Tag : Zero Trust

Articles C2 Fall 2022

Historic collaboration: Next-gen virtual infrastructure accelerates apps, boosts workloads

Mark Nickerson
Today we are excited to announce the new HPE ProLiant with VMware vSphere® Distributed Services Engine™ developed in collaboration with VMware and AMD Pensando as the first HPE solution for VMware’s Project Monterey. This new...
Articles C2 Fall 2022

Developers: Get free resources and training through the HPE Developer Community portal

Dale Rensing
The variety of ways that developers, data scientists, and ML engineers can leverage APIs and data to create new business opportunities is boundless. But if it’s too hard, it’s not worth the struggle, right? That’s...
Articles C2 Summer 2022

XYPRO Presents Zero-Trust Security, Enterprise Integration, at HPE India’s BCD

Steve Tcherchian
It was an honor to be invited to speak at this year's Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days....
Articles C2 Winter 2021 Data Solutions Data Solutions

XYPRO – Best of NonStop 2021

Steve Tcherchian
Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According...
https://insights.comforte.com/hubfs/data%20protection%20methods%20blog%20header.jpeg
Articles C2 Winter 2021 Data Data Security

Getting Started with Data-centric Security

Dan Simmons
With a proliferation of cyber-attacks throughout the pandemic, data-centric security has been pushed to the forefront of many organizations’ cybersecurity strategy. Even companies with mature security programs are vulnerable to breach, and since data is...
Articles C2 Fall 2021 Data Zero Trust Security

Mapping HPE’s Zero Trust Efforts To The Current Cyber Threat Landscape

Matt Kimball
The latest ransomware attack on the market was a doozy. Just a few weeks ago, the Russian hacking group known as REvil attacked MSPs (Managed Service Providers) that utilize Kesaya’s VSA software, holding them hostage...
Articles C2 Fall 2021 HPE GreenLake Project Aurora Security Zero Trust Security

Making the move to zero trust architecture: 4 key considerations

Jeff Enters
New approaches to innovative security architectures are starting to emerge, including HPE’s groundbreaking Project Aurora. Here’s how to make zero trust architecture work for your business. The broad concept of zero trust architecture has achieved...
Articles C2 Fall 2021 Data Solutions XYGATE Zero Trust Security

XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop

Steve Tcherchian
Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are...
Articles Data Winter 2020

When it comes to Digital Transformation, Don’t Forget Security

Neil Correa
Digital transformation (DX) is the natural evolution of traditional business operations allowing organizations to capitalize on the full capabilities of our technological advancements, meet consumer expectations and keep competitors at bay (or at least be on...