Events
From Cindy Leonard:
Micro Focus Cybersecurity Summit
Join us for the second annual Micro Focus Cybersecurity Summit taking June 11-13, 2019 in Dallas. Hear from peers and Micro Focus experts as they share best practices and solution roadmaps to help you take a holistic, analytics-driven approach to securing what matters most – identities, applications, and data. Register now!
From Cindy Leonard
New InfoSec Blog
With our 2019 Micro Focus Cybersecurity Summit set for June of this year, get the highlights of the 2018 Summit, which introduced our expanded security portfolio. Then make plans to attend this year! Get all the details in this new InfoSec blog!
#MicroFocusCyberSummit #Cybersecurity #SecurityandRisk
From Cindy Leonard:
Look Book
Explore our new LookBook to learn more about how Micro Focus #Security, Risk & Governance solutions can help your organization by securing what matters most – identities, applications, and data. Click here to learn more!#SecurityandRisk
From Cindy Leonard:
Webinar:
This new InfoSec webinar provides an overview of market trends facing organizations as they venture into a digital transformation. We will review how organizations can make their digital transformation secure by employing the #NIST framework for cybersecurity and ways they can to use it to strengthen every facet of their organization’s defenses against a breach. View on-demand now!
From Cindy Leonard:
Cyberthreat Defense Report
The new Cyberthreat Defense Report from CyberEdge Group surveyed IT security decision makers and asked them to share how they plan to improve their #security posture and which technologies they see as essential weapons against #cyberthreats. The survey also looked at the biggest headaches and obstacles for IT security professionals. Get more info and see how to get your copy in our new #InfoSec blog.
From Ellen MacDermid:
Register now for the Micro Focus Cybersecurity Summit, June 11-13, 2019
Don’t miss the Micro Focus Cybersecurity Summit, taking place at the Hilton Anatole in Dallas, Texas, from June 11-13. Our largest security event of the year, this summit gathers hundreds of global attendees for hands-on education, skills-building, personalized solutions discussions, expert insight, and access to our product experts.
Customers and prospects attend free of charge. Partners pay a nominal fee.
Build a custom agenda that addresses your organization’s specific security needs. Meet 1:1 with our executives and experts to build an action plan. Develop your skills to increase your security knowledge and add more value to your organization.
Visit the website to see content, meet speakers, review educational opportunities, and understand how you will benefit by attending. Register today.
From Gil Cattelain:
How to Balance Usability and Data Protection in the BYOD Era
Current mobile device management (MDM) solutions offer control at the expense of usability. They feel intrusive and conflict with the nature of BYOD. With ZENworks Mobile Workspace, administrators can balance usability and data protection without the frustration. Read more
From Caroline Oest:
Case Study: See how Montferland Government uses Micro Focus ZENworks and Collaboration solutions
See why the Netherlands municipality of Montferland has long relied on ZENworks for its central IT management requirements in this new customer case study.
From Caroline Oest:
Don't forget to have a look at our recently launched technical knowledge base for ArcSight. A number of new videos were created, giving an overview of ArcSight ESM variables, offering How to tips, presenting best practice for ArcSight Logger Search and much more!
Sandra Herber:
Discover how SMAX delivers ESM at SITS 2019
While you’re at the Service Desk and IT Support Show (SITS), Europe’s leading event for IT professionals on 1-2 May in London (free admission to those who preregister by 30 April), treat yourself to a one-on-one, info-packed demo of Micro Focus SMAX—recently named a Forrester ESM Wave Leader. Book your demo now
Micro Focus NHS Customer Forum
Digital transformation is driving organizations to look at IT from more angles than ever before, leading them to realize that an effective strategy spans many different technology disciplines and investments. Join us for the Micro Focus NHS Customer Forum in London on 9 May to meet with peers from other NHS organizations and Micro Focus experts to learn how we can help with your journey to digital transformation. Register now
2019 FINRA Annual Conference
Mark your calendar for FINRA's Annual Conference 2019 to take advantage of a variety of sessions related to current trends in compliance, cybersecurity, risk management, and more. Register now for this event held in Washington, DC, from 15-17 May. While you’re there, be sure to visit the Micro Focus Information Governance team at pod 11 to learn about unified archiving for all your business communication data. Register now
Fortify at SecureGuild online conference for Application Security Testing
Fortify is a Platinum sponsor of SecureGuild, an online conference dedicated security testing. Join in on 20 May as Fortify’s Jimmy Rabon presents “Do your Pipelines remember? They must if you want to go fast with static analysis.” Register now
Micro Focus REALIZE is headed to Australia!
Join us for this free, one-day software experience for business leaders and IT professionals on 28 May in Melbourne, on 30 May in Sydney, and on 4 June in Canberra. Gain insight on how to address complex problems and realize smarter business outcomes through case scenarios and best practices, learn and connect on the latest innovations, explore our entire software portfolio, see product demos, get to know our trusted partners, and network with experts and peers in the Solution Showcase Zone. Meet with our executives and product experts for a personalized session. Register now
Engage with Our Products
Fortify is now a Diamond Sponsor for the OWASP OpenSAMM v.2
Fortify is excited be a sponsor ofthe OWASP SAMM (Software Assurance Maturity Model)—the prime maturity model for software assurance.
Announcing File Dynamics 6.2
An expanded emphasis on data growth, automation, compliance, security, and protection are all contributing to evolving requirements for data management. To meet the dynamic demands of today’s organizations, Micro Focus offers File Dynamics, an identity- and target-driven policy approach to today’s network data management challenges.
With File Dynamics, you have the means to not only automate the provisioning, day-to-day management, archiving, and disposal of user and group network storage, but to manage all other unstructured data on the network. Additionally, File Dynamics provides the means to secure data through remediation and notification as well as protect data through point-in-time data recovery.
New to File Dynamics 6.2:
· Storage Resources Scoping. The Storage Resources panel in the Admin Client now contains an interface for the configuration of Storage Resource scoping. Providing a scope for Storage Resources can greatly improve the time to discover and rebuild the Storage Resources database.
· Client-based Directory Services and File System Access. All navigation and listing of Active Directory and live file system entries in the Admin Client are now performed directly by the Admin Client, using the logged-on user’s credentials. Prior versions of the client redirected these requests through the Engine, using the user’s authenticated credentials.
Announcing new releases for File Governance Suite: File Reporter 3.6 and File Dynamics 6.2
The Micro Focus File Governance Suite is a full set of file governance tools to help you address data governance challenges in your Microsoft Windows network. Comprising Micro Focus File Reporter and Micro Focus File Dynamics, the File Governance Suite lets you know what files you’re storing, their relevancy, who has access to them, if any contain personal or confidential information that needs to be secured, and much more. Then it lets you establish policies that can manage, secure, and even recover your data.
Micro Focus File Reporter 3.6 inventories network file systems and delivers the detailed file storage intelligence you need to optimize and secure your network for efficiency and compliance. Engineered for enterprise file system reporting, File Reporter gathers data across the millions of files and folders scattered among the various network storage devices that make up your network. Flexible reporting, filtering, querying, and content analysis options then present the exact findings you need so that you can demonstrate compliance or take corrective action.
Micro Focus File Dynamics 6.2 provides extensive services to address the expanding requirements of network data management. Identity-driven policies automate tasks that are traditionally done manually, resulting in cost savings and assurance that tasks are being performed properly. Target-driven policies offer data migration and relocation, cleanup, notification of changes to access permissions, and protection from data corruption and downtime.
Community
ArcSight Community Initiatives on GitHub
The ArcSight community is currently working on several interesting open source initiatives. This includes building new features, adding new documentation for the portfolio from Software Development Kits, and much more. You can receive notifications on new releases and projects by following the project on GitHub!
Enablement Resources
New Security webinar library – Check out our new Security webinar library on BrightTALK! Log in with your BrightTALK credentials or register for free.
Webinar: How Proven AI Accelerates Your App Competitiveness – As application vendors race to put artificial intelligence into their products to deliver differentiating value, they are often faced with the choice of whether to invest in homegrown technology. In this case, it is critical to holistically evaluate a partnership beyond just the technology itself to ensure sustainable success. Join this webinar on 1 May to learn about key criteria for evaluating an OEM partner, how Micro Focus addresses those criteria, and key resources for developers
Webinar: Micro Focus SecOps Innovation: A look into the future of security insights – Join product and solution leaders from Micro Focus and partner Deloitte on 15 May to learn about the core capabilities required for successful SecOps within a modern landscape, including the latest innovations to support digital transformation roadmaps. Hear more about the future of ArcSight, see examples of successful customer journeys, and get an introduction to Interset for UEBA, our newest advanced analytics acquisition.
Webinar: Data protection: Your biggest reputational risk? – Your corporate reputation is one of your greatest assets, taking years to build and only minutes to lose. So what’s the best way to protect it? Learn how you can safeguard your hard-won reputation against both internal and external threats and protect one of your biggest reputational risks: your data.
Webinar: Discover Key Shifts in the Privacy and Data Protection Environment - There is a lot more data at risk today than there has been in the past. The explosion of personal data being collected, harnessed, and used means that companies have to be increasingly aware of how they manage it. Additionally, there has been an expansion of global requirements such as the GDPR, California's CCPA law, and Brazil's LGPD law.
Webinar: Ensure Privacy Protection through your Digital Transformation – Privacy represents a major challenge for the modern enterprise. The flexibility of hybrid IT and insights of data analytics are essential to the business. But the digital transformation that is key to business success and competitive advantage is also a major vulnerability when it comes to data privacy. Organizations are rightfully concerned about CCPA, GDPR, PIPEDA, and the growing number of regulations now being enacted, which means they need to figure out how to reduce their risk. But current privacy protection approaches fall short. What’s needed is a unified technology framework that lets you take a holistic, analytics-driven approach to securing what matters most—a framework flexible enough to meet the needs of your enterprise, but specific enough to offer a guide to risk reduction. Join us for this informative webinar to discover why Micro Focus is a leader in providing this solution.
Webinar: Close the Gap in Your Ransomware Defense – Ransomware is a global epidemic that is spreading like wildfire. The FBI estimates that ransomware infects more than 100,000 computers a day around the world. Join this webinar to learn about ransomware challenges and impact, why malware detection alone is not enough, and how to close the gap with holistic endpoint data and device management.
Webinar: Anatomy of a Breach – Cyber breaches have almost doubled in the past five years, according to the World Economic Forum, which now lists cyberattacks as third on its list of top global risks. But how can organizations keep pace, keep secure? There needs to be a plan. One of the clearest, most comprehensive, flexible, and highly regarded approaches to cybersecurity is the framework devised by the National Institute of Standards and Technology (NIST). This webinar provides an overview of market trends facing organizations as they venture into a digital transformation and how they can make their digital transformation secure by employing the NIST framework to strengthen every facet of their organization’s defenses against a breach.
Video series: Fortify Unplugged – This video series includes a deep dive into some of Fortify on Demand’s most useful features:
Blogs and Articles
Highlights from the 2018 Micro Focus Cybersecurity Summit
With our 2019 Micro Focus Cybersecurity Summit set for June, get the highlights of the 2018 Summit, which introduced our expanded security portfolio. Then make plans to attend this year! Get all the details in our new InfoSec blog… Read more
Security, Risk & Governance recap from Micro Focus Universe
The SRG Forum at Micro Focus Universe attracted over 300 customers and partners this year. Presentations from top customers, Micro Focus experts, and partners focused on how to protect what matters the most: identities, apps, and data. Check out the event’s highlights by the numbers… Read more
Privacy and data protection, regulatory compliance—Yes, you can have it all
There’s a lot more data at risk today than ever before. The explosion of personal data being collected, harnessed, and used means that companies have to be increasingly aware of how they manage it… Read more
Connected car data targeted: How data security drives innovation
Here's how to scale data security at the pace of the IoT initiative and the speed your business demands… Read more
9 disruptive security plays from RSAC 2019
Here are nine exceptionally disruptive technologies from RSAC 2019 that might just turn the tide in security… Read more
How machine learning bolsters your security operations
This is the future of security: You must include data science and—specifically—machine learning to elevate the level of predictability… Read more
Addressing governance and regulatory requirements
What are your thoughts on assessing governance and regulatory compliance? Have you participated in such an assessment? Did you follow a formally documented process, and if so, which one? Delve into the process of assessing your governance and regulatory requirements … Read more
32 application security stats that matter
The state of app sec by the numbers: Don't let your company become one of these statistics... Read more
Developing a prioritized security strategy
In our last post, Addressing Governance and Regulatory Requirements, we described the third of six processes for implementing a data security practice. Here we present our fourth process: developing a prioritized security strategy... Read more
The Good and the Bad in the Global State of Cybersecurity
The new Cyberthreat Defense Report form CyberEdge Group surveyed IT security decision-makers and asked them to share how they plan to improve their security posture and which technologies they see as essential weapons against cyberthreats… Read more
Ransomware and Data
The goal of ransomware is simple: to hold your data hostage until a ransom is paid to its captor. The effects are devastating. The NotPetya ransomware attack is estimated to have cost businesses up to $10 billion. Its sibling, WannaCry, tallied losses somewhere between $4 billion and $8 billion. The high cost of failure is preventable if businesses adapt and enforce these best practices… Read more
Resources
Case study: Coca-Cola FEMSA chooses Fortify on Demand
When a move to hosting applications in the cloud prompted the need for more structured application security to identify vulnerabilities before they cause issues, Coca-Cola FEMSA turned to Fortify on Demand.
The CCPA and Privacy: Data Protection & Identity
The California Consumer Privacy Act (CCPA) is the most consequential data privacy regulation yet to come out of U.S. initiatives. See an informative infographic on CCPA for key points to know. Read a concise white paper by PwC, discussing CCPA in light of GDPR. Consume these two newly added CCPA-related assets, along with Micro Focus Data Privacy solutions information, now collected on the content portal. CCPA becomes law on January 1, 2020!
Flash point paper: Data Privacy: Keys to Keeping Your Corporate Data Secure
With the expanding number of different devices, apps, and operating systems that corporate workers use to get their jobs done, protecting corporate data grows harder and harder
White paper: Five Steps to Defend Your Company Against a Security Breach
The NIST framework has five parts, each of which provides a useful lens for evaluating your company’s security. Download this white paper for an overview of the NIST framework and ways you can to use it to strengthen every facet of your organization’s defenses against a breach.
Flash point paper: Ransomware—Preventing Hostage Data
Cybercriminals take advantage of a vulnerability in your environment to infest your systems with malware that encrypts your vital business data so that it’s unusable until you pay them to decrypt it. In some cases, they even steal the data and threaten to release it to your competitors or sell it to the highest bidder.