Cloud

More and more organizations are digitally transforming their business by moving to the cloud.  This isn’t surprising—but it does present a challenge to the IT team who is increasingly becoming a “broker” for these cloud services.   IT (despite not controlling the underlying infrastructure, platforms, or even applications providing the cloud service) is still on the…

+ read more

wheaps
By: wheaps
May 3, 2017
3:17 pm
Reads:
1,218
Score:
5

Author Thomas Hood once wrote, “…the easiest reading is damned hard writing.” I imagine most system administrators would express a similar sentiment when approached about automating parts of their organization’s identity and access management (IAM) system. Although automation makes IAM processes less complex for users, it introduces additional complexity for IT, particularly in four specific…

+ read more

Travis Greene
Jul 1, 2015
7:13 am
Reads:
7,503
Score:
Unrated

The inefficiency of tape data backup and the cost of a complete mirrored infrastructure explain the buzz around the concept of recovery as a service (RaaS). RaaS is a new model of disaster recovery in which service providers typically manage, own and operate the disaster recovery systems. Organizations which once bought and operated their own…

+ read more

Mike Robinson
Feb 25, 2015
8:24 am
Reads:
3,129
Score:
Unrated

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
2,433
Score:
5

But the fire is so delightful. And since we have no place to go, Let it snow, Let it snow, Let it snow! (props to Sammy Cahn and Jule Styne). It’s true, I love a good snow storm, dustings are a joke, 4 inches of snow is decent, 1 foot or more of snow is…

+ read more

Tobin Isenberg
Jan 27, 2015
11:19 am
Reads:
2,284
Score:
5

Every year we conduct a Data Health Check of over 400 IT decision makers in the UK and as a NetIQ partner, disaster recovery (DR) always plays a big part in it. 2014 was a particularly interesting year for DR, especially in terms of the growing gaps between small, medium and large organisations. More than…

+ read more

Jan 15, 2015
4:20 am
Reads:
3,257
Score:
Unrated

Last week I attended the NetIQ BrainShare conference in Salt Lake City. In this blog post I’ll reflect on the content and themes – as I experienced them myself. There was a lot to choose from at BrainShare. I built my agenda mainly around IAM and security. Especially I wanted to learn about NetIQ’s vision…

+ read more

By: Petteria
Nov 12, 2014
9:37 am
Reads:
3,544
Score:
5

It’s prediction season again and I’ve written a piece for CSO Australia. Here’s how it starts…    “2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012…

+ read more

ianyip
By: ianyip
Dec 20, 2013
9:39 am
Reads:
5,000
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow