HPE News
Blog Home All Blogs

Upcoming Security Webinars

Posted By Cindy Leonard, 1 hour ago

Data Protection in the Changing Payments Landscape

On Demand

As the use of stolen or fraudulent cards for in-person card present transactions becomes more difficult, criminals are shifting their focus to online activities. To stay ahead of the bad guys, merchants and institutions need tools that are specifically designed to address these challenges. Join HPE’s Smrithi Konanur to hear more about proven ways to safeguard sensitive crypto processes and protect payment transactions while eliminating the exposure to sensitive cardholder data.

Register Here:

 

2017 Trends in Identity, Security & Analytics for the Digital Enterprise

On demand

This Enterprise Security Summit is where top security experts discuss technologies to protect apps and data in today’s new digital enterprise – across cloud, mobile, web and IoT. Attend Online and learn about Data-Centric security advances without impacting performance.

Register here:

 

Key Steps to Implement & Maintain PCI DSS Compliance in 2017

DATE: Feb 28, 2017

TIME: 1PM Eastern / 10AM Pacific

With cyber-attacks on payment card data and personal information becoming much more advanced, the PCI DSS standard has been forced to adapt to address these new threats. The requirements of PCI DSS are clear, but it takes work to accomplish compliance across an organization. On this webinar HPE’s Branden Williams and the panel will discuss some best practices, and solutions that provides your business with an easy, cost-effective and highly automated way to achieve compliance with PCI DSS in 2017.

Register Here:

 

 

 

This post has not been tagged.

Share |
PermalinkComments (0)
 

Introducing Data Center Automation 2017.01 – New Year, New Suite

Posted By Megan Glick, 1 hour ago

This year, we’re completely revolutionizing HPE’s Data Center Automation (DCA) suite!

DCA 2017.01 is part of a continuous evolution towards a suite solution that unifies infrastructure management across infrastructure tiers and simplifies the consumption experience. We’ve brought infrastructure management under a single entitlement framework. Customers now have the flexibility of consuming and scaling the suite solution across different infrastructure tiers, without the need to manage licensing for individual infrastructure ecosystems. We’ve also introduced stand-alone compliance. Customers can run compliance independently, without having to coordinate complex scheduling with resource-heavy data center tasks such as provisioning and patching. This is the advantage of modularization - capability consumed freely, by itself, and scaled on demand. Lastly, in the theme of efficient infrastructure management, we’ve added an analytics pillar, starting with analytics-driven capacity and performance optimization for virtualized environments. Based on near real-time data, customers can right-size their VM environment, forecast capacity needs and intuitively identify any bottlenecks.

In short, the DCA suite is a unified infrastructure management solution to automate tasks, orchestrate IT processes, enforce compliance and optimize infrastructure. 

Register for our upcoming webinar – “Data Center Automation: A new year, a new suite” here and learn more about how this new offering will revolutionize infrastructure management. 

This post has not been tagged.

Share |
PermalinkComments (0)
 

GDPR a Concern for All Global Enterprises

Posted By Kathy Kuehne, 1 hour ago

Confused about whether the General Data Protection Regulation (GDPR) applies to you?  It does if you do business in or with Europe. 

With the GDPR, the improper management of EU citizen personal data could result in an audit and fine unless IT leaders for all global enterprises adjust their information management and backup strategies. In New GDPR Mandates Require Changes to Storage Management, Gartner discusses the data protection directive and the key challenges to achieve compliance by the May 2018 deadline.

Read this report to see why Gartner recommends you implement technologies and processes such as file analysis and archiving to make sure it is possible to comply with requests from natural persons protected under the GDPR and EU supervisory bodies.  Learn why Gartner further recommends, where possible, you reduce backup retention to only what is required for operational recovery.

This post has not been tagged.

Share |
PermalinkComments (0)
 

Best Practices for Data Retention

Posted By Kathy Kuehne, 1 hour ago

Data retention is critical to secure content management and content compliance.  Unfortunately policy compliance and regulatory requirements are complex, yet vague, and vary by data type and jurisdiction.  Furthermore many organizations are driven by a “delete nothing” mentality when faced with pressing the <delete> key. 

In the foundational Gartner research, Best Practices for Data Retention and Policy Creation Will Lower Costs and Reduce Risks, you can explore a framework that will help IT leaders devise a policy for prudent data retention in the enterprise.  Discover best practices that Gartner recommends to help you manage the volume, variety and velocity of data within the organization, and overcome interdepartmental and cross-functionality issues created by data having different value to different parts of the organization.

This post has not been tagged.

Share |
PermalinkComments (0)
 

Announcing General Availability of HPE Service Virtualization release 3.83 and its free Community Edition.

Posted By Kimm Yeo, 1 hour ago
  1. New Protocols Support
    • SFTP protocol: Customers now get another option when it comes to simulation of file exchange agents. Besides FTP and FTPS file transfer protocols, they can now specify SFTP (FTP over SSH) when choosing and defining the FTP agent.
    • Fixed length over FTP/File System: Another flexibility whereby users can transfer fixed length messages over FTP or file system.
    • SAP RFC over Webmethod: In addition to IDOC services, they can also use remote agent to virtualize SAP RFC services running within WebMethods Integration Server.
  2. Virtual Service Design and Simulation Enhancements. Existing power users will be very happy to see so many enhancements made in this area. Feature functionalities such as rule duplication, track creation, learning and management has been made so much simpler and intuitive in this release. Besides this, there are also a host of improvements made to SCA (Service Call Activity).
  3. New SV Jenkins Plugin Support. HP Application Automation Tools 5.0 now contains integration with HPE SV. The Jenkins plugin enables ease of deploy/undeploy selected services from SV project, change mode of virtual services as well as export virtual service with new updated models after learning.

There has also been a 30% increase in performance of simulation. Check out HPE SV Help Center for more details on  what’s new in HPE SV3.83.  

Try out the updated HPE Service Virtualization Community Edition (release 3.83). This free software allows you to create and run multiple virtual services and incorporate performance and data models for more realistic application testing and simulation. 

Check out our recent blog. 

This post has not been tagged.

Share |
PermalinkComments (0)
 

RSA Conference 2017

Posted By Administration, Thursday, January 12, 2017
Updated: Tuesday, January 10, 2017

Moscone Center | San Francisco
February 13 – 17, 2017

HPE Security
As a Platinum sponsor at this year’s RSA Conference. It’s a great opportunity to engage in a variety of informative activities targeted at helping you better protect your digital enterprise. Experience in person a proactive approach to protecting what matters most to you, by building security into your data and applications and detect, respond to and remediate threats at scale. Enter HPE code XS7HPENT when you register for free access to the RSA exhibit halls, a $100 value. Then add the following activities to your agenda to connect with our HPE Security team and see how we can help you fearlessly innovate in the face of increasing risks.

Visit HPE Security at booth #3717 in the North Hall
  • Meet with our experts for an HPE Security consultation
  • Assess your security position with Enterprise Security Services
  • See demos of HPE Security Products and Solutions
    • Building in security for data de-identification, data privacy and secure collaboration with Voltage
    • Securing application development, testing and operations with Fortify
    • Securing data management, monitoring, alerting and response orchestration with ArcSight
Attend the Keynote Terence Spies
HPE Distinguish Chief Technologist at HPE Security – Data Security
Does cryptography actually work? Assessing security in the post-quantum age
Thursday, February 16 11:20 AM-11:40 AM
Engage in Sessions
Jess Emerson
Global Lead HPE Software’s Cyber Defense Consulting
Fully automated security operations: Fact of fiction?
Thursday, February 16 at 9:15 AM - 10:00 AM

Kerry Matre
Director, HPE Security Portfolio
Security for real people: A case study
Watch for the live-stream interview throughout the conference on RSAC TV.
Meet with HPE Executives
Meet 1:1 with our HPE executives and leaders in the meeting center. Talk with your HPE account manager to get a meeting requested with an HPE executive matched to your business discussion needs. You can also send a request to RSAteam@hpe.com to get connected with your HPE account manager
Read More

This post has not been tagged.

Share |
PermalinkComments (0)
 

Federal Data Security in Focus

Posted By Cynthia Leonard, Wednesday, December 21, 2016

DATE: Jan 18, 2017

TIME: 1PM Eastern / 10AM Pacific

About the Webinar:

During this webinar, experts will explain how agencies can embrace new forms of encryption without the worry that it will break their systems. We will take a look at how format-preserving encryption can allow for agencies to conduct their work without systems slowing down or breaking altogether. Then examine how the latest end-to-end data security can be added across a number of different enterprises, from systems looking to harness the cloud to those that still depend on legacy technology, all while supporting cross-organizational collaboration.

Presenter: Terence Spies

Register here

This post has not been tagged.

Share |
PermalinkComments (0)
 

HPE ALM Octane Virtual Hackathon

Posted By Tye Davis, Wednesday, December 21, 2016

We know that speed and quality of app development is often priority number one for organizations, but with continuing evolution of app development, the need for trailblazers who provide better and faster processes is at an all-time high.

During the HPE ALM Octane Virtual hackathon, we are looking for the best developers and software innovators around the world to fill the gaps in today’s software development lifecycle processes.

Fueled by more than $10,000 in prizes, this 30-day virtual hackathon will bring together developers, designers and entrepreneurs from all over the world to work on solutions for the future of software development.

Participants in the Octane Hackathon will be asked to solve one of the following challenges:  

Dynamic Analytics

Develop the next generation of data analytic applications for app development using the Octane APIs that educates and demonstrates data analysis at its finest! How do you collaborate among all those involved in the software development process?

Productive Collaboration

Show us how you’d make interaction and productivity better between Development, Testing, Security, Architecture and IT Operations with HPE ALM Octane!

Electric Agile/DevOps

The Agile methodology is now prevalent in many organizations and continues to grow in adoption. Show us how you think agile/DevOps methodologies can better enable and align strategic planning, analysis, forecasting and execution across agile portfolios, programs and team

Judges include Raffi Margaliot, Senior VP/GM ADM at HPE,  Genefa Murphy, Global VP Corporate Marketing at HPE and Ahi Gvirtsman, VP of Innovation at HPE.

Find out more info at OctaneHack.com

This post has not been tagged.

Share |
PermalinkComments (0)
 

Bridging the Gap Between Traditional Data and Big Data

Posted By Cynthia Leonard, Wednesday, December 21, 2016

DATE: Jan 26, 2016

TIME: 2PM Eastern / 11AM Pacific

About the Webinar:

To maximize the value of their analytics investments, enterprises need to incorporate big data into their enterprise data management strategies. This DBTA webinar will help viewers Understand the key technologies and best practices, from data modeling and architectural considerations, to data integration, data quality and data security strategies.

Presenter: HPE’s Jamie Morgan

Register here

This post has not been tagged.

Share |
PermalinkComments (0)
 

2017 Trends in Identity, Security & Analytics for the Digital Enterprise

Posted By Cynthia Leonard, Wednesday, December 21, 2016

DATE: Jan 26, 2016

TIME: 1PM Eastern / 10AM Pacific

About the Webinar:

This Enterprise Security Summit is where top security experts discuss technologies to protect apps and data in today’s new digital enterprise – across cloud, mobile, web and IoT. Attend Online and learn about Data-Centric security advances without impacting performance.

Register here

This post has not been tagged.

Share |
PermalinkComments (0)
 
Page 1 of 64
1  |  2  |  3  |  4  |  5  |  6  >   >>   >| 

Contact Us

Vivit Worldwide
P.O. Box 18510
Boulder, CO 80308

Email: info@vivit-worldwide.org

Mission

Vivit's mission is to serve
the Hewlett Packard
Enterprise User
Community through
Advocacy, Community,
and Education.