NonStop ™ Newsletter for September 2019

Sponsored By

Gold Sponsor

Silver Sponsor

________________________________________

Click an Article to See more

Contents

Verify Elite: The Complete Solution for File Integrity Monitoring & Compliance

Parsing XML and JSON Messages in COBOL

Gravic Publishes New White Paper on HPE Shadowbase SOLV Product Suite

Stop Wasting Money on Security

No ................

Managing the Enterprise in Real-Time

Digital banks are eating away at Traditional banking.

TIC SOFTWARE: REST and Geocoding - The Perfect Combination for NonStop

ASK TW

Visit LUSIS at CTUG | Canadian Tandem Users Group

Hand-in-Hand with MOMI at the 2019 NonStop TBC!

Visit the XYPRO events calendar

NSTBC 2019

 

 

 

   
 

Verify Elite: The Complete Solution for File Integrity Monitoring & Compliance

File Integrity Monitoring is an important requirement of the PCI data security standard for securing confidential (e.g., cardholder) information, and is considered a crucial part of protecting business assets.

NonStop systems are now being used in far more dynamic situations and have more external connections than ever before. The ubiquity of payment cards for personal electronic transactions has changed the security equation in a fundamental way.

Any compromise in security is likely to have far reaching consequences, both in terms of financial loss, and for the wider damage to an organization’s reputation. Protecting personal cardholder information is paramount.

In this context, File Integrity Monitoring should be considered an important security necessity, not just for PCI compliance, but in order to preserve the integrity of all NonStop systems.

Verify Elite is a complete NonStop compliance and file integrity monitoring solution from CSP, which continuously ensures that your NonStop System's security meets industry standards and regulations, including PCI DSS, SOX and GDPR.

By performing regularly scheduled compliance checks, Verify Elite's Security Compliance Monitor can ensure your compliance with both regulations and internal security policies.

And by executing regularly scheduled file integrity checks, Verify Elite's File Integrity Monitor can quickly detect if any unauthorized changes occur to selected groups of files.

What’s New in Verify Elite 2.4

Two key new features included in the latest release of Verify Elite are the new “Binder Timestamp” flag for Guardian File Integrity Check and the EMS logging options .

Security Compliance Monitor Key Features

·        Pre-built customizable compliance rules

·        Detailed reporting on regulatory compliance

·        Includes rules for PCI DSS, SOX,

·        Customizable reports

·        Intuitive GUI makes compliance checking & audit reporting eas 

File Integrity Monitor Key Features

·        Monitors both Guardian & OSS files

·        Meets PCI-DSS regulation 11.5

·        Captures file fingerprints

·        Full audit reporting capability

·        Alerts for unauthorized changes

·        Multi-Node Fileset Compare

·        Easily integrated with enterprise security tools

 

Multi-Node Fileset Compare

The regular comparison of filesets across nodes should also be a part of the process to ensure the integrity of your files. For example, files that are replicated to backup environments or remote nodes need to be regularly compared to production files to ensure their integrity.

Verify Elite’s Multi-Node Fileset Compare feature permits the comparison of filesets located either locally or across NonStop nodes. Using the file attribute information, Multi-Node Fileset Compare can compare selected filesets across any two nodes, identifying both the matches and differences between the file attributes in each. If a discrepancy is found, investigation and possible remedial action can then take place.

CSP - Compliance at your Fingertips™

For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit wiki.cspsecurity.com

We Built the Wiki for NonStop Security ®

Regards,

The CSP Team     

+1(905) 568 - 8900

 


Parsing XML and JSON Messages in COBOL

 Thunder Suite from Canam Software Labs generates COBOL and C source code for reading and writing XML and JSON messages.  Using the Thunder toolset, a Handler Design is created that specifies the mapping between program data fields and XML/JSON nodes as well as the data validation rules that should be applied.  The Handler Design is then used to generate all the COBOL or C source required to parse and create XML/JSON messages.  The code can be used in new or existing programs – no runtimes required!

To see how Thunder works, click here to view the video near the bottom of the page.

 Thunder is the solution of choice for developers and IT architects for processing XML and JSON messages in COBOL and C.  It’s model-driven approach frees up developers’ time to focus their expertise on the business logic in their programs while reducing the time to market for applications.

Thunder is available in three unique solutions.

JSON Thunder for COBOL and C code creation.

XML Thunder for COBOL, C and Java code creation.

Thunder Suite, which packages both XML Thunder and JSON Thunder plus version control for a truly comprehensive code generation solution.

Be sure to visit Canam Software and out partner TIC at this year’s Technical Boot Camp in San Francisco November 3rd to 6th.  Schedule a one-on-one demo of Thunder today!   Email info@canamsoftware.com or call (289) 719-0800.

 ___________________________________________________________________________

To start a free 30-day trial of Thunder Lite and experience the power of a model-driven approach to code creation that JSON and XML-enables COBOL, C and Java programs, visit www.jsonthunder.com or http://www.xmlthunder.com.

 


Gravic Publishes New White Paper on HPE Shadowbase SOLV Product Suite

Gravic recently published a new white paper: HPE Shadowbase SOLV Product Suite – Online Database Loading, Copying, Synchronizing, and Unloading.

The HPE Shadowbase Online Loader (SOLV) and the HPE Shadowbase Extract, Transform, and Load (ETL) Toolkit are utility products designed to perform initial database loads, including any subsequent target database resynchronization.

Online and offline loading (or unloading) of a source database into a target database can be open for reading and updating while the load (or copy) occurs. The SOLV utility plays an important role in eliminating planned downtime via zero downtime migration (ZDM) and also provides an option for replicating non-audited HPE NonStop Enscribe and SQL data.

The ETL Toolkit is used to extract database changes or initial load data into flat files for subsequent ETL loading into a data warehouse using comma-separated value (CSV), fixed-position, and tab-delimited formats. A variety of features and databases are supported.

 

Gravic Presents on New HPE Shadowbase Use Cases at ATUG Meeting

 

 

Gravic recently presented, HPE Shadowbase Mission-Critical Use Case Solutions and Product News at the ATUG Meeting held in Atlanta. Attendees learned about new and future HPE Shadowbase features and how the software solves various enterprise use case problems, including:

·        Business Continuity – active/passive, sizzling-hot-takeover, active/active replication architectures

·        Data Integration and Synchronization – big data/OLAP, feed data warehouses

·        Application Integration – real-time fraud detection, build real-time business intelligence systems

·        Zero Downtime Migration – eliminate planned application downtime, minimize the risks associated with hardware and software changes

Please Enjoy Gravic’s Two Videos on HPE Shadowbase

Shadowbase Overview Video

We hope that you find this video interesting and informative. Please share it with your colleagues!

Paul J. Holenstein Award Interview

Paul Holenstein, Gravic EVP, was interviewed at HPE Discover on Gravic winning the HPE Momentum Technology Partner of the Year 2019 Award.

 

To speak with us about your data replication and data integration needs, please call us at +1.610.647.6250, or email us at SBProductManagement@gravic.com. Hewlett Packard Enterprise directly sells and supports Shadowbase solutions under the name HPE Shadowbase. For more information, please contact your local HPE Shadowbase representative or visit our website.

 

Please Visit Gravic at these Upcoming Events

CTUG Conference—Toronto, 25-26 September

MexTUG Meeting—Mexico City, 17 October

Connect HPE Technical Boot Camp—San Francisco, 3-6 November

SunTUG Sunshine Summit—Tampa, 28 February

 


Stop Wasting Money on Security!

 Steve Tcherchian

XYPRO Technology

 Businesses are spending more money than ever on cybersecurity technology to protect their infrastructure and data. Spending money on security doesn’t equate to being secure.

To put it into perspective, businesses spend an average of over $115 USD per user on security software, hardware and services, yet nearly 30% of security investment goes underutilized or is never implemented. Small businesses, those with less than 1,000 users, are impacted more, with an average spending of $157 per user, yet the same underutilization concern still exists.

These are eye popping numbers which really underscores how much purchased software is sitting on the shelf and not being used. 

CEOs, CISOs and board members have taken notice. Cybersecurity is now just as important in the boardroom as the bottom line. The financial, reputational and career-ending risk of a catastrophic security breach is such a high-profile problem that many more business leaders are putting emphasis on security.

No one wants their company to be the next Marriott or CapitalOne (from a data breach perspective). Budgets are being allocated and money is being spent, but a large part of that security investment is still sitting around doing nothing—it’s unimplemented shelfware. The fact that the decision has been made and the money spent, regardless of implementation, leads to a false sense of security, further exacerbating the problem and more importantly, the risk.

As you’re reading this, you’re probably looking over at your white board thinking “Yeah, we still have to implement that”. Trust me, you’re not alone.

 

Click here to continue reading.

 


No Smoke ......

No smoke, no mirrors, no snake oil.

Just NonStop Services to suit you.

www.brightstrand.com

 

 


Managing the Enterprise in Real-Time

Your business consists of multiple architectures, systems, platforms, applications, all pivotal to providing a service to your customers.   

The enterprise components may be monitored individually, or occasionally via enterprise management solutions but rarely, are they managed collectively - as a service.

The Collective Solution - Sentra

A collection of real-time dashboards, performance metrics, query engines, rules based alerting are all available for your monitoring needs.

Sentra real-time monitoring is conducted away from your enterprise, managed via a unique and powerful enterprise monitoring solution.

Centralised Management

Sentra is a client-server(s) application for management of multi-vendor systems, networks, applications, cloud, and security.  

Centralised monitoring is the key aspect of Sentra, accompanied with escalation, alerting, tracking and reporting facilities. It collectively, in real-time, retrieves data from numerous sources and interprets this data in how it affects the service provision to your business.

This real-time and historical data is available for Sentra’s unique query engine, where you can drill down into any of the data and retrieve content, e.g., based on suitable access rights, retrieve transaction and payment details with the option to mask any of the account data fields prior to viewing.

Cloud Monitoring

Cloud platforms of course provide their own monitoring facilities but as with the whole of the business enterprise, monitoring multiple platforms and multiple cloud service providers such as AWS, GCP, Azure can be tedious, especially if your administrators are individually, monitoring these multiple platforms and services.

By utilising Sentra, all your platforms and Cloud services can be monitored from one collective browser based interface.

Security and Intrusion Detection

Security Risk Management and Intrusion Detection is all about providing system and network administrators with a visual representation of any anomalous traffic, occurring within their networks. This kind of monitoring is invaluable to a large enterprise.

If you would like further information on how Sentra can provide all your monitoring requirements, including that of HPE NonStop, then please do not hesitate to contact Insider Technologies Limited:

hello@insidertech.co.uk

+44 161 876 6606

Further details are available via our website:

https://www.insidertech.co.uk/solutions/

 

 


Digital banks are eating away at Traditional banking.

Digital-only banks operating within the UK are set to grow significantly over the next year, reaching a total of some 35 million customers globally, according to Accenture.

Digital challengers such as Revolut, Tide, Starling, Monzo, N26, and even one delightfully named Tandem are slowly but surely taking customers away from the UK’s Big-four HSBC, Lloyds, Royal Bank of Scotland, & Barclays.  Digital banks operating in the UK boast not only UK based customers, but 13 million customers across Europe. While initially targeting market share, the digital challengers and now increasingly attracting customers of all ages and wealth profiles, as they focus on becoming more profitable.  Balances are increasing, indicating greater confidence in these digital banks.  Not only are they attracting consumers, but all also business level banking too.  The recent explosion of single-trader companies requiring a modern banking service is also attracting yet more clients, with an increasing number of clients counting on them as their primary account. 

Digital banks have one major advantage:  the cost to serve a digital-only customer is much less than the traditional banks.  Without the heavy costs of their branch and ATM networks, customer service costs are roughly 20% of the cost of traditional banking.

So the opportunity is there to launch yet more new digital bank.  Admittedly there are quite a few services to bring to the market.  Debit Cards, Faster Payments, International Transfers, Direct Debits, New Account Opening, iOS and Android mobile Apps, OpenAPIs, SMS, Mobile Wallets are all features that must be available 24/7.  And it takes time to build.

Which is one of the reasons why banks are turning to banking service companies such as OmniPayments to help launch their challenger bank.  The OmniPayments modern architecture really lends itself to a challenger bank:  OpenAPIs with JSON support, ISO20022 for Instant Payments, enables a modern card switch to be launched in months, not years. 

OmniPayments comprehensive solution includes:

   Card Issuing full lifecycle

   Card Authorisation and Routing

   complete support for all major Card Networks incl. Visa, MasterCard

   complete support for ATM, POS, & ECOM Transactions

   Payments on-prem or as-a-service in a private cloud

   OpenAPI Support over JSON / XML

   Proven high performance (1000s of transactions per second)

   Fraud Management

   Loyalty Accrual and Redemption

   Host system connection for Legacy mainframe

   ISO8583 and ISO20022 Support

   Faster Payments

   Clearing & Settlement

   Guaranteed uptime with active/active implementation

   Debit, Credit, and PrePaid cards

   Magstripe, EMV, Contactless,

   Real or Virtualised for Mobile Wallet

   Robust Security - PCI Compliant

   Mobile App Support for full customer control

  

For more information, please visit OmniPayments.com ,

contact us at sales@omnipayments.com,

or come talk to us at one of the many shows including the Nonstop TBC in San Jose running from November 3-6. 

  


TIC SOFTWARE: REST and Geocoding - The Perfect Combination for NonStop

 


Some may refer to it as low hanging fruit, others the sweet spot , or even perhaps the perfect storm. Regardless, geocoding may be the perfect way to empower your NonStop application via RESTful API.

What is Geocoding?

Before we get into how to use Geocoding, it’s important to understand its function. Through Geocoding, a street address can be converted into geographic coordinates like latitude and longitude. This allows a computer system to make a map with the locations of different businesses, houses, parks, and much more.

What if you already have the latitude and longitude of a location? Reverse geocoding converts geographic coordinates into a street address that humans can read. Continue reading blog

For more information about our solution, please contact
Sales-support@ticsoftware.com or visit our website http://www.ticsoftware.com
Follow us on LinkedIn | Twitter | TIC Blogs

 


Ask TandemWorld

Got a question about NonStop ? ASK Tandemworld

Keep up with us on

Twitter @tandemworld

We are currently seeking skilled resources across the EMEA region,

contact us for More Info

www.tandemworld.net


Visit LUSIS at CTUG | Canadian Tandem Users Group

 

If you're going to be attending CTUG next week in Mississauga, Ontario please be sure to stop by our booth and connect. Learn why so many financial and retail institutions have partnered with Lusis Payments to leverage solutions for; Message Switching, Transaction Processing, Fraud, Loyalty Management, Legacy Payment Replacement, POS and ATM Management.

 

Our TANGO solution has replaced more legacy payments installations than all of our competitors combined over the past 4 years. Stop by and see how.

TANGO FRAMEWORK

  • BUILT ON MICRO SERVICES
  • HIGH AVAILABILITY
  • PLATFORM AGNOSTIC
  • DATABASE AGNOSTIC
  • TESTED AT 10,000 TPS
  • POWERFUL SDK

Lusis Payments is dedicated to providing the best technology solutions in the payments industry. Visit our booth to learn about our advancements in Data Science, Artificial Intelligence, FX Trading, ISO 20022, Fraud and Blockchain. If you'd like to schedule some specific time to meet while at the show please contact me at 402.889.9331 or visit lusispayments.com/events.

Ki Roth
Business Development, North America

(402) 889-9331

Ki.Roth@lusispayments.com


Hand-in-Hand with MOMI at the 2019 NonStop TBC!

 

 

BlackWood Systems will be offering private, individual training at the NonStop Technical Boot Camp for our customers and those interested in learning about MOMI. 

Since we don't know the Breakout Session schedule yet, we are simply taking names/companies at this time and will be in touch with you to schedule an optimum time for your MOMI training.

This is a great opportunity for you to get everyone 'up to speed' with their MOMI usage! 

 

Registration Info:

https://events.eventzilla.net/e/handinhand-with-momi-at-the-2019-nonstop-tbc-2138750011

 

About MOMI:

 

MOMI is the superior real-time tool for monitoring, troubleshooting and diagnosing your HPE NonStop™ System operations:

 

User Friendly

Budget Friendly

Resource Friendly

 

Reliable, Technical Excellence and Strong Customer Support

MOMI runs on all NonStop platforms!

 

kwood@blackwood-systems.com

602-569-8766

 


Visit the XYPRO events calendar

here to see where we will be

and to sign up for free webinars.

CTUG 2019

September 25, 2019 - September 26, 2019 

Mississauga, Ontario

2019 PCI SSC Europe Community Meeting

October 22, 2019 - October 24, 2019 

Dublin, Ireland
 

NonStop Technical Boot Camp 2019

November 3, 2019 - November 6, 2019 

Burlingame, CA
 

2019 PCI SSC Asia-Pacific Community Meeting

November 20, 2019 - November 21, 2019 

Melbourne, Australia

 

 


Make plans to join the global NonStop community for four days of networking and learning with NonStop Engineers, Executives, Partners and Customers:

Registration is open! 

https://www.nonstoptbc.com/

Pricing Information:

Early Bird price:       $1395                        expires October 1st

Regular price:          $1695

 

General Session Keynote Speakers:

Elvis Chan
Supervisory Special Agent (SSA)
Federal Bureau of Investigations

Sample Breakout Sessions:

NSDEE - Increasing efficiency for application development

 

What's new in the world of compilers and languages in use on the NonStop system?

 

Advanced case study in payment industry from ‘Payment as a service’ to ‘Payment Token’ - Use cases for NonStop in concierge service for next-generation retail payments

 

Update on NonStop Manuals

 

Prepare your VMware environment to deploy vNS

The Partner SIG looks forward to reuniting with Customers and HPE this fall!

 

Kathy Wood

NonStop Partner SIG/Vendor Chair

kwood@blackwood-systems.com

 

 


Find out more about us at www.tandemworld.net

Sponsored By

Gold Sponsor

Silver Sponsor

 

 



www.tandemworld.net

+44 (0) 20 8304 7979


Our company, Tandemworld, accepts no liability for the content of this email, or for the consequences of any actions
or information provided.

To Unsubscribe or Change your Subscription Please click here