Accelerate and Automate SAP HANA Security Compliance with Workload Aware Security Layer (WASL) from HPE and XYPRO XYPRO TeamOctober 16, 20220387 views In most mission critical environments, SAP HANA is the lifeblood of an organization. SAP HANA (High-performance ANalytic Appliance) is a highly performant, highly scalable in-memory database that serves as a platform for enterprise resource planning (ERP) applications and other business workloads that need to analyze data in real-time. Hewlett Packard Enterprise (HPE) is the #1 system provider for SAP HANA* with over 40 percent market share—more than the next three vendors combined—and is the leader in deployments of SAP HANA appliances, tailored datacenter integration (TDI), SAP® BW/4HANA®, and SAP S/4HANA®.… Read more
XYPRO Presents Zero-Trust Security, Enterprise Integration, at HPE India’s BCD Steve TcherchianJune 20, 20220250 views It was an honor to be invited to speak at this year's Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days. Read more
XYPRO – Best of NonStop 2021 Steve TcherchianDecember 2, 20210305 views Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According to Verizon’s 2021 Data Breach Investigation Report, 61% of cyberattacks targeted credential theft. This far surpasses personal, banking and payment card information which have been primary targets for years. The cybersecurity industry has responded with a variety of ways to protect sensitive data with regulations, technology, and awareness, which has forced attackers to look for easier targets, such as usernames and passwords. Read more
XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop Steve TcherchianSeptember 21, 20210252 views Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are carried out. Ransomware is extremely damaging for a business due to its relatively low cost to execute and high value rate of return. Four percent might seem like a low number, but just one user falling victim to a phishing attempt is one too many.… Read more
GDPR 2021 – Compliance and Penalties; 3 Years Later Steve TcherchianSeptember 21, 20210332 views The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data of EU citizens, regardless of where that business or individual is based. Read more
Payments Apps and Database Security. It’s Business as Usual. Until it’s Not. Steve TcherchianSeptember 21, 20210268 views CashApp, Zelle, Venmo, ApplePay, Square - the payments industry is growing and expanding into areas we hadn’t imagined. Everyone relied on it before the pandemic - now it’s critical infrastructure and embedded into our everyday habits. Read more
PCI DSS 4.0 Is Coming. Will You Be Ready? Steve TcherchianJune 15, 20210325 views Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new templates and supplements, including the “Migrating from SSL and early TLS Information Supplement” in April 2015 which highlighted the risks of SSL and TLS 1.0. The supplement described a migration plan as well as set a migration deadline of 1 July, 2016. Read more
President Biden’s Cybersecurity Order 101: The Essential Guide Steve TcherchianJune 15, 20210304 views On May 12th, 2021, President Biden released the “Executive Order on Improving the Nation’s Cybersecurity”. Its primary goal is to secure our national digital landscape. What we’re seeing is an overdue, full-force reaction to the threats to cybersecurity and operational infrastructure. Read more
Meeting Your Security Integration Objectives – CyberArk, ServiceNow, Splunk and more… Steve TcherchianMarch 23, 20210408 views COVID-19 and its security ramifications continue in 2021 and well beyond. All of the threats brought to the fore when we were sent to work from home got added to the already-growing set of risks we were already trying to mitigate. Read more
Lisa Partridge of XYPRO Technology Corporation: How We Plan To Rebuild In The Post COVID Economy Charlie KatzSeptember 22, 20200187 views Everything that happens is ultimately my responsibility. Period. However, one cannot and should not do it all alone. No one person has all the answers and think of all the perspectives to consider when making decisions. Read more