Do you have feedback on our new interface?
Do you have feedback on our new interface? Let us know HERE
Security Blog
Get IT security insights to manage threats, costs and compliance while proactively protecting your business to stay ahead of attackers anywhere in the world.

Security Blog

Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Process Driven Approach towards Data Security.pngIn my last blog, “The Data Protection Stack,” we discussed why implementing a data security practice is necessary. In this post, we discuss how to implement a data security practice following seven steps to data-centric Security.


Read Blog Article

Read more
0 0 274
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

ZENworks at the RSA Security Conference.png

ZENworks provides a unified solution that reduces the overhead that comes with configuration. Remote capabilities and powerful protections, both locally and in the cloud, make Unified Endpoint Management a popular choice for networks of scale.


Read Blog Article

Read more
0 0 567
Micro Focus Contributor
Micro Focus Contributor

‘Better’ data privacy and compliance can be found at RSA.jpgSecuring data and ensuring data privacy is critical. Orgs need to discover, classify and protect data wherever it exists and overlay who or what has access to that data. See us at the RSA Conference to learn about our Security, Risk, and Governance solutions.


Read Blog Article

Read more
3 1 962
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

In a data security practice, the highest level of the data protection stack, application layer protection, provides the most protection. Even if all security layers below the application are compromised, security is not bypassed.The Data Protection Stack.png


Read Blog Article

Read more
1 0 578
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

While RSA Conference attendees always ask, “What’s new this year in security,” there is no magic silver bullet. However, we will be presenting a set of solutions tailored to address your end-to-end journey that few other security vendors can offer.Identities.png

 


Read Blog Article

Read more
0 0 871
Micro Focus Frequent Contributor
Micro Focus Frequent Contributor

Manufacturing and automotive industries need a comprehensive security strategy that incorporates security from the earliest stage of development all the way to the end of that product’s functional life.Modernizing breach defense for the manufacturing and automotive industries2.jpg

 


Read Blog Article

Read more
0 0 977
The opinions expressed above are the personal opinions of the authors, not of Micro Focus. By using this site, you accept the Terms of Use and Rules of Participation. Certain versions of content ("Material") accessible here may contain branding from Hewlett-Packard Company (now HP Inc.) and Hewlett Packard Enterprise Company. As of September 1, 2017, the Material is now offered by Micro Focus, a separately owned and operated company. Any reference to the HP and Hewlett Packard Enterprise/HPE marks is historical in nature, and the HP and Hewlett Packard Enterprise/HPE marks are the property of their respective owners.