Users:266K Posts:2.2M Kudos:0

Latest Blogs

Blog articles of interest across this community

The Importance of Identity and Access Management in Pandemic Times

Identity and Access Management (IAM) is the foundation of a Security infrastructure. Similar to building a house, a shaky home foundation can lead to ...
in Security Blog yesterday

ITOM’s COSO strategy and the use of COSO Data Lake in Operations Bridge (Update)

In the era of big data technologies, organizations are looking for ways to adopt a new data collection, storage and processing model, in order to solv...

Collab Monthly Newsletter

It has been quite a year. The shift to the new normal in 2020 has put even further strain on busy organizations, in terms of the data being generated ...

Knowledge Partner

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.