Having problems with your account or logging in?
A lot of changes are happening in the community right now. Some may affect you. READ MORE HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

charles.clawson Respected Contributor.
Respected Contributor.

Cybersecurity has come a long way, and no solution has benefited as much from advanced analytics as those focused on the patterns of human behavior known as User and Entity Behavior Analytics. See how to terminate these insider threats with ArcSight UBA 6.1.Terminate threats with UBA 6.1.jpg


Read Blog Article

Read more
0 0 1,625
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Single point solutions may not address the bigger picture of the modern IT landscape. It’s critical to have a vision that goes beyond what a single point solution can offer to address risk in a coordinated approach to protect from data privacy breaches.Beyond single-point .png

 


Read Blog Article

Read more
0 0 2,019
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

How does one go about scamming potential puppy owners? See how Fortify on Demand Researcher Ray Kelly was able to dissect their scam and call them out:

PuppyTw.png

 

 


Read Blog Article

Read more
1 0 1,917
Micro Focus Expert
Micro Focus Expert

Engage with our Micro Focus Channel and Alliance Partnerships during our upcoming Cybersecurity Summit in September. Customers can visit our Partner Pavilion to learn more about our premier sponsors and the unique solutions they bring to the market.CSS SM6.png

 


Read Blog Article

Read more
0 0 3,643
Micro Focus Expert
Micro Focus Expert

Ransomware continues to be the scourge of the business world, as organizations continue to get hit with costly and devastating attacks. It’s time to fight back.How_to_Deal_With_Ransomware_Threats.jpg 


Read Blog Article

Read more
0 0 961
Micro Focus Expert
Micro Focus Expert

BYOD users want access without giving up control of their mobile devices to the company. With Micro Focus ZENworks Mobile Workspace, you can strike the right balance of providing convenient user access and keeping your data secure.ZENworks Mobile Workspace.jpg 


Read Blog Article

Read more
0 0 1,393
Micro Focus Expert
Micro Focus Expert

Sorting through, deploying, and transitioning applications for your office may seem to be a daunting task for management, but Micro Focus Desktop Containers can streamline the process.Game Changer.png 


Read Blog Article

Read more
0 0 313
Micro Focus Expert
Micro Focus Expert

Whether your IT team is managing a BYOD environment or corporate-owned devices – or a combination of both– you can simply manage them from a single endpoint management solution:Mobile Device Management Can Be a Burden, But it Doesn’t Have to Be.png


Read Blog Article

Read more
0 0 311
Micro Focus Expert
Micro Focus Expert

Whether you’ve adopted a BYOD strategy popular with most businesses, or still retain corporate-owned devices – or a combination, mobile devices introduce a level of risk, including unauthorized access to networks and resources, and data theft.Mobility.jpg 


Read Blog Article

Read more
0 0 416
Micro Focus Expert
Micro Focus Expert

With Update 3 to ZENworks 2017, Micro Focus continues the push towards a secure, unified endpoint management solution with new features designed to enhance existing capabilities to further streamline administrators’ tasks.ZENworks 2017 Update 3 Increases Unified Endpoint Management Capabilities.png

 


Read Blog Article

Read more
0 0 415
Micro Focus Expert
Micro Focus Expert

Micro Focus Enterprise Technology Forums allows you to gain new insights into addressing the challenges of Hybrid IT and incorporating DevOps and SecOps into your technology supply chain.Micro Focus Enterprise Technology Forums.png 


Read Blog Article

Read more
0 0 2,593
Micro Focus Expert
Micro Focus Expert

Every year the Software Security Research (SSR) team at Micro Focus Fortify releases an annual report on the state of application security. Here are a couple of things that jumped out in this year's "Application Security Research Update" report.Breaking news.jpg


Read Blog Article

Read more
1 0 1,423
Micro Focus Contributor
Micro Focus Contributor

Announcing the release of Micro Focus Directory and Resource Administrator 9.2, providing the functionality to easily delegate just the proper administrative privilege powers needed to administer Active Directory and Office 365.New Directory and Resource Administrator Release.png

 

 

 


Read Blog Article

Read more
0 0 902
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Data security often isn’t the most critical concern for IT Pros, until it’s too late. Better to learn from industry experts and your peers about how to reduce privacy risks at the Micro Focus Cybersecurity Summit, Sept 25-27 in Washington DC.CSS SM4.png


Read Blog Article

Read more
0 0 2,154
Micro Focus Expert
Micro Focus Expert

zenworks.pngIn a mobile-focused business world, an IT team’s ability to efficiently manage all the endpoints in an enterprise is critical to operational success across the business. Whether you’re managing a corporate-owned, BYOD, or hybrid environment, a complete, integrated suite of endpoint management tools streamlines the process for IT and ensures devices are secure, compliant, and provide access to the tools and information each user needs to perform.


Read Blog Article

Read more
0 0 2,662
charles.clawson Respected Contributor.
Respected Contributor.

To understand our new product, ArcSight Investigate, and what need it fills we need to first look at some of the biggest pain points of the modern SecOps team.Discover new search feature within Arcsight Investigate.jpg


Read Blog Article

Read more
1 0 1,371
Micro Focus Contributor
Micro Focus Contributor

Announcing the release of Change Guardian 5.1. Change Guardian provides intelligence and workflow around events that can be used for the purpose of security monitoring, file integrity monitoring, configuration monitoring, and privileged user monitoringNew Change Guardian Release Delivers NetApp Monitoring & Extended Capabilities.png


Read Blog Article

Read more
0 0 958
Micro Focus Contributor
Micro Focus Contributor

Announcing the release of Privileged Account Manager 3.5, allowing IT administrators to work on systems without exposing administrator passwords. It also manages, controls, and records privileged account activities across hybrid environments.Discover What’s New in Micro Focus Privileged Account Manager.png


Read Blog Article

Read more
0 0 1,177
Micro Focus Expert
Micro Focus Expert

Brent Kynaston, solutions architect at Trivir, is giving a BrightTalk webinar on the details of deploying Micro Focus Advanced Authentication for your mobile workforce.Delivering Enterprise grade Authentication for Your Mobile workforce.png 


Read Blog Article

Read more
0 0 1,091
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Most users of mobile applications understand that apps gather certain types of information and use it for data mining or targeted advertising. But do you know exactly what type of data your mobile app is collecting about you?   Mobile devices.png 


Read Blog Article

Read more
1 0 2,137
Micro Focus Expert
Micro Focus Expert

With so many consequences of a security breach, such as financial, reputation and brand damage, lost productivity, forensics costs and more, it’s time for organizations to address application security head on, before it’s too late.Picture4.png 


Read Blog Article

Read more
2 0 1,443
viktor.doundako Respected Contributor.
Respected Contributor.

The new Guest Data entitlement in the recent 2.30 release of Micro Focus ArcSight Data Platform (ADP) offers two ways that ArcSight Event Broker can increase your ROI in your existing enterprise IT infrastructure. Increase your enterprise bus ROI with Guest Data entitlement1.png

 


Read Blog Article

Read more
0 0 1,579
Micro Focus Expert
Micro Focus Expert

Focused security events, such as the Micro Focus Cyber Security Summit gives you a chance to have meaningful conversations with cyber security leaders who inspire you, as well as lets you get our take on InfoSec for three days at a professional level. See more in our new #InfoSec blog:How Visiting a New City or Going to a Focused Security Event Helps Your Career.jpg 


Read Blog Article

Read more
1 0 1,326
Mdelima Valued Contributor.
Valued Contributor.

The fact that GDPR and now the California Consumer Privacy Act (CCPA) have different requirements raises the stakes for enterprises to improve data governance and data protection throughout its lifecycle.Data Privacy strikes back.jpg 


Read Blog Article

Read more
0 0 1,331
Mdelima Valued Contributor.
Valued Contributor.

The challenge is that as data flows throughout the enterprise it must be protected—at-rest, in-motion, and in-use. But traditional system and perimeter IT security can’t achieve this, except in silos, leaving security gaps in the modern hybrid enterprise.Infographic-the-challenges-of-securing-big-data-title.png

 


Read Blog Article

Read more
1 0 2,310
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.