The fastest, open, infrastructure-independent, advanced analytics SQL database
Securely access and analyze enterprise (and public) text, audio & video data
An intuitive hunt and investigation solution that decreases security incidents
User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen
Autonomous operations through a business lens
Intelligent automation for service desk, configuration, and asset management
SQL analytics solution handling large amounts of data for big data analytics
High-scale protection of sensitive data at rest, in motion, and in use across systems
Agile/DevOps management for continuous quality and delivery
Manage and track requirements from idea to deployment
Plan, track, orchestrate, and release complex applications across any environment
Enable all aspects of SCCM with enterprise grade scalability, security, and compliance
Automate deployments for continuous delivery with drag-and-drop simplicity
Govern application lifecycle activities to achieve higher quality
Unify test management to drive efficiency and reuse
Integrated, component-based test framework that accelerates functional test automation
Accelerate functional test automation across web, mobile, API, and enterprise apps
Discover, design, and simulate services and APIs to remove dependencies and bottlenecks
Shift-left functional testing using the IDE, language, and testing frameworks of choice
Reliable and efficient test automation for functional and regression testing
Centralized, omnipresent lab to develop, debug, test, monitor, and optimize mobile apps
Learn more about the LoadRunner Family of solutions
Cloud-based solution to easily plan, run and scale performance tests
Project-based performance testing to identify performance issues
Easy-to-use performance testing solution for optimizing application performance
Collaborative performance testing platform for globally distributed teams
Discover, design, and simulate services and APIs to remove dependencies and bottlenecks
Identifies security vulnerabilities in software throughout development
Gain valuable insight with a centralized management repository for scan results
Manage your entire application security program from one interface
Provides comprehensive dynamic analysis of complex web applications and services
Builds packages of change artifacts to speed up mainframe application development
Enable faster, efficient parallel development at scale
A development environment that streamlines mainframe COBOL and PL/I activities
Intelligence and analysis technology that provides insight into core processes
Fuel mobile apps, cloud initiatives, process automation, and more
Future-proof core COBOL business applications
Maintain and enhance ACUCOBOL-based applications
Deliver application access—anywhere
Maintain and enhance COBOL systems
Maintain and enhance RM/COBOL applications
Connect COBOL applications to relational database management systems
Derive incremental value with real-time, relational access to COBOL data
Unlock business value with real-time, relational access to ACUCOBOL data
Connect ACUCOBOL applications to relational database management systems
Automatically understand and analyze Micro Focus COBOL applications
Build COBOL applications using Agile and DevOps practices
Deploy COBOL applications across distributed, containerized or cloud platforms
Modernize core business system infrastructure to support future innovation
Manage agile projects using a collaborative, flexible, requirements and delivery platform
Manage requirements with full end-to-end traceability of processes
Automatically understand and analyze IBM mainframe applications
Capture, analyze, and measure the value, cost and risk of application portfolios
Build packages of change artifacts to speed up mainframe application development
Build and manage packages of change artifacts to speed up mainframe application development
Provide multiple change management interfaces to maintain mainframe apps
Build and modernize IBM mainframe COBOL and PL/I applications
Enable faster, efficient parallel development at scale
Fuel mobile apps, cloud initiatives, process automation, and more
Manage mainframe files for fast problem resolution
Easily test mainframe application changes using flexible infrastructure
Compare and manage mainframe data, text, and directory files
Connect Dev and Ops by automating the deployment pipeline and reduce feedback time
Centralize planning and control for the entire software release lifecycle
Orchestrate and integrate processes for faster software development and delivery
Detect changes, synchronizes multiple environments, and restores failed systems
Execute IBM mainframe COBOL and PL/I workload on Windows, Linux and the Cloud
Execute modernized IBM mainframe workloads under Microsoft .NET and Azure
Modernize IBM, HP, and Unix application access across desktop and mobile devices
Web-enable IBM and VT application desktop access, Java free
Modernize Unisys mainframe application desktop access
Modernize IBM, HP, and Unix application desktop access
Automate IBM, HP, and Unix application desktop access
Create new applications and workflows with Web services and APIs for IBM, HP, and UNIX applications
Fuel analytics platforms and BI applications with Unisys MCP DMSII data in real time
Centralize host access management with identity-powered access control and data security
Modernize file transfer with security, encryption and automation, within and across the firewall
Learn how Advanced Authentication Connector for z/OS is a multi-factor authentication for all your IBM z/OS end points
Measure and manage terminal-based software deployment and usage
Centralize host access management with identity-powered access control and data security
Develop and deploy applications with a comprehensive suite of CORBA products
Build distributed applications at enterprise scale
Develop, deploy, and support CORBA 2.6 compliant middleware in C++ or Java
Connect applications on diverse operating environments
Email, IM, chat-based teamwork, anti-virus, anti-spam, disaster recovery, and more
Provides secure file access and sharing from any device
Provides secure email, calendaring, and task management for today's mobile world
Backup and disaster recovery solution that ensures critical email is always available
Seven essential tools to build IT infrastructures, including secure file sharing
Provides secure team collaboration with document management and workflow features
Provides single sign-on for enterprises and federation for cloud applications
Protect your sensitive information more securely with multi-factor authentication
File Reporter and Storage Manager solution suite bundle
File Reporter for OES examines OES network file systems and delivers intelligent file insights so you can make the most intelligent business decisions.
Provides secure file access and sharing from any device
Protects your key business systems against downtime and disaster
Simplifies resource management on a Storage Area Network and increases availability
File, print, and storage services perfect for mixed IT environments
Cloud-based endpoint backup solution with file sync and share, and analytics
Package, test, and deploy containerized Windows apps quickly and easily
Seven integrated products to help track, manage and protect endpoint devices
Provides reports that integrate licensing, installation and usage data
Provides automated endpoint management, software distribution, support, and more
Delivers identity-based protection for devices and features total protection
Proactive laptop and desktop data protection to automatically lock out threats
Automates patch assessment and monitors patch compliance for security vulnerabilities
Streamlines and automates the way you provide IT services to your business
Cloud-based, scalable archiving for regulatory, legal, and investigative needs
Archive all business communication for case assessment, search, and eDiscovery
Automate employee data and communication monitoring to meet regulatory compliance and internal initiatives
Mitigate risk across social media channels to meet regulatory compliance obligations
Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.
Address the ever-changing needs of network data management
File analysis to discover, classify and automate policy on unstructured data
Discover what is being stored and who has access
Structured data archiving to retire outdated applications and reduce data footprint
Identity-driven governance of data & access
SaaS-based file analysis on all of your unstructured data
Respond to litigation and investigations quickly, accurately, & cost-effectively
SaaS-based file analysis on all of your unstructured data
Identify, analyze, and manage your data; then establish policies to protect your data properly and efficiently, in use and throughout its lifecycle, and ensure data preservation.
File analysis to discover, classify and automate policy on unstructured data
Discover what is being stored and who has access
Address the ever-changing needs of network data management
Structured data archiving to retire outdated applications and reduce data footprint
Helping organizations meet data privacy regulatory guidelines through the management & disposition of data.
Securely access and analyze enterprise (and public) text, audio & video data
Backup and disaster recovery for diverse, dynamic, and distributed enterprise
Automate provisioning, patching, and compliance across the data center
Discover and manage configuration items (CIs) in Hybrid IT environments.
Simplify fulfillment automation and enforce governance
Automate and manage traditional, virtual, and software-defined networks
The first containerized, autonomous monitoring solution for hybrid IT
Automate IT processes end-to-end
Build, secure, and scale automated business processes across the enterprise
Engaging end-user experience and efficient service desk based on machine learning
A comprehensive threat detection, analysis, and compliance management SIEM solution
An intelligent log management solution that eases compliance burdens and accelerates forensic investigation for security professionals
A comprehensive log management solution for easier compliance, efficient log search, and secure cost-effective storage.
Download and deploy pre-packaged content to dramatically save time and management
A future-ready data platform that transforms data chaos into security insight.
User and entity behavioral analytics that augments existing security tools and empowers security operations teams to identify and respond to the threats that matter before data is stolen
A fully-featured, adaptable solution that simplifies the day-to-day use of SIEM
A comprehensive Security Orchestration Automation Response platform with cognitive automation, investigation service desk, process orchestration and SOC analytics.
Persistent file encryption, complete control, and visibility to simplify unstructured data security
Format-preserving encryption, tokenization, data masking, and key management
Omni-channel PCI compliance and data protection for end-to-end payments security
Email, file, and Office 365 protection for PII, PHI, and Intellectual Property
Saas cloud email encryption to protect information on Office 365
The full solution for secure automated file transfer management inside and across perimeters
Identifies security vulnerabilities in source code early in software development
Provides comprehensive dynamic analysis of complex web applications and services
Gain valuable insight with a centralized management repository for scan results
Manage your entire application security program from one interface
Gain visibility into application abuse while protecting software from exploits
Provisions and governs access to unstructured data
Provides an LDAP directory with incredible scalability and an agile platform
Provides automated user access review and recertification to remain compliant
Delivers an intelligent identity management framework to service your enterprise
Provides single sign-on for enterprises and federation for cloud applications
Move beyond username and passwords and securely protect data and applications
Multi-factor Authentication for all your IBM z/OS end points
Integrate the host with your modern security framework
Adapt the authentication and access experience to the risk at hand.
Enables users to reset their passwords without the help of IT
Streamlines authentication for enterprise apps with a single login experience
Protect and manage access to your APIs.
Enables IT administrators to work on systems without exposing credentials
Limits administrative privileges and restricts directory views to specific users
Edit, test and review Group Policy Object changes before implementation
Protect critical data, reduce risk and manage change with Change Guardian
Extend the power of Active Directory to Linux resources
Unify and centrally manage policies across multiple platforms.
Protect critical data, reduce risk and manage change with Change Guardian
Finds and repairs configuration errors that lead to security breaches or downtime
Provides easy compliance auditing and real-time protection for IBM iSeries systems
Protect your network and messaging system from malware, viruses, and harmful content
Scalable, end-to-end encrypted email solution for desktop, cloud, and mobile
Cloud-based endpoint backup solution with file sync and share, and analytics
Package, test, and deploy containerized Windows apps quickly and easily
Provides reports that integrate licensing, installation and usage data
Provides automated endpoint management, software distribution, support, and more
Delivers identity-based protection for devices and features total protection
Proactive laptop and desktop data protection to automatically lock out threats
Automates patch assessment and monitors patch compliance for security vulnerabilities
Streamlines and automates the way you provide IT services to your business
Seven integrated products to help track, manage and protect endpoint devices
Help you embed security throughout the IT value chain and drive collaboration between IT operations, applications, and security teams.
Help you to react faster and gain a competitive advantage with enterprise agility.
Accelerate your hybrid cloud outcomes with advisory, transformation and implementation services.
Application management services that let you out-task solution management to experts who understand your environment.
Strategic consulting services to guide your digital transformation agenda.
Fully functional use-case modeling, with pre-built integrations across the Micro Focus Software portfolio, showcasing real-life use-case
Expert security intelligence services to help you quickly architect, deploy, and validate your Micro Focus security technology implementation.
A service integration and management service that optimizes delivery, assurance, and governance in multi-supplier settings.
Get insights from big data with real-time analytics, and search unstructured data.
Get insights from big data with real-time analytics, and search unstructured data.
Get insights from big data with real-time analytics, and search unstructured data.
Mobile services that ensure performance and expedite time-to-market without compromising quality.
Get insights from big data with real-time analytics, and search unstructured data.
Comprehensive Big Data services to propel your enterprise forward.
All Micro Focus learning in one place
This Cookie Policy applies to all of our websites ("Websites"). By accessing any of our Websites, you agree that this Cookie Policy will apply whenever you access the Websites on any device.
Any changes to this policy will be posted here and we reserve the right to vary this policy from time to time and your continued use of our Websites after any such change has been posted will constitute your agreement to any such changes.
Like many companies, some or all of our Websites may use "cookies". A Cookie is a small file of letters and numbers that is placed on your computer's hard drive when you visit certain websites. We may use cookies to tell us, for example, whether you have visited us before or if you are a new visitor and to help us identify site features in which you may have the greatest interest. Cookies may enhance your online experience by saving your preferences while you are visiting a particular site. For more information on cookies, please see www.whatarecookies.com.
Most of the cookies we use are "personalisation cookies" which are used to recognise repeat visitors to the Websites and "analytics cookies" which monitor how visitors use our Websites and give us a better understanding of what content visitors are spending most time reading. The types of cookies used on our Websites are as follows:
Cookie Type |
Details |
---|---|
Strictly Necessary | These cookies are essential to enable you to receive a service on a website. For example, cookies to operate online shopping baskets, do your internet banking or to comply with the law (e.g. such as to keep your information safe). |
Analytics/Performance | These cookies are used only to help us to improve our Websites over time, by giving us insights into how the various sections of the Websites are used and how users interact with the Websites, for example which pages visitors go to most often and whether they get error messages from web pages. The information collected is anonymous and statistical. |
Authentication/Functionality | These cookies are used to identify unique visitors to the Websites. If you log in to the Websites, these are the cookies that allow us to remember who you are and what your preferences are so that we can provide you with access to pages personal to you, for example your account pages or your selected font size. These cookies help keep your visit to the site secure. These cookies can also enable enhanced, more personal features and to provide services you have asked for such as watching a video, which is how they are used on our website. Whilst information collected by "functionality" cookies may or may not be anonymised, the "functionality" cookies on our website only collect anonymous information. |
Targeting | These cookies collect information about your browsing habits to make advertising relevant to you and your interests. These cookies collect the most information about users. |
Session |
These are cookies that are designed to ensure that your visits to the Websites are as smooth as possible. Their main uses are:
|
We have listed in the table below the specific cookies that we use and the purposes for which we use them. You will see that we have also identified whether they are session cookies or persistent cookies. 'Session cookie' is a commonly used description for a cookie which stores information about user page activities to allow users to be recognized within a website so any page changes or item or data selection is remembered from page to page; whilst 'persistent cookie' is a commonly used description for a cookie which helps websites remember your information and settings when you visit them in the future.
Cookie |
Name | Purpose | Persistent / Session | More Information |
---|---|---|---|---|
Java Session | JSESSIONID | This cookie is essential for the Java programming language to maintain a session with users. | Session | View here |
PHP Session | PHPSESSID | This cookie is essential for the PHP programming language to maintain a session with users. | Session | View here |
Access Manager |
IPCZQX########## UrnNovellNidpClusterMemberId ZNPCQ003-######## lb_esp lb_login lb_netiq lb_novell lb_partnernetprogram |
Access Manager is a Novell product used to manage authentication and security. These cookies are essential for its functionality. | Session | View here |
MyNetIQ Legacy |
policytarget TJS |
Legacy cookies used to manage access to restricted resources. | Session Persistent | |
Cookie |
Name | Purpose | Persistent / Session | More Information |
---|---|---|---|---|
Google Analytics |
AID APISID CAL GAPS HSID NID OGP OGPC PREF SAPISID SID SNID SSID _utma _utmb _utmt _utmv _utmx _utmxx _utmz _ga _gat |
These cookies are used to collect anonymous information about how visitors use our site. We use the information to compile analytical reports which help us improve our website. The cookies collect information such as the number of visitors to our website, how they arrived there (e.g. directly from the internet or through linking from another website) and tracking which web pages they visited. | Session | View here |
Eloqua |
BKUT ELOQUA ELQSTATUS |
Eloqua Corp. is a marketing automation SaaS company owned by Oracle which developed automated marketing and demand generation software and services for business-to-business marketers. It is used for many core demand generation activities. | Persistent | View here |
Double Click Tracking |
_drt_ id matchcasale matchfbx matchgoogle matchibehavior matchimprovedigital matchopenx matchpubmatic matchspotx matchtwitter wfivefivec |
DoubleClick is a 3rd party product owned by Google that is used to measure campaign success. | Persistent | View here |
Decibel Insight |
da_lid da_sid |
Decibel Insight is a full suite of behavioral analysis tools. | Persistent | |
Cookie |
Name | Purpose | Persistent / Session | More Information |
---|---|---|---|---|
Language Preference |
ag_language novell_language user_language novell_lang_ redirect_refer |
Language cookie used to display content in users preferred language. | Persistent | |
Country Preference | user_country | Country cookie is used to display localized content based on a user's location. | Persistent | |
Novell Search |
novell_search_type novell_search_paid _keyword novell_search_landing novell_search _campaign novell_search |
This cookie is used to track the banner rotation count on the netiq.com home page. | Persistent | |
Home Page Banner Rotation | netiq_home_counter | Decibel Insight is a full suite of behavioral analysis tools. | Session | |
Vbulletin Forums |
bb_lastactivity bb_lastvisit |
VBulletin is a 3rd party product used for forums and it uses these cookies to track visitor activity. | Persistent | View here |
AddThis social sharing widget | __atuvc | AddThis is a content sharing tool that allows users to share content on social media, blogs, websites, etc. | Persistent | View here |
LiveChat |
__livechat __livechat_chat __livechat_lastvisit __lc.visitor_id.### km_ai km_lv km_uq mp_####### #######_mixpanel |
LiveChat is an online marketing, live support and web analytics application for SMB and large enterprise offered in SaaS (software as a service) model. It is used to offer chat support to visitors of the site. | Persistent | View here |
DemandBase | s_fid | Used to deliver targeted personalization based on a user's location and known information about them. | Persistent | |
All information collected through the use of cookies is encrypted and we do not use cookies to collect information such as credit card numbers.
Most browsers will tell you how to stop accepting new cookies, how to be notified when you receive a new cookie, and how to disable existing cookies. Please note, however, that without cookies you may not be able to take full advantage of all our Website features. For example, we use a cookie to remember your cookie preferences and so:
Certain pages on our Websites may contain "web beacons" (also known as Internet tags, pixel tags or clear GIFs). These web beacons allow third parties to obtain information such as the IP address of the computer that downloaded the page on which the beacon appears, the URL of the page on which the beacon appears, the time the page containing the beacon was viewed, the type of browser used to view the page and the information in cookies set by the third party.
An IP address is a unique identifier that certain electronic devices use to identify and communicate with each other on the Internet. When you visit our websites, we may view the IP address of the device you use to connect to the Internet. We use this information to determine the general physical location of the device and understand from what geographic regions our website visitors come. We also may use this information to enhance our websites.
Micro Focus takes its users' concerns seriously. If you believe that Micro Focus has not complied with this Privacy and Cookie Policy, or if you have any questions about our privacy practices in general, you may write to the Micro Focus Group Compliance Officer at the address provided below, or by email at: compliance@microfocus.com.
Micro Focus
The Lawn
22-30 Old Bath Road
Newbury
Berkshire, RG14 1QN
United Kingdom
If you have a complaint, please describe in as much detail as possible the ways in which you believe that this Privacy and Cookie Policy has not been complied with. We will investigate your complaint promptly.
If you provide Micro Focus with inconsistent preferences (for example, by indicating on one occasion that you consent to our use of cookies and on another by declining cookies), Micro Focus will endeavor to update your privacy preferences in a timely and accurate manner.
Micro Focus International plc and certain of its other UK group companies are individually registered as a 'Data Controller' on the public Register of Data Controllers as maintained by the UK's Information Commissioner. Micro Focus' overseas group companies process your personal data in accordance with data protection laws in the countries in which they operate. To find out more information about the companies within the Micro Focus group that may handle your personal information, please visit www.microfocus.com.
We may change this Privacy and Cookie Policy from time to time by updating this page. Check this page from time to time to learn about any changes.
This Privacy and Cookie Policy was last updated: 13 March 2019