OpenText Community for Micro Focus products
OpenText Community for Micro Focus products
  • Site
  • User
  • Site
  • Search
  • User
OpenText Community for Micro Focus products
  • Blogs
  • Ask & Explore
  • Community Guide
  •  

    Menu

    ×
  1. Welcome

      Welcome

      ×
    1. Getting Started Guide
    2. Knowledge Partner Program
  2. Application Modernization

      Application Modernization

      ×
    1. ChangeMan ZMF
    2. CORBA
    3. Extend AcuCOBOL
    4. Mainframe Access
    5. Micro Focus COBOL Analyzer
    6. Micro Focus Enterprise Suite
    7. Micro Focus Visual COBOL
    8. Net Express/Server Express
    9. RM/COBOL
  3. Cybersecurity

      Cybersecurity

      ×
    1. Cybersecurity User Group
    2. Cybersecurity Technical Enablement
    3. ArcSight
    4. File Analysis Suite
    5. File Dynamics
    6. File Reporter
    7. Fortify
    8. Galaxy
    9. NetIQ Access Manager
    10. NetIQ AD Bridge
    11. NetIQ Advanced Authentication
    12. NetIQ Change Guardian
    13. NetIQ Data Access Governance
    14. NetIQ Directory & Resource Administrator
    15. NetIQ eDirectory
    16. NetIQ Group Policy Administrator
    17. NetIQ Identity Governance
    18. NetIQ Identity Manager
    19. NetIQ LDAP Proxy
    20. NetIQ Privileged Account Manager
    21. NetIQ Risk Service
    22. NetIQ Secure API Manager
    23. NetIQ Secure Configuration Manager
    24. NetIQ SecureLogin
    25. NetIQ Security Solutions for IBM i
    26. NetIQ Self Service Password Reset
    27. NetIQ Validator
    28. PlateSpin
    29. SecureData
    30. SecureMail
    31. Sentinel
    32. Structured Data Manager
    33. Voltage
  4. DevOps Cloud (ADM)

      DevOps Cloud (ADM)

      ×
    1. AccuRev
    2. Agile Manager
    3. ALM Octane ValueEdge
    4. ALM Quality Center
    5. Business Process Testing
    6. Deployment Automation
    7. Dimensions CM
    8. Dimensions RM
    9. LoadRunner Cloud
    10. LoadRunner Enterprise
    11. LoadRunner Professional
    12. Micro Focus Connect
    13. Project and Portfolio Mgmt.
    14. PulseUno
    15. PVCS Version Manager
    16. Release Control
    17. Requirements Management
    18. Service Virtualization
    19. Silk Central
    20. Silk Performer
    21. Silk Test
    22. StarTeam
    23. UFT Developer
    24. UFT Digital Lab
    25. UFT One
  5. IT Operations Cloud

      IT Operations Cloud

      ×
    1. Asset Manager & Connect-IT
    2. Data Center Automation
    3. Discovery and CMDB
    4. Hybrid Cloud Management
    5. Hybrid Cloud Management X
    6. Network Operations Management
    7. Operations Bridge
    8. Operations Orchestration
    9. OPTIC (ITOM Platform)
    10. Robotic Process Automation
    11. Service Manager
    12. SMAX Suite
    13. Solutions Business Manager
  6. Portfolio

      Portfolio

      ×
    1. Connected: Backup
    2. Content Manager
    3. ControlPoint
    4. Data Protector
    5. Filr
    6. GroupWise Products
    7. iPrint
    8. Open Enterprise Server
    9. Retain Unified Archiving
    10. Storage Manager
    11. Vibe
    12. VM Explorer
    13. ZENworks Suite
  7. Unstructured Data Analytics

      Unstructured Data Analytics

      ×
    1. IDOL
    2. Vertica
  8. Micro Focus Marketplace
  9. News from Support
  10. Technical Insights Series
  • User
  • Site
  • Explore Community
  • User
    • Blogs
    • Ask & Explore
    • Community Guide
    •  
    Showing 30 Results for galaxy
      Summer Time Fun Time at the RSA Security Conference!

      Summer Time Fun Time at the RSA Security Conference!

      cynthia.leonard1
      cynthia.leonard1
      The RSA Security Conference is back, taking place in San Francisco, California on June 6-9. Yay, RSA is back, but it feels strange to have it in the summer. You might remember it was slated to be held in person for the first time in two years in February…
      • over 1 year ago
      • Cybersecurity
      • Cybersecurity Blog
      cynthia.leonard1
      by cynthia.leonard1
      Cybersecurity
        over 1 year ago
        Blogs
      Fortify Employee Spotlight: Getting to know Giuseppe Salvato

      Fortify Employee Spotlight: Getting to know Giuseppe Salvato

      Kaitlyn Sorensen
      Kaitlyn Sorensen
      At Fortify , we have an incredibly talented and diverse team. We hope you join us in taking the opportunity to get to know different members from all over our organization through the Fortify Employee Spotlight series. This spotlight is highlighting Giuseppe…
      • over 1 year ago
      • Cybersecurity
      • Cybersecurity Blog
      Kaitlyn Sorensen
      by Kaitlyn Sorensen
      Cybersecurity
        over 1 year ago
        Blogs
      Detecting MITRE ATT&CK Techniques: Is SIEM effective?

      Detecting MITRE ATT&CK Techniques: Is SIEM effective?

      pwheiler
      pwheiler
      Earlier this year, cybersecurity firm CardinalOps published their 2022 Report on the State of SIEM Detection Risk . CardinalOps, who operate a cloud-based AI analytics platform that continuously audits SIEM/XDR/EDR solutions to detect and eliminate MITRE…
      • over 1 year ago
      • Cybersecurity
      • Cybersecurity Blog
      pwheiler
      by pwheiler
      Cybersecurity
        over 1 year ago
        Blogs
      Does Artificial Intelligence Really Understand the RSA Security Conference?

      Does Artificial Intelligence Really Understand the RSA Security Conference?

      cynthia.leonard1
      cynthia.leonard1
      Every year, I get most excited about the RSA Security Conference , this year held April 24-27 in San Francisco. Of course, I also get excited this time of the year to write a blog that tells the viewers about what’s new with our cybersecurity solutions…
      • 5 months ago
      • Cybersecurity
      • Cybersecurity Blog
      cynthia.leonard1
      by cynthia.leonard1
      Cybersecurity
        5 months ago
        Blogs
      The Automated Security Operations Center—Myth or Reality?

      The Automated Security Operations Center—Myth or Reality?

      Steve Jones
      Steve Jones
      On paper, the idea of SOAR, Security Orchestration Automation and Response, sounds great. We read all the time about the challenges faced by Security Operation Centers, whether in the press, on vendor web sites or in the introductory slides of a customer…
      • 8 months ago
      • Cybersecurity
      • Cybersecurity Blog
      Steve Jones
      by Steve Jones
      Cybersecurity
        8 months ago
        Blogs
      Micro Focus recognized as Visionary in 2022 Gartner Magic Quadrant for SIEM, with ArcSight evaluated

      Micro Focus recognized as Visionary in 2022 Gartner Magic Quadrant for SIEM, with ArcSight evaluated

      pwheiler
      pwheiler
      We are excited to announce that Micro Focus has been recognized as a Visionary in the 2022 Gartner® Magic Quadrant TM for Security Information and Event Management , with our product solution CyberRes ArcSight having been evaluated. Micro Focus was…
      • 10 months ago
      • Cybersecurity
      • Cybersecurity Blog
      pwheiler
      by pwheiler
      Cybersecurity
        10 months ago
        Blogs
      Understand and Mitigate Risk with Intuitive Visualization

      Understand and Mitigate Risk with Intuitive Visualization

      Security Specialist
      Security Specialist
      Interset can generate a list of your riskiest users just by analyzing the data that routinely flows through your organization. Compiling a list like this would normally take security analysts a tremendous amount of effort and time. Keeping that list updated…
      • over 4 years ago
      • Cybersecurity
      • Cybersecurity Blog
      Security Specialist
      by Security Specialist
      Cybersecurity
        over 4 years ago
        Blogs
      Risks and Cybersecurity in the Energy Sector

      Risks and Cybersecurity in the Energy Sector

      Stan Wisseman
      Stan Wisseman
      We are coming up on two years since the Colonial Pipeline cyber breach . That cyberattack was a direct shot at the U.S. energy system and could be considered one of the most consequential cyberattacks in history. As we reviewed in our podcast episode…
      • 5 months ago
      • Cybersecurity
      • Cybersecurity Blog
      Stan Wisseman
      by Stan Wisseman
      Cybersecurity
        5 months ago
        Blogs
      OSINT News - November 11, by Bart Otten

      OSINT News - November 11, by Bart Otten

      COEST
      COEST
      Analysis of the sample that hit the Kudankulam Nuclear Power PlantSecurity Affairs Expert Marco Ramilli and his team analyzed the sample that infected systems at the Kudankulam Nuclear Power Plant, it is a targeted attack. During the past few days a…
      • over 3 years ago
      • Cybersecurity
      • CyberRes Research Blog
      COEST
      by COEST
      Cybersecurity
        over 3 years ago
        Blogs

      Usable Identification - The Key to a World Without Passwords

      MigrationDeletedUser
      MigrationDeletedUser
      Consumer devices offer the best vehicle in bringing non-password based authentication mechanisms to the mainstream much the same way social networks have brought identity federation to the masses . It is the best shot we have of eventually killing passwords…
      • over 10 years ago
      • Cybersecurity
      • Cybersecurity Blog
      MigrationDeletedUser
      by MigrationDeletedUser
      Cybersecurity
        over 10 years ago
        Blogs
    <

    Resources

    Support
    Documentation
    Learning Services
    Partner Programs
    Privacy
    Compliance
    Help
    Company
    Privacy Policy
    Terms of Use
    Accessibility
    Anti-Slavery Statement
    Support
    Contact Us
    Careers
    Code of Business Conduct and Ethics
    Follow Us
    Copyright © 2023 Open Text
    The opinions expressed above are the personal opinions of the authors, not of OpenText. By using this site, you accept the Terms of Use. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.), Hewlett Packard Enterprise Company, or Micro Focus. As of January 31, 2023, the Material is now offered by OpenText, a separately owned and operated company. Any reference to the HP, Hewlett Packard Enterprise/HPE, and Micro Focus marks is historical in nature and the HP, Hewlett Packard Enterprise/HPE, and Micro Focus marks are the property of their respective owners.