Cloud

Author Thomas Hood once wrote, “…the easiest reading is damned hard writing.” I imagine most system administrators would express a similar sentiment when approached about automating parts of their organization’s identity and access management (IAM) system. Although automation makes IAM processes less complex for users, it introduces additional complexity for IT, particularly in four specific…

+ read more

Travis Greene
Jul 1, 2015
7:13 am
Reads:
681
Score:
Unrated

In the world of physical security, officers and guards are trained to set a baseline. This baseline tells them what is normal for the time and place. Sitting quietly and drinking coffee is normal for a coffee shop, while leaping and screaming may be normal for a rock concert. With this baseline, security professionals can…

+ read more

Travis Greene
Mar 17, 2015
7:12 am
Reads:
1,358
Score:
5

The inefficiency of tape data backup and the cost of a complete mirrored infrastructure explain the buzz around the concept of recovery as a service (RaaS). RaaS is a new model of disaster recovery in which service providers typically manage, own and operate the disaster recovery systems. Organizations which once bought and operated their own…

+ read more

MikeRobinson
Feb 25, 2015
8:24 am
Reads:
1,405
Score:
Unrated

Identity defines who you are and what you do. But identity isn’t static—especially when it comes to IT. User identity can change and be manipulated, which introduces significant challenges for IT security teams. Multiple major data breaches made headlines in the past 18 months alone, and unless security teams start to focus on identity, they…

+ read more

David Mount
Feb 11, 2015
4:21 am
Reads:
1,155
Score:
5

But the fire is so delightful. And since we have no place to go, Let it snow, Let it snow, Let it snow! (props to Sammy Cahn and Jule Styne). It’s true, I love a good snow storm, dustings are a joke, 4 inches of snow is decent, 1 foot or more of snow is…

+ read more

Jan 27, 2015
11:19 am
Reads:
804
Score:
5

Every year we conduct a Data Health Check of over 400 IT decision makers in the UK and as a NetIQ partner, disaster recovery (DR) always plays a big part in it. 2014 was a particularly interesting year for DR, especially in terms of the growing gaps between small, medium and large organisations. More than…

+ read more

Jan 15, 2015
4:20 am
Reads:
1,878
Score:
Unrated

Last week I attended the NetIQ BrainShare conference in Salt Lake City. In this blog post I’ll reflect on the content and themes – as I experienced them myself. There was a lot to choose from at BrainShare. I built my agenda mainly around IAM and security. Especially I wanted to learn about NetIQ’s vision…

+ read more

Petteria
By: Petteria
Nov 12, 2014
9:37 am
Reads:
1,918
Score:
5

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
1,839
Score:
5

It’s prediction season again and I’ve written a piece for CSO Australia. Here’s how it starts…    “2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012…

+ read more

ianyip
By: ianyip
Dec 20, 2013
9:39 am
Reads:
3,150
Score:
Unrated

Microsoft Office 365 Enterprise’s mobile and collaboration capabilities may excite your C-suite executives, but how are you planning to make access as easy as your internal applications? If you don’t get it right you’ll impact your user’s single sign-on (SSO) experience, causing frustration and helpdesk calls. You can use DirSync to handle user replication, if…

+ read more

Kent Purdy
Nov 15, 2013
8:44 am
Reads:
1,831
Score:
Unrated