Articles

Integrate Your HPE NonStop Servers With CyberArk

Steve Tcherchian

CyberArk’s Brian Carpenter, Director of Business Development for CyberArk the global leader in privileged access management, and Steve Tcherchian, Chief Product Officer and Chief Information Security Officer for XYPRO Technology Corporation, a leading cybersecurity solutions company Co-presented on the topic of integrating HPE NonStop servers with CyberArk.

Articles

Top Financial Institution Standardizes HPE NonStop Database Management

Steve Tcherchian

The client, a large US-headquartered financial institution, is a multinational, independent investment bank and financial services company assisting individuals, corporations, and municipalities. With more than 8,100 financial advisors serving approximately 3 million accounts in more than 2,600 locations throughout the United States, Canada and overseas, total client assets approach $1 trillion.

Articles

Multi-Factor Authentication Saves Time, Money, Reputation

Steve Tcherchian

Before utilizing XYPRO software solutions and services, one prominent bank depended on non-standard, less secure processes for logging onto their HPE NonStop systems and applications. Relying on a single set of credentials that was managed separately from their corporate Active Directory was both difficult to integrate with enterprise infrastructure and gave poor user experience…

Articles

XYPRO’s 2020 Cybersecurity Predictions – Add 2 Factor Authentication and Machine Learning to Your Plans!

Steve Tcherchian

As 2020 approaches, it’s time to discuss cybersecurity predictions that will impact the industry in the upcoming year. As a CISSP and Chief Information Security Officer for XYPRO, I thought long and hard about what I could say that would be impactful and hasn’t been said before – that’s a tall order! The reality is, what we predicted would be important in 2019, 2018 and even 2017 – is still applicable. A lot of what we predicted back then was never properly addressed and remains a risk today – credential theft and attacks targeting privileged user logins are more prevalent than ever. Currently, the best way to combat these types of attacks is to use 2-factor authentication.

Mission Critical

Strategies for Capturing and Creating Value from your Security Data

Steve Tcherchian

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make better-informed business decisions and provide strategic insights that give your company a competitive advantage in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last decade, computing power has advanced to the point where generating and storing massive amounts of data has become highly cost-efficient.

July-August2019

Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection

Steve Tcherchian

It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. That’s six months! On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.