HPE NonStop News

Registration for the 2019 NonStop Technical Boot Camp is OPEN.

Take advantage of Early Bird savings until October 1st, 2019. Click here to save $300 on #NonStopTBC19 registration now!

The 2019 NonStop Technical Boot Camp will begin with cutting edge deep-dive pre-conference seminars on Sunday hosted by the leaders of NonStop innovations and solutions, and will follow with three days of breakout sessions, keynotes, and networking receptions. Meet and learn from the developers, engineers, and executives that are leading the global NonStop community.

November 3-6, 2019
Hyatt Regency SFO
Burlingame, California USA


earlybird.png

Early Bird Registration Open

Take advantage of Early Bird savings! Save $300 on registration until October 1st.

Register Now


sponsops.png

Secure Your Sponsorship Today

This year's event will attract over 400 members of the global NonStop community for four days of networking and learning with NonStop engineers, executives, partners and customers at the Hyatt Regency San Francisco Airport!

View Sponsorship Opportunities


#NonStopTBC19 Sponsors

 
 

The Connection magazine

Published six times per year and available only to Connect members, The Connection is the premier NonStop user-oriented technical magazine. It offers articles and columns about technical issues and new industry developments as well as the latest information on Connect activities.

Subscribe Now


Gravic-40th-logo.jpg

Gravic Celebrates its 40th Anniversary!

The year 2019 is our 40th year of business and we reflect on the past and look forward to the future. We are making progress toward our core purpose of Improving, and our ability to improve society is manifest in the numerous industry-leading and household-name companies that rely on HPE Shadowbase software. Please visit ShadowbaseSoftware.com for additional information on how our enterprise data replication solutions can solve your company’s business continuity, data integration and synchronization, application integration, and real-time business intelligence challenges. Here’s to the next 40 years!

 
 
csplogo.png
 

Multi-Factor Authentication on Nonstop Made Easy with CSP AUTHENTICATOR+™

 

Multi-factor authentication has become vital in ensuring secure access to systems. It provides superior safety measures over easily compromised single password methods and is also an important requirement to comply with regulations such as PCI 8.3 and GDPR.

Any remote user or non-console admin user that has access to the cardholder environment must include multi-factor authentication. From legacy Pathway applications to the latest RESTful interfaces, effective MFA must be provided for users and applications that have the potential to access sensitive data. 

The new CSP Authenticator+™ supports both primary and secondary authentication for NonStop. It provides a  RESTful interface which supports multi-factor authenticated logins on NonStop systems. CSP Authenticator+ resides on the NonStop Platform and uses an OSS “bridge” to connect to the RESTful interface of the CSP Authenticator+ web server.

Learn more about CSP Authenticator+



CSP - Compliance at your Fingertips™

For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit wiki.cspsecurity.com

 

We Built the Wiki for NonStop Security ®

The CSP Team  +1(905) 568 - 8900

 
 
multibatchlogo.png

The pre-eminent HPE NonStop Batch Scheduler

MultiBatch version 9.5 is now available; part of a continuous development cycle for just one of our NonStop, Enterprise and Payments monitoring solutions.

For 30 years, our customers have utilised this pre-eminent batch scheduler to improve their SLAs and batch scheduling run times, in some cases, reducing their overnight batch schedule run time by up to 6 hours!

This customer, along with all of our other banking, central bank, securities customers have complex and serious mainframe-class schedule requirements. Therefore, not for them the requirement and skillsets to maintain expensive JCL and TACL configurations when they can use the MultiBatch Pathway and/or GUI.

Fully secured, easy to use, variety of scheduling mechanisms and powerful parallel processing. Importantly, batch recovery in seconds (when site-swap situation occurs) enabling the MultiBatch schedule to be recovered up to the point of failure. No need to wonder where the batch schedule is up to, nor maintain TACL scripts, spreadsheets, SQL tables to record the batch status – all provided for you in a single GUI interface, recording batch schedules in real-time, ready for any site-swap and recovery.

So, with the old…

CSPPicture1.png
 

…and in with the new (real-time batch status, being a small but important part of the MultiBatch GUI)…

CSPPicture2.png
 

For further information, please contact Insider Technologies at:

https://www.insidertech.co.uk/products/multibatch

hello@insidertech.co.uk

+44 (0) 161 876 6606

 
Xyprologo.png

Proactive Security and Threat Detection - it’s not That SIEMple

Real-time threat detection is an indisputably critical element for maintaining operational integrity across a rapidly changing mission critical environment. Knowing when your system has been compromised quickly can make the difference between a controllable incident and a headline grabbing, catastrophic data breach.

Most organizations cannot assign the time necessary to proactively monitor their environment.  Investigating potential incidents is a manual and time-consuming process requiring resources to collect, correlate and search through multiple, disparate logs looking for the answer to whether something is a real incident. It’s looking for a needle in a haystack while more hay is piling on.  To do this very heavy lifting, most rely on Security Incident Event Management (SIEM) systems - such as SPLUNK or IBM QRadar.

The truth is, a SIEM-only reliant security strategy is unsustainable and leads to a false sense of security that your SIEM is the ultimate authority on security threat detection and alerts. Unfortunately, SIEM technology is limited by the types of data and devices it is aware of on which it can alert. More…

 
tributary-logo-black.png

HCP (Hitachi Content Platform) Gartner Peer Review!

Take a moment to read this Gartner Peer Review pertaining to Hitachi Vantara Distributed File Systems and Object Storage.

In this informative peer review, the author is quoted “(The Hitachi Content Platform Object Storage Environment) Is quick to stand up, fantastically versatile, and performs exactly as advertised”. Very flattering commentary indeed! In fact this particular reviewer gave HCP an overall rating of 5 out of 5, read the text to find out why.

It’s important to remember that Tributary Systems, is a valued Hitachi partner, and as such, Tributary Systems’ STORAGE DIRECTOR, enhances Hitachi Cloud Object Storage (COS) performance in both active backup and archive use cases. STORAGE DIRECTOR increases read and write speeds to HCP by 5X on average when compared to directly connecting a backup application like Commvault, NetBackup or Veeam to ICOS. In addition, by caching backup data, Storage Director also reduces or eliminates ingress/egress charges for public clouds. We are pleased to demonstrate this in customer environments in a proof of concept (POC).

In addition, no one is more concerned about data security than Tributary Systems. STORAGE DIRECTOR provides AES 256 bit data-at-rest and data-in-flight encryption capable of working with both an enterprise key management systems as well as generating its own keys.

Check out our website at www.tributary.com for complete details on Storage Director, Cloud Object Storage, and data security.

 
cfo-logo-black.png

Living on the Edge (of computing and security)

 

With the advent of Edge computing, where computing is largely or completely performed on distributed device nodes, the ubiquitous question about security and compliance is becoming a central focus of the debate. In particular for Internet of things (IoT) devices, data comes in from the physical world via various sensors, which creates its own unique set of security and compliance challenges.

Big Data Analytics: the Top 3 Security and Compliance Challenges of 2019There is an incredible number of people, devices, and sensors that generate, communicate, and share data. Analysing this data enables organisations to gain customer insights, develop better applications, and improve efficiency and effectiveness – or simply make better decisions.

While these insights are bringing many benefits to companies, there are also increasing concerns over the trustworthiness of this data as well as the security and compliance challenges regarding the way it is used. 

We need more data. Or do we?
Almost everything we use today creates data – from our smartphones to connected TVs, to our smartwatches.

According to IDC, by 2025, 175 Zeta Bytes (1021) of data will have been created worldwide.

At the organisational level, this also includes a large amount of data that was accumulated internally as well as that which comes from complex infrastructure.

Much of this data, such as emails, spreadsheets, and word documents, is held in unstructured form. Also, a lot of data is created in an ad hoc manner which causes significant problems because it is hard for an organisation to know what exists and where it is stored. 

And looking at the term big data from a broader perspective, much more potential comes from utilising data from external sources like social media, publicly available data from government databases, and data from other organizations.

The combination of data sets holds a lot of value when gaining insights or trying to make decisions based on consumers preferences.

Here are the top 3 challenges for big data security and compliance in 2019:

  • Challenge 1 – Ethics and Compliance. Organisations have to comply with regulations and legislation when it comes to collecting and processing data to protect PII.

  • Challenge 2 – Poor Data Management. Caused by a lack of clear ownership for big data and poor control over its lifecycle.

  • Challenge 3 – Insecure Infrastructure. Security by design is required to avoid additional vulnerabilities from IoT devices.

Read More
 
N2TUG_Logo.jpg
 

N2TUG Save the Date!

N2TUG presents Devops for CI/CD: Deliver Changes with Confidence
Thursday, June 27th, 2019.

To Register now, click here to open your email client, and create an email to send to us so we can register you. Please follow the instructions at the bottom of the email before hitting ‘Send’.  If your email client doesn’t support ‘mailto’ links, please reply to bhonaker@xid.com with

Subject:  Registration for N2TUG 2019: Devops for CI/CD: Deliver Changes with Confidence
Book now at The Gaylord Texan Resort: https://book.passkey.com/go/hpetugmeeting