Welcome!

Blog Feed Post

An Introductory Primer to OpenEdge Security

Security breaches increasingly affect businesses of all kinds—are you prepared? Learn how to implement the latest security features built into OpenEdge.

It’s tempting to dismiss security concerns by imagining that your business is not a target for would-be attackers. However, even as high-profile breaches garner headline after headline, data shows smaller companies are being actively targeted as well. No matter what size your business is or what industry you operate in, you can’t afford to neglect your security in 2018.

Not only is there obvious potential for financial loss, but a security breach puts the reputation of your company at risk. Your brand and your image will be tarnished and it’ll take hard work to win back the trust of your customers, let alone gain new ones. You don’t want to be the company known for losing the personal information of your users because of lax security policies.

Constructing a Holistic Security Plan

There are several key steps required to develop a security plan that is comprehensive and well thought out. The process begins with visualizing all the systems in your enterprise and mapping out every device, path and network, examining the touch points between them and how data travels back and forth. Then you must assess these points and determine areas of risk.

Often, the most prized asset for an organization is the database, which makes database security an excellent place to focus on. Proper identity management as well as a sufficient level of data encryption must be enabled, both for data at rest and in motion. This should be followed by effective monitoring of your database, a system of notifications when suspicious activity is detected, and a plan for how to respond.

Shore up Your Security Gaps

The above is just an overview of the process you will need, but once you have implemented it the gaps in your security configuration will be revealed. The critical step is to shore up these gaps once you have identified them.

Often you can simply turn on functionality that you may not have been aware of, while other steps may require more active monitoring of logs or other data. In other cases you may be optimally using the software you have, but it is no longer up to date and so does not include the latest security standards. In that case, updating your software will be the best path to improving your security.

Get the Latest Security Features with OpenEdge

At Progress, our goal is to deliver agile solutions that enable you to embrace change and turn it into a competitive advantage. We are dedicated to providing you with the support you need to succeed in a rapidly changing security environment. OpenEdge 11.7 utilizes the latest security technologies and standards to protect your data and help you minimize the risk of an attack.

You can learn more about OpenEdge security in our on-demand security primer. If you want to minimize security vulnerabilities that may be identified within your OpenEdge application, consider the OpenEdge Security Health Check. OpenEdge 11.7 is packed with new features, from performance to user experience to security. Curious about what OpenEdge 11.7 has to offer? Check out the top 5 reasons to upgrade to OpenEdge 11.7.

Watch the Security Primer

See the Top Reasons to Upgrade

Read the original blog entry...

More Stories By Progress Blog

Progress offers the leading platform for developing and deploying mission-critical, cognitive-first business applications powered by machine learning and predictive analytics.

Latest Stories
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
CloudEXPO New York 2018, colocated with DevOpsSUMMIT and DXWorldEXPO New York 2018 will be held November 12-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI and Machine Learning to one location.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
ICC is a computer systems integrator and server manufacturing company focused on developing products and product appliances to meet a wide range of computational needs for many industries. Their solutions provide benefits across many environments, such as datacenter deployment, HPC, workstations, storage networks and standalone server installations. ICC has been in business for over 23 years and their phenomenal range of clients include multinational corporations, universities, and small busines...
This sixteen (16) hour course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration and automation in order to improve the flow of work between software developers and IT operations professionals. Improved workflows will result in an improved ability to design, develop, deploy and operate software and services faster.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
Authorization of web applications developed in the cloud is a fundamental problem for security, yet companies often build solutions from scratch, which is error prone and impedes time to market. This talk shows developers how they can (instead) build on-top of community-owned projects and frameworks for better security.Whether you build software for enterprises, mobile, or internal microservices, security is important. Standards like SAML, OIDC, and SPIFFE help you solve identity and authenticat...
The digital transformation is real! To adapt, IT professionals need to transform their own skillset to become more multi-dimensional by gaining both depth and breadth of a wide variety of knowledge and competencies. Historically, while IT has been built on a foundation of specialty (or "I" shaped) silos, the DevOps principle of "shifting left" is opening up opportunities for developers, operational staff, security and others to grow their skills portfolio, advance their careers and become "T"-sh...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
Hackers took three days to identify and exploit a known vulnerability in Equifax’s web applications. I will share new data that reveals why three days (at most) is the new normal for DevSecOps teams to move new business /security requirements from design into production. This session aims to enlighten DevOps teams, security and development professionals by sharing results from the 4th annual State of the Software Supply Chain Report -- a blend of public and proprietary data with expert researc...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
This session will provide an introduction to Cloud driven quality and transformation and highlight the key features that comprise it. A perspective on the cloud transformation lifecycle, transformation levers, and transformation framework will be shared. At Cognizant, we have developed a transformation strategy to enable the migration of business critical workloads to cloud environments. The strategy encompasses a set of transformation levers across the cloud transformation lifecycle to enhance ...