Find out more about us at
www.tandemworld.netSponsored By
Gold Sponsor
NonStop ™ Newsletter for November 2019 Sponsored By Gold Sponsor ________________________________________ Click an Article to See more Contents Register Now for Upcoming TBC Recap Webinar No Smoke.... XYPRO’s 2020 Cybersecurity Predictions - Add 2 Factor Authentication and Machine Learning to Your Plans! Gravic Publishes New Video on HPE Shadowbase Business Continuity Monitoring Those Poorly Structured EMS Events OpenAPIs at the heart of OmniPayments Multi-Factor Authentication on Nonstop Made Easy with CSP AUTHENTICATOR+™ XYPRO Calendar NSU40 SIG Hosts First Annual Hackathon at Connect’s 2019 HPE NonStop Technical Boot Camp
|
|||||||||||
Register Now for Upcoming TBC Recap Webinar
Missed Boot Camp this year or didn't get a chance to see NuWave's new payment demo? Not to worry! NuWave and TIC Software have you covered with their upcoming webinar "TBC Recap: Get REST Access to Databases and Payment Applications". This session will be held in just a couple of weeks, so register now to secure your spot!
No Smoke ......
No smoke, no mirrors, no snake oil. Just NonStop Services to suit you. Join BrightStrand at the BITUG Little SIG 2019
XYPRO’s 2020 Cybersecurity Predictions - Add 2 Factor Authentication and Machine Learning to Your Plans! Steve Tcherchian, CISSP Chief Product Officer, CISO XYPRO Technology Corporation As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn't been said before - that’s a tall order! The reality is, what we predicted would be important in 2019, 2018 and even 2017 - is still applicable. A lot of what we predicted back then was never properly addressed and remains a risk today - credential theft and attacks targeting privileged user logins are more prevalent than ever. Currently, the best way to combat these types of attacks is to use 2 factor authentication. Use it for everything. There is no simpler way to state it - but this is still not being done. Risk will continue to increase in 2020. I cover this and other cybersecurity predictions for 2020 in the list below.
Machine Learning (ML) and Artificial Intelligence (AI) Will be Key to Combating Threats – We’ve all heard security vendors discuss ML and AI as features within their products for years. Up until recently, this wasn’t much more than a marketing gimmick. We have not begun to scratch the surface of the capabilities of ML and AI to combat threats. There is a lot of skepticism that has existed for years, but in 2020 we will have no choice. The amount of data being generated is increasing exponentially and the only way to keep up and identify threats is to allow machines to churn through data and trust they will detect the right concerns - then take appropriate action to combat the threat. We are going to see a lot of research, funding and effort invested in these methods. We need to get comfortable with the technology so it can be adopted on a wider scale and evolve. We have no choice. It’s the only way to monitor security going forward. Attacks on the Edge will Increase – the proliferation of IoT devices, sensors, endpoints and a remote workforce is fulfilling our need for faster information in a mobile method. Edge computing enables us to generate and analyze data for decision making faster than ever before. Research firm IDC estimates at least…… Click Here to Continue Reading
Shadowbase Business Continuity Video We hope that you find this video interesting and informative. Please share it with your colleagues and let us know if you have any questions or comments. This video is also available with the following subtitles: HPE Shadowbase Team Presents at Connect HPE NonStop Technical Boot Camp
Opening Night Reception
First TBC Hackathon
Diane Funkhouser Receiving the Connect HPE Recognition Award
NSU40 Pub Crawl
We greatly enjoyed attending the 2019 Connect HPE NonStop Technical Boot Camp (TBC) held November 3-6 at the Hyatt Regency San Francisco Airport Hotel and spending time with many of you. Notable highlights include the Sunday evening Hackathon and Reception; various keynote speakers, including Jeff Kyle (VP & GM HPE Mission Critical Systems) and Elvis Chan (FBI Supervisory Special Agent); the “Geeks who Drink” trivia; and the NSU40 Pub Crawl. We were also pleased that Diane Funkhouser was honored with the Connect HPE Recognition Award. The Hyatt Regency did an excellent job preparing the facilities and serving attendees with delicious food and desserts throughout the show. We thank Connect and the HPE staff for hosting a terrific gathering. We shared ideas regarding how the HPE Shadowbase product suite can provide solutions to your most pressing business issues. HPE Shadowbase was featured in several presentations:
· Protect Your Business in a World of Uncertainty, Mark Pollans, WW Sr. Product Manager, HPE · Implement Migrations with Ease using HPE Shadowbase Zero Downtime Migrations (ZDM), Paul Holenstein, Executive Vice President, Gravic · Customer Testimonial – Using HPE Shadowbase Software in a BASE24-eps™ Migration, Rick Stather, Senior System Consultant & Team Leader, TCM · Don’t Procrastinate – Validate! Rick Stather, Senior System Consultant & Team Leader, TCM · HPE Shadowbase Mission-Critical Use Case Solutions and Product News, Paul J. Holenstein, Executive Vice President, and Paden R. Holenstein, Marketing Specialist, Gravic If you are interested in discussing our presentations’ content or would like us to present these or other HPE Shadowbase topics to your staff, please contact us. Hewlett Packard Enterprise globally sells and supports Shadowbase solutions under the name HPE Shadowbase. For more information, please contact your local HPE Shadowbase representative or visit our website.
Please Visit Gravic at these Upcoming 2020 Events
Monitoring Those Poorly Structured EMS Events
Your application is generating poorly structured events to the Event Management Service (EMS) and because they’ve not been properly formatted, these events arrive into EMS as, in a lot of cases, text events. When they are written directly to EMS, unformatted, instead of as a series of tokens, EMS recognises this and creates a default event on behalf of the originating process, all of them with identical token settings. The event buffer includes the same SSID and event number - TANDEM.12.0 512 – but with no meaningful subject, manager or process^descriptor. Filtering of this information is at best an expensive processing exercise and sometimes it can be impossible. The same filtering and monitoring problem occurs where the application issues the same event for different situations, e.g. APP.1.0 1000 for a normal event but is also issued for a failure event. These may be acceptable and something that doesn’t overly concern you but for important applications which affects your business, knowing what is a problem will be hugely beneficial. So, instead of sending this diagnostic information directly to EMS, Insider’s Reflex Gateway Conversion module can take receipt of the event messages and based on some preconfigured rules, generate a new unique and fully tokenised EMS event. This converted event can then be routed to the Reflex Reaction engines, or escalated as appropriate, e.g. to Tivoli, OpenView, email, SMS. Optionally, applications can write their events directly to the Gateway process, where they will be parsed and re-issued as fully tokenised events. Consider the following simple text messages: · $RPC E0015 PC:020070 SDIV AB: msg to A0
· $RPC E0014 PC:067700 ASSIGN missing for 02 UM process
· $RPC E0006 PC:001000 AREACODES shows 7 AORs; NUM^AORS is 8.
In the Reflex graphical Console, they appear as:
As they all have the same SSID and Event Number, it’s very difficult to manage these events, i.e. which one is critical, informational. Using the Reflex Gateway module, we can create three different rules for the above data, so that when they are parsed, new tokenised events are issued. Rule 1 If the event text characters: · “$RPC” appear in positions 2 to 5 · “E0015 PC:020070” appear in positions 9 to 23 · “SDIV AB: msg to A0” appear in positions 25 to 42 Then generate a new SSID of RPCERROR.1.0, event number 2007, with the text as it is and a more meaningful subject token of ‘RPC^ERROR’. In this example, the new event has been issued with the Emphasis token set to True:
Rule 2 If the event text characters: · “$RPC” appear in positions 2 to 5 · “E0014 PC:067700” appear in positions 9 to 23 · “ASSIGN missing for 02 UM process” appear in positions 25 to 56 Then generate a new SSID of RPCERROR.1.0, event number 6770, with the text as it is and a more meaningful subject value of ‘RPC^ERROR’. In this example, the new event has been issued with the Emphasis token set to False:
Rule 3 If the event text characters: · “$RPC” appear in positions 2 to 5 · “E0006 PC:001000 AREACODES” appear in positions 9 to 33 · “shows 7 AORs; NUM^AORS is 8.” appear in positions 35 to 63 Then generate new SSID of RPCAREA.1.0, event number 1001, with the text as it is and a more meaningful subject value of ‘RPC^AREA^CODE’. In this example, the new event has been issued with the Emphasis token set to False:
These three new events are registered in the Reflex database for you as part of the translation exercise and they are available to all of the Reflex reaction modules. During the conversion exercise and if required, you can amend the source text via Reflex Gateway, deleting redundant information such as date and time, adding new data such as severity, or the name of the originating process.
The text to EMS translation rules are built within the Gateway module and require no programming expertise.
If messages arrive in Gateway and there is no rule built, then an alert is generated and you can create and implement a rule for the new message without closing down the software.
Reflex Status Monitor Status Monitor is one of many reaction engines available for managing, reporting and escalating events. One of the converted events (along with many other application, subsystem events) has been mapped as a Vulnerable event, causing the ‘RPC’ group to change state.
Email Alerting EMS events can be escalated to enterprise managers, SMS and email, as in this example…
Reflex Gateway Use Cases
Gateway is used within our financial client base to parse their poorly structured events for foreign exchange transfers, high value payments, RTGS events into more meaningful alerts.
The result of this, is that NonStop Operations and the Business are continually informed on the health of their critical applications.
https://www.insidertech.co.uk/solutions +44 161 876 6606
Ask TandemWorld Keep up with us on Twitter @tandemworld We are currently seeking skilled resources across the EMEA region, contact us for More Info www.tandemworld.net OpenAPIs at the heart of OmniPayments OmniPayments is OPEN for APIs
Following on from last month, OmniPayment are pleased to be announcing the advancement of our OpenAPI program. OmniPayments have identified over 300 functions within the application suite that can be exposed as APIs in a bid to unleash the power of the payments application. These OpenAPIs will expose the major components of the OmniPayments application including Banking core services, P2P payments, B2B, P2B & B2P payments, POS, mPOS & ATM Terminal Management, Merchant Management, Loyalty, Card management, Fraud Solutions, ATMs, Tokenization and e-Wallet. Through the backbone of Webservices with JSON and XML formats, users will be able to leverage the functions using their favourite SDK tools for whatever front-end device they want to integrate into their application. Coders love the simplicity of JSON over Webservices and its readability. JSON is a great step forward from the traditional established method of using ISO8583, a bit-mapped message that served the industry well in the days of expensive telecommunications, but which now looks slightly quaint to modern world developers in the world of GIT, Java, Python, C#, .Net etc at their fingertips. Banking services are opening up to the modern world and increased competition through the move toward Open Banking. Consumers are increasingly demanding better Banking services on their phones and tablets, with all the increased convenience this brings. Want to transfer money to a friend? Do it on your phone App. Want to check your balance? Check your phone. Need to split a bill? There’s an App for that. The technical solution underlying all this is the move towards Open Banking, and OpenAPIs in particular. At the heart of any set of OpenAPI WebServices lies a robust web server that can interpret and respond securely to the client devices requesting the service. The OmniPayments approach to OpenAPIs is enabled through its inherent Web-based architecture designed and built over 20 years ago. At the heart of the highly scalable OmniPayments, web services enable XML and JSON requests from Browsers, from mobile Apps, or from other APIs making requests into the card payments switch. Consumers can check on a balance, check on recent transactions, activate a new card, and freeze a card temporarily till you find it again. OmniPayments meets the needs of traditional and emerging banking technology. You can find more on OmniPayments at www.omnipayments.com , contact your local representative or email us at sales@omnipayments.com for further information.
Multi-Factor Authentication on Nonstop Made Easy with CSP AUTHENTICATOR+™
Multi-factor authentication has become vital in ensuring secure access to systems. It provides superior safety measures over easily compromised single password methods and is also an important requirements to comply with regulations such as PCI 8.3 and GDPR. Any remote user or non-console admin user that has access to the cardholder environment must include multi-factor authentication. From legacy Pathway applications to the latest RESTful interfaces, effective MFA must be provided for users and applications that have the potential to access sensitive data. The new CSP Authenticator+™ supports both primary and secondary authentication for NonStop. It provides a RESTful interface which supports multi-factor authenticated logins on NonStop systems. CSP Authenticator+ resides on the NonStop Platform and uses an OSS “bridge” to connect to the RESTful interface of the CSP Authenticator+ web server.
Primary authentication methods such as RADIUS, RSA Cloud, Active Directory, Oracle ID Manager and Open LDAP are supported. User Rights Synchronization will make it easier than ever before to integrate a NonStop system into the Enterprise ID management platforms. CSP Authenticator+ can provide authentication services via Safeguard Authentication SEEP, or Pathway and Non-Pathway servers. Almost any application, including TACL, can now easily support multi-factor authentication (MFA). Secondary authentication methods supported include RSA SecurID, Email, Text Message, Google Authenticate and RADIUS. You can now enable MFA logins for different applications, making them more secure!
CSP Authenticator+ Key Features:
· Primary and Secondary authentication support · Browser-based user friendly interface · Standardized authentication across platforms · Configurable for all or selected users · Certified for the latest RSA release · Support for virtual addressing
CSP - Compliance at your Fingertips™ For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit wiki.cspsecurity.comWe Built the Wiki for NonStop Security Regards, The CSP Team +1(905) 568 - 8900
XYPRO Calendar December 3, 2019 Barclays Bank London, England
December 4, 2019 Scottsdale, AZ
European NonStop HotSpot (GTUG) May 4 – 6, 2020 Berlin, Germany
November 16 – 18, 2020 San Francisco, CA
Find out more about us at www.tandemworld.netSponsored By Gold Sponsor
|
|
||||||||||
+44 (0) 20 8304 7979 Our company, Tandemworld,
accepts no liability for the content of this email, or for the
consequences of any actions |