Security

PCI and GDPR Data Protection Requirements Met With Zero Downtime on Payments Processing Network

[vc_row][vc_column][vc_empty_space][vc_column_text]

Company profile

Bankart is a card payments processing center headquartered in Slovenia that serves 23 banks and other institutions across six countries in four different currencies. With our Central Authorization System (CAS), Bankart processes over 43 million ATM, POS, internet, and mobile transactions every month on ACI’s BASE24© Classic. We also control and manage ATM and POS networks for most of our banks.…

Read more

Risk Management in the Real World:
Today, Tomorrow and Beyond

[vc_row][vc_column][vc_empty_space][vc_column_text]

2018 was another troubling year in the cybersecurity world. We saw a repeat of last year’s data breaches on a larger scale. Google, Toyota, Facebook, Under Armour, LifeLock, Air Canada, Blue Cross and many, many more fell victim to some sort of compromise. Hardly a week went by where we weren’t reading about a new mega breach. Even the popular online video game, Fortnite, was hacked and children’s personal data was found for sale on the dark web.…

Read more

Top Two Hybrid Cloud Concerns?
Spend & Security

[vc_row][vc_column][vc_empty_space][vc_column_text]Businesses are embracing hybrid cloud in record numbers because it lets them choose a mix of applications, services and platforms — all tailored to their needs. Yet, many struggle with the complexity of operating different private and public clouds in conjunction with traditional infrastructure. Often, they don’t have the right skills to oversee and manage their cloud implementations and that can lead to unrestrained cost and risk.…

Read more

Three Ways of Looking at Security Operations

[vc_row][vc_column][vc_empty_space][vc_column_text]The term “security operations” is often interpreted to be synonymous with a security operations center (SOC). In fact, a web search on security operations results mostly in links to SOC content. But that’s a narrow view. How you view security operations will make a difference in how fast your organization can deliver software and mitigate breach damage. A bigger-picture view that includes IT operations is necessary to address the agile threat environment that exists today.…

Read more

5 Creative Uses of Advanced Authentication

[vc_row][vc_column][vc_empty_space][vc_column_text]Micro Focus’s Advanced Authentication (AA) is an open framework that allows just about any authentication type to be plugged into it. With its open architecture, AA allows organizations to future proof their environment so they can always have the freedom to adopt the latest without the fear of vendor lock-in.

Troy Drewry, product manager for Advanced Authentication, I presented a BrightTalk webcast tilted, “The Five Most Creative Ways that Organizations are using Advanced Authentication,” that shares the transformations we’re seeing in authentication among our customers, both install base as well as in new implementations.…

Read more

Protecting Your Enterprise – That’s Our Mission

[vc_row][vc_column][vc_empty_space][vc_column_text]

Our Story

From connecting systems that never stop, to data protection

comforte was founded in 1998 by the creators of a connectivity solution for mission-critical systems.
Soon after becoming the most widely used terminal emulation solution for HPE NonStop systems, comforte realized the next logical step was to make sure that communication between systems and applications were securely connected as well.…

Read more

Our Data Is Under Attack! Getting Your Data Security Strategy Up To Par With GDPR

[vc_row][vc_column][vc_empty_space][vc_column_text]If I was writing this in the early 2000s, I would have started with the line “open any newspaper and the headline will be screaming about…” but since this is 2018, and newspapers have pretty much gone the way of the dodo bird, I will start with: open any web browser or news app…” My point is that things have evolved very quickly over the last 20 years thanks to the internet.…

Read more

Simplifying Hybrid IT for a Successful Digital Transformation

[vc_row][vc_column][vc_empty_space][vc_column_text]One size fits all was never a good idea for consumers buying clothing, and it certainly doesn’t work well for purchasing IT. That’s because every business is different. Each enterprise has unique business processes, security concerns, customer demands, and financial limitations. Because of these differences, enterprises worldwide are turning to a better IT strategy–hybrid IT.

 

Hybrid IT complexity slows digital transformation

Hybrid IT gives enterprises more options, letting them choose public cloud, private cloud, on-premises solutions – or a combination of all three.…

Read more