Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE

The Micro Focus Community

Sign in or register to tap into the vast knowledge pool of the community

REGISTER > SIGN IN >
Most "Liked" Contributors

Latest Blogs

Blog articles of interest across this community

How to Balance Usability and Data Protection in the BYOD Era

Priority one for corporate IT: protect company data across devices and networks. Unfortunately, this conflicts with your users’ top priority: completi...
in Security Blog yesterday
1
0
180

Micro Focus / HPE Alliance strong at HPE Aspire

HPE Aspire is headed our way May 19-23, 2019 at the Swan and Dolphin Resort, Orlando, FL. Have you registered to attend? HPE Aspire 2019 is where over...
1
0
912

Key Takeaways from Implementing a Data Security Practice

Our post on improving and monitoring a data security practice discussed the last of six processes for “standing up” a data security practice. So this ...
in Security Blog on 2019-04-16
1
0
511
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.