Community in read only mode June 18 & 19
This community will be set in READ ONLY mode for a while on Tuesday June 18 into Wednesday June 19 while we import content and users from our Micro Focus Forums community site. MORE INFORMATION
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.
Micro Focus Cybersecurity Summit - June 11-13 Join us for our Cyber Security Summit in Dallas. Sessions will focus on how to manage risk, secure DevOps, guard data privacy, and respond to the threats your org faces. Free for customers....

Security Blog

Micro Focus Contributor
Micro Focus Contributor

Three considerations for monitoring changes to Azure Active Directory.pngChange monitoring has been established as vital to security and compliance for enterprises using Active Directory. However, some IT administrators feel that, since they have implemented Azure AD, they don’t need to worry about the Azure component being monitored. Here are the most three considerations.


Read Blog Article

Read more
1 0 41
Micro Focus Contributor
Micro Focus Contributor

Managing Entitlements in the Enterprise.pngOne basic definition of digital entitlement is the right to access a computer, and by extension connect to a corporate network. The expectation is that administrators or application owners are managing these entitlements. But who can keep up with the barrage of changes happening to Identity and Access Management in today’s environments?


Read Blog Article

Read more
1 0 413
Micro Focus Contributor
Micro Focus Contributor

Extend the power of Active Directory.jpgWhen bridging AD with Linux resources, customers want a way to manage and secure their entire environment without having to duplicate identities and access controls or invest in additional tools and security vendors. New Micro Focus AD Bridge can help leverage those resources.


Read Blog Article

Read more
2 0 626
Micro Focus Contributor
Micro Focus Contributor

Data-centric security vs. identity-centric security.pngWhat are some of the arguments for identity-centric security vs. data-centric security? If you want to weigh in on the debate, please consider attending the Micro Focus Cybersecurity Summit happening June 11-13 in Dallas, TX, where you can meet with Micro Focus product experts and customers.


Read Blog Article

Read more
3 0 1,687
Micro Focus Expert
Micro Focus Expert

Don’t be a Breach Statistic .pngThe second annual Micro Focus Cybersecurity Summit takes place in Dallas on June 11-13. Find out what’s in store for this year’s Cybersecurity Summit and what you can learn about our expanded security portfolio.

 


Read Blog Article

Read more
0 0 3,066
Micro Focus Expert
Micro Focus Expert

John Delk.jpgWith our 2019 Micro Focus Cybersecurity Summit set for June of this year, get the highlights of the 2018 Summit, which introduced our expanded security portfolio. Then make plans to attend this year!


Read Blog Article

Read more
0 0 1,840
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.