Management of Very Large Security Event Logs

Size: px
Start display at page:

Download "Management of Very Large Security Event Logs"

Transcription

1 Management of Very Large Security Event Logs Balasubramanian Ramaiah Myungsook Klassen Computer Science Department, California Lutheran University 60 West Olsen Rd, Thousand Oaks, CA 91360, USA Abstract - Modern computing systems generate huge amounts of system event log data which are used to address a wide range of important issues such as auditing network status. The traditional method of analyzing event log data is labor intensive and error-prone. In this paper, we will describe our efforts on architecting an integrated log data mining system for automatic management. The system includes a SQL server as a central log server to store historic event log data from other monitored computers. The relational database offers many features desirable for conducting network management: indexes, query optimizer, and powerful query language. We evaluate SQL server hardware performance and query execution speeds with two different sizes of real data. Keywords: network, security, authentication, event log, management 1. INTRODUCTION Data in the log files describe the status of each component and record system operational changes, such as starting and stopping of services, detection of network applications, software configuration changes, and software execution errors. The log analysis problems in general can be broadly divided into the following 3 major tasks: Log data collection and storage in a central repository. Event categorization and event mining : Ability to identify the various log types and categorize them based on type, application, and operating system etc. Reporting and auditing: generate historic reports or perform investigations, audits these logs for compliance and regulatory audits. The time required to do log file data analysis is often high and subject to many errors, due to the fact that traditionally most network management activities have been performed with direct human involvement. As a network becomes increasingly large, those activities become more demanding and data intensive. At large corporations, log files generated by computing systems for different functions and different processes are quite large. When network management is performed with extensive and direct human involvement, it presents some limitations: complexity, difficulty and errors in the operation of network management systems. For these reasons, the automation of network management has become important, as it provides for improved quality of service offered to the customers, while at the same time minimizing potential human errors and reducing network operational costs (Parulkar). The desirable framework is an integrated and automated network maintenance system which incorporates all 3 major tasks mentioned above. Papavassiliou(2000) described methods and tools to provide an efficient and proactive network maintenance process. It was designed using AT&T transaction access service network which is a hybrid POTS-and data wide area network. The system uses an Oracle 7 relational database running on HP K series servers running HP-UX The developed system includes the following tools: (1) the information tracking system that

2 provides a common framework for the storage and retrieval of provisioning, capacity management and maintenance data; (2) the transaction event viewer system that generates, filters, and presents diagnostic events that indicate system occurrences or conditions that may cause a degradation of the service. Tao (2005) proposed an integrated framework to mine system log files for automatic management. The log files were collected from several different machines with different operating systems and Windows NT data was collected using a tool logdump2td developed by Event Mining Team at IBM. The raw data file has 14 columns and text mining techniques were used to categorize messages. One of the important factors for success of an integrated network administration system is a fast response time. Being able to access data and extract necessary information from it at a fast speed to determine if there are any security breaches (Yamanishi, Smyth) or other issues is very important. A robust, fast data analysis system will help companies not only satisfy most audit and regulatory requirements but also boost security and system stability. One way to improve the system response time is to use an efficient data storage and query system for a large log data. Today network management systems use custom storage and retrieval solution to store log file data. They might be enhanced with basic fixed indexes. While they have advanced to quickly process incoming data and generate queries on-the-fly, storing and efficient querying hundreds of gigabytes of historical log file data remain unchanged. While such custom databases can be made to support large flow rates, they are expensive to build, provide a very narrow set of features, and offer limited API(Snyder et al). In contrast, relational databases offer powerful query optimizers, indexes, and a flexible query language. Geambasu examined how and when relational database can be used to store and query historical network flow information in a network intrusion detection system. They reported that Postgres relational database supports relatively large deployments very well with 3 indexes. The purpose of this paper is to present an integrated event log system to automate data gathering, data analysis and report generation using relational database as a log data file storage format. It addresses an issue if a relational database can support a network log data query in a timely manner, especially for a large number of monitored local machines. It also briefly touches the hardware scalability of the proposed system. Operating systems like Linux do not have security auditing functionality and therefore are at a disadvantage in providing data for event queries (Reynolds). Reynolds pointed out that ironically Window NT and its successors provide much of necessary data for security events. So he (2003) used the Windows event log and developed a host-based intrusion detection system. Our system was implemented with the Identity Management system like the authentication systems in Microsoft Window Servers since it provides data required for network activity analysis. But the developed system is easily extensible and pluggable to other operating system platform and to other log formats. In this document, in section 2 we present our methodology including system architecture, data preprocessing, and database design. Section 3 shows query results and hardware performances on this important problem. We continue with query locking issue in Section 4 and conclude in Section 5.

3 2. METHODOLOGY 2.1 System Architecture Figure 1 shows the deployment architecture for the event log system. The system was designed to be vertically and horizontally scalable and therefore was divided into multiple components. A server in a local site logs its event data in its designated local site log collection server. Then it in turn will replicate data to a central log repository using replication at scheduled intervals. Adiscon software (Adiscon, 2007) was used, along with some customized code written in.net platform to collect and send data to a SQL Server, which is the central log server. Adiscon was chosen because of the flexibility of the software: it can send data simultaneously to multiple destinations including syslog server and can write data in a relational database format. The software also provided features for intelligent event notification based on the rules that can be set on the servers. Figure 1: Deployment architecture The companies running servers across multiple sites can take advantage of the compartmentalized model, not worrying about bandwidth consumption by the log data during the peak business hours. The solution will also provide web servers which will host the web front end and custom reports to query the data from the central repository. The system is comprised of a NetApp filer with 3 TB of storage and SQL 2000 Server Database built on a 4way - 8 GB HP DL 585 G1 with 8 GB RAM. More storage can be added as required without changing the central log server as the storage system is decoupled from it. The DL 585 server is capable of handling 8 processors and up to 32 GB of memory.

4 2.2 Data Collection and Preprocessing In the site where the project was implemented, there were about 2000 Window based systems. For prototyping, log data was collected for 1 day from 200 domain name controller servers which generate more data than the rest of machines. One domain controller generates about 25GB per day. Initially 23 attributes, shown in Table 1, were logged by the Adiscon tool from every server into the central log server. The goodness of each attribute was measured from its data distribution for all possible attribute values. If it was the same or has little variation for possible attribute values, it was considered not very useful. Through this process, attributes were reduced from 23 to 10. Retained attributes are ID, ReceivedAt, DevieReportedTime, facility, message, EventSource, EventUser, EventCategory,EventID, and EventLogType. They are shown in Table 1 in bold and Italic. As a result, each server sends only ten attributes to the central log. A lower number of attributes not only reduces the overall storage space requirements, but also improves the performance of SQL query execution. Table 1:Data fields (attributes) captured in Adiscon log data. Attributes Data Function Type ID Unique Identifier of the log entry CustomerID ReceivedAt Datetime The Time when the log entry was received by the loghost service DeviceReportedTime Datetime The time when the event was reported to the OS service. Facility Syslog facility name an integer value Priority FromHost The system name reporting the event name Message Text The actual data in the log entry NTSeverity Importance Reserved for future use EventSource EventUser EventCategory EventID The Event ID number corresponding to the Windows event EventBinaryData Text Event entry binary information MaxAvailable Disk space available CurrUsage Current disk usage MinUsage Minimum disk space used MaxUsage Maximum disk space used InfoUnitID SysLogTag EventLogType GenericFileName Any file name configuration specified. SystemID 2.3 SQL Server Database design There is one main table server which contains 10 attributes selected through preprocessing. This table has a relationship directly or indirectly to 14 auxiliary tables which can provide detail information about the server under question. For instance, its operating system and its service pack installed can be queried. This design stores all dynamic and real time log data from one

5 server in one table, thus allows a fast and efficient query for a particular server. The schema is extensible for different log type application and for different data size. 3. EXPERIMENTAL RESULTS 3.1 Central Log Server Processor & Memory Utilization Processor utilization was evaluated with a 85GB database with 6 simultaneous connections running a query with a single join between 2 tables. As shown in, processors are running at about 24% of the time. The actual production data is expected to be 10 times this sample size and as a result, execution will slow down. Efficient indexing or more than a 4 concurrent processors should be considered as a possible solution. Table 2: Processor Utilization with 85 GB in joining 2 tables Total Processor 0 Processor 1 Processor 2 Processor 3 % Privileged Time % Processor Time % user time Memory Utilization The SQL server showed a 66% Cache hit ratio on a 3 GB RAM system with 85 GB Database. Since system will be scaled up to around 1 to 1.5TB, the memory usage is expected to be around 6-7 GB. 3.2 SQL Query Results When a system administrator investigates the event, he/she issues queries against database. We bench marked the performance of three specific queries against two different size data sets: 2.5GB(40 million records) and 7.5GB(100 million records). Our focus was to investigate effectiveness of the system in terms of system security stability. One particular case is to identify a cause of account lockouts, and following query results show that a source data of the cause in the logs can be easily queried against historical relational database. EventId 642 is Use Account Management Events for the status of Changed. Usamdc01am is a server table and Devicereportedtime is time when the event took place. Three types of queries: 1. Query all records of particular event(s) of interest select * from usamdc01am where EventID='642' 2. Query all records of particular event(s) of interest with a given time range select * from usamdc01am where Devicereportedtime>='12/01/2006' and EventID='642' 3. Query all events with in a time range. select * from usamdc01am where Devicereportedtime >='12/01/2006' Experiments were conducted to measure a system performance with indexes. Initially queries were executed without any indexes and later indexes were created on various attributes and narrowed down to one index of EventID on all log tables.

6 The experimental results in Table 3 demonstrate that indexing the attribute used in the query dramatically improved the performance. In the case of query 3, indexing EventId didn t improve the performance at all and it is expected since the query is on DeviceReportedTime. Table 3:query performances with index EventId for 25GB data and 75GB data. Query type Data Size Time with No EventID Index Time with EventID Index Columns Queried query1 2.5 GB 7.42 minutes 20 Seconds Event ID query2 2.5 GB 6.58 minutes 8 Seconds Event ID + DeviceReportedTime query3 2.5 GB 1 hr 37 minutes 1 hr 37 minutes DeviceReportedTime query GB Not available 39 seconds Event ID query 2 7.5GB Not available 13 seconds Event ID + DeviceReportedTime query GB 5 hr 40 minutes 5 hr 40 minutes DeviceReportedTime Query performances with two different data sizes are consistent: when a data size increases, a total amount of query time increases. For instance, for query1 with indexing, it took 20 seconds with 25 GB while it took 39 seconds with 75GB. 4. QUERY CONNECTION TIMEOUT AND LOCKING The front-end web application written to query data in a single user environment worked well without problems when database is small, and when there are not very many simultaneous insert operations into the SQL database. However when the number of entries in the database grew to be over 10GB and query times increased, queries against a table would create locks, causing problems with an insert operation and other queries running concurrently. The problem became magnified when the number of connections to a table querying for data increased: users started getting timeouts/never ending queries till the SQL server dropped one of the connections to resolve the locks. When the application code was modified to explicitly not use any locking and to allow dirty reads, this issue was solved. The following SQL code snippet show forcing the SQL server not to put any type of locks being executed against a server log data table. Sample query with explicit no lock option: Select message from ustodc01am with (NOLOCK) where Devicereportedtime>= 10/01/2006 and Devicereportedtime<= 10/15/2006 and EventID='644' 5. CONCLUSION We have created an integrated network monitoring system with a web front end application and a commercial relational database as a central log server. Handling large amounts of historical data is not a new problem in databases. However, most work on historical data is data warehousing where data is archived, indexed, and summarized offline with plenty of time to optimize. In our work, handling and querying a large amount of data is on-line, while having to optimize for reading.

7 We have demonstrated the validity of our system using real log file data collected from 20 Windows Identity Management systems. The central log server processor utilization rates and memory cache ratios were monitored for system stability with the prototype 20GB and the suggestion was made for the real production data size of over 1 terabytes. Our system and its methodology can be straightforwardly applied to the analysis of a wide range event log files. In this paper, we have focused on use log lockout queries. It is left for future study how to extend our work in order to find a method to choose the right indexes by examining databases and queries. 6. REFERENCES [1] Adiscon event log support manual. [2] Geambasu, R. and Bragin, T Exploiting History in a network intrusion Detection Ststem. NDSI 2007, NetDB Workshop [3] Papavassiliou, S. and Pace. M From service configuration through performance monitoring to fault detection: implementing an integrated and automated network maintenance platform for enhancing wide area transaction access services. ernational Journal of Network management Vo:10. p [1] Parulkar, G., Schmidt, D., Kraemer, E., Turner, J. and Kantawala, J Architecture for monitoring, visualization, and control of gigabit networks. IEEE Networks. Sept/Oct, Vol:34. [5] Reynolds, J., and Clough, L Continual Repair for Windows using the Event Log. SSR 03, October 31, [2] Smyth. P Markov monitoring with unknown states. IEEE journal on selected areas in Communications (JSAC), special issue on elligent Signal processing for Communications. [7] Snyder, D., and Thayer, R or Fetched on March 23, [3] Tao, L. Liang, S., Sheng, M., and Peng, W An integrated framework on mining logs files for computing system management. KDD 05. p776-p781. [9] Yamanishi, K. and Maruyama.Y Dynamic Syslog Mining for network Failure Monitoring. KDD 05. p

Tuning Tableau Server for High Performance

Tuning Tableau Server for High Performance Tuning Tableau Server for High Performance I wanna go fast PRESENT ED BY Francois Ajenstat Alan Doerhoefer Daniel Meyer Agenda What are the things that can impact performance? Tips and tricks to improve

More information

DB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005

DB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 DB Audit Expert 3.1 Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 Supported database systems: Microsoft SQL Server 2000 Microsoft SQL Server 2005 Copyright SoftTree Technologies,

More information

Load Testing and Monitoring Web Applications in a Windows Environment

Load Testing and Monitoring Web Applications in a Windows Environment OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework

Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework Many corporations and Independent Software Vendors considering cloud computing adoption face a similar challenge: how should

More information

Pervasive PSQL Vx Server Licensing

Pervasive PSQL Vx Server Licensing Pervasive PSQL Vx Server Licensing Overview The Pervasive PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489

Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489 Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489 Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key aspects of the apps

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions

Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Details Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key

More information

CribMaster Database and Client Requirements

CribMaster Database and Client Requirements FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster

More information

InfiniteGraph: The Distributed Graph Database

InfiniteGraph: The Distributed Graph Database A Performance and Distributed Performance Benchmark of InfiniteGraph and a Leading Open Source Graph Database Using Synthetic Data Objectivity, Inc. 640 West California Ave. Suite 240 Sunnyvale, CA 94086

More information

Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide

Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide Abstract The sizing of hardware in a deployment of EMC Document Archive Services for SAP is determined

More information

What s New in Centrify DirectAudit 2.0

What s New in Centrify DirectAudit 2.0 CENTRIFY DATASHEET What s New in Centrify DirectAudit 2.0 Introduction Centrify DirectAudit s detailed, real-time auditing of privileged user sessions on Windows, UNIX and Linux systems provides a full

More information

Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010

Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet

More information

SQL Server Administrator Introduction - 3 Days Objectives

SQL Server Administrator Introduction - 3 Days Objectives SQL Server Administrator Introduction - 3 Days INTRODUCTION TO MICROSOFT SQL SERVER Exploring the components of SQL Server Identifying SQL Server administration tasks INSTALLING SQL SERVER Identifying

More information

www.dotnetsparkles.wordpress.com

www.dotnetsparkles.wordpress.com Database Design Considerations Designing a database requires an understanding of both the business functions you want to model and the database concepts and features used to represent those business functions.

More information

OBSERVEIT DEPLOYMENT SIZING GUIDE

OBSERVEIT DEPLOYMENT SIZING GUIDE OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides

More information

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Networks Holding Corporation All Rights Reserved. Rev 9/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum

More information

The syslog-ng Store Box 3 F2

The syslog-ng Store Box 3 F2 The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

Application Performance Testing Basics

Application Performance Testing Basics Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free

More information

Very Large Enterprise Network, Deployment, 25000+ Users

Very Large Enterprise Network, Deployment, 25000+ Users Very Large Enterprise Network, Deployment, 25000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

EMC Unified Storage for Microsoft SQL Server 2008

EMC Unified Storage for Microsoft SQL Server 2008 EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information

More information

PATROL From a Database Administrator s Perspective

PATROL From a Database Administrator s Perspective PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks

More information

Server Consolidation with SQL Server 2008

Server Consolidation with SQL Server 2008 Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Installing and Administering VMware vsphere Update Manager

Installing and Administering VMware vsphere Update Manager Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5

VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 Performance Study VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 VMware VirtualCenter uses a database to store metadata on the state of a VMware Infrastructure environment.

More information

The Flash- Transformed Server Platform Maximizing Your Migration from Windows Server 2003 with a SanDisk Flash- enabled Server Platform

The Flash- Transformed Server Platform Maximizing Your Migration from Windows Server 2003 with a SanDisk Flash- enabled Server Platform WHITE PAPER The Flash- Transformed Server Platform Maximizing Your Migration from Windows Server 2003 with a SanDisk Flash- enabled Server Platform.www.SanDisk.com Table of Contents Windows Server 2003

More information

Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW

Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW About this Course This course provides SharePoint developers the information needed to implement SharePoint solutions

More information

Oracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya

Oracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database - Engineered for Innovation Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database 11g Release 2 Shipping since September 2009 11.2.0.3 Patch Set now

More information

Enterprise Network Deployment, 10,000 25,000 Users

Enterprise Network Deployment, 10,000 25,000 Users Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

Managing your Red Hat Enterprise Linux guests with RHN Satellite

Managing your Red Hat Enterprise Linux guests with RHN Satellite Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions

More information

Microsoft 70-414 Exam

Microsoft 70-414 Exam Volume: 92 Questions Topic 1, Contoso Ltd Overview Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has a main office and six branch offices. The

More information

And OrACLE In A data MArT APPLICATIOn

And OrACLE In A data MArT APPLICATIOn PErfOrMAnCE COMPArISOn Of InTErSySTEMS CAChé And OrACLE In A data MArT APPLICATIOn Abstract A global provider of mobile telecommunications software tested the performance of InterSystems Caché and Oracle

More information

MS SQL Performance (Tuning) Best Practices:

MS SQL Performance (Tuning) Best Practices: MS SQL Performance (Tuning) Best Practices: 1. Don t share the SQL server hardware with other services If other workloads are running on the same server where SQL Server is running, memory and other hardware

More information

Hardware and Software Requirements for Server Applications

Hardware and Software Requirements for Server Applications Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Enterprise Solutions, Inc. All Rights Reserved. Rev 7/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum Hardware

More information

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led

Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills

More information

How To Store Data On An Ocora Nosql Database On A Flash Memory Device On A Microsoft Flash Memory 2 (Iomemory)

How To Store Data On An Ocora Nosql Database On A Flash Memory Device On A Microsoft Flash Memory 2 (Iomemory) WHITE PAPER Oracle NoSQL Database and SanDisk Offer Cost-Effective Extreme Performance for Big Data 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 What Is Big Data?...

More information

The syslog-ng Store Box 3 LTS

The syslog-ng Store Box 3 LTS The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance

More information

Developing Microsoft SharePoint Server 2013 Advanced Solutions

Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT TM OMNIDOCS Imaging & Enterprise Content Management SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT O MNIDOCS Enterprise Content

More information

Reinvent your storage infrastructure for e-business

Reinvent your storage infrastructure for e-business Reinvent your storage infrastructure for e-business Paul Wang SolutionSoft Systems, Inc. 2345 North First Street, Suite 210 San Jose, CA 95131 pwang@solution-soft.com 408.346.1400 Abstract As the data

More information

Vodacom Managed Hosted Backups

Vodacom Managed Hosted Backups Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers

More information

Implementing a Digital Video Archive Based on XenData Software

Implementing a Digital Video Archive Based on XenData Software Based on XenData Software The Video Edition of XenData Archive Series software manages a digital tape library on a Windows Server 2003 platform to create a digital video archive that is ideal for the demanding

More information

Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software

Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software The Video Edition of XenData Archive Series software manages one or more automated data tape libraries on

More information

An Esri White Paper June 2010 Tracking Server 10

An Esri White Paper June 2010 Tracking Server 10 An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2010 Esri All rights

More information

Cloud Computing. Chapter 1 Introducing Cloud Computing

Cloud Computing. Chapter 1 Introducing Cloud Computing Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization

More information

Veritas Configuration Manager Profile. A Profile Prepared by EMA October 2006

Veritas Configuration Manager Profile. A Profile Prepared by EMA October 2006 Veritas Configuration Manager Profile A Profile Prepared by EMA October 2006 Table of Contents Corporate Information...1 CMDB Type:...1 Areas Supported:...1 IT Domain:...2 Target customers:...2 Product

More information

QLIKVIEW INTEGRATION TION WITH AMAZON REDSHIFT John Park Partner Engineering

QLIKVIEW INTEGRATION TION WITH AMAZON REDSHIFT John Park Partner Engineering QLIKVIEW INTEGRATION TION WITH AMAZON REDSHIFT John Park Partner Engineering June 2014 Page 1 Contents Introduction... 3 About Amazon Web Services (AWS)... 3 About Amazon Redshift... 3 QlikView on AWS...

More information

Tandberg Data AccuVault RDX

Tandberg Data AccuVault RDX Tandberg Data AccuVault RDX Binary Testing conducts an independent evaluation and performance test of Tandberg Data s latest small business backup appliance. Data backup is essential to their survival

More information

Exadata Database Machine

Exadata Database Machine Database Machine Extreme Extraordinary Exciting By Craig Moir of MyDBA March 2011 Exadata & Exalogic What is it? It is Hardware and Software engineered to work together It is Extreme Performance Application-to-Disk

More information

Very Large Enterprise Network Deployment, 25,000+ Users

Very Large Enterprise Network Deployment, 25,000+ Users Very Large Enterprise Network Deployment, 25,000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com

Syslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded

More information

Implementing a Data Warehouse with Microsoft SQL Server 2012 MOC 10777

Implementing a Data Warehouse with Microsoft SQL Server 2012 MOC 10777 Implementing a Data Warehouse with Microsoft SQL Server 2012 MOC 10777 Course Outline Module 1: Introduction to Data Warehousing This module provides an introduction to the key components of a data warehousing

More information

Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered.

Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered. Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered August 24, 2015 Contents GLOSSARY PUBLIC CLOUD SERVICES-NON-METERED... 4 ORACLE PLATFORM

More information

Fact Sheet In-Memory Analysis

Fact Sheet In-Memory Analysis Fact Sheet In-Memory Analysis 1 Copyright Yellowfin International 2010 Contents In Memory Overview...3 Benefits...3 Agile development & rapid delivery...3 Data types supported by the In-Memory Database...4

More information

The syslog-ng Premium Edition 5LTS

The syslog-ng Premium Edition 5LTS The syslog-ng Premium Edition 5LTS PRODUCT DESCRIPTION Copyright 2000-2013 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

BMC BladeLogic Client Automation Installation Guide

BMC BladeLogic Client Automation Installation Guide BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Scalability and Performance Report - Analyzer 2007

Scalability and Performance Report - Analyzer 2007 - Analyzer 2007 Executive Summary Strategy Companion s Analyzer 2007 is enterprise Business Intelligence (BI) software that is designed and engineered to scale to the requirements of large global deployments.

More information

INTRODUCING ORACLE APPLICATION EXPRESS. Keywords: database, Oracle, web application, forms, reports

INTRODUCING ORACLE APPLICATION EXPRESS. Keywords: database, Oracle, web application, forms, reports INTRODUCING ORACLE APPLICATION EXPRESS Cristina-Loredana Alexe 1 Abstract Everyone knows that having a database is not enough. You need a way of interacting with it, a way for doing the most common of

More information

Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions

Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This course provides SharePoint

More information

Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database

Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database Built up on Cisco s big data common platform architecture (CPA), a

More information

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta

More information

Product Life Cycle Management

Product Life Cycle Management Engineering Change Control Systems (atecc) Product Life Cycle Management Enterprise information boundaries are disappearing as corporations open their networks to allow external access by manufacturing

More information

syslog-ng Product Line

syslog-ng Product Line www.balabit.com syslog-ng Product Line syslog-ng Description www.balabit.com IT environments constantly generate important data in log messages syslog-ng Collects Filters Classifies Normalizes Stores Transfers

More information

Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center

Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session

More information

IBM Rational Asset Manager

IBM Rational Asset Manager Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational

More information

What is the Difference Between Dedicated and Managed Hosting Services?

What is the Difference Between Dedicated and Managed Hosting Services? A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. This is more flexible than

More information

DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions

DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions Summary Duration Vendor Audience 5 Days Microsoft Developer Published Level Technology 21 November 2013 300 Microsoft SharePoint

More information

Tableau Server 7.0 scalability

Tableau Server 7.0 scalability Tableau Server 7.0 scalability February 2012 p2 Executive summary In January 2012, we performed scalability tests on Tableau Server to help our customers plan for large deployments. We tested three different

More information

Recommendations for Performance Benchmarking

Recommendations for Performance Benchmarking Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best

More information

CBW NLS IQ High Speed Query Access to Database and Nearline Storage

CBW NLS IQ High Speed Query Access to Database and Nearline Storage CBW NLS IQ High Speed Query Access to Database and Nearline Storage Speed up Your SAP BW Queries with Column-based Technology Dr. Klaus Zimmer, PBS Software GmbH, 2012 Agenda Motivation Nearline Storage

More information

IBM Tivoli Monitoring for Databases

IBM Tivoli Monitoring for Databases Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

TNT SOFTWARE White Paper Series

TNT SOFTWARE White Paper Series TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE

More information

Implementing HIPAA Compliance with ScriptLogic

Implementing HIPAA Compliance with ScriptLogic Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE

More information

Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution

Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Jonathan Halstuch, COO, RackTop Systems JHalstuch@racktopsystems.com Big Data Invasion We hear so much on Big Data and

More information

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices

Sawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal

More information

The HP Neoview data warehousing platform for business intelligence Die clevere Alternative

The HP Neoview data warehousing platform for business intelligence Die clevere Alternative The HP Neoview data warehousing platform for business intelligence Die clevere Alternative Ronald Wulff EMEA, BI Solution Architect HP Software - Neoview 2006 Hewlett-Packard Development Company, L.P.

More information

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive

Implementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have

More information

VMware vcenter Update Manager Administration Guide

VMware vcenter Update Manager Administration Guide VMware vcenter Update Manager Administration Guide Update 1 vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document

More information

The syslog-ng Premium Edition 5F2

The syslog-ng Premium Edition 5F2 The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,

More information

Considerations for Management of Laboratory Data

Considerations for Management of Laboratory Data Considerations for Management of Laboratory Data 2003 Scientific Computing & Instrumentation LIMS Guide, November 2003 Michael H Elliott Drowning in a sea of data? Nervous about 21 CFR Part 11? Worried

More information

Novell File Reporter 2.5 Who Has What?

Novell File Reporter 2.5 Who Has What? Novell File Reporter 2.5 Who Has What? Richard Cabana Senior Systems Engineer File Access & Mgmt Solution Principal Attachmate Novell North America rcabana@novell.com Joe Marton Senior Systems Engineer

More information

Oracle BI EE Implementation on Netezza. Prepared by SureShot Strategies, Inc.

Oracle BI EE Implementation on Netezza. Prepared by SureShot Strategies, Inc. Oracle BI EE Implementation on Netezza Prepared by SureShot Strategies, Inc. The goal of this paper is to give an insight to Netezza architecture and implementation experience to strategize Oracle BI EE

More information

Database as a Service (DaaS) Version 1.02

Database as a Service (DaaS) Version 1.02 Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...

More information

Scalability in Log Management

Scalability in Log Management Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:

More information

Case Study: Load Testing and Tuning to Improve SharePoint Website Performance

Case Study: Load Testing and Tuning to Improve SharePoint Website Performance Case Study: Load Testing and Tuning to Improve SharePoint Website Performance Abstract: Initial load tests revealed that the capacity of a customized Microsoft Office SharePoint Server (MOSS) website cluster

More information

Oracle Database 11g: New Features for Administrators DBA Release 2

Oracle Database 11g: New Features for Administrators DBA Release 2 Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change

More information

XenData Archive Series Software Technical Overview

XenData Archive Series Software Technical Overview XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic

More information

Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services. By Ajay Goyal Consultant Scalability Experts, Inc.

Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services. By Ajay Goyal Consultant Scalability Experts, Inc. Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services By Ajay Goyal Consultant Scalability Experts, Inc. June 2009 Recommendations presented in this document should be thoroughly

More information

Technical Specifications

Technical Specifications Technical Specifications Deployment and Integration The zero footprint web architecture ensures no intrusion on your users computers. Use ZAP CubeXpress to bring in Microsoft Dynamics customizations and

More information

A TECHNICAL WHITE PAPER ATTUNITY VISIBILITY

A TECHNICAL WHITE PAPER ATTUNITY VISIBILITY A TECHNICAL WHITE PAPER ATTUNITY VISIBILITY Analytics for Enterprise Data Warehouse Management and Optimization Executive Summary Successful enterprise data management is an important initiative for growing

More information

An Oracle White Paper June 2012. High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database

An Oracle White Paper June 2012. High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database An Oracle White Paper June 2012 High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database Executive Overview... 1 Introduction... 1 Oracle Loader for Hadoop... 2 Oracle Direct

More information

#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance)

#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance) #9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance) Messina Thursday, 1:30 PM - 2:15 PM Paul F. Deaver, Sr. Consultant Security, Government & Infrastructure

More information

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com

syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.

More information

Indexing Techniques for Data Warehouses Queries. Abstract

Indexing Techniques for Data Warehouses Queries. Abstract Indexing Techniques for Data Warehouses Queries Sirirut Vanichayobon Le Gruenwald The University of Oklahoma School of Computer Science Norman, OK, 739 sirirut@cs.ou.edu gruenwal@cs.ou.edu Abstract Recently,

More information

XenData Product Brief: SX-520 Series Servers for Sony Optical Disc Archives

XenData Product Brief: SX-520 Series Servers for Sony Optical Disc Archives XenData Product Brief: SX-520 Series Servers for Sony Optical Disc Archives The SX-520 Series of Archive Servers creates highly scalable Optical Disc Digital Video Archives that are optimized for broadcasters,

More information

Running VirtualCenter in a Virtual Machine

Running VirtualCenter in a Virtual Machine VMWARE TECHNICAL NOTE VirtualCenter 2.x Running VirtualCenter in a Virtual Machine Running VirtualCenter in a virtual machine is fully supported by VMware to the same degree as if it were installed on

More information