Cloud

In the world of physical security, officers and guards are trained to set a baseline. This baseline tells them what is normal for the time and place. Sitting quietly and drinking coffee is normal for a coffee shop, while leaping and screaming may be normal for a rock concert. With this baseline, security professionals can…

+ read more

Travis Greene
Mar 17, 2015
7:12 am
Reads:
1,147
Score:
5

The inefficiency of tape data backup and the cost of a complete mirrored infrastructure explain the buzz around the concept of recovery as a service (RaaS). RaaS is a new model of disaster recovery in which service providers typically manage, own and operate the disaster recovery systems. Organizations which once bought and operated their own…

+ read more

MikeRobinson
Feb 25, 2015
8:24 am
Reads:
1,165
Score:
Unrated

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
952
Score:
5

But the fire is so delightful. And since we have no place to go, Let it snow, Let it snow, Let it snow! (props to Sammy Cahn and Jule Styne). It’s true, I love a good snow storm, dustings are a joke, 4 inches of snow is decent, 1 foot or more of snow is…

+ read more

Tobin Isenberg
Jan 27, 2015
11:19 am
Reads:
595
Score:
5

Every year we conduct a Data Health Check of over 400 IT decision makers in the UK and as a NetIQ partner, disaster recovery (DR) always plays a big part in it. 2014 was a particularly interesting year for DR, especially in terms of the growing gaps between small, medium and large organisations. More than…

+ read more

Jan 15, 2015
4:20 am
Reads:
1,651
Score:
Unrated

Last week I attended the NetIQ BrainShare conference in Salt Lake City. In this blog post I’ll reflect on the content and themes – as I experienced them myself. There was a lot to choose from at BrainShare. I built my agenda mainly around IAM and security. Especially I wanted to learn about NetIQ’s vision…

+ read more

Petteria
By: Petteria
Nov 12, 2014
9:37 am
Reads:
1,668
Score:
5

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
1,676
Score:
5

It’s prediction season again and I’ve written a piece for CSO Australia. Here’s how it starts…    “2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012…

+ read more

ianyip
By: ianyip
Dec 20, 2013
9:39 am
Reads:
2,835
Score:
Unrated

Microsoft Office 365 Enterprise’s mobile and collaboration capabilities may excite your C-suite executives, but how are you planning to make access as easy as your internal applications? If you don’t get it right you’ll impact your user’s single sign-on (SSO) experience, causing frustration and helpdesk calls. You can use DirSync to handle user replication, if…

+ read more

Kent Purdy
Nov 15, 2013
8:44 am
Reads:
1,656
Score:
Unrated

Organizations today are eager to double-down on their cloud initiatives to increase their competitive stance in the market.  Added to this, with the proliferation of smart mobile devices, enterprises are now seeing a surge of cloud-based services that organizations need to manage. At NetIQ today, we are announcing the findings of a security survey quantifying…

+ read more

Nov 5, 2013
8:00 am
Reads:
2,433
Score:
Unrated