Our self service customer portal is currently under maintenance and will be back soon! Sorry for any inconvenience this may have caused.
Technology leaders and corporate decision makers at companies processing mission critical data use XYPRO security solutions to protect against catastrophic data loss, financial loss, reputation damage and regulatory intervention. XYPRO has delivered HPE NonStop risk management and security solutions longer than anyone!
Learn more about XYPRO’s extensive line of Enterprise-Integrated NonStop Risk Management, Compliance, Identity & Security solutions. Register now to find the solutions important to you and enjoy the richest technical event dedicated exclusively to the global Hewlett Packard Enterprise NonStop server community.
Take advantage of this gathering of learning, networking and socializing!
Sunday, November 3 Pre-Conference Education
Join your NonStop community before Boot Camp begins for XYPRO’s NonStop pre-conference seminars. Lunch Included..
9:00am – 11am
Maximize Your Investment in HPE NonStop Security With XYGATE
Presented by Rob Lesan, XYPRO Technology
Did you know that already you have the tools you need to protect your organization from a catastrophic security breach delivered with your HPE NonStop server? XYPRO’s XYGATE® Merged Audit (XMA) and XYGATE User Authentication (XUA) are two key security solutions included with all new HPE NonStop servers.
XMA intelligently merges audit data from multiple sources such as Safeguard, EMS, XYGATE, Base24, Base24-EPS (and others) into a single, normalized database to give you the security information you need, when you need it. Report on data, alert on data and send it all to your enterprise SIEM for enterprise integration and clarity of your company’s overall security health.
XUA Integrates HPE NonStop authentication with a variety of authentication providers, including Microsoft Active Directory, LDAP, RADIUS and RSA SecurID. These provide Multi-Factor Authentication (MFA/2FA) support for the HPE NonStop Server, addressing the latest PCI-DSS requirements “out of the box”.
Join XYPRO for a NonStop TBC Pre-Conference Education session and learn how to configure XMA for maximum audit efficiency and how to implement XUA for multi-factor authentication (a PCI requirement!) in a NonStop server environment – take advantage of the rich security tools included with your HPE NonStop server. Register today.
12:00pm – 2:00pm
A Five-Step Guide to Proactive Risk Management
Presented by Rob Lesan, XYPRO Technology
Risk management is an integral part of the mission critical application life cycle. It ensures that your systems and applications are reliable, work as expected and the availability of the environment to your customers. The main purpose of the risk management cycle is to reduce or mitigate the chances of failure due to a cyber security breach – which could be devastating for your customers, your company and your career. Defining a risk management strategy to achieve and maintain compliance with regulations like PCI DSS or ISO can be both difficult and expensive.
What’s surprising to learn is that many organizations already have the tools they need to achieve compliance and simply need a plan to implement! In this session, we’ll go over the 5 necessary steps to properly implement a measurable risk management strategy. We will cover what auditors look for, which tools you already have and how to simplify and automate your audit and compliance activity so it becomes a sustainable strategy on which you can rely. XYPRO regularly partners with organizations like yours, providing protection from threats and strengthening weaknesses that put you and your customers as risk.
Sign up for this NonStop TBC pre-conference session with XYPRO and learn how to effectively protect your mission critical data and the HPE NonStop server environment. Register today.
Monday, November 4 2:30pm-3:30pm (Regency Ballroom C)
Simplifying Security Operations and Compliance with XYGATE SecurityOne
Presented by Tanya Jones, Discover Financial Services
PULSE is one of the nation’s leading ATM/debit networks, currently serving banks, credit unions and savings institutions across the country. PULSE is owned by Discover Financial Services. The network links cardholders to ATMs and POS terminals at retail locations nationwide.
As a provider of critical managed network services, PULSE needs to ensure continuous compliance and protect themselves from data theft, malware and other cybersecurity threats all while ensuring an available network. Dedicating time and resources for audits, manual monitoring of log files and piecing together data from multiple sources was an inefficient and manual process. The volume, velocity and availability of the data made this an impossible task.
In this session, Tanya Jones, Senior Manager of Information Security at Discover Financial Services, discusses how XYGATE SecurityOne’s Security Management and Analytics Platform simplified audit activities, reduced risk, improved threat detection and increased efficiency of their security operations while maintaining compliance with regulations such as PCI-DSS and others.
Join XYPRO and the Women of NonStop for a special wine and cheese networking reception at #NonStopTBC19 benefitting the Connect Future Leaders of Technology Scholarship fund.
Tuesday, November 5 – 1:00pm – 2:00pm (Regency Ballroom C)
Anatomy of a CyberSecurity Breach – Building a Strategy That Works
Presented by Steve Tcherchian, XYPRO Technology
Once your network and systems have been compromised, there is no going back. The best you can do is contain the damage as quickly as possible. The current mean time to detect a cybersecurity breach is nearly 200 days. That means hackers are in your network, on your systems doing what they want for over 6 months before they’re detected – IF they’re ever detected. The damage to your systems, the loss of your critical data, the impact to your company’s reputation and your career is immeasurable. These are the things that keep leaders up at night.
Interestingly, most organizations have the solutions and data necessary to proactively detect malicious activity, yet this problem still exists. Why?
Join us as we dissect the activities cyber criminals use to infiltrate networks, how they camouflage their activity as “innocuous user behavior” while they move freely about your infrastructure, targeting your data. We’ll show you a security strategy that utilizes next generation threat detection, providing actionable data with real time analytics to quickly mitigate risks. This one-hour session shows you the strategy to protect you and your organization’s mission critical data from a catastrophic security breach.