Cloud Security

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
266
Score:
Unrated

The 2014 Global Economic Crime Survey conducted by PwC shares a startling statistic about cyberattacks: “seven percent of U.S. organizations lost $1 million or more due to cybercrime incidents in 2013, compared with three percent of global organizations; furthermore, 19 percent of U.S. entities reported financial losses of $50,000 to $1 million, compared with eight…

+ read more

Travis Greene
May 21, 2015
10:04 am
Reads:
1,792
Score:
Unrated

What better place to learn about social access and security than Las Vegas? Throngs of people sit down at a gaming table and never think twice about the layers of security in the building. That’s because the security is transparent – casinos are experts at applying security based on user behavior rather than building walls…

+ read more

Travis Greene
Dec 19, 2014
8:49 am
Reads:
2,065
Score:
5

Cloud computing means different things to different people but almost everyone agrees that a hybrid cloud environment is the most likely outcome for most enterprises. So what are the key challenges for securing the hybrid enterprise? Any attempt to define security in a cloud environment will fail unless it defines the meaning of cloud in…

+ read more

David Shephard
Jan 14, 2014
10:06 am
Reads:
2,550
Score:
Unrated

Microsoft Office 365 Enterprise’s mobile and collaboration capabilities may excite your C-suite executives, but how are you planning to make access as easy as your internal applications? If you don’t get it right you’ll impact your user’s single sign-on (SSO) experience, causing frustration and helpdesk calls. You can use DirSync to handle user replication, if…

+ read more

Kent Purdy
Nov 15, 2013
8:44 am
Reads:
2,895
Score:
Unrated

This is the last in a series of 5 blogs that address the results of a cloud security survey conducted on NetIQ’s behalf earlier this year. The purpose of the survey was to understand the perceptions of cloud security within enterprises worldwide. In this last installment, I take a look at how well IT managers…

+ read more

Renee Bradshaw
Sep 5, 2013
10:54 am
Reads:
2,174
Score:
Unrated

This is part 4 of a 5-part blog series discussing the results of a recent industry survey we conducted to understand the perceptions of cloud security within enterprises worldwide. Today, I’ll take a look at how confident IT managers are in their ability to demonstrate regulatory compliance of sensitive data in the cloud. Globally, most…

+ read more

Renee Bradshaw
Sep 4, 2013
9:12 am
Reads:
2,271
Score:
Unrated

Passwords are the bane of any security administrator’s life. While the theoretical ideal would be to permit access to systems using two-factor authentication, real-world implementation is rarely simple and often expensive. What’s more, without the right incentives and consumer buy-in, end users may find the additional procedures complex and inconvenient. So why do we care…

+ read more

David Shephard
Jul 22, 2013
9:01 am
Reads:
2,337
Score:
Unrated

Lets get straight in: 1. Secure, automated user provisioning In any organisation, new employees come and go, and they change jobs, locations and roles. Each time this happens it creates a new task for a member of IT, who then has to check that any old privileges are revoked, and obtain approval for privileges that…

+ read more

David Shephard
Jun 17, 2013
8:06 am
Reads:
13,695
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow