Fighting Human Trafficking using AML and KYC Justin SimondsOctober 16, 20220276 views In the last Connection, my ‘Trends and Wins’ column discussed this topic, but very quickly. I wanted to expand on this subject due to its importance. If you’re like me, you’ve heard something about human trafficking. It seemed like a distant problem, not something I’d run up against. I was very surprised to find how prevalent it was even in developed countries.… Read more
Easily Modernize and Expose Valuable Enscribe Data – Eliminate Data Silos with HPE Shadowbase Paden R. HolensteinMarch 23, 20210306 views Several customers recently approached us looking for solutions to their remote data access/connection requirements. HPE Shadowbase software uses a data replication/integration architecture to meet these needs, and has experience successfully deploying these solutions at a number of customer sites. Resolving this Challenge In the past, companies accessed trapped data via remote clients. Unfortunately, this approach had several issues: Queries impacted several key components Production environment Network CPU resources Queries timed out and failed if the network was down or the production environment was inaccessible Today, these companies face a dilemma: “What do we do if our solution has gone End-of-Service-Life (EOSL)?… Read more
Integrate Your HPE NonStop Servers with SailPoint Identity Governance XYPRO TeamSeptember 22, 20200254 views Whether you need to provision users on one or multiple HPE NonStop servers, XYGATE Identity Connector (XIC) elegantly integrates your NonStop servers with your SailPoint enterprise solution. Achieve user governance, provisioning and reconciliation of HPE NonStop user accounts directly from SailPoint. Read more
Integrate Your HPE NonStop Servers With CyberArk Steve TcherchianJune 23, 20200334 views Join CyberArk’s Brian Carpenter, Director of Business Development, and Steve Tcherchian, Chief Product Officer and Chief Information Security Officer for XYPRO as they discuss how the CyberArk Privileged Access Security Solution secures, manages, automates, and logs all activities associated with privileged access. They will detail current attack vectors and analyze real use cases on how your HPE NonStop servers can seamlessly integrate with CyberArk processes to help ensure complete visibility, traceability, automation, and security of your HPE NonStop servers. Read more