Supported

There are a few things you can do to achieve greater efficacy during your next access certification campaign that don’t require a Superbowl-ad-sized budget. Here are some tips to consider to make your next access certification truly effective.

Amie Johnson
Jan 29, 2015
5:16 pm
Reads:
1,767
Score:
5

Take a few minutes to click around NetIQ Views, and see what’s out there. Play around in Cool Solutions as well — see where we moved all the furniture. Then come back and take this little survey. (7 minutes tops.) You just might win a $10 Amazon gift card, and your insights will help us see where we can make adjustments.

By: ssalgy
Oct 28, 2014
6:00 pm
Reads:
2,471
Score:
4.75

This week (well, month, sorry we’ve been a way for a while) on the Monitoring Guys – It’s all about BrainShare baby. That’s right, BrainShare is going down in just a few days and we are pumped. We’ll walk through some of the sessions and presenters that you should be checking out and talk a…

+ read more

Joe Rogers
Oct 22, 2014
8:02 pm
Reads:
2,764
Score:
5

I’m a huge sci-fi geek. I love stories about interstellar travel, artificial intelligences and alien worlds. I have a soft spot for all things Star Trek too. I’d love to be zipping through space at superluminal speeds—boldly going where no one has gone before. Well, except for those pesky inertial dampeners and warp drives. Seriously—in…

+ read more

wheaps
By: wheaps
Oct 22, 2014
4:26 pm
Reads:
2,405
Score:
5

We’ve all been there. A few times each year IT revisits their shortlist of potential projects to determine what to fund. For many, the list of “to do’s” is longer than their arm, while their budget fits in a shirt pocket. Which inevitably results in prioritizing spend on projects that address risk and compliance first….

+ read more

Kent Purdy
Oct 22, 2014
4:05 pm
Reads:
15,325
Score:
5

Recently, as I was scrolling through one of my social media feeds, I noticed that a friend of mine had copyrighted one of his photos. While visiting a local festival, he took a snapshot of a vendor’s table stacked high with hand-painted pottery and posted it to his social network. The colorful bowls caught my…

+ read more

Rhonda Holloway
Oct 15, 2014
11:33 am
Reads:
2,380
Score:
5

In todays fast paced world, we’re always looking to make information and data easier to consume. The phrase ‘There’s an app for that’ started making it’s way into the general discourse a few years ago to note that yeah, there’s probably something out there that makes it easy to do that. The App is now…

+ read more

Joe Rogers
Oct 9, 2014
1:02 pm
Reads:
2,416
Score:
5

Last week, a major financial institution in the US revealed that over 76 million households and seven million small businesses were compromised. The hackers don’t appear to have gained access to personally identifiable information, there’s no evidence that account information was taken, nor is there evidence of fraud. But it’s impossible not to worry about…

+ read more

Rhonda Holloway
Oct 9, 2014
12:12 pm
Reads:
2,062
Score:
3.67

It’s death by irrelevant data today. I don’t know about you—but I can’t open a web browser, check my email, update my social status or catch up on the news without being inundated by inane information. What?! Another “You Won’t Believe What Happens Next” video? Get outta here! No really, get out of here! Of…

+ read more

wheaps
By: wheaps
Oct 7, 2014
5:32 pm
Reads:
2,042
Score:
5

At NetIQ, we spend a lot of time listening to things that are important to our customers and partners. News aggregators and social media mentions and posts are a great way to listen. They show what’s trending right now and is often raw, unvarnished and very real. We consider that kind of feedback vitally important…

+ read more

Rhonda Holloway
Oct 2, 2014
2:12 am
Reads:
2,622
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow