NonStop Insider

job types

Site navigation

Recent articles



For monthly updates and news.
Subscribe here
NonStop Insider

Effectively Secure Cloud-Native Applications with Multi-Factor Authentication



CSP logo

CSP Oct 21 - 1

Developers are under pressure to build and ship applications faster than ever and update applications frequently through automated processes. Corporations are now deploying applications developed on containers straight into production, managing them with orchestration tools such as Kubernetes, and running them in the cloud.

As a result, productivity increases, but so does the organizational risk. Striking a balance between speed and security requires a comprehensive strategy to proactively address cloud-native security requirements. An inclusive cloud security strategy allows an organization to detect security issues earlier in the development lifecycle without slowing down the whole process.

Organizations must implement a multi-pronged security approach to ensure secure access to information across the different cloud environments. The unified policies should govern access and control, regardless of whether the security gateways and services are located onsite or on the Cloud.

An organization has to consider deploying the right security solutions for cloud-based business operations. Strengthening network and IT infrastructure security is crucial for businesses. When it comes to cloud security, it is not just about simply placing a firewall at the peripheral of the cloud Infrastructure. From a security standpoint, it includes a comprehensive analysis of the current policies, procedures, and security standards that are in place.

New technologies for building cloud applications such as containers, Kubernetes, and serverless architectures are reshaping the way enterprises build and deploy business applications. They have also introduced a new set of risks that you can’t mitigate by applying traditional approaches to application security. So how do you ensure the security of your cloud-native applications?

Depending on the current security stance, the organization will have to implement numerous security tools, including Intrusion Prevention and Detection Systems, Identity Access Management, and Multi-factor Authentication.

On this last item, modern authentication methods represent a more robust security structure, and also provide a better user experience when logging into applications. MFA also makes it easier for auditors to get answers to critical compliance questions; providing information such as which users are granted access to which system, and also how the access policy is being reliably enforced. Additionally, some of the modern MFA applications available today also include reporting capabilities, which ensure that compliance standards, such as PCI DSS, are being met.


Introducing the New CSP Authenticator +

Cloud-Native Application

CSP Oct 21 - 2

CSP Authenticator+® provides multi-factor authentication for NonStop servers and supports various authentication methods. It can be used as a Safeguard SEEP or with Pathway and non-Pathway applications. Almost any application, including TACL, can now easily support multi-factor authentication.

The new CSP Authenticator + cloud-native application was developed using a modern cloud-based framework. This redesign focuses on providing security, flexibility, and scalability.

Multiple authentication methods such as RADIUS, Active Directory, RSA, and Open LDAP are supported. Additional authentication methods include Email, Text Message, and Google Authenticator.

New features:


CSP Oct 21 - 3

CSP Authenticator+ Key Features:

CSP – Compliance at your Fingertips™

For complimentary access to CSP-Wiki®,
an extensive repository of NonStop security knowledge
and best practices, please visit


We Built the Wiki for NonStop Security ®

The CSP Team          

+1(905) 568 –8900

csp feb 19 - 3