Partner TriVir explains how governance insights works.
See how you can query the IG catalog directly in the interface to learn things about your environment. As a CISO or as a cyber security engineer or analyst or is somebody charged with reducing risk…
read more at microfocus
Michiel Uncovers - Identity Governance & Administration
Wie is wie en wie mag wat. Dat is de basis van Identity & Access Management. Hoe zorg je dat alle gebruikersinformatie up-to-date blijft en dat toegang beperkt blijft…
Wie is wie en wie mag wat. Dat is de basis van Identity & Access Management. Hoe zorg je dat alle gebruikersinformatie up-to-date blijft en dat toegang beperkt blijft tot de taken die een gebruiker heeft? Michiel legt het uit in deze korte video.
Je hebt gebruikers en gebruikers. En sommige gebruikers hebben veel meer toegangsrechten dan anderen. Zoals beheerders. Zij zijn dan ook een gewilde prooi voor cybercriminelen. Hoe zorg je dat het beheer veilig blijft? Michiel legt het uit in deze korte…
Video: Introduction to NetIQ Identity Governance SaaS and Cloud Bridge
Tell your followers how to get an Introduction to NetIQ Identity Governance SaaS and Cloud Bridge in our new IAM unplugged video!
Vanuit security oogpunt bekeken is de vraag wie toegang heeft tot wat geen IT- maar een businessvraag. Om dit beantwoorden moet je weten waaróm iemand toegang krijgt en welke risico’s je loopt door dit te geven. Hoe dat werkt, zie je in deze video.
See how you can perform security and data analysis for Microsoft 365, including analysis of permissions and sharing links for Teams channels, SharePoint Online sites, and OneDrive for Business.
Data Access Governance is all about the right people…
Learn about the future of request and approval in NetIQ Identity Governance and Administration. We'll show how users can request and approve access to resources in the latest version of Identity Governance, and we'll discuss what's coming next for the…
Video: Governing Access to Unstructured Data | NetIQ Data Access Governance (DAG)
In this video, we show how you can gain visibility into who has access to documents and files in unstructured data repositories like SharePoint and Teams. Then…
Cloud Bridge Architecture for IAM SaaS and On-Premises
This video provides an overview of the new Cloud Bridge used in the Micro Focus Identity and Access Management SaaS platform. The Cloud Bridge provides secure communication between on-premises…
Video: Continuous Compliance with Micro Focus NetIQ Identity Governance and Administration
Discover a new approach to IAM compliance that doesn't burden your compliance team with large scale, heavy-weight certification campaigns. More in our new Identity…
Video: Decision Support with Micro Focus NetIQ Identity Governance and Administration
Rubber-stamping an employee’s access really reduces the effectiveness of your Access Management certification program. Here’s what you can do about it!
We are happy to share two new demos from IGA Product Manager Patrick Gookin:
Decision Support - See how to drive better access decisions and reduce certification rubber stamping: https://www.youtube.com/watch?v=5z0MfXpSUe0&feature=youtu.be
Continuous…
Discover how identity-driven solutions from Micro Focus can help you gain control over unstructured data and ensure the right people have access to the right files. Watch video
Video: NetIQ Identity Governance and Administration (IGA) Demo
Our new NetIQ Identity Governance and Administration Demo shows how to create, assign access, detect and remediate policy violations & instantly disable users. More in this new IAM video…
See how our Identity Governance and Administration solution spans all of your business processes relating to identity & access in our new IAM video: ...
read more at itweb
Realizing the full potential of identity access management
A round table with Micro Focus & @ITWeb brought together like-minded CISOs to share best practices and understand the challenges within the IAM landscape. More in…