Tandemworld eNewsletter for September 2016 Platinum Sponsor is
Gold Sponsor Silver Sponsor
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
Tandemworld eNewsletter for September 2016 Contents
comForte - Events near you comForte - With Yuma, NonStop X Has Become a Full Software Solution XYPRO looks forward to seeing you throughout 2016 comForte - Webinar: Modernizing Payment Applications on the NonStop Platform: Hype or Hope? XYPRO is proud to be a Diamond Sponsor for this year’s NonStop Technical Boot Camp! comForte - Technical Boot Camp website Musings on NonStop! - September, ‘16
Current Subscribers 15102 Tributary Systems’ Storage Director 5.0: Policy Based Data Management for the NonStop Professional
Worried About a Fuzzy View of Your Data? Shadowbase Online Loader, SOLV, Will Clear Your Vision
Traditional target database loading gives you a “fuzzy” view of your data for an extended time. The ETL loaded data represents a snapshot of the past, and is old and stale until replication refreshes the offline loaded target data from the replication queue files. For a large database, this replication could take days or weeks to resolve, a time during which your target data is fuzzy and incomplete.
Instead, Gravic provides a patented online loader called SOLV which clears your vision. Replication and target database loading happen at the same time and are coordinated so that the data in the target database is current and matches the source database. Double vision is gone and your data is available without a big-bang cutover, which could be a thud. SOLV is a unique capability only available to HPE Shadowbase users. For more information on SOLV, please contact your local HPE account team or visit our website. To speak with us about SOLV or your data replication and data integration needs, please visit us at www.ShadowbaseSoftware.com, email us at SBProductManagement@gravic.com, or call us at +1.610.647.6250. Hewlett Packard Enterprise directly sells and supports Shadowbase Solutions under the name HPE Shadowbase
Gravic Presents on HPE Shadowbase Zero Downtime Migration Technology at VNUG Conference
This month, Gravic attended the VNUG Nordic Users Conference at the beautiful Ranas Slott Castle outside of Stockholm, Sweden, and presented on Improving Uptime and Eliminating Risk for Disruptive Migrations with HPE Shadowbase Zero Downtime Migration (ZDM) Technology. VNUG is a special event, engaging customers with great content and HPE and vendor support, while providing many networking opportunities. Congratulations to Thomas Monell of Evry Card for winning our GoPro Hero camera!
Gravic Presents at First-Ever Greater New York/New Jersey Area HPE & Partner NonStop Information Day
Last week, Gravic presented at the first-ever Greater New York/New Jersey Area HPE & Partner NonStop Information Day, held for partners and users at the HPE Offices in Berkeley Heights, NJ. Our presentation on Shadowbase ZDM demonstrated how customers are leveraging HPE Shadowbase solutions to perform zero downtime migrations, and to safely eliminate planned downtime with no loss of business services for otherwise risky and disruptive application, database, and operating system upgrades. Several use case scenarios were reviewed for both homogeneous and heterogeneous migrations. If you are interested in discussing this presentation’s content or would like us to present this or other HPE Shadowbase topics to your staff, please contact us.
Please Visit Gravic at these Upcoming 2016 Events
Please Visit Gravic at these Sites
TANDsoft’s Sensitive Data Intercept (SDI) Protects Sensitive Data-at-Rest for Enscribe, SQL/MP, and SQL/MX
Integration may be easy but so is support – we have seen it all, rest easy! Foundations are extremely important for any endeavor, be it the building of a house or skyscraper or a new highway or dock. At the very heart, foundations represent something firm and solid capable of supporting everything that then rises or stretches before us. We don’t have to look very hard or too long before we come to recognize whether a foundation is sound or not and the appearance of cracks and the opening of holes all tell of expediency overriding prudence.Today’s enterprises are fully aware of foundations when it comes to software. They are more likely called infrastructure or low-level code and sometimes even middleware but no matter how you describe it, todays solutions are every bit as dependent on strong foundations as is anything else we build. Good foundations provide flexibility and expand the options available to developers and operators alike – good foundations contribute significantly to any CIO’s peace of mind. Just as with the presence of sound foundations, sound infrastructure is less likely to fail and that too is a message not lost on these CIOs. In today’s world of constantly evolving technologies and architectures prudent CIOS also look to vendors that provide stability. This is evidenced by blue-chip customers acknowledging a steady stream of new and applicable features, eyes firmly set on tracking these evolving technologies and architectures and support that is 24 X 7, around the clock. With increasing demands coming from legislators and commissions as they watch for privacy breaches, security intrusions and inadequate customer support, as is currently being highlighted in the airline industry with so many failures of its infrastructures of late, more than one Fortune 500 company is basing their advertising on a “steady as you go” mantra. None of this comes as a surprise to DataExpress. We have provided key infrastructure for several decades and have not just stayed in business through the dot com crises, the fall out following 9 / 11 and more recently, the meltdown that came with the Global Financial Crisis but rather, continued to provide managed and secure file transfer services to some of the biggest of the Global Fortune 1000 companies. File transfer may not be exciting but that is by intent. Ticking over in the background and running neither with fanfare or minute amounts of management attention, DataExpress simply moves the data over and over again. Visitors to the offices of DataExpress often remark on how serene the office environment looks even as somewhere around the globe multiple files are moving under the oversight of DataExpress. The business of DataExpress revolves around constant testing as we track the many current operating system releases from HPE NonStop and like so many of our compatriots in the NonStop vendor community we too run multiple NonStop systems to ensure compliance with all the latest releases and fixes. And it’s all in the background and without any explanation, completely transparent to any of our visitors. This is not to say there aren’t customer situations that arise that have all of us at DataExpress working the phones and the systems but there are only a few reasons for such incidents. Something at either endpoint was changed or volumes increased in size unexpectedly or the NonStop system itself was upgraded or there were even configuration changes made to the firewall during a maintenance cycle. One of the obvious downsides from running so unobtrusively is that often times, DataExpress is simply overlooked, essentially, forgotten! As one of our executives put it: “Then ONE transfer at ONE client fails to ONE of their end users, and the phones start ringing!” By happenstance, routines have been developed within DataExpress to manage such crisis and for the most part, our prudence in being prepared doesn’t go unnoticed. There is the almost instantaneous exchange of trace files, log files, conference calls, demands on how long it will take to fix (in most circumstances, the problem has not even been identified yet), confirmation from DataExpress we will work through the night / weekend etc. Not to mention that oft-requested “can you get your team onto our site?” But our foundations are strong and as yet, together with our customers, we have seen no evidence of cracks or holes in what is for those running DataExpress a crucial foundation for much of what they must do on a daily basis. For many NonStop users DataExpress is the foundation for core infrastructure around which these NonStop users have built additional application suites that in some cases has led to the development of new business opportunities with sizable revenue-creation implications. To those businesses that just don’t have the resources to respond to the many legislative and commission mandates, for a fee an enterprise with the processes in place can on-sell their established services and this is something we are really thrilled to see happening. DataExpress as a source of new revenues that in most cases more than offset our fees is pleasing to see! Of course, like many other NonStop vendors we are keeping our eye on the growth in the NonStop X business together with the stated objective of HPE to transform to a hybrid infrastructure made up of traditional IT and private clouds. There is certainly market appeal for both of these – NonStop X with its better price performance metrics and the hybrid infrastructure making it easy to push some processes to Linux and Windows and even private clouds. And after a fashion, treating NonStop with an attached Linux or Windows is the type of baby-step approach we see prudent CIOs evaluating and with both DataExpress NonStop (DXNS) and Data Express Open Platform (DXOP) we are well positioned no matter the direction taken by these CIOs. Foundations are increasingly important and building next generation solutions on solid foundations is a must for all CIOs. Even for the NonStop community, the changes influenced by cloud computing are inescapable but we can see clearly the steps that need to be taken and for DataExpress, it will be all about the experiences and knowledge we have with running DataExpress on different runtime platforms. It may not be a case of returning to the lazy days of summer, quietly sitting in a beach chair somewhere watching the tide slowly advancing up the beach – but we are prepared all the same. Yes, our foundations are rock solid and this is not lost on any of the prudent CIOs with whom we work today.
DataExpress, Inc.
sales@dataexpress.com
Secure, Fraud-Resistant, NonStop Banking-on-the-Go
from OmniPayments The OmniPayments Mobile Banking App brings real-time, anywhere banking and financial-transaction convenience to your customers via their digital devices. It is intuitive, user-friendly, and highly secure and is architected for the Android operating system. Built on OmniPayments’ fault-tolerant HPE NonStop X servers, the App is backed by an automatic failover function to guarantee continuous availability. It readily can be customized to address your unique requirements and those of your customers. We, of course, provide the highest possible security and fraud protection. OmniPayments Mobile Banking Features ♦♦ Pay bills ♦♦ Transfer funds ♦♦ Recharge prepaid mobile devices ♦♦ Manage loyalty programs & gift cards ♦♦ Make in-store purchases ♦♦ Monitor account & credit/debit card balances ♦♦ Deposit checks ♦♦ Set alerts & reminders ♦♦ Review statements & transactions ♦♦ Access popular, even custom wallets ♦♦ Find ATMs/Branches ♦♦ Block stolen cards ♦♦ Order checks ♦♦ Send feedback ♦♦ ...and more OmniPayments Mobile Banking Security ♦♦ Sensitive information is masked on screen ♦♦ Four-point logging of each transaction ♦♦ 128-bit or greater encrypted communication between device and host ♦♦ No data is stored on device ♦♦ Potential fraud and compromised accounts can be detected and blocked ♦♦ Logon using unique identifiers The OmniPayments Financial Ttransaction Switch is a switching solution for the financial and retail industries. It is deployed on NonStop for the highest availability and offers all the requisite functionality to manage credit/debit-card transactions. It manages multiple devices, hosts application interfaces, and interoperates with third-party products or other systems if required. OmniPayments easily expands to provide additional functionality when needed and supplies complete security functions for every financial transaction handled, including encryption-at-rest and encryption-in-flight. Available around the clock, OmniPayments will survive any single fault, requires no downtime for maintenance or upgrades, and supports a range of disaster-recovery solutions. OmniPayments can be installed either as a complete, off-the-shelf solution or can be enhanced with customer-requested modifications and features to improve cost-effectiveness, efficiency, and risk mitigation. Our team of 100-plus NonStop specialists are skilled at rapid project turnarounds and meeting deadlines. OmniPayments also distributes OmniCloudX on NonStop X. OmniCloudX hosts numerous OmniPayments instances at a pay-for-use price so attractive that mid-size retailers and financial organizations now can enjoy the benefits of having their own high-capacity transaction switches. Starts at only $5,000 USD per month. The OmniPayments Preauthorization Engine is used by financial institutions in conjunction with the OmniPayments Financial Transaction Switch or as a seamless interface to other providers’ switches via a custom support module (CSM). We call it the Fraud Blocker! OmniPayments systems in production today process 700 million transactions per month, generated by point-of-sales terminals and over 14,000 ATMs. A single OmniPayments system supports up to 10,000 transactions per second. Multiple OmniPayments systems can cooperate to provide any capacity required by an application. From our seven worldwide locations, we serve as a 24×7 managed services provider for remote production monitoring. To learn more about OmniPayments, attend our presentations and visit with our staff at the following events. ATUG – Atlanta HPE NonStop User Group (29 September) Atlanta, Georgia (USA) DUST – Desert Users of Tandem (4 October) Scottsdale, Arizona (USA) PKF – Payments Knowledge Forum (4 October) London, England CTUG – Canadian Tandem Users Group (19 October) Mississauga, Ontario, Canada NENUG – New England NonStop User Group (20 October) Andover, Massachusetts (USA) Nonstop TBC – NonStop Technical Boot Camp (13-16 November) San Jose, California (USA) OmniPayments customers and others interested in our solutions are invited to join the new OmniPayments Discussion Group on LinkedIn at http://bit.ly/2bB1AGh. For further information, contact Yash Kapadia at +1 408-446-9274 or at yash@omnipayments.com. MATUG Fall Meeting Postponed until Late Spring 2017 Due to low attendee registration, and after several discussions with HPE personnel, customers, and other vendors, the MATUG Board has regretfully decided to postpone the MATUG Meeting that was previously scheduled for Tuesday, October 18 at the HPE facilities in Herndon, Virginia. We hope to hold this event in late Spring, 2017, possibly in May or June. We are sorry if this postponement has caused anyone hardship in regards to changing travel plans. We look forward to meeting in the Spring! Registration Open for NENUG Fall User Meeting
Did you know that you can now register to attend the Northeast NonStop User Group (NENUG) on October 20 in Andover, MA? Registration is open. Don't wait to sign up for this great day of presentations by HPE and its partners!
XYPRO - Breaches are from Mars, Security is from VenusBe sure to test your security knowledge by taking the short quiz at the end of the article! There is quite a large disconnect in the way security breaches are evolving versus how security solutions and resources are keeping up to address them, much like the book from John Gray covering relationships and the different motivations, of men and women. Unlike the book though, we’re not trying to come to a happy medium – we’re trying to keep the war like Mars at bay. As a security strategist, I’m constantly evaluating what is possible to help identify gaps and opportunities. The one thing I have learned over the course of my career is: The only thing constant in cyber security is that attackers’ methods will continue to evolve. They get smarter, more resourceful and are impressively ever patient. The HPE Integrity NonStop server is not only a foundation of the HPE Server business, it is also central to countless mission-critical environments globally. For the longest time, security of these powerful systems and the “Mission Critical” applications they run remained mostly static and under the radar while high profile attacks on other platforms have taken the spotlight. That hasn’t lessened the risk and exposure of the NonStop server. It’s actually created a gap. With globalization and introduction of new technologies for the NonStop server, this security gap will only increase if not addressed. Interestingly enough, the NonStop server isn’t the only mission critical enterprise solution in this situation. There are some colorful parallels that can be drawn between applications running on the NonStop server and those running in SAP environments. Both are in highly mission-critical environments and vital to the revenue generation of an organization, and they frequently run payments applications like ACI’s BASE24 and other homegrown applications. This creates some interesting security challenges. In a recent The Connection Magazine Article, Jason Kazarian, Senior Architect at HPE described legacy systems as “complex information systems initially developed well in the past that remain critical to the business in spite of being more difficult or expensive to maintain than modern systems”. His article went on to point out the security challenges of legacy applications. In summary some of these types of applications can tend to be unsupported, security patches aren’t readily available and if they are, they aren’t applied in a timely fashion because of fear of disruption, and they don’t have a lot of the security features modern applications would have. This makes detecting and addressing security risk and anomalies a greater challenge than it already is.
MIND THE GAP How can this problem be addressed? Protect what you can. As a first step, be it system, application or data – push the risk down the stack to an area that is more controllable by typical security. For example, tokenizing data used by a legacy application will send an attacker to go search for that data through another method, preferably one better suited for detection. Have a risk based, layered approach. This will swing the odds in your favor. OK, maybe not completely in your favor, but this approach will provide you with the arsenal you previously did not have: It will create those choke points, provide the visibility needed and help reduce mean time to detection and response. With the way threats are evolving, those of us responsible for security need to constantly evaluate and assess our capabilities. Let’s take a dive into each layer to explore the benefits they provide in an overall security strategy.
Protect Protection/prevention is the first and most critical layer of any security framework. Without a proper protection layer in place, none of the other layers can be relied upon. Think of the protection layer as the traditional defensive strategy – “the wall built around assets“. This includes defining and implementing a security policy as well as hardening of the network, the system and applications. The protection layer is also where users, roles, access control and audits are set up. Key fundamental concepts to consider as part of the protection layer.
These types of preventative controls are necessary and intended to prevent unauthorized access to resources and data, but they cannot solely be relied on as a long term sustainable security strategy. Attackers’ motivations and sophistication are changing, therefore when prevention fails, detection should kick in while there is still time to respond and prevent damage. Detect In testimony given before the Senate Subcommittee on Science, Technology and Space, famed cryptographer and cyber security specialist Bruce Schneier said: “Prevention systems are never perfect. No bank ever says: “Our safe is so good, we don’t need an alarm system.” No museum ever says: “Our door and window locks are so good, we don’t need night watchmen. Detection and response are how we get security in the real world… “ Schneier gave this testimony back in July of 2001, yet in 2016 where organizations are getting hit by incidents they can’t detect, this premise is still valid and critical. In the previous section we discussed hardening systems and building a wall around assets as the first layer of security strategy. I’m surprised by the number of conversations I have with IT and Security folks who still carry the mindset that this degree of protection and compliance is good enough. No matter what level of protection a system has, given enough time, an attacker will find a way through. The faster you can detect, the faster you can respond, preventing or limiting the amount of damage a security breach can cause. Detection is not a simple task. The traditional method of detection is through setting up distinct rules or thresholds. For example, if a user fails 3 logons in a span of 5 minutes, detect it and send an alert. In most cases that rule is explicit. If the failed logon events spanned 20 minutes, or worse yet, 10 days, it would not be detected. The limitation with relying on rules for detection is they will not alert on what they don’t know about. Those low and slow incidents and unknown unknowns – activity not normal on a given system -will fly under the radar and no one would be the wiser until you get a call from the FBI. The other challenge is correlating events from multiple data sources. Let’s look at the incident pattern below.
In this incident pattern, we have events from EMS, Safeguard and XYGATE. The NonStop server could send each individual data source to an enterprise SIEM, but the SIEM would not have any context to detect the incident pattern as suspicious behavior. A security analyst could create rules to detect the incident pattern, but that’s just one use case. The traditional method is to scour through event audit records, try to put the pieces together and then create a rule to detect that pattern in the future. The weakness in that thinking is the incident has already occurred. You’re putting a rule together on the off chance it will happen again. However, it’s not reasonable or possible to anticipate and define every possible incident pattern before it happens. A third area of concern is profiling a system and its behavior to understand what is normal behavior for users, applications and the system to be able to recognize when activity is not normal. This can be accomplished through evaluating the system and its configuration, profiling the system over a period of time, profiling user behavior, highlighting risk management and a variety of other intelligence methods. This is where machine learning has a significant advantage. No human could possibly evaluate the volume of data needed to make these types of determinations at the speed required by today’s standards. Machine learning is a type of artificial intelligence that enables the system to teach itself. Explicit rules are no longer the lone method of detection. Machine learning can profile a system or network over a given amount of time to determine what is normal to isolate what is not normal. Inserting machine learning as part of a solution process significantly increases abilities to stay on top of what is going on with a given system, user, network or enterprise. Alert
The third layer relies on alerting. The challenge most environments have as they grow and their infrastructure becomes more chaotic with more tools, more users, more data and more events is that they alert too much or too little. How does one know what to act on and what is just noise? There are solutions that position themselves as being able to do data and analytics, but that ends up generating more data from existing data. Now someone needs to determine if the newly formed alert is actionable or just noise. Going back to our previous failed logon example, if we were to receive 15 different alerts for the same rule, how can one know which alert to pay attention to and which to safely ignore? If you’ve ever been responsible for responding to security alerts, you know this creates alert fatigue. Back in my early days, mass deleting emails of similar types of alerts was one of my favorite things to do. Contextualization allows the system itself to determine what is actionable and what is just noise. A solution likeXYGATE SecurityOne can evaluate each potential alert and, based on activity that happened previously for that that user, IP, system etc…, determine whether the reported activity is business as usual or a serious issue that needs to be paid attention to. Creating new data and new alerts from existing data doesn’t solve the problem. Applying context to the new incidents generated helps focus efforts on those incidents that truly need attention. Once an account changes hands, it will behave slightly differently.
Contextualization is key. Containing the breach and quickly recovering from it are the most important steps of this layer. Response and containment comprise of a number of simultaneous activities to assist in minimizing the impact of a breach. These may include but not limited to:
This is necessary to slow down or stop an attack as well as the preservation of evidence. Evidence of the attack is generally gathered from audit logs, but coupled with detection and analytics tools can provide access to information in a much quicker and more granular fashion. Being able to preserve evidence is key is forensic investigations of the breach as well as important for prosecution. Once all the pieces fall into place and there is an incident alert that requires response, how will your organization deal with the issue? Breach incidents are hardly ever the same. There needs to be a level of categorization and prioritization on how to deal with specific incidents. In some cases, you may want to slowly stalk your attacker, where in others, the sledgehammer approach may be the only thing that can preserve data. Does everyone understand their assigned roles and responsibilities? Is there someone in charge? Is there a documented plan? All of these are considerations that need to be accounted for as part of response. This can be summarized in two words – BE PREPARED.
Resources On the HPE NonStop server – the protection layer can be addressed with properly configuring Safeguard, implementing protection of data in flight and data at rest and deploying third party security tools available for the system. For alerting and detection, XYGATE Merged Audit with HPE Arcsight can provide the tripwires and alarms necessary for proper detection. For further detail on how to properly protect a NonStop server, HPE has published the HPE NonStop Security Hardening Guide. XYPRO has also published a 10 part blog series on how to properly protect a NonStop server (http://bit.ly/21nmQiY). For the next generation of detection and alerting, XYPRO’s newest offering, XYGATE SecurityOne (XS1), bringing risk management and visibility into real time. XS1 correlates data from multiple HPE Integrity NonStop server sources, detects anomalies using intelligence and analytics algorithms to recognize event patterns that are deemed out of the ordinary and suspicious for users, the system and environment. Coupled with HPE ArcSight, the solution can provide a constant, real time and intelligent view of actionable data in a way that was never been seen before. Strong technology and process is important, but people are paramount to any successful security strategy. Constant security training and development on industry best practices, security trends and attack evolution should be factored into any security program. Without ongoing training and reinforcement of people, the gap only has an opportunity to widen. An organizations most valuable resource are the people hired to provide security and close the gap. Use them wisely and ensure they have the tools and training to provide the layers of defense required. En Finale Cyber criminals don’t sit around waiting for solutions to catch up. Security complacency ends up being the Achilles Heel of most organizations. Because of its unique attributes, security on the NonStop server needs to be addressed in a layered approach and Risk Management is a big part of the process. Putting the layers in place to allow us to highlight risk as early as possible to address it is key in dealing with upcoming challenges. This will hopefully help bridge the gap between attacks and security. We need to recognize the paradigm shift and the change in mindset in how we approach security, and attackers’ ability to stay one step ahead of most defenses is central to their strategy. As the NonStop platform evolves and becomes more interconnected, what was put in place previously to address security will not be sustainable going forward. No matter how vendors position their solutions, security is hard, doing the right thing is hard, but that doesn’t mean security professionals need to work harder. From a security professional’s perspective, cyber criminals will always be viewed as Mars – warlike. Relentlessly driving to break into systems, get to data, wreak havoc and cause disruption to fulfill their malicious objectives. Meanwhile, cyber security staff need to act more like Venus – clouded in mystery and deliberately avoid being seen while following the enemy. If Mars knows our tactics, Mars can avoid them. Mars is at war. Mars is patient. Mars will continue to attack, low and slow. With the proper security layers in place, Mars will be thwarted by deliberate masking, redirection and detection that hides where the data really is and alerts when the enemy is near. We continue to get smarter by blocking, hiding and redirecting things away in response to attacks. But unlike men and women, Venus in the security world has a goal is to keep Mars at bay forever…or longer…
Multi-Factor User Authentication for NonStop
Payment Card Industry Data Security Standard (PCI DSS) v3.2 The latest PCI DSS v3.2 has expanded Requirement 8.3 into sub-requirements, requiring multi-factor authentication for all personnel with non-console administrative access, and all personnel with remote access to the CDE (cardholder data environment).New Requirement 8.3.1 (effective February 1, 2018) addresses multi-factor authentication for all personnel with non-console administrative access to the CDE.
New Requirement 8.3.2 addresses multi-factor authentication for all personnel with remote access to the CDE (incorporates former Requirement 8.3).
CSP Authenticator CSP Authenticator provides two-factor authenticated logins to NonStop systems using RSA SecurID Authentication Manager. All communications with the RSA Authentication Manager are fully encrypted. The Authenticator agent can be configured to include all or some users and terminals. Additionally, selected NonStop users can be assigned to specific RSA ids. CSP Authenticator can provide authentication services in two ways: 1) Safeguard Authentication SEEP In this mode, all login attempts by Guardian users that are normally processed against Safeguard are instead passed to the Authenticator agent, which in turn sends the login request to the RSA Authentication Manager for authentication. 2) Pathway Server In this mode, login attempts through a Pathway application are passed to the Authenticator agent, which in turn sends the login request to the RSA Authentication Manager for authentication.
CSP Authenticator is certified with the latest RSA release and works seamlessly with other security products in the NonStop environment. For more information please visit www.cspsecurity.com For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit wiki.cspsecurity.comMeet our team at these upcoming events, as we introduce Protect-X, our new and exciting security solution for hardening SAFEGUARD & OSS:
Regards, The CSP Team +1 (905) 568-8900
BITUG NEWS Coming soon: · Autumn Newsletter - will be issued in October 2016 - make sure you register for your copy by joining the BITUG mailing list at www.bitug.com· Little Sig – Thursday 8th December 2016 at Barclays, Canary Wharf - This event will take the form of an education/training session in the morning from 09:00, user and HPE presentations in the afternoon, BITUG AGM and a social evening.Do Not Miss Out - Mark Your Diary Now – For more info got to: http://www.bitug.com/little-sig-2016 Registration will open in the next few days.
· The European NonStop Conference and Exhibition and the BIG SIG rolled into one major event (eBITUG):
Do Not Miss Out - Mark Your Diary Now 9th and 10th MAY 2017 at the DoubleTree Hotel – Tower Of London For the latest information on all BITUG activity and to ensure you are first to know when event registration is open for the above events (there will be limited spaces – so registration will be on a first come, first served basis) please visit http://www.bitug.com and join the BITUG mailing list. Any questions please email chairman@bitug.com Kevin Poultney Chairman, BITUG. BrightStrand International Limited
Visit Lusis at CTUG
If you will be in
Canada October 19-20 for the CTUG
conference, please stop by our booth and get
an on-site presentation of TANGO. TANGO is our
award winning,
mission-critical, transaction processing software solution.
Here's what others have to say about TANGO: “TANGO helps us to provide better value, improved transactional performance and reliability.” - Philip Fayer, CEO, Pivotal Payments
“...TANGO was the best match for our needs and requirements. Lusis Payments has ensured a successful migration, and the solution is now running excellent.” - Jan Erik Secker, VP, NETS
“Our relationship with Lusis has been a tremendous asset to us. We've worked at all levels together...” - Randy Meyer, VP Mission Critical Systems, HP
“...not only did TANGO deliver the full capability to replace our existing solution but furthermore it delivered on the promises of flexibility, agility, capability and quality.” - Pieter Cilliers, CEO, BankservAfrica
Other upcoming events:
NonStop Technical Boot Camp 2016
GENERAL MANAGER Phone: 415-829-4577 Email: Brian.Miller@lusispayments.com Website: www. lusispayments.com
Availability Digest Examines HPE’s Software Spinoff to Micro Focus
It is yet another huge HPE announcement in 2016. Earlier this year, HPE merged its Enterprise Services Division with Computer Sciences Corporation (CSC), an arrangement valued at USD $8.5 billion. On 7 September, HPE and global software company Micro Focus announced their intent to merge HPE’s non-core software assets with the Micro Focus suite of solutions, a deal valued at USD $8.8 billion.
Both announcements represent HPE’s plan to slim down and to focus on its primary strategy – to become the industry leader in supplying software-defined hybrid IT solutions that will run today’s data centers and will bridge them to multicloud environments. Core software assets such as OneView and the Helion Cloud platform remain with HPE. It is the non-core assets that are being spun off. The Availability Digest reviews HPE’s strategy and introduces readers to the new realm of “spin-merge.”
In addition to “HPE Spins Off Software Assets to Micro Focus,” read the following articles in the Availability Digest’s September 2016 issue:
ING Bank Down Ten Hours Due to Fire Suppression Test – Inergen fire suppression systems are popular and necessary add-ons in data centers. So important are they that tests of the systems are scheduled routinely. Here lies a big challenge. The release of Inergen gas is explosive and very, very loud. Coupled with the noise of the fire sirens, the threat exists that unless precautions are taken, hard disks can be damaged. Such was the case to WestHost in 2010. Now comes another example – ING Bank in Bucharest, Romania, lost its data center for 10 hours during a recent test of its fire-suppression system.
Yahoo Hack Sets a Record – 500 Million Accounts – Not every record-breaking accomplishment deserves to be lauded. In late 2014, a Yahoo data breach led to the theft of information from 500 million user accounts – the largest corporate breach ever reported. The breach was not discovered until much later and was not announced by Yahoo until September, 2016. What took so long?
Delta Air Lines Cancels 2,100 Flights Due to Power Outages – This past August, Delta’s data center in Atlanta, Georgia (USA) experienced a massive outage that cancelled over 2,100 flights and cost the airline at least USD $150 million in revenue. The culprit? A routine failover test caused a fire, which killed one of the two power feeds into the data center. That led to the discovery that hundreds of servers were not linked to an alternative power source. Redundancy matters.
@availabilitydig – The Twitter Feed of Outages - Our article highlights some of our numerous tweets that were favorited and retweeted in recent days.
The Availability Digest offers one-day and multi-day seminars on High Availability: Concepts and Practices. Seminars are given both onsite and online and are tailored to an organization’s specific needs. We also offer technical and marketing writing services for a variety of industries as well as consulting services on risk assessment and system architecture. We ghostwrite for others and have years of experience in writing patent disclosures.
Published monthly, the Digest is free and lives at www.availabilitydigest.com. Please visit our Continuous Availability Forum on LinkedIn. We’re at 781 members and counting. Follow us as well on Twitter @availabilitydig.
comForte - Events near you
Security Quiz To ensure you and your security team are equipped with the right tools and knowledge necessary to keep Mars at bay, we have designed a security quiz to ready you and your team for battle. Be one of the first 100 people to take the test and get entered for a chance to win an Amazon Echo!
Steve
Tcherchian, CISSP
comForte - With Yuma, NonStop X Has Become a Full Software Solution
30. Aug 2016 created by Richard Buckle | posted in: #Modernization #NonStopX #Yuma
It’s been almost a year since I first heard about Yuma in HPE Discover 2015 presentations and conversations. (Yuma is also known as NonStop Application Direct Interface, or NSADI). For anyone interested in NonStop systems, NSADI supports HPE’s message of how contemporary NonStop has become. Based on the Intel x86 architecture and utilizing industry standard InfiniBand (IB) as the interconnect fabric, NonStop has transcended both hardware and infrastructure to become a software solution – indeed, arguably, the best software platform on the planet.
It never comes as too big of a surprise when I hear adventurous developers mention NonStop on x86 and IB, sourced from vendors apart from HPE – particularly with the recent advances in virtualizing NonStop and its CLIMs. With vNonStop and vCLIMs, now all it takes is the presence of x86 chips, an appropriate Linux-supported KVM, and suddenly, vNonStop and vCLIMs will be impervious to what lies beneath. KVM? KVM provides the VM within which vNonStop and vCLIM can run. Transforming to a hybrid infrastructure suggests NonStop is part of the bigger picture for HPE in the data center.
Read the full story
Lusis TANGO Webinar Series
Please join us for our next series of 1-on-1 presentations on transaction processing software for acquiring, routing, switching and authentication. TANGO is a solution that authorizes payments across multiple channels including ATM, POS, eCommerce, Prepaid and Mobile.
Learn how TANGO: · Has become the most cost effective long term payments solution on the market · Has been chosen by companies worldwide due to its performance and hardware agnostic capability · Can offer flexible architecture while providing scalable performance · Has recently gone live at one of the Big Five Banks in Canada · Select a date and time that works best for you!
Register today: http://www.lusisblog.com/tango_webex.html
GENERAL MANAGER Phone: 415-829-4577 Email: Brian.Miller@lusispayments.com Website: www. lusispayments.com
XYPRO looks forward to seeing you throughout 2016
ATUG 2016September 29, 2016 September 29, 2016Atlanta, GAEvent Website >
Payments Knowledge ForumOctober 3, 2016 October 4, 2016LondonEvent Website >
DUST – October 2016October 4, 2016 October 4, 2016Event Website >
MATUG 2016October 18, 2016Event Website >
PCI Europe 2016October 19, 2016 October 20, 2016Edinburgh, ScotlandEvent Website >
CTUG 2016October 19, 2016 October 20, 2016Mississauga, Ontario, CanadaEvent Website >
NENUG 2016October 20, 2016Event Website >
GTUG SIGOctober 26, 2016 October 27, 2016Bad Homburg v. d. Höhe, GermanyEvent Website >
NonStop Technical Boot Camp 2016November 13, 2016 November 16, 2016San Jose, Ca.Event Website >
PCI Asia Pacific 2016November 16, 2016 November 17, 2016SingaporeEvent Website >
comForte - Webinar: Modernizing Payment Applications on the NonStop Platform: Hype or Hope? The Payment landscape is evolving fast as payment processors and banks struggle with new competitors and regulations. Fintech start-ups challenge every assumption and technology by starting from the bottom – while new regulations such as GDPR (new European privacy laws) are difficult to implement in legacy systems which have grown over decades. The key to effective, efficient operations for IT - and your company - is not to radically replace core business offerings or functionality of legacy applications but rather to use a smart modernization approach. Fortunately, with the right tools and expertise, it’s possible to cost effectively modernize payment applications running on the NonStop platform, which itself has recently been modernized by HPE. ‘Modernization’ can mean anything from connecting your existing application to new market players to extending the capabilities ‘in-place’ - to improving security and governance/compliance.
XYPRO is proud to be a Diamond Sponsor for this year’s NonStop Technical Boot Camp!
With over 500 NonStop community members expected to attend, this is an event that you don’t want to miss! At XYPRO excitement is building and we are enthusiastically planning educational presentations, product updatesand fun nights out on the town. Visit www.NonStopBootcamp.com for the latest information on pre-conference seminars, the session agenda and the exciting speakers lined up! If you have yet to register for both the Pre-Conference Seminars and the Boot Camp get signed up now. We cannot wait to see everyone; this should be the best Boot Camp conference yet!!
comForte - Technical Boot Camp website Join us at the NonStop Technical Boot Camp in San Jose! We are excited to be a Diamond Sponsor at the Technical Bootcamp and are looking forward to seeing you in one of our pre-conference seminars, presentations or at our stand in the Partner Pavillion. Visit our website for more information on our presentation
Musings on NonStop! September, ‘16
The
opinions expressed here are solely
Are you finding this format for my Musings on NonStop useful? Do you find the links to my posts and commentaries worth following? It’s been a year since I changed the content of my monthly Musings but I am always monitoring the results – so if there are any suggestions you would like to make, feel free to email me at: richard@pyalla-technologies.com And if you plan on attending a couple of RUG meetings including DUST and CTUG, come and say Hi! Continuing with these thoughts,
who within the NonStop community these days doesn’t have a LinkedIn
profile? On the other hand, even as LinkedIn constantly fine-tunes their
product offerings, the amount of information crossing our desks / laps
continues to climb. Have we reached saturation point where reading
anything more has become information overload? Again, we are only a
couple of months away from the NonStop Technical Boot Camp (TBC) and
even as I look forward to catching up with many of you, I am open to
changing style and formats to better suit the time you can spend staying
current on all things NonStop. Real Time View: LinkedIn blog / Pulse: As well as a three part post on
storage … Banking Technology: ComForte: Tandemworld (Musings on
NonStop): Buckle-Up-Travel:
Pyalla Technologies, LLC
TCM Solutions - providers
of HPE NonStop Remote Systems Management
With our eyes never far away from what our customers are doing and as we maintain regular contact with our colleagues at HPE, there is much that we are learning of late. It seems that there has been a sizable jolt that has passed through the NonStop community that has awakened many of our customers to just how good they are having it; running critical applications on NonStop is, once again, making sense to them. Historically, the banks we work with have been NonStop stalwarts for decades but many of our colleagues that we had dealt with over the years were considering career changes as they looked to develop skills on platforms apart from NonStop. It was only a year or so ago that we noticed a lot more chatter taking place about just how long NonStop could prevail.
Tony Craig Managing Director TCM House, NonStop Centre of Excellence, Saltire Centre, Pentland Park, Glenrothes, Fife, KY6 2AG www.tcm.uk.com +44(0)1592 770081
Find out more about us at www.tandemworld.net
|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
+44 (0) 20 8304 7979 We would like to thank the sponsors of the September 2016 eNewsletter
Platinum Sponsor is
Gold Sponsor Silver Sponsor To enquire about Sponsorship opportunities for the Tandemworld Newsletter please click here. Current Subscribers 15102 Our company, Tandemworld, accepts no
liability for the content of this email, or for the consequences of any
actions taken on the basis of the information provided. |