Micro Focus News
Blog Home All Blogs

Micro Focus Cybersecurity Summit

Posted By Sandra Herber, Friday, March 29, 2019

 Join us for the second annual Micro Focus Cybersecurity Summit, taking place 11-13 June in Dallas, TX. Hear from peers and Micro Focus experts as they share best practices and solution roadmaps to help you take a holistic, analytics-driven approach to securing what matters most—identities, applications, and data. Register now 

This post has not been tagged.

Share |
PermalinkComments (0)
 

Micro Focus recognized on CRN's 2019 Security 100 List

Posted By Sandra Herber, Friday, March 29, 2019
CRN, a brand of The Channel Company, has named Micro Focus to its annual Security 100 list. The companies included on this list have demonstrated innovation and creativity in security product development, as well as a strong commitment to delivering those offerings through a vibrant channel of solution providers. Read the press release

This post has not been tagged.

Share |
PermalinkComments (0)
 

TechBeacon this month

Posted By Rob Mitchell, Friday, March 29, 2019

In the best of TechBeacon this month experts share how to choose the right test automation tools, how Micro Focus used IT4IT and SAFe to drive a 10X increase in release velocity, DevSecOps best practices, and more.

How to use IT4IT and SAFe to increase release velocity 
By leveraging both frameworks, Micro Focus increased its release velocity by a factor of 10. Distinguished Technologist Lars Rossen tells you how they did it - and how you can too.

The top 7 test automation mistakes: How to avoid your next fail 
These all-too-common miscalculations will cost you time, money, and trust—and derail your progress. Here’s how to avoid disaster.

Buyer’s Guide to Test Automation Tools   
This exclusive report from the editors at TechBeacon covers the latest technology trends, with advice from experts you trust. Which tools are best suited for the three different testing roles? Where do today’s tools fall short—and what’s coming next? Discover the answers, and consult sample RFP to ensure you ask vendors the right questions before making a decision. (Registration required).

The state of DevSecOps: 5 best practices from the front lines   
Could this be the year when DevSecOps finally catches on everywhere? Finally, Best practices are emerging. Here are the most successful ones to consider this year.

GDPR execution will be a major task this year—and reap benefits 
The General Data Protection Regulation went into effect last May, but practical execution of the GDPR in the enterprise is only just ramping up now. Micro Focus Business Strategist David Kemp explains why the task is incomplete — and what to do next.

This post has not been tagged.

Share |
PermalinkComments (0)
 

Discover, protect, and control access to data to lower privacy risk

Posted By Majken Pullin, Friday, March 29, 2019

Ensuring the privacy of your customer information and IP is critical for protecting the lifeblood of your enterprise. But where to start? Micro Focus offers a comprehensive framework approach that maps products and technologies to each phase of your strategy. Whether just starting out with data discovery and classification to determine your risk, or if ready to apply controls and audit compliance, our security, risk and governance solutions scale to your needs, each step of the way. Begin to unlock new business value safely when data is trusted in the hands of appropriate users and applications, while lowering risk of abuse or loss. This privacy solution overview webinar will illustrate how you can begin your journey!

This post has not been tagged.

Share |
PermalinkComments (0)
 

Calculating the return on investment for Identity & Access Management

Posted By Majken Pullin, Friday, March 29, 2019

The time to value is critical to ensure any level of infrastructure investment. Use our ROI calculator to find out how much the Micro Focus NetIQ Identity and Access Solutions can save your organization. If you'd like a deeper discussion on your results and how our solutions can drive true ROI, please call us at 1-888-323-6768 to talk to a representative to get a more detailed ROI picture.

View the calculator today

This post has not been tagged.

Share |
PermalinkComments (0)
 

Five Steps to Defend Your Company Against a Security Breach

Posted By Majken Pullin, Friday, March 29, 2019

Using the cloud lessens the burden on IT departments, freeing them to develop new products and services (often in the cloud). It gives today’s workers the 24/7 access they demand. Cloud services create new efficiencies, drive innovation, and lower costs.

But the cloud also provides new opportunities for cyberthieves who lurk in the dark corners of the web. Attacks are increasing, both in prevalence and disruptive potential. Cyber breaches have almost doubled in the past five years, according to the World Economic Forum, which now lists cyberattacks as third on its list of top global risks.

There are many angles from which to approach cybersecurity. One of the clearest, most comprehensive, most flexible, and most highly-regarded methods we’ve found is the framework devised by the National Institute of Standards and Technology (NIST).

The NIST framework has five parts, each of which provides a useful lens for evaluating your company’s security and making decisions about how to manage it. This paper provides an overview of the NIST framework and ways you can to use it to strengthen every facet of your company’s defenses against a breach.

Download the paper today

This post has not been tagged.

Share |
PermalinkComments (0)
 

Anatomy of a Breach

Posted By Majken Pullin, Friday, March 29, 2019

Cyber breaches have almost doubled in the past five years, according to the World Economic Forum, which now lists cyberattacks as third on its list of top global risks.  But how can organizations keep pace, keep secure? There needs to be a plan! One of the clearest, most comprehensive, most flexible, and most highly-regarded methods we’ve found to approach cybersecurity is the framework devised by the National Institute of Standards and Technology (NIST).

This webinar provides an overview of market trends facing organizations as they venture into a digital transformation. We will review how organizations can make their digital transformation secure by employing the NIST framework and ways they can to use it to strengthen every facet of their organization’s defenses against a breach.

View part 1 of our on-demand webinar series today!

This post has not been tagged.

Share |
PermalinkComments (0)
 

Five Tips for Getting the Most From Your Secure Software Development Testing Budget by Gartner

Posted By Majken Pullin, Friday, March 29, 2019

Every business today relies on applications to run and be profitable and developing secure applications has become an essential necessity for organizations of all sizes. Keeping up with the speed and volume for business needs while maintaining release deadlines and development budgets is only achievable when application security is an integral part of the software development process. Balancing the effectiveness and the budget for security testing of applications remains to be a key factor in delivering applications on time, on budget in a secure way.

Why read the report?

Using a variety of security testing methods and tools are key in having complete coverage and improved probability of detecting security issues within software development lifecycle. Optimizing the penetration testing budgets and getting a better return on this investment can be achieved through a strategic approach. 

Download “Five Tips for Getting the Most From Your Secure Software Development Testing Budget report by Gartner to see Gartner’s view on getting the most out of your security testing budget covering:

  • Key Challenges
  • Analysis
  • Recommendations

Click here to learn more!

 

This post has not been tagged.

Share |
PermalinkComments (0)
 

Webinar: Ensure Privacy Protection Through Your Digital Transformation

Posted By Majken Pullin, Friday, March 29, 2019

Privacy represents a major challenge for the modern enterprise. The flexibility of hybrid IT and insights of data analytics are essential to business. But the digital transformation that is key to business success and competitive advantage is also a major vulnerability when it comes to data privacy.

Organizations are rightfully concerned about CCPA, GDPR, PIPEDA, and the growing number of regulations now being enacted means they need to figure out how to reduce their risk. But current privacy protection approaches fall short. What’s needed is a unified technology framework that lets you take a holistic, analytics-driven approach to securing what matters most—a framework flexible enough to meet the needs of your enterprise, but specific enough to offer a guide to risk reduction.

Join us for this webinar to learn about:

  • The attributes of a flexible, unified framework to address disparate regulations
  • Five critical technology capabilities to enable compliance
  • Data discovery and classification to manage risk
  • Governing identity privileges, access, and stores

View the webinar today!

This post has not been tagged.

Share |
PermalinkComments (0)
 

Ransomware: Preventing Hostage Data

Posted By Gil Cattelain, Friday, March 29, 2019

The costs of ransomware can vary based on the data held, but there’s also lost time and productivity from workstations no one can access. IT resources dedicated to reacting to the downtime only ramp up the internal costs of these attacks. Businesses can feel completely dead in the water for hours or days at a time when due to the employee downtime ransomware creates. The high cost of failure is preventable if businesses adapt and enforce these best practices.

Click here to learn more!

 

 

This post has not been tagged.

Share |
PermalinkComments (0)
 
Page 4 of 97
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  >   >>   >| 

Contact Us

Vivit Worldwide
P.O. Box 18510
Boulder, CO 80308

Email: contact-us@vivit-worldwide.org

Mission

Vivit's mission is to serve
the Micro Focus User
Community through
Advocacy, Community,
and Education.