ArticlesC2 Fall 2022 Accelerate and Automate SAP HANA Security Compliance with Workload Aware Security Layer (WASL) from HPE and XYPRO by XYPRO Team October 16, 2022 written by XYPRO Team In most mission critical environments, SAP HANA is the lifeblood of an organization. SAP HANA (High-performance ANalytic Appliance) is a highly performant, highly scalable in-memory database that serves as a platform for enterprise resource planning (ERP) applications and other business workloads that need to analyze data in real-time. Hewlett Packard Enterprise (HPE) is the #1 system provider for SAP HANA* with over 40 percent market share—more than the next three vendors combined—and is the leader in deployments of SAP HANA appliances, tailored datacenter integration (TDI), SAP® BW/4HANA®, and SAP S/4HANA®. With nearly 25,000 customers and over 34,000 servers running SAP applications on HPE hardware HPE brings a unique understanding of SAP and SAP HANA environments for customers of all sizes and with all types of workloads. HPE understands the demand SAP HANA requires from server and storage environments to keeping mission-critical applications protected and secure, modernizing your digital core. Many organizations find it difficult to achieve and stay in compliance with the latest security and regulatory requirements with regard to SAP HANA. Evolving industry regulations put additional stress on security professionals to maintain system security policies. According to the Hiscox Cyber Readiness Report, over 70% of global organizations are not prepared to handle a sophisticated cyberattack. And the costs are huge—on average, a data breach costs an organization over $4.24 million. Add the more difficult to measure, but very real costs of data loss, customer trust, and reputation damage, and these figures quickly multiply. With the frequency of cyberattacks increasing and currently standing at approximately 100 million data records every day, you need to take action to protect your data. Consider the following: Are you confident of the security compliance of your business-critical workloads? Is your compliance level current to address evolving threats? Do you thoroughly understand the risks of your business operations and data? Security compliance for SAP HANA is challenging When deploying SAP HANA, adherence to the SAP HANA security guidelines is a monumental and expensive effort. The SAP security guide for hardening SAP HANA now exceeds 800 pages. This doesn’t include hardening the RedHat or SUSE Linux operating system to meet Center of Internet Security (CIS) compliance benchmarks. HPE research has found that out-of-box Linux distributions are less than 50% compliant with industry standards. To achieve full compliance, organizations are required to harden systems with manual effort and scripts. Performing these processes manually across multiple systems in multiple locations is burdensome to IT teams as they are cumbersome, prone to human error, and can consume months of staff time to evaluate, remediate, deploy, and maintain security compliance. The Difference Maker: Automated security compliance with WASL With decades of expertise in securing the most critical and demanding IT environments in the world, XYPRO Technology, together with Hewlett Packard Enterprise have strengthened their mission-critical security offerings with a unique security compliance solution for Linux® and SAP HANA® workloads—Workload Aware Security Layer (WASL). WASL is designed to provide efficient, industry-standard compliance at the operating system and application levels. Unlike other products in the market that rely on security services or require manual effort and custom scripting, WASL automates the security compliance process. WASL reduces security compliance deployment time for Linux operating systems and SAP HANA® workloads from months to minutes. With a single click, WASL hardens both the Linux operating system and the SAP HANA workload to achieve over 90% security compliance. The remaining effort requires minimal input, such as a password or log file location. WASL unburdens IT, teams, fortifying the business, and lowering costs to achieve quick time to value. Through a single pane-of-glass, WASL quickly assesses the security posture of your SAP HANA environment and its exposure to threats. WASL’s intuitive, consolidated dashboard continuously monitors compliance for your operating systems and mission-critical workloads, a key activity, especially after an O/S update. WASL remediates non-compliant issues with a single click and, if needed, rolls back to a previous compliant version – something other compliance solutions cannot do. WASL is customizable – adding, modifying, and silencing rules in accordance with security policies specific to your country/location/industry. WASL can define roles such as user, administrator, policy officer, operator, security auditor, and more. WASL also generates audit reports. With such powerful security capabilities at your fingertips, costly third-party security services can be avoided, and the risk of fines and legal costs for non-compliance is mitigated. Ready to learn more? Ask for a free trial If you are looking to simplify and accelerate security compliance for SAP HANA on Linux (RHEL & SUSE SLES) across your HPE server environment, visit www.xypro.com/wasl or contact your HPE representative. October 16, 2022 0 comment 9 FacebookTwitterPinterestEmail
ArticlesC2 Summer 2022 XYPRO Presents Zero-Trust Security, Enterprise Integration, at HPE India’s BCD by Steve Tcherchian June 20, 2022 by Steve Tcherchian June 20, 2022 It was an honor to be invited to speak at this year’s Hewlett Packard Enterprise Business Critical Dialogue (BCD) event in Chennai, India. What an unforgettable 3 days. 0 FacebookTwitterPinterestEmail
ArticlesC2 Winter 2021Data SolutionsData Solutions XYPRO – Best of NonStop 2021 by Steve Tcherchian December 2, 2021 by Steve Tcherchian December 2, 2021 Have we become numb to the news of security breaches? Unfortunately, the attacks on our businesses, personal lives and even global infrastructure are not slowing down. Cybercrime is up over 600% during the pandemic. According to Verizon’s 2021 Data Breach Investigation Report, 61% of cyberattacks targeted credential theft. This … 1 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2021Data SolutionsXYGATEZero Trust Security XYPRO and HPE Partner to Provide ZERO Trust Security for HPE NonStop by Steve Tcherchian September 21, 2021 by Steve Tcherchian September 21, 2021 Arecent industry phishing report showed that 4% of users are prone to click on anything sent to them. That is a scary statistic given that phishing is one of the primary methods ransomware attacks are carried out. Ransomware is extremely damaging for a business due to its relatively low … 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2021Data SolutionsGDPRHPE NonStop ComplianceSecurity GDPR 2021 – Compliance and Penalties; 3 Years Later by Steve Tcherchian September 21, 2021 by Steve Tcherchian September 21, 2021 The General Data Protection Regulation, or GDPR, is a major piece of legislation adopted in 2018. It is designed to address the protection and responsible use of every European Union citizen’s personal data. However, GDPR is not an EU-only regulation. It affects ANY business or individual handling the data … 0 FacebookTwitterPinterestEmail
ArticlesC2 Fall 2021DataData SolutionsSecurity Payments Apps and Database Security. It’s Business as Usual. Until it’s Not. by Steve Tcherchian September 21, 2021 by Steve Tcherchian September 21, 2021 CashApp, Zelle, Venmo, ApplePay, Square – the payments industry is growing and expanding into areas we hadn’t imagined. Everyone relied on it before the pandemic – now it’s critical infrastructure and embedded into our everyday habits. 0 FacebookTwitterPinterestEmail
ArticlesC2 Summer 2021Security PCI DSS 4.0 Is Coming. Will You Be Ready? by Steve Tcherchian June 15, 2021 by Steve Tcherchian June 15, 2021 Since the release of PCI-DSS 3.0 in 2013, the PCI Security Standards Council has been quite busy. A little over a year after it was published, the council released PCI-DSS 3.1, followed by several new templates and supplements, including the “Migrating from SSL and early TLS Information Supplement” in … 1 FacebookTwitterPinterestEmail
ArticlesC2 Summer 2021Security President Biden’s Cybersecurity Order 101: The Essential Guide by Steve Tcherchian June 15, 2021 by Steve Tcherchian June 15, 2021 On May 12th, 2021, President Biden released the “Executive Order on Improving the Nation’s Cybersecurity”. Its primary goal is to secure our national digital landscape. What we’re seeing is an overdue, full-force reaction to the threats to cybersecurity and operational infrastructure. 1 FacebookTwitterPinterestEmail
ArticlesC2 Spring 2021Data SolutionsSecurity Meeting Your Security Integration Objectives – CyberArk, ServiceNow, Splunk and more… by Steve Tcherchian March 23, 2021 by Steve Tcherchian March 23, 2021 COVID-19 and its security ramifications continue in 2021 and well beyond. All of the threats brought to the fore when we were sent to work from home got added to the already-growing set of risks we were already trying to mitigate. 1 FacebookTwitterPinterestEmail
C2 Fall 2020 Lisa Partridge of XYPRO Technology Corporation: How We Plan To Rebuild In The Post COVID Economy by Charlie Katz September 22, 2020 by Charlie Katz September 22, 2020 Everything that happens is ultimately my responsibility. Period. However, one cannot and should not do it all alone. No one person has all the answers and think of all the perspectives to consider when making decisions. 0 FacebookTwitterPinterestEmail