutions can help you run IT better. To that end,  I’m very happy to announce our new IT Operations…

+ read more

Joe Rogers
Apr 14, 2015
7:41 am
Reads:
538
Score:
Unrated

The most fundamental question for any business – Are we open?  Not just the doors to the building but can we deliver the services that our customers contract with us for? IT is a challenge.  In the previous post,  we talked about making sure that all of your IT stuff is working.  No red lights on…

+ read more

Joe Rogers
Apr 10, 2015
7:25 am
Reads:
351
Score:
5

IT contractors are like in-laws. They may not be blood relatives, but they’re still considered family. Similarly, contractors aren’t standard, permanent employees, but they still work within your organization, making them a part of the organizational family. Some in-laws are dignified and contribute positively to the family; some in-laws dreadful and make holidays a nightmare….

+ read more

Travis Greene
Apr 7, 2015
7:43 am
Reads:
726
Score:
Unrated

The old days of user access are gone Taking a least-privileged user approach for access control goes a long way in protecting your organization. But in today’s connected and mobile world, securing access purely from user permission level is not enough. Context needs to play a foundational role for assessing the risk of honoring those…

+ read more

Kent Purdy
Mar 30, 2015
11:13 am
Reads:
729
Score:
4

Mobile devices have almost become human appendages. Look around any crowd and you’ll find someone buried in their smartphone or other mobile device, regardless of what’s going on around them. The workplace is no exception. With the adoption of mobile devices across enterprises, users have more flexibility and can potentially be more productive. However, bring-your-own-device…

+ read more

Travis Greene
Mar 26, 2015
8:08 am
Reads:
930
Score:
Unrated

A few months ago, we introduced you to the ‘Four Lenses of IT operations’. In this post, NetIQ defines four questions and the associated key capabilities that IT Operations needs in order to quickly and confidently answer these questions on a regular basis. I’d like to go a little bit more in depth into the questions…

+ read more

Joe Rogers
Mar 25, 2015
11:22 am
Reads:
764
Score:
5

If there’s any problem that plagues all IT departments—it’s one of relevance. Now before anyone gets upset—I’m not saying IT is irrelevant. However, there’s often a lack of communication between those running the business (CxOs and Line of Business owners) and those that keep the business running (IT). However critical IT is to the success…

+ read more

wheaps
By: wheaps
Mar 19, 2015
2:35 pm
Reads:
1,396
Score:
Unrated

The day when devices, houses, clothes and many other possessions connect and communicate with the outside world is fast approaching. Also called the Internet of Everything (IoE), this world of connected devices will offer convenient services that operate everywhere around us. Yet the looming presence of IoE brings up issues of control, security and privacy….

+ read more

GeoffWebb
By: GeoffWebb
Mar 19, 2015
9:27 am
Reads:
842
Score:
Unrated