Submit Search
Upload
HIMSS2014 Conference - Customer Slides
•
Download as PPTX, PDF
•
0 likes
•
271 views
Michele Hudnall
Follow
Looping slides/video to be used at the HIMSS 2014 Conterence
Read less
Read more
Technology
Report
Share
Report
Share
1 of 11
Download now
Recommended
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
accenture
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
NetIQ
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
Accenture Operations
Identity, Security and Healthcare
Identity, Security and Healthcare
NetIQ
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
Gene Kim
How 24 hour fitness security platform investment contributes to healthy security
How 24 hour fitness security platform investment contributes to healthy security
3VR Inc.
VITAS Innovative Healthcare
VITAS Innovative Healthcare
Connected Futures
Recommended
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ Directory & Resource Administrator Helps Kindred Healthcare Achieve Com...
NetIQ
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
accenture
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
NetIQ
Technology Factor: Accelerating Your Journey to As a Service
Technology Factor: Accelerating Your Journey to As a Service
Accenture Operations
Identity, Security and Healthcare
Identity, Security and Healthcare
NetIQ
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
Gene Kim
How 24 hour fitness security platform investment contributes to healthy security
How 24 hour fitness security platform investment contributes to healthy security
3VR Inc.
VITAS Innovative Healthcare
VITAS Innovative Healthcare
Connected Futures
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based enterprise 20
Kasia Szkuta
Cloud Methodology and Facts
Cloud Methodology and Facts
CSI Solutions
Technology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Technology
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Technology
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Dell World
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Operations
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Symantec
Security Technology Vision 2016
Security Technology Vision 2016
Accenture Technology
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching Engine
Massimo Bertaccini
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
Mike Davis
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
Citrix
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
accenture
Interested in working at Druva?
Interested in working at Druva?
Druva
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
Domenico Catalano
How to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven culture
Shahid Shah
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
SteveAtHPE
HealthCare Heal Thyself - The Patient as the hub of a new health system
HealthCare Heal Thyself - The Patient as the hub of a new health system
Mark Scrimshire
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
Peak 10
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
NetIQ
adventist-health-en
adventist-health-en
Shawn Mayhew
More Related Content
What's hot
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based enterprise 20
Kasia Szkuta
Cloud Methodology and Facts
Cloud Methodology and Facts
CSI Solutions
Technology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Accenture Technology
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Accenture Technology
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Dell World
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Operations
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Symantec
Security Technology Vision 2016
Security Technology Vision 2016
Accenture Technology
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching Engine
Massimo Bertaccini
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
Mike Davis
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
Citrix
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
accenture
Interested in working at Druva?
Interested in working at Druva?
Druva
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
Domenico Catalano
How to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven culture
Shahid Shah
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
SteveAtHPE
HealthCare Heal Thyself - The Patient as the hub of a new health system
HealthCare Heal Thyself - The Patient as the hub of a new health system
Mark Scrimshire
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
Peak 10
What's hot
(20)
Legal challenges of cloud based enterprise 20
Legal challenges of cloud based enterprise 20
Cloud Methodology and Facts
Cloud Methodology and Facts
Technology Vision 2016 - Infographic
Technology Vision 2016 - Infographic
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
Building Future-Ready Healthcare IT Platforms: Get To The Cloud
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Security Technology Vision 2016
Security Technology Vision 2016
Cryptolab Presentation: Crypto Searching Engine
Cryptolab Presentation: Crypto Searching Engine
Cloud adoption in the EU - and analyst's perspective (revised)
Cloud adoption in the EU - and analyst's perspective (revised)
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
Limit Your Vulnerabilities: Assess. Develop. Protect.
Limit Your Vulnerabilities: Assess. Develop. Protect.
Interested in working at Druva?
Interested in working at Druva?
Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
How to emrace risk-based Security management in a compliance-driven culture
How to emrace risk-based Security management in a compliance-driven culture
HPE Security Keynote from Istanbul 20th Jan 2016
HPE Security Keynote from Istanbul 20th Jan 2016
HealthCare Heal Thyself - The Patient as the hub of a new health system
HealthCare Heal Thyself - The Patient as the hub of a new health system
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
Similar to HIMSS2014 Conference - Customer Slides
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
NetIQ
adventist-health-en
adventist-health-en
Shawn Mayhew
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
richard_turner
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
NetIQ
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
bmcmenemy
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
bmcmenemy
8 Best Practices for Enabling Employee-Owned Smartphones
8 Best Practices for Enabling Employee-Owned Smartphones
Intel IT Center
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
ThousandEyes
Internet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Gosia Fraser
Securing the digital front door
Securing the digital front door
Ryan Coleman
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
The Digital Insurer
Cyber Cops: Safeguarding Your Online Presence
Cyber Cops: Safeguarding Your Online Presence
Cybercops
Fragile to agile in 24 months: Doing "IT" differently at the NHS
Fragile to agile in 24 months: Doing "IT" differently at the NHS
nexthink
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
Netskope
Turn Your C-Suite Into Your A-Team
Turn Your C-Suite Into Your A-Team
Angela Tuminello
Hello__We_are_ITS
Hello__We_are_ITS
Joshua Bernson
Hello. We are ITS
Hello. We are ITS
Andrew Saylor
Netiq css huntington_bank
Netiq css huntington_bank
NetIQ
Revenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data deluge
Shahid Shah
complywise_newsletter2009
complywise_newsletter2009
Neil Ridsdale
Similar to HIMSS2014 Conference - Customer Slides
(20)
Central Denmark Region Strengthens Administrative Security with Identity Mana...
Central Denmark Region Strengthens Administrative Security with Identity Mana...
adventist-health-en
adventist-health-en
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
A Smarter, more Secure Internet of Things from NetIQ at Gartner IAM Summit 2015
8 Best Practices for Enabling Employee-Owned Smartphones
8 Best Practices for Enabling Employee-Owned Smartphones
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Assure Patient and Clinician Digital Experiences with ThousandEyes for Health...
Internet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Securing the digital front door
Securing the digital front door
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
Plum Benefits Pvt. Ltd – Insurtech Innovation Award 2024
Cyber Cops: Safeguarding Your Online Presence
Cyber Cops: Safeguarding Your Online Presence
Fragile to agile in 24 months: Doing "IT" differently at the NHS
Fragile to agile in 24 months: Doing "IT" differently at the NHS
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
Turn Your C-Suite Into Your A-Team
Turn Your C-Suite Into Your A-Team
Hello__We_are_ITS
Hello__We_are_ITS
Hello. We are ITS
Hello. We are ITS
Netiq css huntington_bank
Netiq css huntington_bank
Revenue opportunities in the management of healthcare data deluge
Revenue opportunities in the management of healthcare data deluge
complywise_newsletter2009
complywise_newsletter2009
More from Michele Hudnall
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
Michele Hudnall
2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDB
Michele Hudnall
2005-0801 - NetworkWorld - ITIL
2005-0801 - NetworkWorld - ITIL
Michele Hudnall
2006 04 - Solution Flyer - Energy Industry
2006 04 - Solution Flyer - Energy Industry
Michele Hudnall
2017 - Michele Hudnall Letter and Resume
2017 - Michele Hudnall Letter and Resume
Michele Hudnall
BrainShare 2014 - Partners
BrainShare 2014 - Partners
Michele Hudnall
2011 07 Cloud Service Contracts Get Stormy Final
2011 07 Cloud Service Contracts Get Stormy Final
Michele Hudnall
Business Service Management Made Easy!
Business Service Management Made Easy!
Michele Hudnall
More from Michele Hudnall
(8)
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
2010-07 - Datamation - Top 10 Reasons Cloud Computing Deployments Fail
2008-0207 - DatacCenter Journal - Myths of the CMDB
2008-0207 - DatacCenter Journal - Myths of the CMDB
2005-0801 - NetworkWorld - ITIL
2005-0801 - NetworkWorld - ITIL
2006 04 - Solution Flyer - Energy Industry
2006 04 - Solution Flyer - Energy Industry
2017 - Michele Hudnall Letter and Resume
2017 - Michele Hudnall Letter and Resume
BrainShare 2014 - Partners
BrainShare 2014 - Partners
2011 07 Cloud Service Contracts Get Stormy Final
2011 07 Cloud Service Contracts Get Stormy Final
Business Service Management Made Easy!
Business Service Management Made Easy!
Recently uploaded
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Overkill Security
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
The Digital Insurer
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
sammart93
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
UiPathCommunity
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
Rustici Software
Recently uploaded
(20)
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
HIMSS2014 Conference - Customer Slides
1.
Identity, Security and
Healthcare: Customer Success
2.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.2 “Now that we do not have to input employee profile information manually, we are able to add new recruits to the system up to five times faster than before, considering that since we have adopted Identity Manager we have grown from 3,000 to 15,000 users, you can imagine what an indispensable advantage this is!” Jerry van Rekom Head of ICT, Carante Groep
3.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.3 “Without this type of security solution in place, a user could log in using someone else's credentials to access records they shouldn't be and there would be no way of verifying who was actually in the system, SecureLogin helps prevent those kinds of problems.” Nicholas Ivon Director of Information Systems, Clark & Daughtrey
4.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.4 “When we update some aspect of a user’s information, the change is automatically and instantly propagated to all connected systems...” Gianfranco Scocco IT Manager, Coopservice Group
5.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.5 “The biggest benefit with SecureLogin has really been the reduction in user frustration. We are no longer at odds with our users over moving forward with advanced clinical applications because they know we can continue to provide them with simple, easy access” Jim Hauenstein CIO , Enloe Medical Center
6.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.6 “It would be very difficult to live without NetIQ Directory and Resource Administrator.” Kelley Ealy Security Analyst, Kindred Healthcare
7.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.7 “Identity Manager will save us huge amounts of time and effort, and will also ensure that new users are given access to the information they need right away.” Eppe Wolfis IT Manager, Lentis
8.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.8 “The NetIQ solution gives the Trust the tools to work more efficiently and ensure only authorized employees gain access to confidential information. Ultimately, this enables us to provide a better service to our patients and make savings, which we can spend on developing new health services.” Daniel Grogan i-services Supervisor, The Mid Yorkshire Hospitals NHS Trust
9.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.9 “After exploring a number of solutions, we determined that NetIQ could deliver the best integrated and automated solution for implementing IT controls, delegated administration, comprehensive reporting and troubleshooting. With NetIQ, we can standardize on a single solution and increase reliability and accuracy while reducing our own workload— ultimately enabling us to deliver maximum value to our customers.” Ron Piper Technology Services, Prime Care Technologies
10.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.10 “NetIQ Group Policy Administrator beats the daylights out of the native tools.” Guy Pierre Network Administrator, Good Samaritan Hospital
11.
© 2014 NetIQ
Corporation and its affiliates. All Rights Reserved.11 +1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) info@netiq.com NetIQ.com Worldwide Headquarters 1233 West Loop South Suite 810 Houston, TX 77027 USA http://community.netiq.com
Download now