ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Desenvolva e modernize aplicativos comerciais usando tecnologia contemporânea
The leading solution for COBOL application modernization
Modernize aplicativos de mainframe IBM, processos de entrega, acesso e infraestrutura
Modernize o acesso ao aplicativo do host: mais seguro e fácil de usar, integrar e gerenciar
Obtenha interoperabilidade de sistemas em toda a empresa
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Desenvolvimento seguro, teste de segurança e proteção e monitoramento contínuos
Augment human intelligence
Criptografia, tokenização e gerenciamento de chaves para a desidentificação de dados e privacidade
Uma abordagem integrada ao gerenciamento de identidade e acesso
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Detecte ameaças conhecidas e desconhecidas por meio de correlação, ingestão de dados e analítica
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Experiência cativante para o usuário final e central de serviços eficiente, com base em aprendizado de máquina
A primeira solução de monitoramento autônoma e contida para TI híbrida
Automatize e gerencie redes tradicionais, virtuais e definidas por software
Descubra e gerencie itens de configuração (CIs) em ambientes de TI híbridos.
Simplifique a automação de atendimento e faça cumprir a governança
Automatize processos de TI de ponta a ponta
Manage IT & software assets for better compliance
Automatize o provisionamento, a aplicação de patches e a conformidade em todo o data center
Desenvolva, proteja e expanda processos empresariais automatizados em toda a empresa
Obtenha insights baseados em big data com analítica em tempo real e faça pesquisas em dados não estruturados.
Todo o aprendizado da Micro Focus em um único lugar
Desenvolva as habilidades para ter sucesso
Aumente a velocidade, remova os gargalos e melhore a entrega de software continuamente
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Modernize os principais sistemas de negócios para impulsionar a transformação dos negócios
Desenvolva e modernize aplicativos comerciais usando tecnologia contemporânea
The leading solution for COBOL application modernization
Modernize aplicativos de mainframe IBM, processos de entrega, acesso e infraestrutura
Modernize o acesso ao aplicativo do host: mais seguro e fácil de usar, integrar e gerenciar
Obtenha interoperabilidade de sistemas em toda a empresa
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
A segurança é fundamental para tudo o que você faz: operações, aplicativos, identidade e dados
Desenvolvimento seguro, teste de segurança e proteção e monitoramento contínuos
Augment human intelligence
Criptografia, tokenização e gerenciamento de chaves para a desidentificação de dados e privacidade
Uma abordagem integrada ao gerenciamento de identidade e acesso
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Detecte ameaças conhecidas e desconhecidas por meio de correlação, ingestão de dados e analítica
Access all products in CyberRes
Soluções jurídicas, de conformidade e de privacidade confiáveis e comprovadas
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Acelere as suas operações de TI à velocidade do DevOps
Experiência cativante para o usuário final e central de serviços eficiente, com base em aprendizado de máquina
A primeira solução de monitoramento autônoma e contida para TI híbrida
Automatize e gerencie redes tradicionais, virtuais e definidas por software
Descubra e gerencie itens de configuração (CIs) em ambientes de TI híbridos.
Simplifique a automação de atendimento e faça cumprir a governança
Automatize processos de TI de ponta a ponta
Manage IT & software assets for better compliance
Automatize o provisionamento, a aplicação de patches e a conformidade em todo o data center
Desenvolva, proteja e expanda processos empresariais automatizados em toda a empresa
Access all products in IT Operations Management
Molde a sua estratégia e transforme a sua TI híbrida.
Obtenha insights baseados em big data com analítica em tempo real e faça pesquisas em dados não estruturados.
Dê à sua equipe a capacidade de fazer a sua empresa operar com desempenho máximo
The Quality Council for Trades and Occupations (QCTO) oversees the design, implementation, assessment, and certification of occupational qualifications in South Africa. The QCTO also offers guidance to service providers who must be QCTO-accredited to offer occupational qualifications.
Industry
Location
Products
The QCTO is subject to regular audits by national regulatory bodies. The various systems in use by the QCTO range from accounting and ERP solutions, to HR, Employee Self-Service (used to manage staff holidays, payslips, and tax certificates), and the custom-developed system used to issue certificates to qualified applicants. There is a Management Information System for qualification development.
Access and security varies by system which makes it hard to collate all the information required for auditors, as Mr Tafadzwa Ramhewa, IT Director for the QCTO, explains: “We needed to pull audit trails of who had access to the different systems. Every month we would print out access reports and then compare this with user access request forms to work out if the two access sources lined up. Some systems have such restricted access that we would rely on the business owners to do this job for us. All in all it would easily take half a day of our time every month.”
Thankfully the audit findings have always been positive, although one recommendation was taken to heart by the QCTO. Ramhewa: “The auditors were pleased with the system access review for our end users, but we didn’t review access for our system administrators in the same way. We have other processes in place for this, but the auditors felt we needed a clearer separation of duties, which just wasn’t possible with the manual processes we had.”
These considerations were even more important in light of new data protection legislation which will be enforced by South African government from 2018. This has been introduced to fight identity theft and ambush marketing and has resulted in a real behavioral change in South African organizations.
Following a market review, the QCTO was introduced to NetIQ Identity Governance and NetIQ Change Guardian to close any loopholes in their access and security policies. Identity Governance was implemented and is used to collect and correlate user entitlements across all QCTO applications into one view. It is designed to eliminate manual processes and increase efficiency.
Ramhewa explains its use within QCTO: “The business owners of our solutions receive an automated email driven by Identity Governance to confirm which users have access to their systems. This process is managed independently from the system administrators so that they can be included in the process as well, creating a clear separation of duties. The Identity Governance reports are easy to understand and our business owners are comfortable working with the process.”
Change Guardian delivers further automation to the security of QCTO systems, and as Ramhewa says: “For us, it’s all about automation. The less human intervention, the better. Policing our user accounts is very important as we have a lot of contractors and staff mobility. We need to be able to control system access easily and have a transparent audit trail.”
Change Guardian centrally records and audits changes, consolidating and archiving change events from across the QCTO IT environment. This helps reduce the complexity required to analyze multiple, disparate logs. Before the Change Guardian implementation, there was a manual effort involved in getting ready for an audit exercise. The IT team needed to ensure there were no orphan user accounts which could pose a potential security threat. Today, Change Guardian reports in real-time on deleted user accounts, failed log-ons, reset passwords etc. This gives the team the control and visibility they need to rapidly detect and disrupt threats that could negatively impact the confidentiality, integrity, and availability of the organization’s critical assets.
Identity Governance and Change Guardian have streamlined the auditing process and improved security for QCTO. Ramhewa comments: “We worked with LiyaTech, a knowledgeable local implementation partner, and it was great to have the expertise from Micro Focus on hand as well, during the project. We find the solutions easy to administer and can already see the benefits.”
He concludes: “Identity Governance and Change Guardian have helped us be compliant with stringent new data protection regulations, and the solutions are saving us time and effort every day. We feel we are completely transparent in our access reviews and our system security has been enhanced in the process.”
We worked with LiyaTech, a knowledgeable local implementation partner and it was great to have the expertise from Micro Focus on hand as well, during the project. We find the solutions easy to administer and can already see the benefits.