News & Case Studies

Our expertise is sought out for insight in publications worldwide. Our subject matter experts regularly lend their viewpoint to the news of the day that affects organizations and consumers alike.

Generic filters
Filter by Categories
PartnerOne Continues Investment in AI with XYPRO Applied AI Technology

PartnerOne Continues Investment in AI with XYPRO Applied AI Technology

RIVERSIDE, Calif., Feb. 19, 2026 /PRNewswire/ -- XYPRO, a PartnerOne company and market leader of security and compliance solutions for mission-critical systems, introduces Lionel, an internal AI assistant designed to unlock institutional knowledge across the HPE Nonstop Compute ecosystem. This marks a major milestone in PartnerOne's applied artificial intelligence strategy. Over the past year, XYPRO has focused…
XYPRO and CAIL Announce Partnership and Deliver First-of-Its-Kind Multi-Factor Authentication Integration for HPE Nonstop

XYPRO and CAIL Announce Partnership and Deliver First-of-Its-Kind Multi-Factor Authentication Integration for HPE Nonstop

SIMI VALLEY, Calif., Dec. 11, 2025 /PRNewswire/ -- XYPRO, a leading provider of mission critical cybersecurity, compliance and enterprise integration solutions, and CAIL, the standard for enterprise emulation, have completed the first and only integration that enables OpenID Connect (OIDC) multifactor authentication directly from CAIL emulator sessions for HPE Nonstop systems. This gives organizations the ability…
From Visibility to Action: Bringing HPE Nonstop into Enterprise Risk Management

From Visibility to Action: Bringing HPE Nonstop into Enterprise Risk Management

For years, vulnerability management has been framed as a visibility problem. If you can see your vulnerabilities, the thinking goes, you can manage the risk. That assumption no longer holds. Most enterprises today aren’t struggling to collect vulnerability data. They’re struggling to operationalize it — to prioritize risk consistently across platforms, enforce remediation, and defend…
Quantum Computing and the Ticking Clock: Why Mission-Critical Workloads Can’t Ignore This Risk

Quantum Computing and the Ticking Clock: Why Mission-Critical Workloads Can’t Ignore This Risk

If you’re responsible for mission-critical workloads—whether that’s processing payments, running a power grid, safeguarding patient records, or securing government communications—your world revolves around one concept - Trust.
XYPRO SQLXPress Now Included in HPE’s Database Bundle

XYPRO SQLXPress Now Included in HPE’s Database Bundle

For those already leveraging NonStop SQL, SQLXPress is a powerful, easy-to-use solution to streamline database operations. And for organizations considering NonStop SQL, the enhanced capabilities of SQLXPress make it an even more compelling choice.
Resilience and Adaptability –  Evolving Your Security with Confidence!

Resilience and Adaptability – Evolving Your Security with Confidence!

We’re not just securing systems—we’re securing the entire backbone of our organizations and in most cases, our economies. It's time to challenge what’s familiar and commit to a new era of security thinking that doesn’t just react but anticipates, adapts, and ensures resilience at every level.
From Reactive to Preventive: How Real-Time Monitoring Powers Your Modern IT Strategy

From Reactive to Preventive: How Real-Time Monitoring Powers Your Modern IT Strategy

Continuous, real-time monitoring plays an essential, though often underestimated, role in the success of modern IT strategies.
PCI DSS 4.0 Compliance : A Comprehensive Guide  (XYPRO Education)

PCI DSS 4.0 Compliance : A Comprehensive Guide (XYPRO Education)

Pre-Conference Education - "Mastering PCI DSS 4.0 Compliance for HPE NonStop: A Comprehensive Guide"

Instructor: Rob Lesan, Senior Solution Architect, XYPRO
The Cyber Shield: A Blueprint for Digital Security and Resilience

The Cyber Shield: A Blueprint for Digital Security and Resilience

The Ransomware Menace Ransomware is a concern across all industries.  High-profile attacks make headlines and cause substantial disruptions. The reason these attacks are successful is often inadequate monitoring and a broad attack surface. Many organizations fail to implement best practices such as multi-factor authentication (MFA), change management, and proper access controls. This lack of stringent…

Get Instant Access to Security News & Advice

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation