ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
최신 기술을 사용하여 비즈니스 애플리케이션을 구축하고 모더나이제이션합니다
The leading solution for COBOL application modernization
IBM 메인프레임 애플리케이션, 딜리버리 프로세스, 액세스 및 인프라를 현대화합니다
보다 쉬운 사용법, 보다 쉬운 통합, 보다 쉬운 관리, 더 우수한 보안으로 호스트 애플리케이션 액세스를 현대화합니다
기업 내 시스템 상호 운용성을 확보합니다
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
개발, 보안 테스트, 연속 모니터링 보안 및 보호
Augment human intelligence
데이터 재파악 및 개인정보를 위한 암호화, 토큰화, 키 관리
ID 및 액세스 관리의 통합 방식
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
상관관계, 데이터 수집 및 분석을 통해 알려진 위협과 알려지지 않은 위협을 탐지합니다
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
머신 러닝에 기반하여 최종 사용자 경험과 효율적인 서비스 데스크 연계
하이브리드 IT를 위한 최초의 컨테이터화된 익명 모니터링 솔루션
전통적인 네트워크와 가상 및 소프트웨어 정의 네트워크를 자동화하고 관리합니다
하이브리드 IT 환경의 구성 항목(CI)을 찾고 관리할 수 있습니다.
이행 자동화 간소화 및 거버넌스 강화
종합적인 IT 프로세스 자동화
Manage IT & software assets for better compliance
데이터 센터 간 프로비져닝, 패칭, 컴플라이언스를 자동화합니다
기업 전반에서 자동화된 비즈니스 프로세스를 구축하고 보안을 유지하고 규모를 조정할 수 있습니다
모든 Micro Focus 학습이 한 곳에서 제공됩니다
성공에 필요한 역량을 쌓습니다
속도를 높이고 병목 현상을 제거하고 소프트웨어 딜리버리를 지속적으로 개선하십시오
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
비즈니스 변혁을 촉진하도록 핵심 비즈니스 시스템을 현대화합니다
최신 기술을 사용하여 비즈니스 애플리케이션을 구축하고 모더나이제이션합니다
The leading solution for COBOL application modernization
IBM 메인프레임 애플리케이션, 딜리버리 프로세스, 액세스 및 인프라를 현대화합니다
보다 쉬운 사용법, 보다 쉬운 통합, 보다 쉬운 관리, 더 우수한 보안으로 호스트 애플리케이션 액세스를 현대화합니다
기업 내 시스템 상호 운용성을 확보합니다
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
운영, 애플리케이션, 정체성, 데이터 등 핵심 업무 항목에 보안을 제공합니다
개발, 보안 테스트, 연속 모니터링 보안 및 보호
Augment human intelligence
데이터 재파악 및 개인정보를 위한 암호화, 토큰화, 키 관리
ID 및 액세스 관리의 통합 방식
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
상관관계, 데이터 수집 및 분석을 통해 알려진 위협과 알려지지 않은 위협을 탐지합니다
Access all products in CyberRes
믿을 수 있고 입증된 법률, 컴플라이언스 및 개인 정보 보호 솔루션
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
DevOps 속도로 IT 운영을 가속화합니다
머신 러닝에 기반하여 최종 사용자 경험과 효율적인 서비스 데스크 연계
하이브리드 IT를 위한 최초의 컨테이터화된 익명 모니터링 솔루션
전통적인 네트워크와 가상 및 소프트웨어 정의 네트워크를 자동화하고 관리합니다
하이브리드 IT 환경의 구성 항목(CI)을 찾고 관리할 수 있습니다.
이행 자동화 간소화 및 거버넌스 강화
종합적인 IT 프로세스 자동화
Manage IT & software assets for better compliance
데이터 센터 간 프로비져닝, 패칭, 컴플라이언스를 자동화합니다
기업 전반에서 자동화된 비즈니스 프로세스를 구축하고 보안을 유지하고 규모를 조정할 수 있습니다
Access all products in IT Operations Management
전략을 수립하고 하이브리드 IT를 변환합니다.
실시간 분석을 통해 빅 데이터에서 통찰력을 확보하여 비구조화 데이터를 검색합니다.
팀이 비즈니스 성과를 극대화하도록 지원합니다
The Quality Council for Trades and Occupations (QCTO) oversees the design, implementation, assessment, and certification of occupational qualifications in South Africa. The QCTO also offers guidance to service providers who must be QCTO-accredited to offer occupational qualifications.
Industry
Location
Products
The QCTO is subject to regular audits by national regulatory bodies. The various systems in use by the QCTO range from accounting and ERP solutions, to HR, Employee Self-Service (used to manage staff holidays, payslips, and tax certificates), and the custom-developed system used to issue certificates to qualified applicants. There is a Management Information System for qualification development.
Access and security varies by system which makes it hard to collate all the information required for auditors, as Mr Tafadzwa Ramhewa, IT Director for the QCTO, explains: “We needed to pull audit trails of who had access to the different systems. Every month we would print out access reports and then compare this with user access request forms to work out if the two access sources lined up. Some systems have such restricted access that we would rely on the business owners to do this job for us. All in all it would easily take half a day of our time every month.”
Thankfully the audit findings have always been positive, although one recommendation was taken to heart by the QCTO. Ramhewa: “The auditors were pleased with the system access review for our end users, but we didn’t review access for our system administrators in the same way. We have other processes in place for this, but the auditors felt we needed a clearer separation of duties, which just wasn’t possible with the manual processes we had.”
These considerations were even more important in light of new data protection legislation which will be enforced by South African government from 2018. This has been introduced to fight identity theft and ambush marketing and has resulted in a real behavioral change in South African organizations.
Following a market review, the QCTO was introduced to NetIQ Identity Governance and NetIQ Change Guardian to close any loopholes in their access and security policies. Identity Governance was implemented and is used to collect and correlate user entitlements across all QCTO applications into one view. It is designed to eliminate manual processes and increase efficiency.
Ramhewa explains its use within QCTO: “The business owners of our solutions receive an automated email driven by Identity Governance to confirm which users have access to their systems. This process is managed independently from the system administrators so that they can be included in the process as well, creating a clear separation of duties. The Identity Governance reports are easy to understand and our business owners are comfortable working with the process.”
Change Guardian delivers further automation to the security of QCTO systems, and as Ramhewa says: “For us, it’s all about automation. The less human intervention, the better. Policing our user accounts is very important as we have a lot of contractors and staff mobility. We need to be able to control system access easily and have a transparent audit trail.”
Change Guardian centrally records and audits changes, consolidating and archiving change events from across the QCTO IT environment. This helps reduce the complexity required to analyze multiple, disparate logs. Before the Change Guardian implementation, there was a manual effort involved in getting ready for an audit exercise. The IT team needed to ensure there were no orphan user accounts which could pose a potential security threat. Today, Change Guardian reports in real-time on deleted user accounts, failed log-ons, reset passwords etc. This gives the team the control and visibility they need to rapidly detect and disrupt threats that could negatively impact the confidentiality, integrity, and availability of the organization’s critical assets.
Identity Governance and Change Guardian have streamlined the auditing process and improved security for QCTO. Ramhewa comments: “We worked with LiyaTech, a knowledgeable local implementation partner, and it was great to have the expertise from Micro Focus on hand as well, during the project. We find the solutions easy to administer and can already see the benefits.”
He concludes: “Identity Governance and Change Guardian have helped us be compliant with stringent new data protection regulations, and the solutions are saving us time and effort every day. We feel we are completely transparent in our access reviews and our system security has been enhanced in the process.”
We worked with LiyaTech, a knowledgeable local implementation partner and it was great to have the expertise from Micro Focus on hand as well, during the project. We find the solutions easy to administer and can already see the benefits.