NonStop ™ Newsletter for August 2019

Sponsored By

Gold Sponsor


Click an Article to See more


OmniPayments flies higher with Payments-as-a-Service

SENTRA - Monitoring Cryptographic Authentication

No ................

NSTBC 2019

Lusis Announces Strategic Partnership with DataCare Zrt

PCI-DSS Compliance with CSP PassPort®

Hand-in-Hand with MOMI at the 2019 NonStop TBC!

Please Enjoy Gravic's Two New Videos on HPE Shadowbase


The Tangible Value of Patterns and Anomalies in Security Data


Visit the XYPRO events calendar

NuWave Is World Travelling!

TIC SOFTWARE: REST and Geocoding - The Perfect Combination for NonStop





OmniPayments flies higher with Payments-as-a-Service

 It’s getting harder and harder to ignore the cloud revolution. Its adoption is now pervasive, its growth year on year is in double-digits. Just look how Amazon Web Services continues its onward march and Microsoft’s Azure strategy continues to drive significant growth for the once windows-focussed company, recently reporting a rather glorious 68% year on year growth in their cloud business.  Cloud expenditure growth is now 7 times greater than on-prem IT spend.  But why has its rise been so meteoric? Let’s just think about all those Apps on your phone – what happens each time you fire up one of those small Apps.  Something has to be tying this all together. 

The same cloud revolution is coming to payments, for consumers, retailers and banks.  Retailers in particular are asking:

“How quickly can I get to market?”

Their customers will not wait, and as e-commerce eats into the bricks market, retailers need to move rapidly to stay in business.

So what are OmniPayments doing to help these business?

OmniPayments brings a global backbone of systems spanning the globe which will allow clients to move quickly and nimbly.  “Payments as a Service” is now an available with OmniPayments.   Let’s assume you want to enter the payments business.  Are you really going to spend 18 months to 2 years and millions of dollars building a data centre, installing systems, firewalls, just to get into a business you wanted to be in 2 years ago? 

Clients are rapidly realising the choice and rapid time to market that Payments as a service offers them.  And that OmniPayments is one of the few games in town with the reliability and scalability to allow them to meet the needs of the 7 billion consumers on planet earth.

Read the full article here.

Payments is everywhere today. Payments are embedded in your phone, embedded in your games, embedded in your apps.  We as consumers are going to be moving more and more electronic money around, and only Payments as a Service will meet that need.  As an example, Korea announced back in 2016 their intended goal of becoming a cash-free society by 2020. They’ll probably get there. Other countries will follow suit.

One of the most exciting propositions from Omnipayments is the recent focus on small to medium sized banks and retailers.  Cloud based offerings have changed this approach and given clients a reduced time to market, increasing return on investment and profitability.

For a long time now, this sector of the market has been neglected; but no more.

With the OmniCloudx payments service, institutions simply plug their existing business workflow into the OmniCloudX service.  They don’t have to worry about any of the infrastructure overheads, e.g. where the system is located, who runs it, the knowledge and skills to run the system.  All this is handled by the OmniCloudX service.   All the client gets are the benefits of the card payments service.

Clients have also embraced a hybrid model of cloud services.  Those with an on-prem facility can leverage OmniCloudX as their business contingency; they can spread the load across both instances, proving their contingency facility with every processed transaction.

The service comes with everything you need to process card and payments. True 24*7 availability, robust security with PIN and Card management, Fraud Management, PCI DSS compliance, EMV-compliant, highly scalable and responsive, switching out to a broad range of Interchanges & Card schemes, Host system integration, clearing and settlement, easy-to-use real-time data visualisation operations.

Plug and Play. It’s become almost that easy with OmniPayments.


SENTRA - Monitoring Cryptographic Authentication

 Insider Technologies’ Sentra enterprise monitoring solution provides real-time monitoring of all elements of an Authentication Server cryptographic environment, including applications, certificates, the Daemon and the cryptographic infrastructure.  



Sentra maintains a centralised database of performance data from one or more Authentication Server environments and provides real-time analysis. The outcome is a collection of dashboards that represent the monitored environments, incorporating real-time performance, service level alerts and graphs representing nominated metrics.

Sentra utilises agents known as 'extraction clients', to read the required information from the target environment and relay it back to its server.  


As the Sentra database is being updated by the extraction clients, the information can be processed in real-time by a variety of techniques, e.g.:

Rules to analyse the data and alert to a dashboard, an enterprise manager or mobile technologies. 

o   The rule can be as simple as checking the level of a value in a table row or scanning for a particular key word in a log entry.

o   More complicated rules based on aggregating data from a number of rows, or tables, or systems, or over time can also be built.

Graphs and charts can be linked together to create a drill down approach to identifying the root cause of any issues identified.


Architecture Description

The Authentication Server environment provides authentication services to applications which forward user requests to it. This will often take the form of a user wanting to authenticate via chip and PIN for example, which will send an EMV request for the authentication server to process.

The processing of this operation may involve objects such as cryptographic keys and certificates stored on a dedicated piece of hardware such as a Cryptographic Module. This requires communication with a database and CRL or an OCSP (a 3rd party Online Certificate Status Protocol service), for certain other kinds of operations such as verifying the signature of an incoming request.

The authentication environment may also output logs to disk and produce JMX performance counters.

Sentra for authentication utilises these extraction clients (agents) to gather data from all parts of this complex and critical system and store it within the central Sentra database, ready for analysis.

Sentra Installation

Sentra is installed on its own Windows server with an attached SQL database. A number of extraction clients are then utilised, e.g.:

Authentication Log Monitoring - Disk

This client is installed within the Authentication Server environment to  read the contents of any Authentication Server log.

The contents of each log file entry are parsed into their component parts, such as timestamp, channel, service name , message. This information is written to Sentra SQL tables for evaluation and reporting.

Authentication Log Monitoring – Database

This client performs in exactly the same manner as ‘Log Monitoring – Disk’. Instead of reading from disk, it reads log file and table information directly from the Authentication Server SQL Database.

Authentication Devices Monitoring

This client is installed onto the Authentication Server environment. It reads device information from cryptographic devices using the pkcs11.dll. Data is then written to the Sentra SQL Database for alerting and reporting purposes.

Authentication Device Objects Monitoring

This client is installed onto the Authentication Server environment. It reads device object (keys, cert etc.) information from the cryptographic devices using the pkcs11.dll. Data written to the Sentra SQL Database for alerting and reporting purposes.

JMX Monitoring

This client is installed onto the Authentication Server environment. It reads JMX performance counters and attributes from the Daemon process. Performance data is written to the Sentra SQL Database for evaluation and reporting purposes.

Windows Event Log / Performance Monitoring

This client represents a number of clients that can be installed on the platform where the Authentication Server application is running.

They can be used to read hardware performance data, subsystem performance data such as SQL Server performance metrics, and event log information. Data is written to the Sentra SQL database for evaluation and reporting purposes.

Benefits of Sentra for Authentication Monitoring

A number of these are summarised below:


·        Single Point of Contact for Monitoring & Alerting

·        Restricted Access to Sentra Functions

·        Simple Access to Disparate Data

·        Real Time Alerting to Potential Issues

·        Automated Issue Resolution

·        No Access to Sensitive Information

·        Performance Improvements

Example Scenarios

Two example scenarios illustrate the advantages of installing Sentra to monitor and manage an Authentication Server environment.

How do I Monitor Pool Usage without Turning on Debugging?

Your Authentication Server environment has been installed and running for some time you are unsure of the impact a potential increase in transactions will have on your environment.

Database pools running out of connections to the database may result in failed transactions during busy periods.

As this is a production server you are unable to interrupt the service you provide to your customers in order to re-tart the Authentication Server environment; business is reluctant to run the environment with debugging turned on, as this would increase the overhead on the service and would require downtime to restart the authentication server with the new settings.

Solution - Use a Sentra Hypervisor to Display Pool Metrics

A Sentra Hypervisor can be configured to provide an overall view of the Authentication Server environment.

This initial view consists of linked icons that represent elements of the Authentication Server environment, such as channels, pools or cryptographic devices. The view can also display simple graphs that provide an indication of performance metrics such as TPS or pool utilisation.

By clicking on the icons in this Hypervisor, further drill-down views can be launched that will display detailed information relating to the selected element. A drill-down view for a channel or pool could display information relating to minimum, maximum and current pool allocation that is updated in real time. This will give an 'at a glance' indication of the current and historical state of the pools.

Rules can be configured to monitor these values. If the rule criteria is broken an alert will be fired, causing the relevant Hypervisor icons to flash, indicating that a threshold is about to be breached, providing advanced warning of any configuration changes that may be required.

Problem - How do I Monitor Cryptographic Memory Utilisation?

You are unaware of the number of certificates and data objects that are stored on each of the cryptographic devices, or servers within your Authentication Server environment but you suspect that they may be nearing capacity.

It will require constant manual intervention, and exposes functions that you do not want made available to the general user population.

Solution - Deploy the Sentra Authentication Extraction Client

The Sentra for Authentication application includes an extraction client that will automatically poll your cryptographic and/or server environments at a specified interval and retrieve information relating to memory utilisation and certificate counts.

As with all information written to the Sentra Database, this information can be interrogated and charted on a Hypervisor view to give a real time and historical view of these values for each cryptographic environment.


If you would like further information on Sentra for Authentication Monitoring, then please contact Insider Technologies Limited:

+44 161 876 6606


No Smoke ......

No smoke, no mirrors, no snake oil.

Just NonStop Services to suit you.




Make plans to join the global NonStop community for four days of networking and learning with NonStop Engineers, Executives, Partners and Customers:

Registration is open!

Pricing Information:

Early Bird price:       $1395                        expires October 1st

Regular price:          $1695


General Session Keynote Speakers:

Dr. Timothy Chou “Artificial Intelligence and the Enterprise”

Elvis Chan
Supervisory Special Agent (SSA)
Federal Bureau of Investigations


New! NonStop Education Marathon:


In this unique 5 day education marathon, 9 primary topics will be covered in ½ day segments. The first morning begins with an introduction and NonStop product overview. Then the marathon starts!

There will be a series of interesting topics delivered by experienced NonStop instructors. Select sessions will also be accompanied by select HPE product management and/or development subject matter experts.


If you also register for the NonStop Technical Boot Camp in San Francisco, a $250 discount will be applied to your TBC registration!


Price: $3,000 USD

Course Length: 5 Days

Delivery Mode: ILT

Location: HPE San Jose Office
6280 America Center Drive

Lunch, coffee and snacks are included with registration.


  • System Operators
  • System Administrators
  • System Analysts
  • Support Personnel


  • This marathon covers many topics which are useful and interesting for anyone who is actively managing a NonStop system- in just one week!
  • Topics are focused on HPE Integrity NonStop X Blade Systems


Detailed knowledge about the HPE Integrity NonStop X Blade System architecture, operations, and management.

The Partner SIG looks forward to reuniting with Customers and HPE this fall!

Kathy Wood

NonStop Partner SIG/Vendor Chair



Lusis Announces Strategic Partnership with DataCare Zrt


Utilizing the Lusis product, TANGO, DataCare Zrt will have the ability to provide message switching, transaction processing, fraud, loyalty management, multi-asset trading platform solutions and services.

SAN FRANCISCO & PARIS-- Lusis Payments, a global innovator of mission-critical payments software, announced today that DataCare Zrt, a leading European data management and solutions provider, has signed a strategic partnership agreement. In the new agreement, Lusis will provide software solutions that will reside in DataCare’s Data Centre. DataCare delivers innovative information technology solutions that help its customers maximize their return on information by increasing the value of information and/or reducing the information technology related costs of information ownership.

Utilizing Lusis’ mission-critical software product, TANGO, DataCare will have the ability to provide message switching, transaction processing, fraud, loyalty management, multi-asset trading platform solutions and services based on an HPE NonStop platform. Datacare has vast expertise in providing unparalleled custom applications built on the HPE NonStop platform to organizations worldwide.  The technological foundation of DataCare’s custom solution is comprised of HP NonStop servers for maximum uninterrupted availability.  Datacare will provide the new services to clients globally.

TANGO is an online processing engine for mission-critical 24x7 solutions. TANGO delivers performance, availability, and scalability, with a rich set of functionalities, all from a single application, a single code set and a single architecture. This flexibility makes TANGO ideal for the next generation of payment systems. TANGO is built on a highly performing micro-service architecture providing agility for business needs.  “As a leading Financial Technology company, we welcome and seek likeminded companies which allow us to collaborate and deliver state-of-the-art technology to the financial industry,” said Philippe Preval, President and CEO of Lusis Payments. “TANGO addresses business needs both now and in the foreseeable future.”

Lusis was recently named as “Best Electronic Payment Systems Solution – Europe 2019” by Capital Finance International. Lusis earned this distinction for its technology and its dedication to research. The Lusis Artificial Intelligence and Data Science department drives the company’s advanced high-performance solutions.

About Lusis Payments
Lusis Payments is an innovative global software and services provider to the payments industry. The company’s proven, cutting edge technology operates in numerous hardware and operating environments. The TANGO platform, combined with the know-how to mitigate risk and deliver high levels of assured customer service, constitutes a unique proposition for organizations faced with the challenge of adapting to traditional and future needs in the payments ecosystem.

About DataCare Zrt
The business mission of DataCare Zrt is to deliver innovative information technology solutions that help its customers maximize their return on information by increasing the value of information and/or reducing the information technology related costs of information ownership. DataCare can supply integrated information technology solutions that combine technologies from various software and hardware vendors into a single unified system and service for the customers.

Brian Miller
Lusis Payments, North America

(415) 829-4577


PCI-DSS Compliance with CSP PassPort®


Authentication and authorization on NonStop systems require a complex arrangement of basic Guardian file permissions, Safeguard globals and optional object ACLs. All of these elements provide control over who can do what to an object.

CSP PassPort® is a comprehensive security solution for controlling and auditing user access to HPE NonStop systems. It provides comprehensive user and command control, password quality enforcement, and full session auditing for NonStop systems.

CSP PassPort complements Safeguard by providing additional security features and greatly expands the Guardian security package for systems without Safeguard.

Manage PCI-DSS Compliance Requirements

CSP PassPort provides important security features for NonStop servers with or without Safeguard. While Safeguard provides a range of authorization and authentication controls, additional controls are required to manage how users logon to TACL and/or OSH, and what privileged commands can then be used. At the same time, once logged on, it is critical to control what activities may then be carried out.

CSP PassPort addresses some of the following PCI-DSS requirements:

Requirement 7

Restrict access to cardholder data by business need-to-know

Requirement 8

Identify and authenticate access to system components

Requirement 10

Track and monitor all access to network resources and cardholder data

Requirement 12

Maintain a policy that addresses information security for all personnel




Designed for NonStop Command Control

CSP PassPort provides comprehensive user and command control, password quality enforcement and auditing. It controls and filters user access to systems, programs and commands according to customized user profiles.

 All user terminal input/output operations (including OSS) can be monitored via an easy-to-use GUI interface, while an audit process records all user activities.

Major Benefits:

Ø  Limit user access to sensitive assets, programs and commands

Ø  Improve user accountability and audit activities

Ø  Track powerful user id’s  and commands

Ø  Prevent easy hacks by enforcing Password Quality

Ø  Eliminate the need to disclose sensitive SUPERID passwords for executing commands

Ø  Generate extensive reports of user activities

Ø  Get real-time notifications with Alert-Plus, and forward logs to SIEM for analysis

Key Features:

Ø  Monitor and audit user sessions down to keystroke level

Ø  Role-based user access

Ø  Time restrictions by command and program

Ø  User Authentication SEEP to prevent users from logging on outside CSP PassPort

Ø  Powerful Custom Reporting

Ø  Control client connections by IP address or IP address ranges

Ø  Multi-factor authentication support (coming soon!)

Learn more about CSP PassPort here

CSP - Compliance at your Fingertips™

For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit


We Built the Wiki for NonStop Security ®


The CSP Team              

+1(905) 568 - 8900


Hand-in-Hand with MOMI at the 2019 NonStop TBC!



BlackWood Systems will be offering private, individual training at the NonStop Technical Boot Camp for our customers and those interested in learning about MOMI. 

Since we don't know the Breakout Session schedule yet, we are simply taking names/companies at this time and will be in touch with you to schedule an optimum time for your MOMI training.

This is a great opportunity for you to get everyone 'up to speed' with their MOMI usage! 


Registration Info:


About MOMI:


MOMI is the superior real-time tool for monitoring, troubleshooting and diagnosing your HPE NonStop™ System operations:


User Friendly

Budget Friendly

Resource Friendly


Reliable, Technical Excellence and Strong Customer Support

MOMI runs on all NonStop platforms!



Please Enjoy Gravic's Two New Videos on HPE Shadowbase


Shadowbase Overview Video

We hope that you find this video interesting and informative. Please share it with your colleagues!

This video is also available with Korean and Chinese Simplified subtitles, with additional translations in the future.

Paul J. Holenstein Award Interview

Paul Holenstein, Gravic EVP, was interviewed at HPE Discover on Gravic winning the HPE Momentum Technology Partner of the Year 2019 Award.

We are happy to share our presentations, so please contact us. Hewlett Packard Enterprise directly sells and supports Shadowbase solutions under the name HPE Shadowbase. For more information, please contact your local HPE Shadowbase representative or visit our website.

Please Visit Gravic at these Upcoming 2019 Events


ATUG Meeting—Atlanta, 18 September

CTUG Conference—Toronto, 25-26 September

Connect HPE Technical Boot Camp—San Francisco, 3-6 November



Ask TandemWorld

Got a question about NonStop ? ASK Tandemworld

Keep up with us on

Twitter @tandemworld

We are currently seeking skilled resources across the EMEA region,

contact us for More Info

The Tangible Value of Patterns and Anomalies in Security Data

Steve Tcherchian

XYPRO Technology

Every business wants more data. Data on their customers, competition, operations, processes, employees, inventory and more. Data can be used to make business decisions and provide strategic insights that gives companies a competitive advantage. This can be in terms of efficiencies, enhancing the customer experience, or refining market strategy. Its uses are limitless. Over the last decade, computing power has advanced where generating and storing data has become much simpler and cost efficient.

With all that data available, most businesses struggle to figure out what to do with it all now that they have it. According to Forrester, up to 73% of data within an enterprise goes unused for analytics. We are so used to extracting targeted information from data that we simply ignore what we don't understand and throw it away as noise. This problem is prevalent in every industry, but especially in the security world. Security teams are overwhelmed with the vast amounts of data generated from firewalls, intrusion detection systems, network appliances and other devices. It's impossible to expect security teams to interpret all this data. We unintentionally end up focusing on what we already know and ignoring what we don't.

Typical alerting systems are configured to raise alarms, but only when they encounter a binary event or reach a threshold. For example, if three or more failed authentication attempts performed in succession are detected, generate an alert. Yet successful authentication attempts are mostly categorized as business as usual and ignored. The current mean time to detect a breach is over six months. Most organizations have all the data they need to identify a breach much faster than the six month average, yet they are still unable to detect and react to a breach in a semi-reasonable amount of time. This is due to


      The volume and velocity of the data being generated

      Not looking for patterns in all of the data available - the unknown unknowns

      Not having the proper context for the data available

If your system is ever breached, you don't necessarily need to look at the failed authentication events, you need to look for anomalies in the successful ones!

Most organizations are well down the path on their journey of capturing and storing all of their data for future analytics. Data Lakes are large repositories of raw data in any format. Capturing, storing and securing that data is key. Once the data is available, it can be analyzed and its value maximized using a variety of methods. This is where the fun starts!

On HPE NonStop servers, XYGATE Merged Audit (XMA) gathers, normalizes and stores security audit data from the system and its applications. Merged Audit is your central repository for all NonStop security data. This is your NonStop Security Data Lake.

Click here to continue reading.



 30 years ago, when Q/Tos was introduced, NonStop was Tandem and all tape volumes were reel-to-reel and unlabeled.  Just as now, Q/Tos cataloged backup criteria for future data retrieval as well as the files that were backed up.

  Q/Tos also tracked the tape volumes to off-site storage and alerted operations when the tape volumes were to return and place them back in service.  Soon after Q/Tos was created, labeled tape support and $Zserver entered the picture creating the first major renovation to the way Q/Tos handled backup and restore. 

This was followed by the evolution of tape drives.  Reel-to-reel became cartridge, and autoloaders and silos replaced operators. 

The latest development was virtual tape servers.  Q/Tos was adapted to take the best advantage of each of these innovations.  Backup and Restore didn’t remain static either.  Backup/Restore 2 came along for OSS and SQL/MX. 

Again Q/Tos evolved to take advantage of BR2 to catalog the backups and automate the restores.  A GUI was developed to improve productivity in maintaining and querying the Q/Tos database. 

From the start in 1989 to the present Q/Tos has adapted to the ever changing Backup/Restore landscape. 

Happy Birthday Q/tos!


more from


Visit the XYPRO events calendar here to see where we will be and to sign up for free webinars.


HPE and OZTUG NonStop Technology Summit (Sydney)

September 3 – September 4, 2019

Sydney, Australia


HPE and OZTUG NonStop Technology Summit (Melbourne)

September 5 – September 6, 2019

Melbourne, Australia


2019 PCI SSC North America Community Meeting

September 17, 2019 - September 19, 2019 

Vancouver, BC, Canada

ATUG – Atlanta HPE NonStop User Group 2019

September 18, 2019 

Alpharetta, GA 


CTUG 2019

September 25, 2019 - September 26, 2019 

Mississauga, Ontario

2019 PCI SSC Europe Community Meeting

October 22, 2019 - October 24, 2019 

Dublin, Ireland

NonStop Technical Boot Camp 2019

November 3, 2019 - November 6, 2019 

Burlingame, CA

2019 PCI SSC Asia-Pacific Community Meeting

November 20, 2019 - November 21, 2019 

Melbourne, Australia



NuWave Is World Travelling!


NuWave Technologies recently attended a wave of NonStop conferences around the world, including the North Texas Tandem User Group (N2TUG), the HPE NonStop Innovation Summit in Seoul, South Korea; and the Taiwan HPE NonStop conference. Check out our recap of summer 2019 HPE NonStop events to hear how they all went!



We're also looking forward to the next round of NonStop events. OZTUG Sydney and OZTUG Melbourne are just around the corner on the 3rd and 5th of September, respectively, and our very own Andrew Price will be hosting the Australian TUGs, as well as presenting on LightWave software at both conferences--talk about multi-tasking! Then our North American reseller, TIC Software, will be on-site and the Atlanta Tandem User Group (ATUG) on September 18th and the Canadian Tandem User Group (CTUG) on September 25th to answer any questions on interfacing to NonStop applications using NuWave solutions. Wherever you are in the world, we look forward to seeing you on the road!

TIC SOFTWARE: REST and Geocoding - The Perfect Combination for NonStop


Some may refer to it as low hanging fruit, others the sweet spot , or even perhaps the perfect storm. Regardless, geocoding may be the perfect way to empower your NonStop application via RESTful API.

What is Geocoding?

Before we get into how to use Geocoding, it’s important to understand its function. Through Geocoding, a street address can be converted into geographic coordinates like latitude and longitude. This allows a computer system to make a map with the locations of different businesses, houses, parks, and much more.

What if you already have the latitude and longitude of a location? Reverse geocoding converts geographic coordinates into a street address that humans can read. Continue reading

Webinar: Are you looking for a good use case for REST on NonStop? Do you want to extend your NonStop applications? If so, attend our Webinar to learn how REST and Geocoding can empower your NonStop application easily.

When: Thu. Aug 29, 2019 | Time: 2:00 PM - 3:00 PM EDT


For more information about our solution, please contact or visit our website



Find out more about us at

Sponsored By


+44 (0) 20 8304 7979

Our company, Tandemworld, accepts no liability for the content of this email, or for the consequences of any actions
or information provided.

To Unsubscribe or Change your Subscription Please click here