NetIQ

Displaying 1-9 of 9 results

  • White Papers // Sep 2009

    The Challenges of Administering Active Directory

    As Active Directory's role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. The lack of native control makes the secure administration of Active Directory a challenging task at best for administrators. As a result, organizations need...

    Provided By NetIQ

  • White Papers // Aug 2009

    AD Management Survey: Reveals Security as Key Challenge

    This paper presents the results of a NetIQ-sponsored Active Directory Management and Security survey, conducted in July 2009. The study itself provides insight into the security challenges associated with managing and administering Active Directory, examines the ownership of Active Directory within enterprise IT organizations, and addresses the growing influence of...

    Provided By NetIQ

  • Webcasts // Mar 2009

    Automated Compliance and Exception Management

    How to best address the growing demands of regulatory compliance? With IT budgets under scrutiny, it is more important than ever to streamline the compliance processes. IT process automation offers the best way to reduce these costs and improve the compliance. The attendee of this webcast will learn how to...

    Provided By NetIQ

  • White Papers // Mar 2009

    A Practical Approach to Automated Compliance Assessment and Remediation

    There are many challenges to regulatory compliance in organization - one of the major challenges being the sheer number of compliance mandates. This creates a real need for security and compliance teams to find a way to streamline their compliance efforts and eliminate the manual processes associated with these. Perhaps...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Protect Your Customer Data on IBM iSeries

    One of the most critical issues facing organizations is how to protect critical data - especially sensitive customer data - in the face of the escalating risk of insider attack. While the IBM iSeries is regarded as being a secure platform, a common risk for security officers is the large...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Critical Host Protection With NetIQ Security Solutions

    A recent survey from Forrester Research shows that more than 80% of security executives rated data protection as an area of significant importance this year, yet traditional security approaches have often failed to adequately protect sensitive information. In this webcast on "Critical Host Protection," attendee will learn how to secure...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Monitoring Privileged Users With NetIQ Change Guardian for Windows

    Monitoring the privileged users is a best practice in IT and a requirement for complying with a number of standards, including the Payment Card Industry Data Security Standard (PCI-DSS). Many of the current monitoring approaches, such as native auditing, file integrity checking or kernel shims, can fail to provide either...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Defend the Database and Protect Your Critical Assets

    NetIQ Change Guardian for Databases closes a critical gap in the data security strategy by tracking access to databases and reporting on user activity that might represent a breach or attack. Reporting and alerting on all activity provides the information one need to meet the compliance challenges of PCI DSS,...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Achieving Agile Security Management: Moving From Reactive to Managed Security

    The presenters of this webcast discuss about achieving agile security management. The attendee will learn how to bring together people, processes and technology to proactively manage the security landscape.

    Provided By NetIQ

  • White Papers // Mar 2009

    A Practical Approach to Automated Compliance Assessment and Remediation

    There are many challenges to regulatory compliance in organization - one of the major challenges being the sheer number of compliance mandates. This creates a real need for security and compliance teams to find a way to streamline their compliance efforts and eliminate the manual processes associated with these. Perhaps...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Protect Your Customer Data on IBM iSeries

    One of the most critical issues facing organizations is how to protect critical data - especially sensitive customer data - in the face of the escalating risk of insider attack. While the IBM iSeries is regarded as being a secure platform, a common risk for security officers is the large...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Critical Host Protection With NetIQ Security Solutions

    A recent survey from Forrester Research shows that more than 80% of security executives rated data protection as an area of significant importance this year, yet traditional security approaches have often failed to adequately protect sensitive information. In this webcast on "Critical Host Protection," attendee will learn how to secure...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Monitoring Privileged Users With NetIQ Change Guardian for Windows

    Monitoring the privileged users is a best practice in IT and a requirement for complying with a number of standards, including the Payment Card Industry Data Security Standard (PCI-DSS). Many of the current monitoring approaches, such as native auditing, file integrity checking or kernel shims, can fail to provide either...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Defend the Database and Protect Your Critical Assets

    NetIQ Change Guardian for Databases closes a critical gap in the data security strategy by tracking access to databases and reporting on user activity that might represent a breach or attack. Reporting and alerting on all activity provides the information one need to meet the compliance challenges of PCI DSS,...

    Provided By NetIQ

  • Webcasts // Mar 2009

    Automated Compliance and Exception Management

    How to best address the growing demands of regulatory compliance? With IT budgets under scrutiny, it is more important than ever to streamline the compliance processes. IT process automation offers the best way to reduce these costs and improve the compliance. The attendee of this webcast will learn how to...

    Provided By NetIQ

  • Webcasts // Jan 2009

    Achieving Agile Security Management: Moving From Reactive to Managed Security

    The presenters of this webcast discuss about achieving agile security management. The attendee will learn how to bring together people, processes and technology to proactively manage the security landscape.

    Provided By NetIQ

  • White Papers // Aug 2009

    AD Management Survey: Reveals Security as Key Challenge

    This paper presents the results of a NetIQ-sponsored Active Directory Management and Security survey, conducted in July 2009. The study itself provides insight into the security challenges associated with managing and administering Active Directory, examines the ownership of Active Directory within enterprise IT organizations, and addresses the growing influence of...

    Provided By NetIQ

  • White Papers // Sep 2009

    The Challenges of Administering Active Directory

    As Active Directory's role in the enterprise has drastically increased, so has the need to secure the data it stores and to which it enables access. The lack of native control makes the secure administration of Active Directory a challenging task at best for administrators. As a result, organizations need...

    Provided By NetIQ