Tag : Security

Diagram Description automatically generated with medium confidence
Articles C2 Summer 2021 Security

PCI DSS 4.0 Is Coming. Will You Be Ready?

Steve Tcherchian
Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy.  A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new...
Articles C2 Summer 2021 DevOps

Security Champions – they can help put the “SEC” in DevSecOps

Stan Wisseman
While DevOps can mean different things to different people or organizations, ideally security is an implied requirement of successful DevOps and there’s no need to differentiate by adding the “Sec”. Security should already be embedded....
Articles C2 Spring 2021 Cloud Data Mission Critical Security

Digital Transformation For Public Sector Agencies Starts With Better Data Management And Strategies

Cohesity
Digital transformation is more than just a buzzword. For many government agencies, it’s a long-overdue necessity that can be broken down into three main improvement areas: better data insights, better delivery models (especially through mobile...
Editors' Picks Security Storage Winter 2020

A Workplace Paradigm Shift: Building Resilience in Our Workforce and Systems with HPE GreenLake

John Sroka
When the coronavirus pandemic forced everyone out of offices, IT teams scrambled to obtain the necessary hardware and additional software licenses necessary to support entirely remote operations. At the same time, they had to match...
Articles Data Winter 2020

When it comes to Digital Transformation, Don’t Forget Security

Neil Correa
Digital transformation (DX) is the natural evolution of traditional business operations allowing organizations to capitalize on the full capabilities of our technological advancements, meet consumer expectations and keep competitors at bay (or at least be on...
C2 Fall 2020

Protecting Your Most Valuable Asset Demands A New Approach To Cybersecurity

Cohesity
Today, data is likely your most valuable and vulnerable strategic asset, and yet many of the methods for storing and protecting it are decades old. Data is not only a record of what has happened;...
C2 Fall 2020

Integrate Your HPE NonStop Servers with SailPoint Identity Governance

XYPRO Team
Whether you need to provision users on one or multiple HPE NonStop servers, XYGATE Identity Connector (XIC) elegantly integrates your NonStop servers with your SailPoint enterprise solution.  Achieve user governance, provisioning and reconciliation of HPE...