IAM

Author Thomas Hood once wrote, “…the easiest reading is damned hard writing.” I imagine most system administrators would express a similar sentiment when approached about automating parts of their organization’s identity and access management (IAM) system. Although automation makes IAM processes less complex for users, it introduces additional complexity for IT, particularly in four specific…

+ read more

Travis Greene
Jul 1, 2015
7:13 am
Reads:
67
Score:
Unrated

Mobile devices have almost become human appendages. Look around any crowd and you’ll find someone buried in their smartphone or other mobile device, regardless of what’s going on around them. The workplace is no exception. With the adoption of mobile devices across enterprises, users have more flexibility and can potentially be more productive. However, bring-your-own-device…

+ read more

Travis Greene
Mar 26, 2015
8:08 am
Reads:
1,204
Score:
Unrated

While the hackers in movies continue to use brute-force methods to breach security, fingers flying on keyboards as firewalls fall, real attackers today prefer the subtler method of hijacking insider credentials. Frankly, it’s far easier to figure out a user’s password or get them to click a link in a phishing email. To reduce the…

+ read more

Travis Greene
Mar 5, 2015
7:45 am
Reads:
1,365
Score:
5

How can you tell? Many IT professionals can’t tell if their identity and access management (IAM) is keeping pace with the latest regulatory controls. But there are organizations, like the SANS Institute, that have tried to simplify security control models with their Critical Security Controls. Your organization is ultimately responsible for deciding whether or not…

+ read more

Travis Greene
Dec 8, 2014
10:55 am
Reads:
1,222
Score:
5

Who are you? This is one of the most common, perhaps even mundane, questions that we ask each other every day. Yet the answer is always multi-faceted and it reveals interesting, often critical information. It can raise concern, it can pique interest and it can lead to more questions. Based on the answer to this…

+ read more

GeoffWebb
By: GeoffWebb
Dec 5, 2014
10:27 am
Reads:
1,751
Score:
5

Last week I attended the NetIQ BrainShare conference in Salt Lake City. In this blog post I’ll reflect on the content and themes – as I experienced them myself. There was a lot to choose from at BrainShare. I built my agenda mainly around IAM and security. Especially I wanted to learn about NetIQ’s vision…

+ read more

Petteria
By: Petteria
Nov 12, 2014
9:37 am
Reads:
1,818
Score:
5

If you are going to call IDM via SOAP to create a new resource request, you should prepare a call like this one…

By: nsanson
Sep 3, 2014
11:45 am
Reads:
1,321
Score:
5

Well that is a silly title, but I was having a conversation with some people I was helping and as always a major stumbling block for getting started with Identity Manager (IDM) is how XPATH works, which should be understandable, but in an Identity Manager context it seems to confuse the heck out of people….

+ read more

geoffc
By: geoffc
Aug 28, 2012
9:33 am
Reads:
3,320
Score:
5

  I am excited to share with you the new NetIQ website. We have completely redesigned the site in order to: • Make it easier for you to find and share information • Showcase our expanded product portfolio • Provide multiple ways to engage with us At NetIQ, we have a culture of focusing on…

+ read more

JayGardner
Apr 30, 2012
1:42 pm
Reads:
3,267
Score:
Unrated

NetIQ President Jay Gardner welcomed the 2000+ attendees to BrainShare 2011 and the inaugural NetIQ keynote Tuesday morning and introduced his topic: the powerful combination that is NetIQ.  In his introductory outline of the new NetIQ Gardner stated “We have combined the capabilities of NetIQ with some of the capabilities of the former Novell to…

+ read more

David Shephard
Oct 21, 2011
1:30 pm
Reads:
2,167
Score:
Unrated