NetIQ Views is the home of NetIQ thought leadership around industry trends, technology and the promise of identity-powered solutions. If you’re wondering what the challenges of today mean for tomorrow, you’ll find that, and much more, here in NetIQ Views.

Latest Posts

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

+ read more

Kevin Hughes
Nov 4, 2016
8:30 am
Reads:
1,172
Score:
5

I often participate in IT executive and security specific events and hear a lot about the cloud, BYOD, IoT and the changing IT landscape. The underlying questions of these discussions are how can we secure the enterprise in this new landscape, and how can we deliver access to systems on demand to satisfy the business…

+ read more

Oct 17, 2016
4:50 pm
Reads:
1,518
Score:
5

Are you a proactive or reactive person? Do you foresee the consequences of circumstances or events and plan accordingly? Or do you wait for consequences to occur and then react? We probably all have behaved proactively and reactively at least once in our lives. For the most part, it’s better to be proactive (even if…

+ read more

Jeremy Gobert
Oct 3, 2016
1:00 pm
Reads:
1,168
Score:
4.67

It’s amazing how little clarity and visibility we have into the true state of any IT environment, despite getting more and more monitoring tools looking at them.  Sometimes, a common cause for this is actually too many monitoring tools.  Each one may be great for its specialized task, but they fail to communicate with each…

+ read more

wheaps
By: wheaps
Sep 26, 2016
3:10 pm
Reads:
975
Score:
Unrated

Updated with on-demand webinar links. Improve Engagement with External Users with SSO. Can you really “have” your cake and “eat” it too? I mean I have cake; I certainly can eat it. Simple, right? Not always. This phrase has created confusion for many years. In the very most literal form of the phrase, you can’t really retain your cake once…

Sep 9, 2016
1:04 pm
Reads:
1,413
Score:
4

It’s a complex world out there. There’s no denying it.  This is especially true in the IT world—where admins are expected to keep systems running smoothly.  However, no matter how you slice it: there’s no way around the true complexity of IT. Physical and virtual machines, networks, operating systems, and applications all have to work…

+ read more

wheaps
By: wheaps
Jul 26, 2016
3:38 pm
Reads:
1,142
Score:
Unrated

Almost every job includes monotonous—but necessary—tasks that we dread completing. For line of business (LOB) managers, access certification is one of these tasks. Imagine a seemingly endless list or spreadsheet containing lines upon lines of users’ names coupled with their levels of access. In addition to a long list of other responsibilities, LOB managers are…

+ read more

Travis Greene
Jul 26, 2016
2:43 am
Reads:
992
Score:
4

To gain a higher ROI for identity governance, your organization must focus less on maintaining compliance and more on reducing the risk of data breaches.

Travis Greene
Jul 18, 2016
11:41 am
Reads:
1,493
Score:
Unrated

What does the name “Panama Papers” bring to your mind? Outed tax evaders? Exposed grafters? Money launderers? Or like me, does your mind go straight to the risk and prevention of insider security breaches? For those of you who don’t habitually pore over the financial or security press, the Panama Papers refers to a massive…

+ read more

Travis Greene
Jul 14, 2016
10:14 am
Reads:
1,045
Score:
Unrated

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
1,668
Score:
5