Security Intelligence

Useful and interesting info about our company and products.

Businesses are spending more money than ever on cybersecurity technology to protect their infrastructure and data. Spending money on security doesn’t equate to being secure. To put it into perspective, businesses spend an average of over $115 USD per user on security software, hardware and services, yet nearly 30% of security investment goes underutilized or…

Continue Reading

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last…

Continue Reading

XYPRO Technology is a certified RSA Ready Technology partner. XYGATE User Authentication (XUA) now supports the RSA Cloud Authentication Service as a second factor of authentication for HPE NonStop servers. RSA is one of the world’s most widely deployed two-factor authentication solutions. Their certification program assures the solution customers are deploying has been verified interoperable…

Continue Reading

Big Breaches, Big Data, Big Context – How to Empower the Next Generation of Security Threat Detection Steve Tcherchian Chief Product Officer & CISO XYPRO Technology Corporation It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it…

Continue Reading

Proactive Security and Threat Detection – it’s not That SIEMple   Steve Tcherchian Chief Product Officer & CISO XYPRO Technology Corporation   Real-time threat detection is an indisputably critical element for maintaining operational integrity across a rapidly changing mission critical environment. Knowing when your system has been compromised quickly can make the difference between a…

Continue Reading

Learning from the Marriott International Data Breach (originally published in Grit Daily) The Marriott data breach highlighted several critical deficiencies in their cybersecurity mindset, plan & resources. Marriott International has admitted to an ongoing breach in its network since 2014 with nearly 500 million records stolen. These included social security numbers, passport numbers, email addresses,…

Continue Reading

May 10, 2018 • Security Intelligence

There is a large disconnect in the way breaches are evolving versus how security solutions are keeping up to address them. Virtualization adds an entirely new layer of complexity to the puzzle. As a security strategist, I’m constantly evaluating what is possible to help identify gaps and opportunities. The one thing I have learned over…

Continue Reading

  I recently came across reruns of a TV show from the 60’s called “Get Smart”. In the opening sequence of the show, the lead character, Maxwell Smart, played by Don Adams, must pass through nearly a dozen doors, or layers of security in order to access his job at “Control” where the secrets are…

Continue Reading

NonStop Technical Bootcamp 2016 – Five Great Take Aways Since I started with XYPRO over 10 years ago, I’ve been to a few NonStop events. This year’s NonStop Technical Bootcamp was big. Nearly 500 attendees crowded the hallways, conference rooms and lobby bar at the Fairmont in San Jose. The atmosphere felt electric and immersive….

Continue Reading

August 8, 2016 • Security Intelligence

    There is quite a large disconnect in the way security breaches are evolving versus how security solutions and resources are keeping up to address them, much like the book from John Gray covering relationships and the different motivations, of men and women. Unlike the book though, we’re not trying to come to a…

Continue Reading