Recent Activity
rvshaw17
0
1
26
liasson
0
1
40
peter_lambrechtsen
3
6
4429
chiraggajjar1
0
10
179
shajipappan
0
4
116
simeonof
1
5
424
dgersic
0
1
55
prasenjitmass
0
1
51
jlrodriguez
0
3
87
jvybihal
0
4
126
aortiz1
0
1
71
joakim_ganse
0
0
50
tschloesser
1
2
85
Brunold Rainer
0
2
92
mcclary
0
2
146
Security Neighborhood Welcome to Identity Manager!

Thanks for joining us! This neighborhood within our community is focused on the discussions about delivering an intelligent identity management framework to service your enterprise—inside the firewall and into the cloud. We have a lot of information ready for you to peruse, and please, feel free to start or jump into any discussion in the discussion forum.

IDM Resources:

News & Information

CSS2019-OnDemand-CommunityRolling-300x250.png

 

Supercharging Insider Threat Detection in the SOC
 
Supercharging Insider Threat Detection in the SOC 

Recent insider threat incidents show the value of a carefully designed insider threat program....

Get beyond short-term: Secure your apps by stage and role

For the second year in a row, insecure software applications have been the main culprit of breaches, according to Verizon's 2019 Data Breach Investigations Report. But applying methods for shoring up your applications by stage and role will help.

The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.