ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Создавайте и модернизируйте бизнес-приложения с использованием современных технологий
The leading solution for COBOL application modernization
Модернизируйте мэйнфрейм-приложения IBM, процессы доставки, средства доступа и инфраструктуру.
Модернизация доступа приложений к хосту: проще, удобнее в интеграции и управлении, безопаснее
Достижение взаимодействия систем на уровне предприятия
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Безопасная разработка, тестирование параметров безопасности, непрерывный мониторинг и защита информации
Augment human intelligence
Шифрование, токенизация данных и управление ключами безопасности для деидентификации и сохранения конфиденциальности данных
Интегрированный подход к управлению идентификацией и доступом
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Определяет ранее известные и новые угрозы с помощью корреляции, приема данных и аналитики
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Удобный пользовательский интерфейс и высокая эффективность работы службы поддержки основаны на технологии машинного самообучения
Первое контейнеризированное автономное решение для контроля работы гибридных ИТ
Автоматизация и управление для традиционных, виртуальных и программно-определяемых сетей
Обнаружение элементов конфигурации и управление ими в гибридных ИТ-средах.
Упрощение автоматизации и контроля процессов
Комплексная автоматизация ИТ-процессов
Manage IT & software assets for better compliance
Автоматизация подготовки, внесения исправлений и соответствия требованиям для всего ЦОД
Создавайте и масштабируйте безопасные автоматизированные бизнес-процессы на предприятии.
Получите всю информацию из массива больших данных за счет аналитики в режиме реального времени и поиска по неупорядоченным данным.
Здесь собраны все учебные ресурсы Micro Focus
Совершенствуйте навыки, которые помогут вам достичь успеха
Повышайте скорость работы, устраняйте препятствия и непрерывно совершенствуйте процесс доставки программного обеспечения
ValueEdge: Value Stream Management
Align corporate investments with business strategy
Continuous quality from requirements to delivery
Scale enterprise SCCM with security and compliance
Resilient AI-powered functional test automation
Enterprise-level requirements management
Deliver continuous application performance testing
Plan, track, orchestrate, and release applications
Govern quality and implement auditable processes
Automate deployments for continuous delivery
Access all products in application delivery management
Модернизируйте основные бизнес-системы, чтобы преобразовать свое предприятие.
Создавайте и модернизируйте бизнес-приложения с использованием современных технологий
The leading solution for COBOL application modernization
Модернизируйте мэйнфрейм-приложения IBM, процессы доставки, средства доступа и инфраструктуру.
Модернизация доступа приложений к хосту: проще, удобнее в интеграции и управлении, безопаснее
Достижение взаимодействия систем на уровне предприятия
Modern mainframe application delivery for IBM Z
Secure, zero-footprint access to host applications
Access host data and automate processes with RPA
Multi-factor Authentication for IBM z/OS endpoints
Access all products in Application Modernization & Connectivity
Безопасность во всех направлениях деятельности: операциях, приложениях, идентификации и обработке данных
Безопасная разработка, тестирование параметров безопасности, непрерывный мониторинг и защита информации
Augment human intelligence
Шифрование, токенизация данных и управление ключами безопасности для деидентификации и сохранения конфиденциальности данных
Интегрированный подход к управлению идентификацией и доступом
Deliver simplified, secure access to users
Scale to billions of identities with IGA platform
Gain control of privileged user activities
Track changes and activities in managed services
Определяет ранее известные и новые угрозы с помощью корреляции, приема данных и аналитики
Access all products in CyberRes
Надежные технологии обеспечения правовой защиты, соответствия нормам и соблюдения конфиденциальности
Analytics for text, audio, video, and image data
Reduce risk, cost, and maintenance, and T2M
AI and machine learning for data analysis
Enterprise backup/disaster recovery
Unified traditional and mobile device management
Meet regulatory & privacy retention requirements
Email, IM, and chat-based collaboration
Mobile workforce communication & collaboration
Secure critical file storage and print services
Access all products in Information Management and Governance
Ускорьте свои ИТ-операции до скорости DevOps
Удобный пользовательский интерфейс и высокая эффективность работы службы поддержки основаны на технологии машинного самообучения
Первое контейнеризированное автономное решение для контроля работы гибридных ИТ
Автоматизация и управление для традиционных, виртуальных и программно-определяемых сетей
Обнаружение элементов конфигурации и управление ими в гибридных ИТ-средах.
Упрощение автоматизации и контроля процессов
Комплексная автоматизация ИТ-процессов
Manage IT & software assets for better compliance
Автоматизация подготовки, внесения исправлений и соответствия требованиям для всего ЦОД
Создавайте и масштабируйте безопасные автоматизированные бизнес-процессы на предприятии.
Access all products in IT Operations Management
Оформите собственную стратегию и преобразуйте свои гибридные ИТ-системы
Получите всю информацию из массива больших данных за счет аналитики в режиме реального времени и поиска по неупорядоченным данным.
Воспользуйтесь нашими образовательными услугами в сфере программного обеспечения, чтобы улучшить эффективность работы
State Grid Shanghai Municipal Electrical Power Company (SGCC) produces and distributes power from coal, gas, integrated gasification combined cycle (IGCC), wind, and solar. The company was founded in 1985 and is based in Shanghai, China. Shanghai Municipal Electric Power Co., Ltd. operates as a subsidiary of State Grid Corporation of China.
Industry
Location
Products
SGCC has been a long-time user of NetIQ Identity Manager™ and NetIQ Access Manager™ to provide a unified identity solution for its 34,000 users. In recent years security has become a more serious issue, with criminals actively harvesting information from data breaches, leading to revenue losses.
Although SGCC had a security system in place to protect its business systems and unified identity systems, the solution wasn’t satisfactory, as Mr. Lu Shida, Director at SGCC, explains: “We couldn’t report on our data in a centralized manner, all the data was separated into different systems. That meant that when we found a security threat, our security administrators would need to examine the logs for each business system. This would take too much time; time in which a security breach could do untold damage to our business. This manual and time-consuming process meant we couldn’t meet our compliance regulations and were being charged penalties.”
SGCC needed a solution to help quickly identify data breaches and data theft. It also needed support in highlighting account password breaches and auditing so-called ‘zombie’ accounts; accounts which aren’t in active use, but which could pose a security risk. As an existing Micro Focus identity and access management customer, it was vital that the security solution integrates with the unified identity solution.
SGCC investigated the market to look for an agile, scalable, and high performance security solution which could be integrated with the Micro Focus identity and access system. SGCC evaluated NetIQ Sentinel, along with EMC eVision and IBM Qradar. EMC was discounted as the software is typically bundled in with EMC hardware; it doesn’t contain an auditing and reporting module, which was important to SGCC; and proved an expensive option. Though the IBM solution was of interest, SGCC was concerned about the lack of IBM support services in China and its ability to help deliver the project.
Mr. Lu Shida comments on the decision for Sentinel: “The native integration between Sentinel and our unified identity system allowed us to introduce many more security features without having to change our system architecture. The Sentinel components are scalable and can easily be extended to meet any future needs we might have. The Sentinel implementation was easy and we were quickly up and running.”
The solution creates daily reports for key application systems and it audits users who have bypassed the unified identity system so that alerts are sent to the security team. Quarterly, the system generates a report to highlight accounts which haven’t been used, so that these ‘zombie’ accounts can be closed down.
With 34,000 users to manage, understanding the “who, what, when, where, and how” of user system access is essential for controlling insider-based risks. Sentinel integrates security data with unique user identity information to help SGCC quickly identify risky access behaviors. To support SGCC’s compliance position, Sentinel simplifies the collection of security events to automate compliance audit and reporting functions and significantly reduce the complexity, time, and costs of locating and preparing data required by auditors.
Security has strengthened the entire SGCC infrastructure, while security management and labor costs are reduced, as explained by Mr. Lu Shida: “With the introduction of Sentinel, we were able to reduce our IT security staff from five to just two. Having the security data at our fingertips means we can respond 80 percent faster to any security breaches, and we have reduced our overall security incidents by 50 percent. This has led to a 90 percent reduction in economic losses caused by security breaches.”
He concludes: “With the Sentinel implementation, ensuring we are always security-compliant is so much simpler. Through the clear and transparent system, we can quickly identify and respond to any security threats. Monitoring and auditing is easy and through the vital integration between the Micro Focus solutions we can manage our ‘zombie’ accounts and have a deep understanding of user access rights for every application we run. Micro Focus has supported us throughout this process and we look forward to our continued partnership.”
The native integration between Sentinel and our unified identity system allowed us to introduce many more security features without having to change our system architecture.
With the introduction of Sentinel, we were able to reduce our IT security staff from five to just two. Having the security data at our fingertips means we can respond 80 percent faster to any security breaches, and we have reduced our overall security incidents by 50 percent.