Category Archives: HP Security

  • 0

Micro Focus tackles compliance requirements across GDPR, MiFID II and more with Digital Safe 10

Category : HP Security

Latest cloud archiving solution advances information risk management; unleashes value of data

Micro Focus   announced Digital Safe 10 to enable customers to mitigate information-borne risk stemming from the surge in regulatory, government and privacy mandates, including the General Data Protection Regulation (GDPR). With Digital Safe 10, customers can refine and extend their information archiving strategies to tackle the complexity of compliance and unleash the untapped potential of archived data to gain greater business insight.

Organisations of all sizes and industries are subject to ever-expanding data compliance requirements that they must be able to respond to quickly. This is complicated by the exponential growth of regulated employee-generated content (email, voice, text, instant message, file, social media, and mobile).

“The magnitude of compliance demands is astounding, and as GDPR and MiFID II take effect in 2018, it will not be any easier for organisations to meet them,” said Joe Garber, vice president, information management and governance at Micro Focus. “Digital Safe 10 further reduces the compliance management burden, allowing teams to more easily address requirements and determine what valuable insights the business can glean to reduce information risk and further drive the top line.”

Digital Safe 10 builds upon and enhances the foundational features that customers have relied on for the past 20 years to manage legal and compliance risk: high levels of security, virtually unlimited processing capacity, market-leading employee supervision, massive scalability, compliant storage, and market-defining architecture. Digital Safe 10 enhancements include:

• GDPR, MiFID II (and more) support: Single pane of glass approach to manage multi-format archived data required for comprehensive compliance reporting and data mining.
• Enhanced data capture: Open APIs to capture and understand structured and unstructured data in hundreds of file formats, including mobile and social media, which is then consolidated in a unified object store.
• Enhanced user interface: A single, modern and efficient user interface that enables high performance early-case assessment (ECA).
• Live capture verification and validation: Tracking, reporting and reconciliation of eCommunications data, providing evidence of data integrity – from ingestion to deletion.
• Integrated reporting framework: Reporting capabilities on data processes with export to all standard file formats and delivery methods.
• Integrated, advanced analytics powered by Micro Focus – More than 400 analytical functions powered by the proven analytics of Micro Focus’ Vertica and IDOL, plus new forms of data enrichment, such as sentiment analysis, message clustering, and machine learning that enable organisations to quickly and efficiently drive meaningful insights faster and through fewer queries. Comprehensive information archiving, more efficient lexical-based supervision, and built-in security that draws from strength in Micro Focus’ Voltage and Atalla technologies.

“Digital Safe 10 is a true reflection of Micro Focus bringing together the power of its portfolio to yield innovative customer-centred solutions that can help customers address SEC, Dodd-Frank, HIPPA, FTC, FDA, MiFID II, GDPR, and many more regulatory requirements in a single solution,” said Garber.

Today Micro Focus also announced the release of Retain 4.3, its unified archiving solution targeted at medium-sized businesses, and at satellite offices of global enterprises that require an on-premises solutions to supplement Digital Safe in countries with strict data sovereignty requirements. The latest Retain solution incorporates carrier-level archiving that enables organisations to capture and store text messages (SMS and MMS) delivered on the carrier network for compliance purposes. The data is secured and archived in a central unified repository that includes multi-platform email and social media.



  • 0

Gartner: 2017 Magic Quadrant for Software Test Automation

Category : HP Security

The Gartner Magic Quadrant for Software Test Automation focuses on functional software test automation tools, Application leaders who are modernizing application development face an increasing need to deliver applications faster and of higher quality.

In the Magic Quadrant, Gartner evaluates vendors in this space based on ability to execute and completeness of vision.

Gartner Magic Quadrant for Software Test Automation, Joachim Herschmann, Thomas E. Murphy, 20 November 2017.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Micro Focus.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consists of the opinions of Gartner’s research organization and should not construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties if merchantability or fitness for a particular purpose.


  • 0

The Future of COBOL applications

Category : HP Security

Digital is driving faster change across every aspect of IT and business. But what does this mean for the future of COBOL applications? We asked and you answered.

Join us on Thursday, December 14th to see the Future of COBOL applications as we unveil and discuss highlights from the 2017 COBOL market survey.

Our COBOL experts, Ed Airey and Scot Nielsen, will provide their market insights into the latest trends, technologies and practices influencing change and innovation for COBOL systems.

You’ll also have a chance to pose your questions to our panel of experts. During this webinar, you’ll…

• Understand how COBOL is connected to core business strategy

• Discover how the latest technologies are inspiring COBOL innovation

• View the top priorities for application development and modernization

• Learn how your peers are responding to digital transformation across their COBOL systems

• Start planning your future application roadmap

• Get your free copy of the 2017 COBOL survey results

Register today for a first look at the next generation of COBOL applications and see how your COBOL systems can take full advantage of this new digital opportunity.

  • 0

Now That’s Cryptographic Computing Power

Category : HP Security

It was recently discovered that more than one business were surreptitiously using computing power of visitors to their web sites to mine bitcoins. Maybe they did this as an alternative way of paying for their costs instead of using advertising. Maybe they did this for other reasons. But this should not be too surprising. The cost of electric power is the single biggest cost in solving hard cryptographic problems these days, and that is true whether you are trying to crack a key or just to mine bitcoins. And that means that there is a strong incentive to get someone else to pay for that power. But exactly how much power does it take to do cryptographic calculations?

Back in 2012, at DARPA’s “The Impending End of RSA” workshop, Dan Bernstein gave a talk in which he described how much electric power it would take to crack various RSA keys. He assumed that an attacker would spend a fairly modest amount on hardware, say just a few million dollars or so, and would then use that hardware to crack a key, with the goal being to crack a key within one year.

Dan claimed (but I have never checked his calculations) that for a 1,024-bit RSA key, it would take about the entire output of a typical power plant to do this. He also claimed that to do this with a 2,048-bit RSA, it would take roughly the amount of energy that the Earth receives from the sun in that year. He then suggested that DARPA really should have called their event “The Impending End of RSA-1,024” because the energy requirements for cracking an RSA-2,048 key makes doing it pretty much out of the question. Dan’s scenario for cracking a 1,024-bit key is right on the outer edges of plausibility. Doing it for a 2,048-bit key is really well into the realm of science-fiction.

But the idea of measuring the cost of cryptographic attacks in terms of energy instead of other factors like time or money is an interesting one. A typical power plant might put out about 1 gigawatt, which ends up being about 30 petaJoules (3 x 1016 J) over a year if it is operated at full capacity. The massive Three Gorges Dam in China has a maximum capacity of about 22.5 gigawatts, or about 675 petaJoules (6.75 x 1017 J) if it is operated at full capacity. The Itaipu Dam on the border of Brazil and Paraguay has a maximum capacity of about 14 gigawatts, or about 420 petaJoules (4.2 x 1017 J) if it is operated at full capacity, but has actually produced more electric power in a year than the larger Three Gorges Dam – 370 petaJoules versus 340 petaJoules.

Those are unwieldy numbers to deal with. Fortunately, there is a handy yardstick to use for measuring energies that are roughly that big, and that is the megaton (MT).

A megaton is how much energy a million tons of TNT releases when it explodes, and is equal to about 4 petaJoules (4 x 1015 J). The energy outputs of the Itaipu Dam and the Three Gorges Dam come to 92.5 MT and 85 MT respectively.

The very first nuclear explosion, the Trinity test, had a yield of about 20 kilotons (KT), or 0.02 MT. The W87 warhead that the American Peacekeeper missile carried 10 of had a yield of about 300 KT, or 0.3 MT. The American B83, another typical Cold War strategic nuclear weapon, had a yield of about 1.2 megatons. The biggest nuclear bomb ever, the USSR’s Tsar Bomba device, had a yield of about 50 MT. By comparison, the crack of RSA-1,024 that Dan proposed would use about 7.5 megatons of energy, or more energy than several Cold War era strategic nuclear weapons.

That is a lot of energy.

Is the amount of energy needed to mine bitcoins more than that or less than that?

It looks like bitcoin miners spend about 18 terawatt-hours of energy, or about 65 petaJoules (6.5 x 1016 J), per year mining bitcoins. That is roughly the energy from two power plants. Or it is roughly enough energy to crack two RSA-1,024 keys. Or it is about 16 megatons of energy. Or it is about the energy released by the nuclear weapons from five Peackeeper missiles. Or it is about the energy of a couple of young programmers at Silicon Valley start-ups.

No matter how you measure it, that is still a lot of energy.




  • 0

Continuous Delivery for All: Automation for greenfield AND heritage applications

Category : HP Security

• Agile and DevOps – what are Agile and DevOps and why the IT industry is transitioning to them?

• Continuous Delivery – what is Continuous Delivery and where does it fit?

• Application Release Automation – why application release automation is needed for Continuous Delivery and how it can be applied to both greenfield (new) and heritage (existing) systems.

• Recommendations – for implementing Continuous Delivery and Application Release Automation.

• Demonstration of the Micro Focus solution

Thu, Dec 7, 2017 6:00 AM – 7:00 AM EST


  • 0

Continuous Delivery for All: Automation for greenfield AND heritage applications

Category : HP Security

Thu, Dec 7, 2017 6:00 AM – 7:00 AM EST

• Agile and DevOps – what are Agile and DevOps and why the IT industry is transitioning to them?
• Continuous Delivery – what is Continuous Delivery and where does it fit?
• Application Release Automation – why application release automation is needed for Continuous Delivery and how it can be applied to both greenfield (new) and heritage (existing) systems. • Recommendations – for implementing Continuous Delivery and Application Release Automation.
• Demonstration of the Micro Focus solution

Register now

  • 0

The Good Fortune of Number Fourteen

Category : HP Security

IBM’s recent Q3 results gave shareholders a welcome bonus by demonstrating some notable revenue results – including strong mainframe revenue.  A 10% growth in the LOB revenues was, according to IBM, “driven by growth in z Systems,” and which was no doubt buoyed by the recent launch of the new z14 mainframe machine.

The result of which was a notable uptick in the IBM stock price. It is encouraging that IBM, their mainframe customers AND their investors share the same positive outlook about the mainframe.

Encouraging? Yes. Fortunate? Not so much. It doesn’t shock me at all that the market is reminded of the profound value of the mainframe environment.

Digital means disruption

Recent industry surveys show only 5% believe they have mastered digital transformation. Traditional approaches are not supporting the flexibility, dynamism and technological diversity the modern organization requires.

Our own research suggests a seismic shift in terms of where IT money is being spent. There is a greater reliance on backend (typically mainframe) “systems of record”, while budget it diverted towards newer (often digital) “systems of engagement”. In just 4 years, the ratio of investment between the two has shifted from an 80/20 split to a 45/55.

Little wonder that at the Gartner Symposium in October, they predicted 90% of all apps running today will still be in use in 2023, while the application modernization services market is set to grow at a rate of 19.4% to be worth over $16Bn by 2022, according to a recent Research and Markets report.

This is supported by other elements of research which reinforce the continued investment in the mainframe as a value-enabler at the heart of digital transformation:

  • 84% of mainframe apps are planned to be maintained or modernized in the near future, according to Micro Focus’ own customer survey
  • 67% are increasing mainframe capacity, according to BMC
  • 50% of all mainframe shops are ALSO using Linux on z Systems, IBM Systems Magazine
  • 84% of the app dev market is using or planning a DevOps adoption, according to Rackspace

All of these data points support the argument that the mainframe is a critical platform of the digital growth those major organizations need. We predicted as much a little while back, and it is not only sensible but also encouraging to see how the market has adopted a very practical solution to the challenges of the digital age.

Modernization Models

Saying “we need to improve” is one thing, planning exactly how is another. It remains important to look holistically at what the business needs to achieve before deciding how the modernization of mainframe systems will support digital innovation. After all, modernization could mean all manner of things depending on the root of the challenge.

Three areas require scrutiny.

  • Application Modernization – This is the “WHAT” changing the app for the better to support new user need, new business functionality.
  • Process – which is more about changing the “how” – the means of creating and updating the systems themselves. Modernization of the process.
  • Infrastructure – more about the “where” than the what, making the mainframe app available as workload wherever the business needs it

In each case, it is important that business and IT leaders collaborate on what is needed by the business and how IT can achieve that without impacting daily operations or delaying the delivery of new business innovation.

Can we do it?

Organizationally, being ready to accept the market changes, and having the wherewithal to execute that change, is a question not only of desire but of skill.

Given the necessity to protect IT investments as well as embrace new technology, it holds that the blend of skills and strategies will have to embrace systems that keep businesses running today, as well as the right technologies and skills to support digital growth. So this means the mainframe and COBOL teams will need to work alongside, and indeed with, those building for new IoT devices, or platforms such as Cloud. This is a hybrid IT model, technically and operationally, that combines the best new technologies and processes, such as DevOps, with trusted core systems such as COBOL applications and IT operations management.

Micro Focus has long been an advocate of a proactive skills planning model to ensure the talent is available for both today and tomorrow’s IT challenges

Yes we can!

Micro Focus has a unique position in the mainframe modernizationmarket. We offer modernization capability for core mainframe systems that will focus on the relevant aspects that need the change – whether application, process or infrastructure.

It allows us to position our solutions to meet these different challenges – delivering change faster, repurposing and modernizing business functions and flexibility to deploy these across mainframe, Linux, cloud and all other business-critical environments.

Supporting a model of hybrid IT that makes use of the best tools and platforms for the job, unified by agile processes, Micro Focus is building on decades of success to support the digital era for mainframe users.


Author: Derek Britton

  • 0

Speed up and optimize software delivery through DevOps

Category : HP Security

Download this Forrester Report—The Need for Speed: Drive Velocity and Quality with DevOps.

Does your Enterprise need a little more zip in its software delivery? Download this February 2017 Forrester DevOps playbook written by industry experts for infrastructure and operations (I&O) professionals. A complimentary copy can be yours, right now. Just fill out the form!

 Great products are no longer enough. Today’s customers demand speed and quality. This need for speed requires changes across the entire organization and delivery toolchain. This 17-page report provides a detailed discussion on how to achieve and sustain the speed of DevOps.
Three Key Takeaways:

Build a combined product team responsible for what you deliver to customers

  •   Move developers, along with operations, quality assurance, and release managers, into a single team that works on the entire pipeline, from commit to deployment across specific applications

Evaluate Your Progress with the five critical DevOps metrics

  •   The five critical DevOps metrics are: 1) time-to delivery; 2) deployment frequency; 3) change volume; 4) success rate; and 5) time-to-recovery

Prioritize Automation

  •   Dev and Ops pros must assemble a loosely-coupled (API-centric) tool chain, including elements like application release automation (ARA), and must integrate that tool chain with the continuous deployment pipeline

DevOps gives I&O leaders and their development peers a way to achieve the speed and quality that customers demand. This report offers I&O leaders the six-step checklist they need to achieve the speed of DevOps as well as the operating model for sustaining that speed.

  • 0

What to Look for in a Credible Unified Endpoint Management (UEM) Solution

Category : HP Security

Invest in a Unified Endpoint Management (UEM) solution that actually meets your device management needs. (No, all UEM solutions are not created equal.) This video outlines the capabilities to look for when you’re ready to move forward with UEM.


  • 0

Getting Cloud Migration Right–Moving to AWS

Category : HP Security

Fri, Nov 3, 2017 11:00 AM – 12:00 PM EDT

Hybrid IT is the answer for maxed-out IT teams buried by demands for new digital services. Blending traditional IT models with newer ones—such as cloud—can give you the agility you need to compete in the digital world. But how can you quickly and reliably move servers to the cloud without business disruption? This webinar tells you how.

You’ll learn:

• How hybrid IT can optimize service delivery without sacrificing cost, availability, and reliability.

• What to look for in a server-migration solution when moving to Amazon Web Services (AWS).

• How cloud migration can enhance IT agility and business competitiveness as you drive digital transformation.

The demand for digital services often requires an accelerated move to the cloud. Don’t act without doing your research. Start with this webinar