NonStop Insider

job types

Site navigation

Recent articles



For monthly updates and news.
Subscribe here
NonStop Insider

CSP Presentation at TBC22: Using CSP Authenticator+ to build a robust Zero-Trust model on NonStop Systems



There is always a strong sense of accomplishment whenever the Connect team, together with the HPE NonStop division, executes well. In this case, successfully restarting the in-person NonStop Technical Boot Camp conference after relying upon virtual events for the previous two years was not just a test of the ability to market TBC22 but a litmus test of the NonStop community’s desire to meet in person.

In an interview published in the NonStop community blog immediately after the event concluded, CSP General Manager, Henry Fonseca, expressed satisfaction with what he saw even as he began promoting next year’s event. “It was great to come back to TBC this year. We always look forward to greeting old friends, meeting new people, and building new relationships,” said Henry. “We know that many others could not attend due to external factors, but you should start planning for TBC23 in Denver, CO. You won’t want to miss it.”

Before we promoted our presentation at TBC, we had already written about how we intended to address application and data security. That has been the foundation of CSP’s success for over three decades, even as we have continued to innovate. Understanding the increasingly complex security challenges facing the NonStop platform is none more topical than protecting applications and data from attacks by bad actors. “From our observations, organizations can achieve more by applying a zero-trust model when it comes to authentication,” said Henry. Applying a Zero Trust model means authenticating anyone who accesses your networks to ensure they are authorized to access specific domains. A typical zero-trust model for NonStop systems might include validating identity, aligning appropriate access management, and implementing technologies such as multi-factor authentication. To this end, CSP provides CSP Authenticator+®. “The new CSP Authenticator+ cloud-native application was developed using a modern cloud-based framework,” said Henry. “This redesign focuses on providing security, flexibility, and scalability. It will prove beneficial for ensuring multi-factor authentication, given that the new cloud-native application supports high availability, Kubernetes deployments, and additional features”.

CSP is not alone in emphasizing the importance of implementing a zero-trust model. HPE Discover Europe 2022 is underway in Frankfurt, where HPE is addressing its approach to Zero Trust Security. “Essentially, the Zero Trust security model replaces faith in the integrity of secure network perimeters (such as private networks, firewalls, and VPN/VPC) with that of the individual software systems that manage critical data,” is how HPE defines Zero Trust. “HPE has recognized that, for customers and partners to deliver a robust and agile Zero Trust security solution for their most critical data systems, trust must be built into everything they use—from the silicon that runs the software to the software itself. 

During CSP’s presentation at TBC22, there was a discussion regarding the move to hybrid infrastructures by many enterprises. CSP reiterated that their multi-factor authentication solution, CSP Authenticator+, was hybrid-ready since it is a cloud-native application containerized through Kubernetes. To reinforce this message, we pointed out how NonStop has become a hybrid infrastructure, with specific hardware dedicated to supporting NonStop and Linux deployed in the CLIMs (storage and communications) and Windows supporting the Console. When it comes to Zero Trust, CSP remains very focused on delivering Zero Trust capabilities at an affordable price point.

“Regarding costs, we’re better priced than our largest competitor, while providing a superior product and excellent customer service,” said CSP Head of Sales, Peter Mehta. “ Our large security product suite addresses a wide range of security & compliance requirements, like compliance reporting, file monitoring, user access management, session control, keystroke logging, password quality management, privileged user management, vulnerability scanning, multi-factor authentication, safeguard objects and ACL management, real time alerting, audit reporting (and more).”

“With our comprehensive product suite that is all encompassing when it comes to protecting applications and data on NonStop, we have proven that we can “eliminate the need to have multiple security vendors. Not only that, these products often complement each other and, working together, deliver a superior, more complete solution,” said Peter. After all CIOs today look for not just competitive pricing but an opportunity to develop a relationship with a trusted vendor even as each CIO looks for that good deal that helps them progress any security implementation.

How do you approach deploying Zero Trust today when there are so many moving parts? And why has deployment gained wide media attention? Keith Townsend, better known as The CTO Advisor and a well-respected member of the HPE Influencer program who regularly promotes other social media authors, recently promoted a post by blogger Melissa Palmer, Should you Trust Zero Trust?

“The goal of Zero Trust is to Trust No One (bonus points if you got the reference). This architecture focuses heavily on identity and access management. There’s no inherent trust as a user carries out their activities throughout the environment, they work in.

“Now switch out users with threat actor. If someone gains access to your environment, that means they cannot traverse through and wreak havoc.

“I’ve got a single word for you to show you why you need to pay attention to Zero Trust – ransomware. Ransomware is one of the biggest threats to any environment today and something the business is absolutely paying attention to.”

This is where our focus on NonStop really shines because it represents a place where the NonStop community can start and then manage in a series of baby steps. According to Melissa Palmer,

“When it comes to getting started with Zero Trust there are many considerations from the business level down to the technology level down to the user level. While many organizations may be tempted to go all in on Zero Trust out of the gate, the complete opposite approach will yield the best results.

“Identify the area to start with. This could be an at-risk user base, or perhaps even the crown jewels of applications or data in your organization. By starting small with one area, you can prove to stakeholders and users alike that the model will be successful.

Having the opportunity to have meaningful conversations with as many members of the NonStop community as were present for TBC22 provided ample opportunity to greet old friends, meet new people, and build new relationships. This is the very essence of why the NonStop community likes to find time to attend these events and for this reason alone, you will find CSP fully supporting NonStop centric events throughout 2023. With that, and with TBC22 now behind us we look forward to seeing you in the near future as Edinburgh in May. 2023 is beginning to loom large on our calendar.

To learn more about our NonStop security solutions, check out our website and stay tuned for updates and useful articles:


We Built the Wiki for NonStop Security ®
The CSP Team
+1(905) 568 –8900