Micro Focus News
Blog Home All Blogs

Announcing Micro Focus Policy Compliance Assessor 1.0

Posted By Sandra Herber, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019

Micro Focus is pleased to announce the release of Policy Compliance Assessor, now available to customers worldwide. This new product enables you to accelerate your move to the cloud by assessing the cloud-readiness of Group Policy Objects (GPOs) and then migrating them to Microsoft Intune with one click.

Policy Compliance Assessor 1.0 includes the following key capabilities:

  • Group Policy evaluation – Find, list, and export all GPOs found within AD using an intuitive and dynamic web console
  • Cloud-readiness assessment – Compare your GPOs against Azure-supported settings to determine whether they are ready to be migrated to Intune
  • One-click migration – Easily view cloud-ready GPOs and duplicate the settings in Intune without the need for scripting
  • Live status updates – Click on GPO details to see individual settings and their migration status
  • Continuous readiness monitoring – Schedule the continuous assessment of your GPOs against new Microsoft releases
  • Intuitive reporting – Easily view assessment results and post-migration reports with the option to export to a .csv file and share with other teams

 

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Micro Focus Voltage Announces the Release of Voltage SecureData for Teradata UDF 3.1

Posted By Sandra Herber, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019
The Micro Focus Voltage SecureData team is pleased to announce the release of Voltage SecureData for Teradata UDF 3.1. This release adds support for AES-256 encryption and automatic Unicode. Join our Voltage Community to see the product announcement!

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Report: 2019 State of Security Operations Update

Posted By Sandra Herber, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019
What are the most pressing challenges for SOCs this year and how are top performers addressing them? Find the answers in our new State of Security Operations Update. Based on assessments and experiences from SOCs around the world, this report provides valuable insights into emerging global trends and proven success factors. Download the eBook today!

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Webcast: Don't Get Shocked, Get Secure

Posted By Sandra Herber, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019

In this this brief on-demand webcast sponsored by nCipher, Micro Focus Voltage Product Marketing Manager Carole Murphy explains how to achieve data-centric information protection across the enterprise with Micro Focus Voltage and nCipher technology. You’ll also learn how to:

  • Make safe use of data for innovation
  • Protect data for privacy and analytics
  • Securely manage cryptographic keys
  • Establish a certified HSM root of trust

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Privacy in the United States: A State by State Privacy Law Review

Posted By Sandra Herber, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019
MER / Sapient webinar sponsored by Micro Focus

The past year has seen a number of new and expanded state regulations addressing privacy and data security. What is emerging is a daunting patchwork of duplicative, overlapping, and occasionally contradictory Information Governance (IG) obligations, ranging from the comprehensive California Consumer Privacy Act (CCPA) to the highly specific Illinois Biometric Information Privacy Act (BIPA). With no consistent direction, and with the specter of federal legislation in this area, IG professionals have their work cut out for them. In this on-demand webinar, two seasoned cybersecurity and compliance lawyers will help you make sense of this fast-changing environment, avoid potential pitfalls, and craft resilient compliance programs. View now.

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Best Practices for Taking Control of Privilege in your Organization

Posted By Majken Pullin, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019

Experts estimate that as many as half of all security breaches occur as the result of abused privileged credentials. Whether the privilege misuse occurs due to employee carelessness or is the work of a cyber-criminal who has leveraged the credentials of an insider to gain access to your IT network, you can best manage this risk by closely controlling and monitoring all privileged access.

Join us for this webcast on Thursday, October 31 to hear from Andras Cser, VP, Principal Analyst with Forrester and Tim Sedlack of Micro Focus. You’ll learn about:

  • Best practices for taking control of privileged access in your organization
  • Why it’s increasingly important to discover and monitor privileged entitlements—wherever they live

Register today!

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Application Security Risk Report

Posted By Majken Pullin, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019

Attacks targeting the application layer are on the rise. Our 2019 Application Security Risk Report reveals the latest industry trends and insights in the application security landscape.

Standards and legislation provide incomplete security coverage:

  • 61% of applications had at least one Critical and High Issue NOT covered by OWASP Top 10.
  • This up 12% YOY, from 49% to 61%.

Open source code has blind spots:

  • Among the top movers in applications with vulnerabilities mapped to the OWASP TOP 10: A9 “Using Components with Known Vulnerabilities” had a significant 16% increase.
  • 87% of the applications tested inherit a critical severity vulnerability from referenced components—up by 22% since 2017.

Get the 2019 report today to learn more about the pulse of AppSec from the Micro Focus Fortify Software Security Research team.

Download the paper today!

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

The Hidden Business Enabler - Advanced Authentication

Posted By Kent Purdy, Thursday, October 17, 2019
Updated: Tuesday, October 15, 2019

Forrester Principal Analyst Andras Csar joins Troy Drewry and Kent Purdy to discuss how authentication can be used as a business enabler both outward-facing and within. Andras starts by review pain points, and costs hit that authentication imposes on organizations, as well as its role in achieving zero trust interactions. He finishes up by providing some recommendations and cautions.

The BrightTalk then segues to Troy and Kent as they illustrate how, if done right, NetIQ Advanced Authentication framework maps to Andras’ zero trust model. The session ends with some Q&A and links to some white papers that help organizations reduce authentication friction. Come listen in.

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Identity and Access Management (IAM) Sessions from Cybersecurity Summit On-Demand

Posted By Kent Purdy, Thursday, September 12, 2019
Updated: Friday, September 6, 2019

While the 2019 Micro Focus Cybersecurity Summit has come and gone, that doesn’t mean that you don’t have access to the latest presentations covering security trends and solutions coming out of Micro Focus. Since it’s my area of specialty I’m going to talk about the Identity and Access Management (IAM) sessions that show up as the middle section on the “Content on Demand” page.

https://www.microfocus.com/en-us/events/cybersecurity-summit-on-demand/speakers

Based on my experience with customers, rarely is there a roadmap discussion where customers don’t learn something new. Not just the future stuff coming down the pike, but also what’s in the product today. The IAM roadmap presentations might very well kick off a discussion with your Micro Focus partner or sales rep to better use what you’ve already purchased.

Another noteworthy session is called "Mitigate Your Biggest Security Risk: Privileged Identities." That session starts by covering the root causes of specific risks, then moves on to the key capabilities of NetIQ Privileged Account Manager. Paul Jones from Cerner then explains their strategy and approach for securing privileged users as well as the tangible results they've seen.

In the session that I participated in, Gireesh Kumar introduces the latest IAM offering - NetIQ Secure API Manager, which has become an essential component of access management. In this session, I cover market trends in API usage and vulnerabilities, then Gireesh goes into detail on how Secure API Manager can be used to extend the coverage of your access management environment. If you have IAM responsibilities within your organization, this is a must-see session.

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 

Cybersecurity Summit 2019 On Demand

Posted By Majken Pullin, Thursday, September 12, 2019
Updated: Friday, September 6, 2019

We’re pleased to announce that content from our 2019 Micro Focus Cybersecurity Summit is now available on-demand. Now you can experience this premier security event for yourself, from the convenience of your desktop.
Gain valuable security knowledge and industry insight directly from the presenters, in any or all of these informative tracks:

  • Application Security & Fortify
  • Breach Defense
  • Data Governance & Secure Content Management
  • Endpoint Security, ZENworks & Connected MX
  • Identity and Access Management & NetIQ
  • Machine Learning, Security Analytics & Interset
  • Privacy, Data Protection & Voltage
  • Security Operations, ArcSight & Sentinel
View session now!

Tags:  Micro Focus Security News 

Share |
PermalinkComments (0)
 
Page 4 of 12
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  >   >>   >| 

Contact Us

Vivit Worldwide
P.O. Box 18510
Boulder, CO 80308

Email: contact-us@vivit-worldwide.org

Mission

Vivit's mission is to serve
the Micro Focus User
Community through
Advocacy, Community,
and Education.