Cloud

More and more organizations are digitally transforming their business by moving to the cloud.  This isn’t surprising—but it does present a challenge to the IT team who is increasingly becoming a “broker” for these cloud services.   IT (despite not controlling the underlying infrastructure, platforms, or even applications providing the cloud service) is still on the…

+ read more

wheaps
By: wheaps
May 3, 2017
3:17 pm
Reads:
618
Score:
Unrated

Author Thomas Hood once wrote, “…the easiest reading is damned hard writing.” I imagine most system administrators would express a similar sentiment when approached about automating parts of their organization’s identity and access management (IAM) system. Although automation makes IAM processes less complex for users, it introduces additional complexity for IT, particularly in four specific…

+ read more

Travis Greene
Jul 1, 2015
7:13 am
Reads:
7,301
Score:
Unrated

In the world of physical security, officers and guards are trained to set a baseline. This baseline tells them what is normal for the time and place. Sitting quietly and drinking coffee is normal for a coffee shop, while leaping and screaming may be normal for a rock concert. With this baseline, security professionals can…

+ read more

Travis Greene
Mar 17, 2015
7:12 am
Reads:
2,553
Score:
5

The inefficiency of tape data backup and the cost of a complete mirrored infrastructure explain the buzz around the concept of recovery as a service (RaaS). RaaS is a new model of disaster recovery in which service providers typically manage, own and operate the disaster recovery systems. Organizations which once bought and operated their own…

+ read more

Mike Robinson
Feb 25, 2015
8:24 am
Reads:
2,938
Score:
Unrated

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
2,280
Score:
5

But the fire is so delightful. And since we have no place to go, Let it snow, Let it snow, Let it snow! (props to Sammy Cahn and Jule Styne). It’s true, I love a good snow storm, dustings are a joke, 4 inches of snow is decent, 1 foot or more of snow is…

+ read more

Tobin Isenberg
Jan 27, 2015
11:19 am
Reads:
2,131
Score:
5

Every year we conduct a Data Health Check of over 400 IT decision makers in the UK and as a NetIQ partner, disaster recovery (DR) always plays a big part in it. 2014 was a particularly interesting year for DR, especially in terms of the growing gaps between small, medium and large organisations. More than…

+ read more

Jan 15, 2015
4:20 am
Reads:
3,085
Score:
Unrated

Last week I attended the NetIQ BrainShare conference in Salt Lake City. In this blog post I’ll reflect on the content and themes – as I experienced them myself. There was a lot to choose from at BrainShare. I built my agenda mainly around IAM and security. Especially I wanted to learn about NetIQ’s vision…

+ read more

By: Petteria
Nov 12, 2014
9:37 am
Reads:
3,363
Score:
5

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
3,148
Score:
5

It’s prediction season again and I’ve written a piece for CSO Australia. Here’s how it starts…    “2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012…

+ read more

ianyip
By: ianyip
Dec 20, 2013
9:39 am
Reads:
4,692
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow