Join us for the 2023 NonStop TBC in Denver, Colorado.
Mark your calendar for this SEPTEMBER 2023 event.
Customer Registration is Open.

2023 HPE NonStop Regional Events

Join your HPE NonStop Community for a local event near you!
(Stay tuned for more regional events as they are confirmed)

April 2023

April 25 – MATUG – Mid-Atlantic States
Reston, VA

April 27 – NYTUG – New York / New Jersey
New York City, NY

May 2023

May 3 – ATUG – Atlanta
Alpharetta, GA

May 15-17 – E-BITUG – Europe
Edinburgh, Scotland

June 2023

June 1 – MEXTUG – Mexico
Mexico City, Mexico

June 7-8 – CTUG – Canada
Mississauga, Ontario

October 2023

October 24-25 – VNUG – Viking User Group
Rånäs Slott, Sweden

Why Technology Convergence is the Future of Cybersecurity

Most IT security functions have accrued multiple-point products over the years. Some were acquired through M&A activity. Others may have been brought in by successive CISOs. The idea is not in itself a bad one – find a product that does one thing really well and integrate it with the rest to deliver “best-of-breed” security. For many years that’s what enterprises aimed for. But too often, the promise didn’t match the reality. Best-of-breed often translated to “worst of both worlds”: security that was disjointed and expensive to manage and maintain.

Yet, as IT leaders look to the new year, increasingly, they’re also looking to simplify and enhance security by converging onto fewer platforms and more compatible products.

The Road to Convergence

A few trends can explain this growing desire for convergence. The first is financial. With interest rates and inflation rising, the era of “cheap money” at an end, and geopolitical tension compounding business uncertainty, much of the world is predicted to slip into recession in 2023. Now, smart boardrooms would never think about cutting budgets, even in this climate. They understand that security is more vital now than ever – to support critical digital transformation initiatives, which can provide much-needed resilience and cost efficiencies. In fact, mean cybersecurity spending rose 60% over the past year, according to one estimate.

However, in this new climate, the C-suite will want IT bosses to do more with less. That means rationalizing what they have. There’s certainly ample room to do so, with the average enterprise running an estimated 76 different security tools. Getting rid of point solutions can help to reduce spending on unnecessary software licenses and help out increasingly stretched IT security teams by reducing the management burden. With a global shortfall of 3.4 million workers, that’s increasingly important.

But it’s not just about reducing costs and enhancing staff productivity. Converging security products is also an opportunity to enhance protection by reducing the information silos, which can lead to poor decision making, and allow visibility and coverage gaps to thrive. It is threat actors, of course, that gravitate to these blind spots. It’s also a chance to bring siloed teams like security and IT operations closer together around a single version of the truth delivered from a unified platform of solutions.

Breaking Down Data Security Silos

When it comes to data security, the challenges associated with point products are even clearer to see. Given that data travels through a potentially large number of heterogeneous systems as it’s created, accessed, edited, saved, copied, backed up and/or archived, it’s understandable that separate vendors have sprung up to deal with specific use cases. Some may handle security for data stores, others for users and data access, and different ones still for networking components and cloud services.

Yet if there’s no centralized control over enterprise data and clear visibility into who’s using it for what purposes, silos inevitably form. These could ultimately put that data at risk if it means it’s not properly managed and protected. Or it could render data inaccessible to those who need to use it, depriving the business of valuable growth opportunities. Data security point products also saddle IT functions with those same old problems of extra cost and complexity.

One Platform to Rule them All

This is why many organizations are looking to build cybersecurity mesh architectures that focus on modular elements which can be easily integrated and work hand-in-hand with each other. Although the concept is still in its infancy, it would seem to offer the prospect of finally delivering on those “best-of-breed promises that were mis-sold for so many years.

It’s also why platform-based security is gaining traction among many CISOs. Data security platforms (DSPs), for example, are quicker and easier to deploy and manage, and deliver the end-to-end visibility that’s so important across the entire enterprise data ecosystem. In so doing, they help to eliminate security siloes and apply consistent and highly effective controls to all enterprise data depending on how it is classified.

This is what comforte offers with its own Data Security Platform. Crucially, it:

  • Delivers data discovery, classification and inventory; defines the optimal policy; applies strong protection; and integrates seamlessly with data flows and applications
  • Does all of the above across the entire enterprise data ecosystem, eliminating silos
  • Offers multiple methods for data protection at rest, in motion and in use – so there’s no need for additional solutions


Convergence is coming!

To find out how comforte AG can accelerate your journey in 2023, download our Data Protection Solution Brief:

Download Solution Brief

ETI-NET: Analytics enabled through Sentinel for HPE NonStop

ETI-NET participation at events held in 2022 has been well documented and it provided us with numerous opportunities to talk to the HPE NonStop community. Among the more popular topics covered in the discussions involved ETI-NET products associated with IT environment’s management. Today, these management offerings include monitoring of strategic mission critical applications in general as well as of your BASE24 payments solution together with engagement with events generated by key NonStop subsystems, including IBM MQ.

“ETI-NET provides a growing range of solutions for the NonStop community,” said ETI-NET COO, Sylvain Tétreault. “Long known for our support of virtual tape and the industry-leading solution meeting all your back-up requirements, ETI-NET has become your potential vendor of choice for management and monitoring solutions. As has been the case with our back-up solutions, these latest additions to the ETI-NET product portfolio are all available through HPE.”

It would be hard to miss just how much attention HPE has been giving to data and specifically to the importance of data analytics. Central to HPE’s message of providing products that help turn data into intelligent information crucial to the continuation of any enterprises’ business pursuits, it is with analytics that insights can be derived whether it is about behavior and trends or simply highlighting opportunities to enter new markets.

Analytics is recognized as being central to the high performance of enterprises in their digital transformation journey. With Sentinel for HPE NonStop (Sentinel), ETI-NET is providing a monitoring capability across any nodes where NonStop is present and in so doing from a single interface, provides the insights into the real world status of applications, infrastructure and subsystems together with access to system and application log messages.

“TaskMaster is the automation engine of Sentinel,” said Tétreault. “Sentinel can parse messages submitted to EMS that describe error conditions that can be corrected programmatically and without manual intervention. This information can be forwarded to TaskMaster, which oversees the implementation of the appropriate automated corrective action.” And EMS is installed on every NonStop system making the deployment of Sentinel a straightforward task with little need to look elsewhere for a solution.

It may be a reasonable expectation among NonStop users that ETI-NET is just a virtual tape and back-up vendor but that is no longer the case. More succinctly, ETI-NET is a vendor that maintains close ties to the HPE NonStop and to those NonStop users already familiar with the product portfolio of ETI-NET. It shouldn’t be a surprise to anyone to read that at ETI-NET we do take to heart all that we hear from HPE and from our customers and wherever opportunities arise, address customer requirements with the products that can benefit them the most.

When it comes to the world of analytics and of gaining insights into enterprise operations, it is a necessity of business to have the tools at hand that provide this support seamlessly and without disruption to ongoing daily operations. With ETI-NET and Sentinel, the NonStop community now has access to a product designed and developed to provide such analytics on all that transpires within your NonStop environment.   


If you were not fortunate to attend events of last year and as yet haven’t caught up with all that is in the ETI-NET product portfolio, then by all means reach out to us by emailing us. We can be reached through the use of the contact info below.

Mirko Buzolitch

[email protected]

NTI: When you expect more from your business data … continuously
DRNet®/Unified delivers on all counts!

Enterprises today expect so much more from the data that they create. Data is proving to be the source of information that leads to greater business insights. If you have missed the most recent messages generated by HPE Marketing then you may not have read of the central role data is playing in almost everything HPE does. And of course, we all know that the freshest data is created on NonStop.

To continue with this theme, according to HPE CEO, Antonio Neri, “Enterprises need to be more data-first in all that they do.” As Neri observed, simply being “awash in data but lacking in connectivity and insight” will not be helpful; unconnected pools of data cannot continue.” More to the point perhaps, it was Neri who also claimed at the time hat “Enterprises who are able to extract outcomes from all their data will be unstoppable.”

What has surfaced recently among the more astute NonStop users where DRNet®/Unified has been installed is that with the Change Data Capture (CDC) methodology, embraced by NTI, these NonStop users have not just unity but adaptability. With DRNet®/Unified installed, it performs data replication, data integration and data distribution with a data transformation option on hand as well.

All-in-one process, utility and even an agent (with an API); DRNet®/Unified present on NonStop can deliver data to where it’s needed in a form that can be consumed and to as many targets as is called for without ever having to defer to another process, utility or agent. This unique property of DRNet®/Unified is attracting considerable attention as it’s not only helping NonStop users leverage data created on NonStop but in a manner whereby isolated (and unusable) pools of data do not develop.

This is the driving influence behind DRNet®/Unified becoming more than just a business continuity solution, but rather, in its new format is driving continuous adaptation for all those enterprises embarked on their digital transformation journey. The journey that is leading them to the world of hybrid IT where no one system does it all! A combination that is both heterogeneous and in all likelihood, leveraging services that are cloud based.

To look at this expanded definition is to view the mindset of continuous adaptation as being the best offense against irrelevancy. The heterogeneous nature of today’s modern, mission-critical application scenarios, machine learning frameworks, and the diversity of enterprise systems, requires flexible, stable and error-resilient solutions. Enterprises expect a lot more from their data and in this regard, DRNet®/Unified delivers! Failing to do so with NonStop, making it difficult to participate by leaving it as unconnected resource, and your NonStop solutions will no longer feature in the future plans of the enterprise.

“At upcoming NonStop user events and conferences planned for this year, the NonStop community will hear a lot more on the topic of Continuous Adaptation,” said Tim Dunne, NTI’s Global Director Worldwide Sales. “You will hear how NTI, capitalizing on the inherent beneficial properties of DRNet®/Unified, has committed to support NonStop participation in the demanding world of enterprise hybrid IT.” Look for NTI at these NonStop community events, including the upcoming pan-European eBITUG event in Edinburgh (May 15 – 17) this spring as well as the NonStop TBC23 in Denver (September 12 – 14) this fall. 

Should it be important to you and your enterprise to know more about DRNet®/Unified and how it would be beneficial to your business, we at NTI are ready to respond to any and all inquiries. Call us on the number below or email us at any time at [email protected]   


Network Technologies International, Inc.

635 Park Meadow Road, Suite 209

Westerville, Ohio 43081-2877

Phone: +1 (614) 794-6000


N.T.I. Limited 

Ard Mhuire

Camp Street


Co. Galway

H91 K5PE


XYPRO 2023 Cybersecurity Predictions: What to Expect in the Coming Year

As we enter 2023, the cybersecurity threat landscape evolves and expands. From the rise of IoT cloud-based attacks to an increased focus on edge computing and IoT devices, organizations must stay vigilant in their efforts to protect against cyber threats. As technology continues to advance and becomes smarter and more automated, it is important to stay ahead of potential threats and understand the latest trends in cybersecurity. In this article, we will examine the top predictions for the 2023 cybersecurity landscape.

 1. Cybersecurity Consolidation

Over the last decade, the cybersecurity market has become a crowded space with solutions for just about every vulnerability or threat. Over time we created a boundless sprawl of technology; shelfware, overlapping functionality, gaps in vendor’s offerings, manual effort, and lack of training and resources has resulted in more of a problem rather than solving one. The need for consolidation is long overdue.

Cybersecurity consolidation refers to the integration and centralization of multiple cybersecurity tools and solutions into a single, unified platform or suite. The goal is to improve the efficiency and effectiveness of cybersecurity operations by streamlining the management of security technologies and reducing the complexity of security architecture. This is achieved by integrating a range of tools and solutions, such as firewalls, intrusion detection and prevention systems, security information and event management (SIEM) solutions, and vulnerability management tools.

Cybersecurity consolidation has numerous benefits. Firstly, it reduces costs and minimizes duplication of effort, as organizations no longer have to manage disparate systems. Secondly, it can improve security visibility, as all security data is aggregated and analyzed in a single location. This helps organizations identify and respond to security threats more quickly and effectively. Consolidation also improves the efficiency of security operations, as security teams can manage and respond to incidents from a single console, reducing the need for manual intervention and streamlining security workflows. Finally, all those benefits of cybersecurity consolidation mean the money spent on cybersecurity is more effectively applied.

“Real-time security monitoring and alerting on anomalies is a must. There is no excuse not to know what is happening in your IT systems in real-time.”

Steve Tcherchian
Chief Information Security Officer
XYPRO Technology

2. API Security

In 2021, as part of their lawsuit settlement, T-Mobile committed to a $150 million initiative to improve its cyber security. In January, they disclosed another mega breach of 37 MILLION customer records, including addresses, emails, phone numbers, dates of birth and more. You’re probably one of the victims.

This particular breach was not discovered for more than a month. The threat actor was taking advantage of flaws in T-Mobile’s APIs. This suggests that T-Mobile is not using widely available, modern security monitoring and detection methods.

APIs are used everywhere, especially by Cloud Service Providers, to access and manage “as a service” offerings. As more workloads migrate to the cloud, API security becomes paramount. API security weaknesses lead to unauthorized access to data and resources, or to malicious attacks, such as data manipulation or injection attacks.

API abuse will continue to be a challenge in 2023. Solving one problem with technology and modernization can reveal another. If you’re not yet securing and monitoring your APIs, start with the basics

Read the full article here

PCI DSS 4.0 – Simplify Compliance in a NonStop World

For a detailed step-by-step guide on the changes between PCI DSS 3.2.1 and PCI DSS 4.0, please see XYPRO’s “PCI DSS Version 3.2.1 to 4.0 Summary of Changes for HPE NonStop™ Servers” guide on XYPRO also provides a comprehensive PCI DSS gap assessment to identify and recommend areas that need to be addressed to ensure you pass your PCI 4.0 audit.  Now is the time to interpret the changes and determine how PCI 4.0 clarifications and added requirements impact your organization. The full summary of changes can be found on the PCI Security Standards website.

Download the Whitepaper

TCM – preparing for a full calendar of events in 2023

It is hard to ignore all that is being said about the future of IT and how cloud computing in all likelihood will dominate the plans of many enterprises. Safe to say, there isn’t a major enterprise that isn’t being impacted by the arguments being made in favor of cloud service providers. HPE has become a recognized leader with GreenLake as it continues to build momentum behind its message of everything as a service together with bringing the cloud experience to you. For the NonStop user this has brought with it the added concern of whether NonStop can play a role whenever these arguments favoring cloud computing arise.

In prior articles and posts, TCM has highlighted how it has witnessed firsthand the growing interest in virtualization, cloud computing and yes, GreenLake. With our knowledge and experience of how NonStop users continue make changes on their journey to digital transformation, TCM is ideally placed to provide the services that the NonStop user community are seeking. It should come as no surprise that with our global presence we are witnessing digital transformations at different points along that journey.

The connection between digital transformation and with it the emergence of hybrid IT comes down to enterprises reevaluating their entire approach to IT. Whether it is a mix of traditional IT working in combination with virtualized server farms or much more – combinations of traditional with a mix or private and public cloud deployments – TCM is already a witness to the changes that come with these ongoing transformations. Furthermore, it would not be surprising therefore to see a mix of technologies, architectures and products (along with further expansion of members of the community’s own partnerships and ecosystems) playing an important role in determining how enterprise solutions are developed, delivered and ultimately monitored.

TCM recently wrote of how the topics of virtualization and cloud services have not only generated considerable discussion among our NonStop customers but given cause for TCM to make strategic investments in digital transformation. For instance, TCM has devoted resources to better understand and subsequently support those NonStop users looking to capitalize on the benefits of running a virtual system. Reaching out to us at TCM as they look to tap into expertise  where a  combination of cloud / virtual machine capabilities, together  with good old fashioned NonStop know-how (in support of mission critical applications running on NonStop), is becoming a frequent request from our NonStop users.

Not only have we written about this topic and talked about investments needed to gain the experience NonStop users seek, but we have led by example. The best example of our increased investment can be seen in the steps we have taken to advance the knowledge of our own specialists – building a working viable virtualized NonStop (vNS) solution as was done by Shiva Subramanian that was covered in his in-depth presentation at NonStop TBC2022 and described in the March – April, 2023, edition of The Connection magazine. And this investment continues as we enter 2023.

Furthermore, our undertakings with vNS have allowed us to examine application modernization. As NonStop users look to enhance their NonStop infrastructures, applications can be overlooked. Using modern technologies we at TCM are now primed to assist NonStop users bring their applications into the modern world.

Where will you hear more from TCM about the steps we are taking to ensure we can partner with our NonStop users on their journey?  Look no further than the upcoming eBITUG event to be held in Edinburgh, Scotland between May 15 and 17, 2023. This is the major event of the spring where the mix of product presentations, networking opportunities and vendor demonstrations will prove enlightening. NonStop and its support of mission critical applications is a very active participant in the GreenLake initiative and you can anticipate considerable coverage from all in attendance on just what this means for the NonStop community.

With this in mind then we can say that you won’t miss seeing us as TCM will be a major sponsor and we trust that you too are looking forward to participate. Then again, should you have any questions or simply looking for someone to have a conversation with, we would welcome you reaching out to us. Just use the email address below. And if we missed seeing you then we would welcome any opportunity to do so when next we meet in Edinburgh. 

[email protected]

CSP: Building impenetrable fortresses
to defend against attacks

Humans have always been concerned with protecting their valuable goods. Our forefathers went to great lengths to secure their property. They set up physical defenses, such as walls and gates, and installed them with archers, patrollers, and bells to sound the alarm if an intruder dared attempt a breach. They also used misdirection to hide the value of their most prized possessions. Hidden passageways, traps, and worse – the gold and jewels – were masked to obfuscate and mislead any attempts by potential threat actors.

Fast forward to what we now face, and many of these strategies still apply. Whether implementing zero trust techniques or simply enforcing the protection of sensitive data – the gold and jewels of any enterprise – it falls on NonStop users to take all necessary precautions to ensure critical information is not compromised.  

When it comes to defense, nothing surpasses a multilayered approach. That was the central point of The TechTarget Security publications article, Ransomware trends, statistics and facts in 2023 by Sean Michael Kerner, where he highlighted how “2022 was a breakout year for ransomware.” As to building a defense, “Organizations and individuals can take steps to mitigate ransomware attacks,” said Kerner. “But there is no silver bullet that will solve or defend against ransomware. What’s needed is a multilayered approach to improve IT security overall.”

High walls, strong gates, hidden passageways, and other security strategies may have been effective in days past. Numerous layers confuse and blind all perpetrators, negating their moves to compromise your most valuable assets. However, when considering a security strategy that is up to the task, organizations must leverage the skills of NonStop security experts with a proven history of incorporating a multilayered defense required by NonStop users today. 

The basic principle of a zero-trust security model is to avoid blindly trusting every element within the corporate infrastructure. “Organizations should always authenticate users, applications, and devices that try to access the network, whether internal or external to the organization,” said CSP General Manager Henry Fonseca, referencing the CSP website. “A zero-trust security model can improve an organization’s overall security position, especially when dealing with mobile workforces or hybrid workspace environments.” To this end CSP provides CSP Authenticator+®.”

When enforcing the protection of personal information, organizations must understand the significance of the PCI Security Standards Council and PCI-DSS v4.0. This new version addresses emerging threats and technologies and provides innovative ways to combat those new threats. The simple challenge of “who goes there?” may have been enough to identify unknown elements in the past, but reliable authentication is necessary in modern times. And again, this is where CSP Authenticator+® can be used as a Safeguard SEEP or with Pathway and non-Pathway applications. Almost any application, including TACL, can now easily support multi-factor authentication. CSPs solutions already provide a multilayered approach to security and the tools required to ensure PCI-DSS compliance.

Zero Trust and PCI DSS compliance are the subjects of CSP’s presentations for numerous upcoming NonStop conferences and events. As you read this post, the planned events at SunTUG, NYTUG, and ATUG may have already come and gone. However, you will find CSP actively engaged with the NonStop user community at events planned on May 13 – 15, 2023, for eBITUG in Edinburgh, Scotland; on June 7 – 8, 2023, for CTUG in Mississauga, Ontario (with our CSP General Manager Henry Fonseca serving as a new CTUG Board President) and of course, on September 12 – 14, 2023, for NonStop TBC in Denver, Colorado.  

If you have any questions regarding zero trust, ransomware, and compliance, we would love to talk to you if you are at one of these upcoming events. We understand the importance of implementing effective security strategies to secure critical applications and protect your NonStop systems. We can establish the fortress that today’s data-centric enterprise requires. To learn more about our NonStop security solutions, check out our website and watch for further updates and articles in this publication, as well as others, including Connect Now and The Connection.


CSP – Compliance at your Fingertips®

For complimentary access to CSP-Wiki®, an extensive repository of NonStop security knowledge and best practices, please visit

We Built the Wiki for NonStop Security ®     

The CSP Team    

+1(905) 568 –8900




Gravic Announces Two New Releases: OSB 6.800 (3/1/23), NSB 6.800 (3/15/23)

  • Support for SQL/MX 3.8.1 has been added.
  • SQL Compare can now compare two tables on two different systems connected over Expand without requiring the “Expand Large Messages” feature to be enabled.
    • SQL Compare will automatically use the largest IPC format that the Expand connection supports.
  • “SQL” and “EXPLAIN” commands were added.
    • When enabled, these commands will allow SQL Compare to log all of its SQL statements and EXPLAIN plans.
  • This version resolves a number of internal issues related to the automatic parallelism features of SQL Compare that were introduced in the previous version.

Gravic Presented on HPE Shadowbase — 2023 and Me

at SunTUG Sunshine Summit

Gravic presented HPE Shadowbase — 2023 and Me at the SunTUG Sunshine Summit in Tampa on March 3.

We discussed several topics, including how a wave of changes is occurring within Gravic: new team members, differentiating product enhancements, the acceleration of software innovation, new releases, and the consequential growing pains.

We are evolving, and you can too. Accelerate your HPE NonStop operations by combining different solutions for exponential returns in the areas of: Business Continuity, Data Integration and Synchronization, Application Integration, Zero Downtime Migration, and Data Validation (Compare and Repair).

MATUG chapter logo

Please Register for the In-person MATUG & NYTUG Meetings, April 2023

Catch up on all things NonStop and hear what is new at HPE in the NonStop space: the HPE NonStop roadmaps, the latest news on NonStop development, product management, and sales. Participate in quality informational sessions from vendors, network with fellow HPE NonStop users, and catch up with friends.

These meetings are open at no cost to all HPE NonStop customers, partners, users, consultants, or other interested parties. User presentations are welcome, take preference to vendor presentations, and are free.

Calling All Vendors, ISV’s, and software providers: There are several 25-minute vendor presentation slots available, for a reasonable sponsorship fee (estimated to be about $250). These slots will be filled on a “first-come first-serve” basis, based on the time of your email response to the respective liaisons above.

Tell your friends: please forward this announcement to others in your organization who may be interested in attending.



Gravic Publishes New Article in The Connection on 2022 TBC Presentation

In case you missed it, we wrote an article, ICYMI (In Case You Missed It) – HPE Shadowbase – What’s New in ’22? in the January/February issue of The Connection based on our TBC 2022 presentation.

HPE Shadowbase software is:

  • HPE’s strategic, go-forward data replication solution for Business Continuity along with Data Streaming for Data and Application Integration.
  • Used for RDF replacements: a product that is MATURE, without any new features or planned enhancements.
  • Committed to Data Integration and Streaming for HPE NonStop and Other Servers.
  • Continuously available, providing automatic recovery from failures.
  • Scalable, with high-data throughput.
  • An extensive set of software solutions with many developments underway.
  • Award-winning, achieving positive reviews, and modernizing enterprise applications.

Ken Scudder Joins Shadowbase Business Development Team

Gravic is proud to announce that Ken Scudder has joined our Shadowbase team as Vice President of Global Business Development. Ken has more than two decades of enterprise software experience in product management, sales, and business development.

His previous experience includes positions at XYPRO Technology, ACI Worldwide, CA Technologies, Peregrine Systems (acquired by HPE), and Arthur Andersen Business Consulting. A former Navy Officer and U.S. diplomat, Ken holds an MBA from the University of Southern California and a BS from Rensselaer Polytechnic Institute.

The opportunity to work with Gravic, HPE NonStop, and build upon the relationships and products that he knows so well, was an opportunity not to be missed. Ken looks forward to supporting customers, partners, and driving new Shadowbase business opportunities!

Alfredo Gonzalez Joins Shadowbase Product Deployment Team

Gravic is also proud to announce that Alfredo Gonzalez has joined our Shadowbase team as Product Deployment Analyst. Alfredo has more than two decades of enterprise software experience in technical support, system administration, business development, and even coordatining and executing Disaster Recovery testing.

Alfredo is very excited to join Gravic and looks forward to supporting customers, partners, and driving new Shadowbase business opportunities in Latin America!

Hewlett Packard Enterprise globally sells and supports Shadowbase solutions under the name HPE Shadowbase. For more information, please contact your local HPE Shadowbase representative or visit our website. For additional information, please view our Shadowbase solution videos:

Specifications subject to change without notice. Trademarks mentioned are the property of their respective owners. Copyright 2023.