NonStop ™ Newsletter for November 2019

Sponsored By

Gold Sponsor

________________________________________

Click an Article to See more

Contents

Register Now for Upcoming TBC Recap Webinar

No Smoke....

XYPRO’s 2020 Cybersecurity Predictions - Add 2 Factor Authentication and Machine Learning to Your Plans!

Gravic Publishes New Video on HPE Shadowbase Business Continuity

Monitoring Those Poorly Structured EMS Events

ASK TW

OpenAPIs at the heart of OmniPayments

Multi-Factor Authentication on Nonstop Made Easy with CSP AUTHENTICATOR+™

XYPRO Calendar

NSU40 SIG Hosts First Annual Hackathon at Connect’s 2019 HPE NonStop Technical Boot Camp

 

 

   
 

Register Now for Upcoming TBC Recap Webinar

Missed Boot Camp this year or didn't get a chance to see NuWave's new payment demo?

Not to worry!

NuWave and TIC Software have you covered with their upcoming webinar "TBC Recap: Get REST Access to Databases and Payment Applications".

This session will be held in just a couple of weeks, so register now to secure your spot!

 

 

 


No Smoke ......

No smoke, no mirrors, no snake oil.

Just NonStop Services to suit you.

www.BrightStrand.com

Join BrightStrand at the BITUG Little SIG 2019

 


XYPRO’s 2020 Cybersecurity Predictions - Add 2 Factor Authentication and Machine Learning to Your Plans!

Steve Tcherchian, CISSP

Chief Product Officer, CISO

XYPRO Technology Corporation

 As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn't been said before - that’s a tall order! The reality is, what we predicted would be important in 2019, 2018 and even 2017 - is still applicable. A lot of what we predicted back then was never properly addressed and remains a risk today - credential theft and attacks targeting privileged user logins are more prevalent than ever.  Currently, the best way to combat these types of attacks is to use 2 factor authentication. 

Use it for everything. There is no simpler way to state it - but this is still not being done.  Risk will continue to increase in 2020. I cover this and other cybersecurity predictions for 2020 in the list below.

 

 

Machine Learning (ML) and Artificial Intelligence (AI) Will be Key to Combating Threats – We’ve all heard security vendors discuss ML and AI as features within their products for years. Up until recently, this wasn’t much more than a marketing gimmick. We have not begun to scratch the surface of the capabilities of ML and AI to combat threats. There is a lot of skepticism that has existed for years, but in 2020 we will have no choice. The amount of data being generated is increasing exponentially and the only way to keep up and identify threats is to allow machines to churn through data and trust they will detect the right concerns - then take appropriate action to combat the threat. We are going to see a lot of research, funding and effort invested in these methods. We need to get comfortable with the technology so it can be adopted on a wider scale and evolve. We have no choice. It’s the only way to monitor security going forward.

Attacks on the Edge will Increase – the proliferation of IoT devices, sensors, endpoints and a remote workforce is fulfilling our need for faster information in a mobile method. Edge computing enables us to generate and analyze data for decision making faster than ever before.  Research firm IDC estimates at least…… Click Here to Continue Reading

 



Gravic Publishes New Video on HPE Shadowbase Business Continuity

 

Shadowbase Business Continuity Video

We hope that you find this video interesting and informative. Please share it with your colleagues and let us know if you have any questions or comments.  This video is also available with the following subtitles:

Chinese Simplified

Japanese

Korean

Spanish (Mexican)

Spanish (Chilean)

 HPE Shadowbase Team Presents at Connect HPE NonStop Technical Boot Camp

 

Opening Night Reception

First TBC Hackathon

 

Diane Funkhouser Receiving the Connect HPE Recognition Award

NSU40 Pub Crawl

 

We greatly enjoyed attending the 2019 Connect HPE NonStop Technical Boot Camp (TBC) held November 3-6 at the Hyatt Regency San Francisco Airport Hotel and spending time with many of you. Notable highlights include the Sunday evening Hackathon and Reception; various keynote speakers, including Jeff Kyle (VP & GM HPE Mission Critical Systems) and Elvis Chan (FBI Supervisory Special Agent); the “Geeks who Drink” trivia; and the NSU40 Pub Crawl. We were also pleased that Diane Funkhouser was honored with the Connect HPE Recognition Award. The Hyatt Regency did an excellent job preparing the facilities and serving attendees with delicious food and desserts throughout the show. We thank Connect and the HPE staff for hosting a terrific gathering.

We shared ideas regarding how the HPE Shadowbase product suite can provide solutions to your most pressing business issues. HPE Shadowbase was featured in several presentations:

 

·        Protect Your Business in a World of Uncertainty, Mark Pollans, WW Sr. Product Manager, HPE

·        Implement Migrations with Ease using HPE Shadowbase Zero Downtime Migrations (ZDM), Paul Holenstein, Executive Vice President, Gravic

·        Customer Testimonial – Using HPE Shadowbase Software in a BASE24-eps™ Migration, Rick Stather, Senior System Consultant & Team Leader, TCM

·        Don’t Procrastinate – Validate! Rick Stather, Senior System Consultant & Team Leader, TCM

·        HPE Shadowbase Mission-Critical Use Case Solutions and Product News, Paul J. Holenstein, Executive Vice President, and Paden R. Holenstein, Marketing Specialist, Gravic

If you are interested in discussing our presentations’ content or would like us to present these or other HPE Shadowbase topics to your staff, please contact us.

Hewlett Packard Enterprise globally sells and supports Shadowbase solutions under the name HPE Shadowbase. For more information, please contact your local HPE Shadowbase representative or visit our website.

 

Please Visit Gravic at these Upcoming 2020 Events

 

HPE APAC MCS/NonStop Events:

HPE MCS Boot Camp, 16-18 February

NonStop Thailand Event, Bangkok, 19 February

NonStop Indonesia Event, Jakarta, 21 February

SunTUG Sunshine Summit: Tampa, 28 February

GTUG IT-Symposium: Berlin, 4-6 May

 


Monitoring Those Poorly Structured EMS Events

 

Your application is generating poorly structured events to the Event Management Service (EMS) and because they’ve not been properly formatted, these events arrive into EMS as, in a lot of cases, text events.

When they are written directly to EMS, unformatted, instead of as a series of tokens, EMS recognises this and creates a default event on behalf of the originating process, all of them with identical token settings.

The event buffer includes the same SSID and event number - TANDEM.12.0   512 – but with no meaningful subject, manager or process^descriptor. Filtering of this information is at best an expensive processing exercise and sometimes it can be impossible.

The same filtering and monitoring problem occurs where the application issues the same event for different situations, e.g. APP.1.0 1000 for a normal event but is also issued for a failure event. These may be acceptable and something that doesn’t overly concern you but for important applications which affects your business, knowing what is a problem will be hugely beneficial.

So, instead of sending this diagnostic information directly to EMS, Insider’s Reflex Gateway Conversion module can take receipt of the event messages and based on some preconfigured rules, generate a new unique and fully tokenised EMS event.  

This converted event can then be routed to the Reflex Reaction engines, or escalated as appropriate, e.g. to Tivoli, OpenView, email, SMS.  

Optionally, applications can write their events directly to the Gateway process, where they will be parsed and re-issued as fully tokenised events.

Consider the following simple text messages:

·        $RPC   E0015 PC:020070 SDIV AB: msg to A0                                   

 

·        $RPC   E0014 PC:067700 ASSIGN missing for 02 UM process                    

 

·        $RPC   E0006 PC:001000 AREACODES shows 7 AORs; NUM^AORS is 8.              

 

In the Reflex graphical Console, they appear as:

 

As they all have the same SSID and Event Number, it’s very difficult to manage these events, i.e. which one is critical, informational.

Using the Reflex Gateway module, we can create three different rules for the above data, so that when they are parsed, new tokenised events are issued.  

Rule 1

If the event text characters:

·        “$RPC” appear in positions 2 to 5

·        “E0015 PC:020070”  appear in positions 9 to 23

·        “SDIV AB: msg to A0” appear in positions 25 to 42

Then generate a new SSID of RPCERROR.1.0, event number 2007, with the text as it is and a more meaningful subject token of ‘RPC^ERROR’.

In this example, the new event has been issued with the Emphasis token set to True:

 

Rule 2

If the event text characters:

·        “$RPC” appear in positions 2 to 5

·        “E0014 PC:067700”  appear in positions 9 to 23

·        “ASSIGN missing for 02 UM process” appear in positions 25 to 56

Then generate a new SSID of RPCERROR.1.0, event number 6770, with the text as it is and a more meaningful subject value of ‘RPC^ERROR’.

In this example, the new event has been issued with the Emphasis token set to False:

 

 

Rule 3

If the event text characters:

·        “$RPC” appear in positions 2 to 5

·        “E0006 PC:001000 AREACODES”  appear in positions 9 to 33

·        “shows 7 AORs; NUM^AORS is 8.” appear in positions 35 to 63

Then generate new SSID of RPCAREA.1.0, event number 1001, with the text as it is and a more meaningful subject value of ‘RPC^AREA^CODE’.

In this example, the new event has been issued with the Emphasis token set to False:

These three new events are registered in the Reflex database for you as part of the translation exercise and they are available to all of the Reflex reaction modules.

During the conversion exercise and if required, you can amend the source text via Reflex Gateway, deleting redundant information such as date and time, adding new data such as severity, or the name of the originating process.

 

The text to EMS translation rules are built within the Gateway module and require no programming expertise.

 

If messages arrive in Gateway and there is no rule built, then an alert is generated and you can create and implement a rule for the new message without closing down the software.

 

Reflex Status Monitor

Status Monitor is one of many reaction engines available for managing, reporting and escalating events.

One of the converted events (along with many other application, subsystem events) has been mapped as a Vulnerable event, causing the ‘RPC’ group to change state.

 

 

Email Alerting

EMS events can be escalated to enterprise managers, SMS and email, as in this example…

 

Reflex Gateway Use Cases

 

Gateway is used within our financial client base to parse their poorly structured events for foreign exchange transfers, high value payments, RTGS events into more meaningful alerts.

 

The result of this, is that NonStop Operations and the Business are continually informed on the health of their critical applications.

 

https://www.insidertech.co.uk/solutions

hello@insidertech.co.uk

+44 161 876 6606

 

 


Ask TandemWorld

Got a question about NonStop ? ASK Tandemworld

Keep up with us on

Twitter @tandemworld

We are currently seeking skilled resources across the EMEA region,

contact us for More Info

www.tandemworld.net


OpenAPIs at the heart of OmniPayments

OmniPayments is OPEN for APIs

Following on from last month, OmniPayment are pleased to be announcing the advancement of our OpenAPI program.  OmniPayments have identified over 300 functions within the application suite that can be exposed as APIs in a bid to unleash the power of the payments application. 

These OpenAPIs will expose the major components of the OmniPayments application including Banking core services, P2P payments, B2B, P2B & B2P payments, POS, mPOS & ATM Terminal Management, Merchant Management, Loyalty, Card management, Fraud Solutions, ATMs, Tokenization and e-Wallet. 

 

Through the backbone of Webservices with JSON and XML formats, users will be able to leverage the functions using their favourite SDK tools for whatever front-end device they want to integrate into their application.  Coders love the simplicity of JSON over Webservices and its readability. JSON is a great step forward from the traditional established method of using ISO8583, a bit-mapped message that served the industry well in the days of expensive telecommunications, but which now looks slightly quaint to modern world developers in the world of GIT, Java, Python, C#, .Net etc at their fingertips.

Banking services are opening up to the modern world and increased competition through the move toward Open Banking.  Consumers are increasingly demanding better Banking services on their phones and tablets, with all the increased convenience this brings.

Want to transfer money to a friend? Do it on your phone App.  Want to check your balance? Check your phone.  Need to split a bill? There’s an App for that.

The technical solution underlying all this is the move towards Open Banking, and OpenAPIs in particular.

At the heart of any set of OpenAPI WebServices lies a robust web server that can interpret and respond securely to the client devices requesting the service.

The OmniPayments approach to OpenAPIs is enabled through its inherent Web-based architecture designed and built over 20 years ago.  At the heart of the highly scalable OmniPayments, web services enable XML and JSON requests from Browsers, from mobile Apps, or from other APIs making requests into the card payments switch. 

Consumers can check on a balance, check on recent transactions, activate a new card, and freeze a card temporarily till you find it again. 

OmniPayments meets the needs of traditional and emerging banking technology.

You can find more on OmniPayments at www.omnipayments.com , contact your local representative or email us at sales@omnipayments.com for further information.

 

 


Multi-Factor Authentication on Nonstop Made Easy

with CSP AUTHENTICATOR+™

 

Multi-factor authentication has become vital in ensuring secure access to systems. It provides superior safety measures over easily compromised single password methods and is also an important requirements to comply with regulations such as PCI 8.3 and GDPR.

Any remote user or non-console admin user that has access to the cardholder environment must include multi-factor authentication. From legacy Pathway applications to the latest RESTful interfaces, effective MFA must be provided for users and applications that have the potential to access sensitive data. 

The new CSP Authenticator+™ supports both primary and secondary authentication for NonStop. It provides a  RESTful interface which supports multi-factor authenticated logins on NonStop systems. CSP Authenticator+ resides on the NonStop Platform and uses an OSS “bridge” to connect to the RESTful interface of the CSP Authenticator+ web server.

Primary authentication methods such as RADIUS, RSA Cloud, Active Directory, Oracle ID Manager and Open LDAP are supported. User Rights Synchronization will make it easier than ever before to integrate a NonStop system into the Enterprise ID management platforms.

CSP Authenticator+ can provide authentication services via Safeguard Authentication SEEP, or Pathway and Non-Pathway servers. Almost any application, including TACL, can now easily support multi-factor authentication (MFA).

Secondary authentication methods supported include RSA SecurID, Email, Text Message, Google Authenticate and RADIUS. You can now enable MFA logins for different applications, making them more secure!

CSP Authenticator+ Key Features:

 

·        Primary and Secondary authentication support

·        Browser-based user friendly interface

·        Standardized authentication across platforms

·        Configurable for all or selected users

·        Certified for the latest RSA release

·        Support for virtual addressing

 

CSP - Compliance at your Fingertips™

For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit wiki.cspsecurity.com

 

We Built the Wiki for NonStop Security

Regards,

The CSP Team              

+1(905) 568 - 8900

 

 


XYPRO Calendar

BITUG Little SIG

December 3, 2019

Barclays Bank

London, England

 

DUST – Desert Users of Tandem

December 4, 2019

Scottsdale, AZ

 

European NonStop HotSpot (GTUG)

May 4 – 6, 2020

Berlin, Germany

 

NonStop Technical Bootcamp

November 16 – 18, 2020

San Francisco, CA

 

 


NSU40 SIG Hosts First Annual Hackathon at Connect’s 2019 HPE NonStop Technical Boot Camp

By NonStop Under 40 SIG (Significant Interest Group)

Since the word ‘Hackathon’ has ‘Hack’ as a root, some attendees immediately wondered if we were encouraging people to break into a NonStop Server. Instead, the word comes from “hack" and "marathon," where "hack" is used in the sense of exploratory programming dating well before the origins of computing all the way back to the 1200s where it meant “cut with heavy blows in an irregular or random fashion”, not to its scarier meaning as a reference to computer security.  In the spirit of 1960s at MIT and at TBC, the word is intended to encourage a design-sprint that creates a functioning product by the end of the event. (If you want to know more, here is Wikipedia’s take on it: https://en.wikipedia.org/wiki/Hackathon. Also, please reference Gravic’s article: From Hacker to Hackathon – History in the Making!)


2019 NonStop TBC Hackathon T-shirts

Three teams came forward to the competition, vying for cash prizes and bragging rights. They were greeted by a gaggle of volunteers, a spectator environment, which included T-shirts, an awesome snack table, and, of course, beer.

Snack and Red Bull Table

The teams were:

1.      Team ‘Mega,’ with Meg Watson and Leon Arens

Team Mega was able to quickly (in about 10 minutes) build and launch a Java + Spring Boot web server on the NonStop. When the client connected, the server sent back an HTML page with some JavaScript code that would do an AJAX request to another, third-party RESTful API that returns Chuck Norris jokes. This team won the “Best Hack” category.

2.      Team ‘NoName,’ with Jonathon Ziegler and Vuk Petrovic

From Vuk Petrovic: Our team struggled to get up and running between getting on the proper Wi-Fi, the download and installation of the correct VPN software, connecting to the NonStop, etc. At one point, Jonathan’s computer hit the (Microsoft) “Blue Screen of Death” and then failed to start. We basically just gave up on Jonathan’s PC at that point (it eventually made a comeback).

3.      Team ‘Can’t-tell-ya,’ with Rob Lesan and Anthony Duffus

Team Can’t-tell-ya applied a time-honored hacking tradition of doing as little as possible to the greatest effect, with a single-line Python app to run a web server that served up a JavaScript site that allowed the user to play the video game ‘Pong’. That command was:

We recruited a duo of seasoned NonStop architects, (Randall Becker and Bill Honaker, to mentor, judge the competition, and ultimately choose the winners. Each team left with a cash prize, and all of the participants left with amazing commemorative Hackathon t-shirts!

The NonStop Under 40 SIG, which conceived and hosted the Hackathon, considered the event a great success, and is already planning an improved event at next year’s TBC. Send us your suggestions and ideas for 2020!

 

 


Find out more about us at www.tandemworld.net

Sponsored By

Gold Sponsor

 



www.tandemworld.net

+44 (0) 20 8304 7979


Our company, Tandemworld, accepts no liability for the content of this email, or for the consequences of any actions
or information provided.

To Unsubscribe or Change your Subscription Please click here