Integrate Your HPE NonStop Servers with SailPoint Identity GovernanceWhether you need to provision users on one or multiple HPE NonStop servers, XYGATE Identity Connector (XIC) elegantly integrates your NonStop servers with your SailPoint enterprise solution. Achieve user governance, provisioning and reconciliation of HPE NonStop user accounts directly from SailPoint.
Ensuring employees have the correct access to the right business applications and IT resources is a critical requirement with which many companies struggle. Current solutions for requesting and managing user access are inefficient, manual, complex, and outdated. Governance is often an afterthought, leaving enterprises vulnerable to security risks and exposed to compliance issues.
Many organizations are adopting solutions like SailPoint to manage their technology assets. SailPoint, the market leader in Identity Governance and Administration, allows businesses to automate an ever-growing technology landscape while addressing security and compliance risk.
XYPRO and SailPoint have partnered to provide the first and only SailPoint certified integration for HPE NonStop servers. XIC for SailPoint provides complete control over who has access to your NonStop servers from your enterprise SailPoint instance.
SailPoint is a flexible identity governance software designed to provide efficient, all-encompassing visibility into who is doing what in your environment via rapid automation of identity and access management across the enterprise. Other benefits:
• Automated User Provisioning – Give users the access they need as they join an organization
• Access Request – Empower users with automated application and data access
• Access Certification – Always ensure users have the right access
• Integrate with CyberArk – The market leader in Privileged Access Management
• Free up Resources – eliminate time consuming manual processes that are costly and error prone
• Simplify Audit Activity
• And much more…
Why XYPRO and SailPoint?
SailPoint’s industry-leading, powerful access certifications, governance controls and logical workflows allow NonStop customers to take full advantage of the capabilities provided by SailPoint that have long been available for other platforms.
A common use case is user account provisioning and deprovisioning. With XIC, when an identity is provisioned through SailPoint, HPE NonStop is now an option to select. Once selected, the userid and all relevant attributes are automatically created on your HPE NonStop servers. No user intervention. No emails being sent to administrators and no manual processes. Similarly, when an identity is disabled through SailPoint, the corresponding account is immediately disabled on all NonStop servers on which it was provisioned.
When that identity is removed using SailPoint, the account is immediately removed from all NonStop servers, ensuring the removal of stale accounts, improving your relationship with your auditors, and strengthening your security procedures at the same time.
XYGATE Identity Connector is a lightweight, easy to deploy, executable using a micro service framework and standard SCIM 2.0 protocols. Simply configure the service XML with the specific HPE NonStop server properties and run the deployer. XYPRO’s NonStop Identity Connector deploys quickly in a JAVA Virtual Machine (JVM) on OSS. No other software is required. Installation is simple, quick and secure.
From Zero to Hero Integrate HPE NonStop with SplunkXYGATE Merged Audit (XMA), included with every HPE NonStop server since 2010, is an easy-to-use and integral security component of the HPE NonStop operating system. XMA collects data from application, system and audit logs into a single, normalized SQL database to generate reports and forward data to your log management or analytics solution. Exciting, right?
Without having to purchase any additional software, XMA communicates directly with enterprise solutions like Splunk “...to modernize your security operations and strengthen your cyber defenses”.
Data is collected from EMS, Safeguard, ACI BASE24, iTP Webserver, XYGATE installations, and much more. This data is aggregated, filtered, formatted, and selectively forwarded in real time. Did I mention you don’t have to try or buy any additional software? XMA is on your NonStop servers already! You own it!
Getting HPE NonStop server data to Splunk is easy. Whether your data is in native XMA/NonStop format, Common Event Format (CEF) or a custom format, it can be sent to multiple targets via TCP or UDP. The only thing to decide is which data you want to send.
XMA is installed and set up within minutes. Configuring XMA to forward data to Splunk takes even less time. All you need is the IP address, port and transport method (TCP or UDP). Pop those settings into the template inside of your XMA filters file and off you go.
Sit back, relax, and let your SOC monitor the log data from Splunk, while you enjoy modern, intelligent, and intuitive enterprise dashboards.
Want to read about XYPRO’s top 5 recommended reports?
5 Best Practices for HPE NonStop File Integrity MonitoringFile Integrity Monitoring (FIM) is a foundational requirement for security compliance frameworks to help identify unexpected or malicious activity across critical system files, diagnose unwanted or inadvertent changes, and shut down attacks before they have a chance to cause damage and disruption.
Organizations that collect and process credit card transactions and payments data must comply with the Payment Card Industry Data Security Standard (PCI DSS) requirements 10.5.5 and 11.5 that state organizations must make efforts to monitor file modifications and ensure the integrity of critical logs from within their Cardholder Data Environment (CDE).
On HPE NonStop servers, XYGATE SecurityOne (XS1) monitors and alerts when key files, objects, or system configurations are viewed, deleted, modified or ownership has changed. XS1 identifies who made the change and if the change put the system at risk or violated policy.
This intelligent form of real-time integrity monitoring simplifies monitoring activity and helps meet the strictest of compliance requirements while reducing noise generated by unnecessary alerts. Your resources are focused on the most critical security events.
Join XYPRO Technology’s Chief Product Officer & CISO, Steve Tcherchian, and Solutions Delivery Specialist, William Ferrara, as we demonstrate the Top 5 HPE NonStop File Integrity Monitoring use Cases.
Integrate Your HPE NonStop Servers With CyberArkXYPRO Technology Corporation, a leading cybersecurity solutions company, and CyberArk the global leader in privileged access management, presented a webinar on integrating HPE NonStop Servers.
The presenters are CyberArk’s Brian Carpenter, Director of Business Development, and Steve Tcherchian, Chief Product Officer and Chief Information Security Officer for XYPRO.
They discussed how the CyberArk Privileged Access Security Solution secures, manages, automates, and logs all activities associated with privileged access. They will detail current attack vectors and analyze real use cases on how your HPE NonStop servers can seamlessly integrate with CyberArk processes to help ensure complete visibility, traceability, automation, and security of your HPE NonStop servers.
“The largest security risks to any organization are the misuse or compromise of privileged credentials,” said Tcherchian. “Privileged accounts are a particular risk as they enable elevated access to your organization’s mission-critical data.”
“Because of the fear of ‘breaking something’ that could impact the ATM, POS, Mobile, or Payments infrastructure, many applications and systems were initially deployed, years ago, with passwords for privileged accounts that were and still are rarely rotated, shared, and improperly stored,” said Tcherchian. “This practice should be keeping CIOs and CISOs up at night, especially since there is something they can do about it.”
The compromise of privileged accounts is connected to nearly all targeted attacks. Proper credential storage and management are paramount for responsible risk mitigation. If you are still manually managing privileged access, you’re not doing all you can to protect your systems. It’s not news that anything manual is resource-intensive, error-prone, and leaves gaps in your security.
A Privileged Access Management solution provides the ideal capabilities for automating these activities. In this webinar, XYPRO and CyberArk will discuss how the HPE NonStop server integration can help with visibility, traceability, automation, and security.
Protect Your Applications with Multi Factor AuthenticationVIRTU-NUG Session 1: June 10, 2020
Detecting Authentication ThreatsThere are nearly a billion fraudulent sign-in attempts per day across the internet. Most of these rely on guessing common usernames and passwords, dictionary and brute force attacks. A new technique for hackers called credential stuffing takes a massive database of usernames and passwords, usually from online service providers’ mega-breach, and “stuffs” those credentials into logins to other sites and services. Because most people reuse the same username/password combination across multiple sites, the attacks are often successful and have the ability to quickly compromise multiple accounts.
HPE NonStop servers help run the global critical infrastructure. Detecting and alerting when fraudulent attempts occur is a must-have in combating these threats to protect the world’s credit card Payments, Mobile Telco, POS networks, etc.
XYGATE SecurityOne™ (XS1)In this webinar, we’ll discuss how XYGATE User Authentication (XUA ships with every NonStop server) events logs feed critical data to XYGATE SecurityOne (XS1), XYPRO’s Risk Management and Threat detection platform to detect compromised accounts and separate actionable events from sifting through the “noise” so you know in real-time if someone or something is attempting to gain unauthorized access to your systems
Protect Your Remote Workforce with Multi factor AuthenticationAll it takes is one compromised account to one legacy application to cause a data breach!
According to Microsoft, 81% of data breaches occur because of weak, default, or stolen credentials and 99% of those attacks can be blocked by implementing Multi-Factor Authentication (MFA).
MFA is an authentication method where a user is granted access only after successfully presenting two or more of the following pieces of information:
Something you know (password)
Something you have (security token)
Something you are (biometrics)
With the unfortunate increase in COVID-19 phishing scams targeting your remote workers, isolated from their day-to-day environments, there is no better time to implement multi-factor authentication across your critical applications, servers, and services.
Join XYPRO’s Chief Product Officer & CISO, Steve Tcherchian to learn how to leverage XYGATE User Authentication (XUA). Already on your HPE NonStop servers and ready to use with no additional software or infrastructure investment, XUA provides strong, industry-standard, multi-factor authentication. XUA extends HPE NonStop security by integrating with enterprise authentication solutions like Microsoft Active Directory, RSA, Google Authenticator, and many others.
Now, XUA elegantly delivers those same, rock-solid protections to your NonStop applications.
XYPRO Webinar: Proactive Risk Management, A Real Time View of Your SecurityThe average security breach takes almost 200 days to detect and costs an organization $4M. What can you do to minimize your exposure.
XYPRO has been protecting Mission Critical Environments for more than 35 years and is relied upon by many of the world’s largest companies. With innovation and thought leadership in each of the key compliance, audit, identity, access and risk management areas, XYPRO now expands its expertise with a fully agnostic security intelligence and risk management platform.
XYGATE SecurityOne’s patented technology reduces the time it takes to detect a potential breach and prevent those breaches from negatively impacting your business.
Join XYPRO’s Chief Product Officer and Chief Information Security Officer, Steve Tcherchian, CISSP, for a comprehensive overview of the security risks and vulnerabilities facing your business every day. Learn how to utilize the next generation of threat detection that provides actionable data and real time analytics to mitigate risks quickly. This one-hour session will provide the strategy you need to protect your organization and mission critical data from a catastrophic security breach.