News & Case Studies

Our expertise is sought out for insight in publications worldwide. Our subject matter experts regularly lend their viewpoint to the news of the day that affects organizations and consumers alike.

Generic filters
Exact matches only
Filter by Categories
XYGATE Merged Audit now supports both BASE24 & BASE24-eps!

XYGATE Merged Audit now supports both BASE24 & BASE24-eps!

The ability to track and review all activity on the HPE NonStop server is a requirement that is no small task as businesses must quickly identify suspicious activity. To help their customers meet these security standards, HPE bundles XYGATE Merged Audit (XMA) with the NonStop Operating System. XMA is an easy to use product that…
The Shelf is for the Elf, Not Security

The Shelf is for the Elf, Not Security

Businesses are managing more data than ever—and spending more money, year after year, to protect that data. Yet spending money on security doesn’t equate to actually being secure. A recent study by Osterman Research discussed how prevalent the “shelfware” problem is becoming. The report showed that businesses spent an average of $115 USD per user…
Audit all security-related activity & events. #1 – Top 10 List

Audit all security-related activity & events. #1 – Top 10 List

Because high-availability and fault-tolerant systems need strong security Finally, we’ve made it to the #1 spot on our Top 10 list! Before we get to that, though, just a reminder that the first nine HPE NonStop server security fundamentals cover some incredibly important aspects of NonStop server security and are vital for protecting your mission…
Continuously Monitor Security Compliance: #2 – Top 10 List of NonStop Security Fundamentals

Continuously Monitor Security Compliance: #2 – Top 10 List of NonStop Security Fundamentals

Because high-availability and fault-tolerant systems need strong security Alright, so let’s assume that you’ve followed the best practices described in items #3 to #10 of XYPRO’s Top 10 NonStop Security Fundamentals, as well as security recommendations from HPE and other sources, and you’ve established strong security procedures for your HPE NonStop system—how can you actually…
Protect Sensitive Data: #3 – Top 10 List of NonStop Security Fundamentals

Protect Sensitive Data: #3 – Top 10 List of NonStop Security Fundamentals

Because high-availability and fault-tolerant systems need strong security Over the last several months, we’ve covered some very important concepts in our Top 10 countdown of NonStop security fundamentals— you can review items #4 to #10 on XYPRO’s website and LinkedIn page. Now, we’ve reached #3 on the list. Throughout much of the first seven security…
XYPRO NonStop Security Fundamentals Top 10 List – #4

XYPRO NonStop Security Fundamentals Top 10 List – #4

Because high-availability and fault-tolerant systems need strong security Alright, we’ve reached #4 on our list of Top 10 NonStop Security Fundamentals— items #5 to #10 are posted on XYPRO’s website and LinkedIn page. Previously, in the #5 entry, we discussed how to strengthen access management using Role-based Access Control (RBAC). RBAC was about managing users’ access…
XYPRO NonStop Security Fundamentals Top 10 List – #5

XYPRO NonStop Security Fundamentals Top 10 List – #5

Because high-availability and fault-tolerant systems need strong security Okay, so now we’re to the top five items on our list—items #6 to #10 are posted on XYPRO’s website and LinkedIn page. Throughout the earlier items on our Top 10 List, the concept of access control came up rather frequently (either directly or indirectly), so let’s…
XYPRO NonStop Security Fundamentals Top 10 List – #6

XYPRO NonStop Security Fundamentals Top 10 List – #6

Because high-availability and fault-tolerant systems need strong security Over the past few months XYPRO has begun counting down our Top 10 NonStop Security Fundamentals and now we’ve reached the halfway point on our list. Before we get to the #6 item though, let’s recap the list to-date: #10 Secure the default system access settings #9…
XYPRO NonStop Security Fundamentals Top 10 List – #7

XYPRO NonStop Security Fundamentals Top 10 List – #7

Because high-availability and fault-tolerant systems need strong security Recent studies have shown that hackers (both internal and external) often use relatively simple attack methods and that it’s as important as ever to follow basic security best practices. Therefore, it makes sense that the first three items in our Top 10 list were about establishing a…

Get Instant Access to Security News & Advice

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation