Join us at eGTUG 2026
CSP is proud to be a Platinum sponsor of eGTUG 2026 at the Hilton Munich City Hotel in Munich, Germany, April 14 to 16, 2026. If you’re responsible for securing HPE Nonstop systems, this is…
Read More
CSP is proud to be a Platinum sponsor of eGTUG 2026 at the Hilton Munich City Hotel in Munich, Germany, April 14 to 16, 2026. If you’re responsible for securing HPE Nonstop systems, this is…
Read More
March 19, 2026 – Mexico Tandem User Group Annual Meeting JW Marriott Polanco, Mexico City Mexico lindo y querido! The Mexico Tandem User Group (MexTUG) will be holding its annual meeting at the JW Marriott…
Read More
Fundamental Strategies for Vulnerability and Risk Management Large organizations, including those with access to critical data, are prime targets for cyber-fraud, ransomware attacks, and the exploitation of software and application vulnerabilities. Overcoming security vulnerabilities involves…
Read More
It is important to identify the vulnerabilities in your system and ensure remedial action to prevent security breaches and data loss. Weak spots are prime targets for threat actors. Providing opportunities for them to steal…
Read More
The new CSP Syslog Receiver for Nonstop servers is an OSS Gateway tool that receives syslog messages from Hardware Security Modules (via TCP/IP or UDP) and forwards them to EMS collectors. This solution delivers improved…
Read More
Implementing Tools to Manage Operational Risk Operational risk management is centered on the assurance that all vulnerabilities associated with business activities are properly identified and understood, that the associated risks are formally assessed and quantified,…
Read More
What is the big deal with Digital Operational Resilience? Everyone is talking about digital resilience lately, and you might be wondering how it relates to managing risks on NonStop systems. The Digital Operational Resilience Act…
Read More
CSP has been an innovator in the field of NonStop security for over three decades and understands the complex security challenges facing the NonStop platform. Organizations must comply with critical security requirements to protect data…
Read More
File integrity monitoring (FIM) exists because change is inescapable for most organizations. From variations in a company’s hardware assets, software programs, configuration states, permissions, and personnel, it is the one constant within IT environments. Some…
Read More
File Integrity Monitoring (FIM) is an important requirement of the PCI data security standard for maintaining confidential (e.g., cardholder) information. It is considered a vital requirement for security compliance frameworks to help identify unexpected or…
Read More