Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Micro Focus Expert
Micro Focus Expert

Identifying critical assets.pngFrom a data security practice, we want two things. First, a list of critical digital assets: we can only protect items already in a digital form. And second, a confidence rating from zero to one hundred percent (0-100%) that we have identified all of the critical assets we either have an interest in or obligation to protect.


Read Blog Article

Read more
2 0 1,220
Micro Focus Expert
Micro Focus Expert

Kaizen for the Modern Enterprise.pngThe theme for this year’s RSA Conference is easier said than done: BETTER. I really like the idea of the entire community of cyber security professionals thinking towards making the world a more secure place through becoming better. Here are three reasons why you should visit the Micro Focus Booth 4508 in the North Hall


Read Blog Article

Read more
2 0 1,133
Micro Focus Expert
Micro Focus Expert

 

MF-Universe-450x253Micro Focus transforms enterprises with ZENworks – Unified Endpoint Management solutions that bridge the gap between existing and emerging technologies. Innovate faster and carry less risk, even as you adopt BYOD and upgrade your infrastructure.


Read Blog Article

Read more
1 0 1,587
Micro Focus Contributor
Micro Focus Contributor

Why is “Identity Powers Everything” the right approach to security.pngMany organizations do not fully utilize Identity and Access Management (IAM) to support their overarching security initiatives. One of the largest reasons is because IAM teams and security teams are often two completely different groups, with different areas of focus.


Read Blog Article

Read more
3 0 1,153
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

The Tragic Downside of Customer Information Management.pngThe same tools that can be used to discover, classify and disposition data for Customer Information Management purposes can be used to protect it, too. Secure Content Management, our comprehensive data governance suite can do all of that to both structured and unstructured data.


Read Blog Article

Read more
1 0 1,020
Micro Focus Expert
Micro Focus Expert

Applying RSA’s .pngThis year’s RSA Security Conference theme is “better.” One critical set of initiatives that you need to keep focused on getting right are your digital transformation projects. Because if the early indicators are actual signs of the times, lagging or failing isn’t a good option. 


Read Blog Article

Read more
2 0 963
Micro Focus Expert
Micro Focus Expert

NewRelease1.pngFortify on Demand delivers application security as a service, providing customers with security testing and support needed to easily create, supplement, and expand a Software Security Assurance in as little as just one day. Check out the new release features.


Read Blog Article

Read more
0 0 3,391
Micro Focus Expert
Micro Focus Expert

Process Driven Approach towards Data Security.pngIn my last blog, “The Data Protection Stack,” we discussed why implementing a data security practice is necessary. In this post, we discuss how to implement a data security practice following seven steps to data-centric Security.


Read Blog Article

Read more
1 0 1,234
Micro Focus Expert
Micro Focus Expert

ZENworks at the RSA Security Conference.png

ZENworks provides a unified solution that reduces the overhead that comes with configuration. Remote capabilities and powerful protections, both locally and in the cloud, make Unified Endpoint Management a popular choice for networks of scale.


Read Blog Article

Read more
0 0 1,720
Micro Focus Expert
Micro Focus Expert

RSA.png
 
 

ZENworks will be in attendance at RSA, Located at North Expo #4508. Visitors are invited to discuss the impact of preventable malware and unified endpoint management solutions built for implementation.


Read Blog Article

Read more
0 0 568
Micro Focus Contributor
Micro Focus Contributor

‘Better’ data privacy and compliance can be found at RSA.jpgSecuring data and ensuring data privacy is critical. Orgs need to discover, classify and protect data wherever it exists and overlay who or what has access to that data. See us at the RSA Conference to learn about our Security, Risk, and Governance solutions.


Read Blog Article

Read more
3 1 1,834
Micro Focus Expert
Micro Focus Expert

In a data security practice, the highest level of the data protection stack, application layer protection, provides the most protection. Even if all security layers below the application are compromised, security is not bypassed.The Data Protection Stack.png


Read Blog Article

Read more
2 0 1,234
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

While RSA Conference attendees always ask, “What’s new this year in security,” there is no magic silver bullet. However, we will be presenting a set of solutions tailored to address your end-to-end journey that few other security vendors can offer.Identities.png

 


Read Blog Article

Read more
0 0 1,554
charles.clawson Respected Contributor.
Respected Contributor.

Manufacturing and automotive industries need a comprehensive security strategy that incorporates security from the earliest stage of development all the way to the end of that product’s functional life.Modernizing breach defense for the manufacturing and automotive industries2.jpg

 


Read Blog Article

Read more
0 0 1,936
Micro Focus Expert
Micro Focus Expert

Breach Defense with Unified Endpoint Management.jpgSecurity is a prime concern for any company safeguarding sensitive data, and the costs of getting it wrong are staggering. Unified Endpoint Management can help with Breach Defense, with remote capabilities and powerful protections both locally and in the cloud.


Read Blog Article

Read more
0 0 1,680
Micro Focus Expert
Micro Focus Expert

Fiscal Benefits of increased data utilization.jpgAs we continue our discussion on building a data security practice, let’s continue our focus on the fiscal aspects. Given that there are multiple information security strategies available, what are the unique financial benefits for implementing data security?


Read Blog Article

Read more
1 0 1,153
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

For Auto Makers.pngWith data pouring in around the clock from millions of cars on the road, auto companies are implementing data lakes to capture that data. But keeping this sensitive data secure and private for use in analytics is a major challenge for the automotive industry.


Read Blog Article

Read more
0 0 5,206
Micro Focus Expert
Micro Focus Expert

RSA blog1.pngTo meet security challenges, come to the RSA Conference to see how to take a holistic, analytics-driven approach to securing what matters most—identities, apps, and data. Better yet, see the familiar faces that make up our comprehensive security portfolio:


Read Blog Article

Read more
0 0 3,141
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.