Cloud Computing

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
370
Score:
Unrated

It’s all the buzz: the battle for the Internet of Things is heating up.  With analysts predicting 50+ billion connected devices by 2020, that’s going to have an impact on your IT world, no matter what happens or who wins. As an IT professional, how can you begin to prepare for the “IT of (Every)thing”—a…

+ read more

wheaps
By: wheaps
Jul 8, 2014
2:02 pm
Reads:
14,909
Score:
Unrated

The management of identity and access in a cloud environment are among the more challenging problems for the enterprise of today. As cloud-based services become more prevalent within the enterprise as a necessary precursor to more mobile, more accessible organizational structures, ensuring that an individual is who they say they are becomes more important. So…

+ read more

David Shephard
Jan 21, 2014
9:53 am
Reads:
2,802
Score:
Unrated

With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior years like cloud, mobility, social and big data have been key challenges recently that are reflected in this year’s predictions. According to…

+ read more

David Shephard
Jan 17, 2014
9:27 am
Reads:
3,310
Score:
5

Cloud computing means different things to different people but almost everyone agrees that a hybrid cloud environment is the most likely outcome for most enterprises. So what are the key challenges for securing the hybrid enterprise? Any attempt to define security in a cloud environment will fail unless it defines the meaning of cloud in…

+ read more

David Shephard
Jan 14, 2014
10:06 am
Reads:
2,578
Score:
Unrated

Organizations today are eager to double-down on their cloud initiatives to increase their competitive stance in the market.  Added to this, with the proliferation of smart mobile devices, enterprises are now seeing a surge of cloud-based services that organizations need to manage. At NetIQ today, we are announcing the findings of a security survey quantifying…

+ read more

Nov 5, 2013
8:00 am
Reads:
3,466
Score:
Unrated

This is the last in a series of 5 blogs that address the results of a cloud security survey conducted on NetIQ’s behalf earlier this year. The purpose of the survey was to understand the perceptions of cloud security within enterprises worldwide. In this last installment, I take a look at how well IT managers…

+ read more

Renee Bradshaw
Sep 5, 2013
10:54 am
Reads:
2,205
Score:
Unrated

This is part 4 of a 5-part blog series discussing the results of a recent industry survey we conducted to understand the perceptions of cloud security within enterprises worldwide. Today, I’ll take a look at how confident IT managers are in their ability to demonstrate regulatory compliance of sensitive data in the cloud. Globally, most…

+ read more

Renee Bradshaw
Sep 4, 2013
9:12 am
Reads:
2,297
Score:
Unrated

What are the risks associated with enterprise organizational structures, assets and processes? How can the enterprise identify and implement the appropriate measures to minimize the risks that those enterprise features inevitably create? These are the kinds of issues a risk framework need to address. Risks can come from innumerable sources, including uncertainty in financial markets,…

+ read more

David Shephard
Aug 7, 2013
9:33 am
Reads:
2,045
Score:
Unrated

Passwords are the bane of any security administrator’s life. While the theoretical ideal would be to permit access to systems using two-factor authentication, real-world implementation is rarely simple and often expensive. What’s more, without the right incentives and consumer buy-in, end users may find the additional procedures complex and inconvenient. So why do we care…

+ read more

David Shephard
Jul 22, 2013
9:01 am
Reads:
2,356
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow