netiq

Results 51 - 75 of 87Sort Results By: Published Date | Title | Company Name
Published By: NETIQ     Published Date: Mar 12, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance, business technology
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper, downtime, continuity plan, continuity tools, security, software development
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This flash point paper contains 4 simple rules to help you cut your organizationís privileged user access issues and facilitate resolution if and when a problem does arise.
Tags : 
netiq, privileged users, it security, hidden risk, super users, administrative access, security breach, corporate policies, mitigating risk, pum, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This paper contains three simple steps for maintaining visibility and control when moving to the cloud and explains how NetIQ can help with each.
Tags : 
netiq, cloud infrastructure, cloud computing, security risks, regulations, information security, compliance management, public cloud, private cloud, hybrid cloud, cloud security, cloud, data security, it security, cloud service, cloud technology, cloud solution, security management, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Virtualization technology can solve the cost vs. time dilemma that traditional data recovery solutions pose, enabling organizations to quickly and cost-effectively recover all server workloads. To learn more, download your copy of this NetIQ paper today.
Tags : 
netiq, white paper, disaster recovery, workload mirroring, removable-media backup, server workload, virtualization technology, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
This white paper looks at the most important elements of securing sensitive health information and meeting HIPAA compliance requirements in a scalable and cost-effective way.
Tags : 
netiq, security, hipaa, compliance, protected health information, hitech act, compliance requirements, healthcare, software development, it management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that youíre doing so.
Tags : 
security intelligence, compliance, log management, user activity monitoring, security
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
IT professionals and executives who use identity management and access governance systems typically have different objectives and technology backgrounds. Converging the systems makes sense, but it must be robust to meet ITís demands and simple for non-IT professionals to manage.
Tags : 
iag, identity and access governance, identity management, compliance, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
As your business users consume software-as-a-service applications, they are introducing new risks to your organization. Why settle for a solution thatís incomplete, unsecure and requires manual interventionó when what the business really needs is a complete, secure and automated solution?
Tags : 
cloud computing, access control, saas, software-as-a-service, security, compliance, user access management, security risks, it management, knowledge management
    
NETIQ
Published By: NETIQ     Published Date: Sep 09, 2013
In your business environment, providing affordable protection for your physical and virtual servers is critical. This free NetIQ Disaster Recovery eBook outlines important topics you need to understand to protect todayís data centers. Download your copy of the guide and learn more.
Tags : 
netiq, disaster recovery, protection, physical server, virtual server, ebook, multi-platform data center, cloud computing, virtualization, roi, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Dec 03, 2013
This free NetIQ white paper outlines seven common challenges associated with the secure administration of Active Directory and provides some helpful insight into what NetIQ can do to assist you.
Tags : 
netiq, active directory, secure administration, business technology
    
NETIQ
Published By: NETIQ     Published Date: Dec 03, 2013
This white paper discusses how delegating Microsoft Active Directory administration using a directory management solution such as NetIQģ Directory and Resource Administratorô can help you to achieve a more secure, efficient and compliant organization.
Tags : 
netiq, microsoft, active directory, complexity, security, identity management solution, directory management solutions, active directory administration, access management, business technology
    
NETIQ
Published By: NETIQ     Published Date: Dec 03, 2013
This flash point paper discusses system and application management and the struggle against service outages. With data overload and data isolation often being the root cause, a services-level approach can reduce the potential of impacting events.
Tags : 
netiq, service outages, monitoring strategy, system failure, single management view, business technology
    
NETIQ
Published By: NETIQ     Published Date: Dec 03, 2013
A poll of CIOs and IT managers reports why departments must defend against complex internal and external threats while mitigating regulatory and compliance concerns. The results provide data about how enterprises view compliance.
Tags : 
security compliance, users access management, it management compliance
    
NETIQ
Published By: NETIQ     Published Date: Dec 05, 2013
This flash point paper discusses advanced persistent threats, the risks they pose, and how automation makes real-time response a reality. It covers questions you should ask yourself and things to consider before making an investment.
Tags : 
netiq, advanced persistent threats, insider credentials, real-time threat response, automation, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Jan 02, 2014
Service Outages: Is Your Current Monitoring Strategy Really Working?
Tags : 
netiq, service outages, service outages, monitoring strategy
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
Recently, industry analysts have focused on new authentication methods; however, maybe passwords arenít dead. In todayís world, passwords are still a big part of life but resetting them still drains the life from IT productivity. Slay that monster.
Tags : 
netiq, passwords, enterprise security, username, password, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
CyberEdge provides insight on both the current state of cyberthreat defense and projections for the future.
Tags : 
netiq, cyberthreat, cyberedge, cyber security, cyberthreat, security
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
Contractors entail a unique challenge for businesses and for IT. Theyíre necessary, but provisioning them correctly and deprovisioning them at the right time is difficult. Read this paper to learn to minimize risk and streamline provisioning for contractors and others.
Tags : 
netiq, it contractors, security, enterprise security, risk issues
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
On the one hand, you have the increased productivity that goes along with BYOD. On the other hand, you have all the security risks and usersí concerns about giving IT visibility or control of a personal device. Learn how to solve this puzzle.
Tags : 
netiq, byod, mobile access, autonomy, privacy, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Jun 20, 2014
Having identity and access management solutions is a must these days. But what happens when someone gets around your solution?
Tags : 
netiq, api, hijacking, cyberthreats, insider credentials, security, it management
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Todayís attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Businesses have to elevate their view of personalization and start thinking about how to make every interaction truly personal to customers.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
As security threats continue to rise with online authentication, your organization must rise to the challenge, as usernames and passwords just donít cut it.
Tags : 
    
NETIQ
Start   Previous    1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.