Management of Very Large Security Event Logs
|
|
- Shanna Matthews
- 8 years ago
- Views:
Transcription
1 Management of Very Large Security Event Logs Balasubramanian Ramaiah Myungsook Klassen Computer Science Department, California Lutheran University 60 West Olsen Rd, Thousand Oaks, CA 91360, USA Abstract - Modern computing systems generate huge amounts of system event log data which are used to address a wide range of important issues such as auditing network status. The traditional method of analyzing event log data is labor intensive and error-prone. In this paper, we will describe our efforts on architecting an integrated log data mining system for automatic management. The system includes a SQL server as a central log server to store historic event log data from other monitored computers. The relational database offers many features desirable for conducting network management: indexes, query optimizer, and powerful query language. We evaluate SQL server hardware performance and query execution speeds with two different sizes of real data. Keywords: network, security, authentication, event log, management 1. INTRODUCTION Data in the log files describe the status of each component and record system operational changes, such as starting and stopping of services, detection of network applications, software configuration changes, and software execution errors. The log analysis problems in general can be broadly divided into the following 3 major tasks: Log data collection and storage in a central repository. Event categorization and event mining : Ability to identify the various log types and categorize them based on type, application, and operating system etc. Reporting and auditing: generate historic reports or perform investigations, audits these logs for compliance and regulatory audits. The time required to do log file data analysis is often high and subject to many errors, due to the fact that traditionally most network management activities have been performed with direct human involvement. As a network becomes increasingly large, those activities become more demanding and data intensive. At large corporations, log files generated by computing systems for different functions and different processes are quite large. When network management is performed with extensive and direct human involvement, it presents some limitations: complexity, difficulty and errors in the operation of network management systems. For these reasons, the automation of network management has become important, as it provides for improved quality of service offered to the customers, while at the same time minimizing potential human errors and reducing network operational costs (Parulkar). The desirable framework is an integrated and automated network maintenance system which incorporates all 3 major tasks mentioned above. Papavassiliou(2000) described methods and tools to provide an efficient and proactive network maintenance process. It was designed using AT&T transaction access service network which is a hybrid POTS-and data wide area network. The system uses an Oracle 7 relational database running on HP K series servers running HP-UX The developed system includes the following tools: (1) the information tracking system that
2 provides a common framework for the storage and retrieval of provisioning, capacity management and maintenance data; (2) the transaction event viewer system that generates, filters, and presents diagnostic events that indicate system occurrences or conditions that may cause a degradation of the service. Tao (2005) proposed an integrated framework to mine system log files for automatic management. The log files were collected from several different machines with different operating systems and Windows NT data was collected using a tool logdump2td developed by Event Mining Team at IBM. The raw data file has 14 columns and text mining techniques were used to categorize messages. One of the important factors for success of an integrated network administration system is a fast response time. Being able to access data and extract necessary information from it at a fast speed to determine if there are any security breaches (Yamanishi, Smyth) or other issues is very important. A robust, fast data analysis system will help companies not only satisfy most audit and regulatory requirements but also boost security and system stability. One way to improve the system response time is to use an efficient data storage and query system for a large log data. Today network management systems use custom storage and retrieval solution to store log file data. They might be enhanced with basic fixed indexes. While they have advanced to quickly process incoming data and generate queries on-the-fly, storing and efficient querying hundreds of gigabytes of historical log file data remain unchanged. While such custom databases can be made to support large flow rates, they are expensive to build, provide a very narrow set of features, and offer limited API(Snyder et al). In contrast, relational databases offer powerful query optimizers, indexes, and a flexible query language. Geambasu examined how and when relational database can be used to store and query historical network flow information in a network intrusion detection system. They reported that Postgres relational database supports relatively large deployments very well with 3 indexes. The purpose of this paper is to present an integrated event log system to automate data gathering, data analysis and report generation using relational database as a log data file storage format. It addresses an issue if a relational database can support a network log data query in a timely manner, especially for a large number of monitored local machines. It also briefly touches the hardware scalability of the proposed system. Operating systems like Linux do not have security auditing functionality and therefore are at a disadvantage in providing data for event queries (Reynolds). Reynolds pointed out that ironically Window NT and its successors provide much of necessary data for security events. So he (2003) used the Windows event log and developed a host-based intrusion detection system. Our system was implemented with the Identity Management system like the authentication systems in Microsoft Window Servers since it provides data required for network activity analysis. But the developed system is easily extensible and pluggable to other operating system platform and to other log formats. In this document, in section 2 we present our methodology including system architecture, data preprocessing, and database design. Section 3 shows query results and hardware performances on this important problem. We continue with query locking issue in Section 4 and conclude in Section 5.
3 2. METHODOLOGY 2.1 System Architecture Figure 1 shows the deployment architecture for the event log system. The system was designed to be vertically and horizontally scalable and therefore was divided into multiple components. A server in a local site logs its event data in its designated local site log collection server. Then it in turn will replicate data to a central log repository using replication at scheduled intervals. Adiscon software (Adiscon, 2007) was used, along with some customized code written in.net platform to collect and send data to a SQL Server, which is the central log server. Adiscon was chosen because of the flexibility of the software: it can send data simultaneously to multiple destinations including syslog server and can write data in a relational database format. The software also provided features for intelligent event notification based on the rules that can be set on the servers. Figure 1: Deployment architecture The companies running servers across multiple sites can take advantage of the compartmentalized model, not worrying about bandwidth consumption by the log data during the peak business hours. The solution will also provide web servers which will host the web front end and custom reports to query the data from the central repository. The system is comprised of a NetApp filer with 3 TB of storage and SQL 2000 Server Database built on a 4way - 8 GB HP DL 585 G1 with 8 GB RAM. More storage can be added as required without changing the central log server as the storage system is decoupled from it. The DL 585 server is capable of handling 8 processors and up to 32 GB of memory.
4 2.2 Data Collection and Preprocessing In the site where the project was implemented, there were about 2000 Window based systems. For prototyping, log data was collected for 1 day from 200 domain name controller servers which generate more data than the rest of machines. One domain controller generates about 25GB per day. Initially 23 attributes, shown in Table 1, were logged by the Adiscon tool from every server into the central log server. The goodness of each attribute was measured from its data distribution for all possible attribute values. If it was the same or has little variation for possible attribute values, it was considered not very useful. Through this process, attributes were reduced from 23 to 10. Retained attributes are ID, ReceivedAt, DevieReportedTime, facility, message, EventSource, EventUser, EventCategory,EventID, and EventLogType. They are shown in Table 1 in bold and Italic. As a result, each server sends only ten attributes to the central log. A lower number of attributes not only reduces the overall storage space requirements, but also improves the performance of SQL query execution. Table 1:Data fields (attributes) captured in Adiscon log data. Attributes Data Function Type ID Unique Identifier of the log entry CustomerID ReceivedAt Datetime The Time when the log entry was received by the loghost service DeviceReportedTime Datetime The time when the event was reported to the OS service. Facility Syslog facility name an integer value Priority FromHost The system name reporting the event name Message Text The actual data in the log entry NTSeverity Importance Reserved for future use EventSource EventUser EventCategory EventID The Event ID number corresponding to the Windows event EventBinaryData Text Event entry binary information MaxAvailable Disk space available CurrUsage Current disk usage MinUsage Minimum disk space used MaxUsage Maximum disk space used InfoUnitID SysLogTag EventLogType GenericFileName Any file name configuration specified. SystemID 2.3 SQL Server Database design There is one main table server which contains 10 attributes selected through preprocessing. This table has a relationship directly or indirectly to 14 auxiliary tables which can provide detail information about the server under question. For instance, its operating system and its service pack installed can be queried. This design stores all dynamic and real time log data from one
5 server in one table, thus allows a fast and efficient query for a particular server. The schema is extensible for different log type application and for different data size. 3. EXPERIMENTAL RESULTS 3.1 Central Log Server Processor & Memory Utilization Processor utilization was evaluated with a 85GB database with 6 simultaneous connections running a query with a single join between 2 tables. As shown in, processors are running at about 24% of the time. The actual production data is expected to be 10 times this sample size and as a result, execution will slow down. Efficient indexing or more than a 4 concurrent processors should be considered as a possible solution. Table 2: Processor Utilization with 85 GB in joining 2 tables Total Processor 0 Processor 1 Processor 2 Processor 3 % Privileged Time % Processor Time % user time Memory Utilization The SQL server showed a 66% Cache hit ratio on a 3 GB RAM system with 85 GB Database. Since system will be scaled up to around 1 to 1.5TB, the memory usage is expected to be around 6-7 GB. 3.2 SQL Query Results When a system administrator investigates the event, he/she issues queries against database. We bench marked the performance of three specific queries against two different size data sets: 2.5GB(40 million records) and 7.5GB(100 million records). Our focus was to investigate effectiveness of the system in terms of system security stability. One particular case is to identify a cause of account lockouts, and following query results show that a source data of the cause in the logs can be easily queried against historical relational database. EventId 642 is Use Account Management Events for the status of Changed. Usamdc01am is a server table and Devicereportedtime is time when the event took place. Three types of queries: 1. Query all records of particular event(s) of interest select * from usamdc01am where EventID='642' 2. Query all records of particular event(s) of interest with a given time range select * from usamdc01am where Devicereportedtime>='12/01/2006' and EventID='642' 3. Query all events with in a time range. select * from usamdc01am where Devicereportedtime >='12/01/2006' Experiments were conducted to measure a system performance with indexes. Initially queries were executed without any indexes and later indexes were created on various attributes and narrowed down to one index of EventID on all log tables.
6 The experimental results in Table 3 demonstrate that indexing the attribute used in the query dramatically improved the performance. In the case of query 3, indexing EventId didn t improve the performance at all and it is expected since the query is on DeviceReportedTime. Table 3:query performances with index EventId for 25GB data and 75GB data. Query type Data Size Time with No EventID Index Time with EventID Index Columns Queried query1 2.5 GB 7.42 minutes 20 Seconds Event ID query2 2.5 GB 6.58 minutes 8 Seconds Event ID + DeviceReportedTime query3 2.5 GB 1 hr 37 minutes 1 hr 37 minutes DeviceReportedTime query GB Not available 39 seconds Event ID query 2 7.5GB Not available 13 seconds Event ID + DeviceReportedTime query GB 5 hr 40 minutes 5 hr 40 minutes DeviceReportedTime Query performances with two different data sizes are consistent: when a data size increases, a total amount of query time increases. For instance, for query1 with indexing, it took 20 seconds with 25 GB while it took 39 seconds with 75GB. 4. QUERY CONNECTION TIMEOUT AND LOCKING The front-end web application written to query data in a single user environment worked well without problems when database is small, and when there are not very many simultaneous insert operations into the SQL database. However when the number of entries in the database grew to be over 10GB and query times increased, queries against a table would create locks, causing problems with an insert operation and other queries running concurrently. The problem became magnified when the number of connections to a table querying for data increased: users started getting timeouts/never ending queries till the SQL server dropped one of the connections to resolve the locks. When the application code was modified to explicitly not use any locking and to allow dirty reads, this issue was solved. The following SQL code snippet show forcing the SQL server not to put any type of locks being executed against a server log data table. Sample query with explicit no lock option: Select message from ustodc01am with (NOLOCK) where Devicereportedtime>= 10/01/2006 and Devicereportedtime<= 10/15/2006 and EventID='644' 5. CONCLUSION We have created an integrated network monitoring system with a web front end application and a commercial relational database as a central log server. Handling large amounts of historical data is not a new problem in databases. However, most work on historical data is data warehousing where data is archived, indexed, and summarized offline with plenty of time to optimize. In our work, handling and querying a large amount of data is on-line, while having to optimize for reading.
7 We have demonstrated the validity of our system using real log file data collected from 20 Windows Identity Management systems. The central log server processor utilization rates and memory cache ratios were monitored for system stability with the prototype 20GB and the suggestion was made for the real production data size of over 1 terabytes. Our system and its methodology can be straightforwardly applied to the analysis of a wide range event log files. In this paper, we have focused on use log lockout queries. It is left for future study how to extend our work in order to find a method to choose the right indexes by examining databases and queries. 6. REFERENCES [1] Adiscon event log support manual. [2] Geambasu, R. and Bragin, T Exploiting History in a network intrusion Detection Ststem. NDSI 2007, NetDB Workshop [3] Papavassiliou, S. and Pace. M From service configuration through performance monitoring to fault detection: implementing an integrated and automated network maintenance platform for enhancing wide area transaction access services. ernational Journal of Network management Vo:10. p [1] Parulkar, G., Schmidt, D., Kraemer, E., Turner, J. and Kantawala, J Architecture for monitoring, visualization, and control of gigabit networks. IEEE Networks. Sept/Oct, Vol:34. [5] Reynolds, J., and Clough, L Continual Repair for Windows using the Event Log. SSR 03, October 31, [2] Smyth. P Markov monitoring with unknown states. IEEE journal on selected areas in Communications (JSAC), special issue on elligent Signal processing for Communications. [7] Snyder, D., and Thayer, R or Fetched on March 23, [3] Tao, L. Liang, S., Sheng, M., and Peng, W An integrated framework on mining logs files for computing system management. KDD 05. p776-p781. [9] Yamanishi, K. and Maruyama.Y Dynamic Syslog Mining for network Failure Monitoring. KDD 05. p
Tuning Tableau Server for High Performance
Tuning Tableau Server for High Performance I wanna go fast PRESENT ED BY Francois Ajenstat Alan Doerhoefer Daniel Meyer Agenda What are the things that can impact performance? Tips and tricks to improve
More informationDB Audit Expert 3.1. Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005
DB Audit Expert 3.1 Performance Auditing Add-on Version 1.1 for Microsoft SQL Server 2000 & 2005 Supported database systems: Microsoft SQL Server 2000 Microsoft SQL Server 2005 Copyright SoftTree Technologies,
More informationLoad Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
More informationORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
More informationAzure Scalability Prescriptive Architecture using the Enzo Multitenant Framework
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework Many corporations and Independent Software Vendors considering cloud computing adoption face a similar challenge: how should
More informationPervasive PSQL Vx Server Licensing
Pervasive PSQL Vx Server Licensing Overview The Pervasive PSQL Vx Server edition is designed for highly virtualized environments with support for enterprise hypervisor features including live application
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489
Developing Microsoft SharePoint Server 2013 Advanced Solutions MOC 20489 Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key aspects of the apps
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Course Details Course Outline Module 1: Creating Robust and Efficient Apps for SharePoint In this module, you will review key
More informationCribMaster Database and Client Requirements
FREQUENTLY ASKED QUESTIONS CribMaster Database and Client Requirements GENERAL 1. WHAT TYPE OF APPLICATION IS CRIBMASTER? ARE THERE ANY SPECIAL APPLICATION SERVER OR USER INTERFACE REQUIREMENTS? CribMaster
More informationInfiniteGraph: The Distributed Graph Database
A Performance and Distributed Performance Benchmark of InfiniteGraph and a Leading Open Source Graph Database Using Synthetic Data Objectivity, Inc. 640 West California Ave. Suite 240 Sunnyvale, CA 94086
More informationMinimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide
Minimum Hardware Configurations for EMC Documentum Archive Services for SAP Practical Sizing Guide Abstract The sizing of hardware in a deployment of EMC Document Archive Services for SAP is determined
More informationWhat s New in Centrify DirectAudit 2.0
CENTRIFY DATASHEET What s New in Centrify DirectAudit 2.0 Introduction Centrify DirectAudit s detailed, real-time auditing of privileged user sessions on Windows, UNIX and Linux systems provides a full
More informationEstimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010
Estimate Performance and Capacity Requirements for Workflow in SharePoint Server 2010 This document is provided as-is. Information and views expressed in this document, including URL and other Internet
More informationSQL Server Administrator Introduction - 3 Days Objectives
SQL Server Administrator Introduction - 3 Days INTRODUCTION TO MICROSOFT SQL SERVER Exploring the components of SQL Server Identifying SQL Server administration tasks INSTALLING SQL SERVER Identifying
More informationwww.dotnetsparkles.wordpress.com
Database Design Considerations Designing a database requires an understanding of both the business functions you want to model and the database concepts and features used to represent those business functions.
More informationOBSERVEIT DEPLOYMENT SIZING GUIDE
OBSERVEIT DEPLOYMENT SIZING GUIDE The most important number that drives the sizing of an ObserveIT deployment is the number of Concurrent Connected Users (CCUs) you plan to monitor. This document provides
More informationHardware and Software Requirements for Server Applications
Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Networks Holding Corporation All Rights Reserved. Rev 9/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum
More informationThe syslog-ng Store Box 3 F2
The syslog-ng Store Box 3 F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance
More informationApplication Performance Testing Basics
Application Performance Testing Basics ABSTRACT Todays the web is playing a critical role in all the business domains such as entertainment, finance, healthcare etc. It is much important to ensure hassle-free
More informationVery Large Enterprise Network, Deployment, 25000+ Users
Very Large Enterprise Network, Deployment, 25000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
More informationEMC Unified Storage for Microsoft SQL Server 2008
EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information
More informationPATROL From a Database Administrator s Perspective
PATROL From a Database Administrator s Perspective September 28, 2001 Author: Cindy Bean Senior Software Consultant BMC Software, Inc. 3/4/02 2 Table of Contents Introduction 5 Database Administrator Tasks
More informationServer Consolidation with SQL Server 2008
Server Consolidation with SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 supports multiple options for server consolidation, providing organizations
More informationCloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
More informationInstalling and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationVirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5
Performance Study VirtualCenter Database Performance for Microsoft SQL Server 2005 VirtualCenter 2.5 VMware VirtualCenter uses a database to store metadata on the state of a VMware Infrastructure environment.
More informationThe Flash- Transformed Server Platform Maximizing Your Migration from Windows Server 2003 with a SanDisk Flash- enabled Server Platform
WHITE PAPER The Flash- Transformed Server Platform Maximizing Your Migration from Windows Server 2003 with a SanDisk Flash- enabled Server Platform.www.SanDisk.com Table of Contents Windows Server 2003
More informationCourse 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions OVERVIEW About this Course This course provides SharePoint developers the information needed to implement SharePoint solutions
More informationOracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya
Oracle Database - Engineered for Innovation Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database 11g Release 2 Shipping since September 2009 11.2.0.3 Patch Set now
More informationEnterprise Network Deployment, 10,000 25,000 Users
Enterprise Network Deployment, 10,000 25,000 Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
More informationManaging your Red Hat Enterprise Linux guests with RHN Satellite
Managing your Red Hat Enterprise Linux guests with RHN Satellite Matthew Davis, Level 1 Production Support Manager, Red Hat Brad Hinson, Sr. Support Engineer Lead System z, Red Hat Mark Spencer, Sr. Solutions
More informationMicrosoft 70-414 Exam
Volume: 92 Questions Topic 1, Contoso Ltd Overview Contoso, Ltd. is a recruiting and staffing company that has offices throughout North America. The company has a main office and six branch offices. The
More informationAnd OrACLE In A data MArT APPLICATIOn
PErfOrMAnCE COMPArISOn Of InTErSySTEMS CAChé And OrACLE In A data MArT APPLICATIOn Abstract A global provider of mobile telecommunications software tested the performance of InterSystems Caché and Oracle
More informationMS SQL Performance (Tuning) Best Practices:
MS SQL Performance (Tuning) Best Practices: 1. Don t share the SQL server hardware with other services If other workloads are running on the same server where SQL Server is running, memory and other hardware
More informationHardware and Software Requirements for Server Applications
Hardware and Software Requirements for Server Applications IVS Enterprise Server Version 11.3+ RMG Enterprise Solutions, Inc. All Rights Reserved. Rev 7/14 TABLE OF CONTENTS INTRODUCTION...3 Minimum Hardware
More informationMicrosoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led
Microsoft SQL Server for Oracle DBAs Course 40045; 4 Days, Instructor-led Course Description This four-day instructor-led course provides students with the knowledge and skills to capitalize on their skills
More informationHow To Store Data On An Ocora Nosql Database On A Flash Memory Device On A Microsoft Flash Memory 2 (Iomemory)
WHITE PAPER Oracle NoSQL Database and SanDisk Offer Cost-Effective Extreme Performance for Big Data 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 What Is Big Data?...
More informationThe syslog-ng Store Box 3 LTS
The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance
More informationDeveloping Microsoft SharePoint Server 2013 Advanced Solutions
Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions Page 1 of 9 Developing Microsoft SharePoint Server 2013 Advanced Solutions Course 20489B: 4 days; Instructor-Led Introduction
More informationOnline Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
More informationSOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management
SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT TM OMNIDOCS Imaging & Enterprise Content Management SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT O MNIDOCS Enterprise Content
More informationReinvent your storage infrastructure for e-business
Reinvent your storage infrastructure for e-business Paul Wang SolutionSoft Systems, Inc. 2345 North First Street, Suite 210 San Jose, CA 95131 pwang@solution-soft.com 408.346.1400 Abstract As the data
More informationVodacom Managed Hosted Backups
Vodacom Managed Hosted Backups Robust Data Protection for your Business Critical Data Enterprise class Backup and Recovery and Data Management on Diverse Platforms Vodacom s Managed Hosted Backup offers
More informationImplementing a Digital Video Archive Based on XenData Software
Based on XenData Software The Video Edition of XenData Archive Series software manages a digital tape library on a Windows Server 2003 platform to create a digital video archive that is ideal for the demanding
More informationImplementing an Automated Digital Video Archive Based on the Video Edition of XenData Software
Implementing an Automated Digital Video Archive Based on the Video Edition of XenData Software The Video Edition of XenData Archive Series software manages one or more automated data tape libraries on
More informationAn Esri White Paper June 2010 Tracking Server 10
An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2010 Esri All rights
More informationCloud Computing. Chapter 1 Introducing Cloud Computing
Cloud Computing Chapter 1 Introducing Cloud Computing Learning Objectives Understand the abstract nature of cloud computing. Describe evolutionary factors of computing that led to the cloud. Describe virtualization
More informationVeritas Configuration Manager Profile. A Profile Prepared by EMA October 2006
Veritas Configuration Manager Profile A Profile Prepared by EMA October 2006 Table of Contents Corporate Information...1 CMDB Type:...1 Areas Supported:...1 IT Domain:...2 Target customers:...2 Product
More informationQLIKVIEW INTEGRATION TION WITH AMAZON REDSHIFT John Park Partner Engineering
QLIKVIEW INTEGRATION TION WITH AMAZON REDSHIFT John Park Partner Engineering June 2014 Page 1 Contents Introduction... 3 About Amazon Web Services (AWS)... 3 About Amazon Redshift... 3 QlikView on AWS...
More informationTandberg Data AccuVault RDX
Tandberg Data AccuVault RDX Binary Testing conducts an independent evaluation and performance test of Tandberg Data s latest small business backup appliance. Data backup is essential to their survival
More informationExadata Database Machine
Database Machine Extreme Extraordinary Exciting By Craig Moir of MyDBA March 2011 Exadata & Exalogic What is it? It is Hardware and Software engineered to work together It is Extreme Performance Application-to-Disk
More informationVery Large Enterprise Network Deployment, 25,000+ Users
Very Large Enterprise Network Deployment, 25,000+ Users Websense software can be deployed in different configurations, depending on the size and characteristics of the network, and the organization s filtering
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationSyslog Analyzer ABOUT US. Member of the TeleManagement Forum. info@ossera.com +1-916-290-9300 http://www.ossera.com
Syslog Analyzer ABOUT US OSSera, Inc. is a global provider of Operational Support System (OSS) solutions for IT organizations, service planning, service operations, and network operations. OSSera's multithreaded
More informationImplementing a Data Warehouse with Microsoft SQL Server 2012 MOC 10777
Implementing a Data Warehouse with Microsoft SQL Server 2012 MOC 10777 Course Outline Module 1: Introduction to Data Warehousing This module provides an introduction to the key components of a data warehousing
More informationOracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered.
Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered August 24, 2015 Contents GLOSSARY PUBLIC CLOUD SERVICES-NON-METERED... 4 ORACLE PLATFORM
More informationFact Sheet In-Memory Analysis
Fact Sheet In-Memory Analysis 1 Copyright Yellowfin International 2010 Contents In Memory Overview...3 Benefits...3 Agile development & rapid delivery...3 Data types supported by the In-Memory Database...4
More informationThe syslog-ng Premium Edition 5LTS
The syslog-ng Premium Edition 5LTS PRODUCT DESCRIPTION Copyright 2000-2013 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
More informationBMC BladeLogic Client Automation Installation Guide
BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationScalability and Performance Report - Analyzer 2007
- Analyzer 2007 Executive Summary Strategy Companion s Analyzer 2007 is enterprise Business Intelligence (BI) software that is designed and engineered to scale to the requirements of large global deployments.
More informationINTRODUCING ORACLE APPLICATION EXPRESS. Keywords: database, Oracle, web application, forms, reports
INTRODUCING ORACLE APPLICATION EXPRESS Cristina-Loredana Alexe 1 Abstract Everyone knows that having a database is not enough. You need a way of interacting with it, a way for doing the most common of
More informationCourse Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Solutions
Course Outline: Course 20489B: Developing Microsoft SharePoint Server 2013 Advanced Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 40 hrs Overview: This course provides SharePoint
More informationCisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database
Cisco UCS and Fusion- io take Big Data workloads to extreme performance in a small footprint: A case study with Oracle NoSQL database Built up on Cisco s big data common platform architecture (CPA), a
More informationArchive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration
Solutions Integrated Storage Appliances Management Optimized Storage & Migration Archive Data Retention & Compliance Services Global Installation & Support SECURING THE FUTURE OF YOUR DATA w w w.q sta
More informationProduct Life Cycle Management
Engineering Change Control Systems (atecc) Product Life Cycle Management Enterprise information boundaries are disappearing as corporations open their networks to allow external access by manufacturing
More informationsyslog-ng Product Line
www.balabit.com syslog-ng Product Line syslog-ng Description www.balabit.com IT environments constantly generate important data in log messages syslog-ng Collects Filters Classifies Normalizes Stores Transfers
More informationMonitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center
Monitor and Manage Your MicroStrategy BI Environment Using Enterprise Manager and Health Center Presented by: Dennis Liao Sales Engineer Zach Rea Sales Engineer January 27 th, 2015 Session 4 This Session
More informationIBM Rational Asset Manager
Providing business intelligence for your software assets IBM Rational Asset Manager Highlights A collaborative software development asset management solution, IBM Enabling effective asset management Rational
More informationWhat is the Difference Between Dedicated and Managed Hosting Services?
A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. This is more flexible than
More informationDE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions
DE-20489B Developing Microsoft SharePoint Server 2013 Advanced Solutions Summary Duration Vendor Audience 5 Days Microsoft Developer Published Level Technology 21 November 2013 300 Microsoft SharePoint
More informationTableau Server 7.0 scalability
Tableau Server 7.0 scalability February 2012 p2 Executive summary In January 2012, we performed scalability tests on Tableau Server to help our customers plan for large deployments. We tested three different
More informationRecommendations for Performance Benchmarking
Recommendations for Performance Benchmarking Shikhar Puri Abstract Performance benchmarking of applications is increasingly becoming essential before deployment. This paper covers recommendations and best
More informationCBW NLS IQ High Speed Query Access to Database and Nearline Storage
CBW NLS IQ High Speed Query Access to Database and Nearline Storage Speed up Your SAP BW Queries with Column-based Technology Dr. Klaus Zimmer, PBS Software GmbH, 2012 Agenda Motivation Nearline Storage
More informationIBM Tivoli Monitoring for Databases
Enhance the availability and performance of database servers IBM Tivoli Monitoring for Databases Highlights Integrated, intelligent database monitoring for your on demand business Preconfiguration of metric
More informationA Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
More informationTNT SOFTWARE White Paper Series
TNT SOFTWARE White Paper Series Event Log Monitor White Paper: Architecture T N T Software www.tntsoftware.com TNT SOFTWARE Event Log Monitor Architecture 2000 TNT Software All Rights Reserved 1308 NE
More informationImplementing HIPAA Compliance with ScriptLogic
Implementing HIPAA Compliance with ScriptLogic A ScriptLogic Product Positioning Paper By Nick Cavalancia 1.800.424.9411 www.scriptlogic.com Table of Contents INTRODUCTION... 3 HIPAA BACKGROUND... 3 ADMINISTRATIVE
More informationAnalyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution
Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Jonathan Halstuch, COO, RackTop Systems JHalstuch@racktopsystems.com Big Data Invasion We hear so much on Big Data and
More informationSawmill Log Analyzer Best Practices!! Page 1 of 6. Sawmill Log Analyzer Best Practices
Sawmill Log Analyzer Best Practices!! Page 1 of 6 Sawmill Log Analyzer Best Practices! Sawmill Log Analyzer Best Practices!! Page 2 of 6 This document describes best practices for the Sawmill universal
More informationThe HP Neoview data warehousing platform for business intelligence Die clevere Alternative
The HP Neoview data warehousing platform for business intelligence Die clevere Alternative Ronald Wulff EMEA, BI Solution Architect HP Software - Neoview 2006 Hewlett-Packard Development Company, L.P.
More informationImplementing a Digital Video Archive Using XenData Software and a Spectra Logic Archive
Using XenData Software and a Spectra Logic Archive With the Video Edition of XenData Archive Series software on a Windows server and a Spectra Logic T-Series digital archive, broadcast organizations have
More informationVMware vcenter Update Manager Administration Guide
VMware vcenter Update Manager Administration Guide Update 1 vcenter Update Manager 4.0 This document supports the version of each product listed and supports all subsequent versions until the document
More informationThe syslog-ng Premium Edition 5F2
The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
More informationConsiderations for Management of Laboratory Data
Considerations for Management of Laboratory Data 2003 Scientific Computing & Instrumentation LIMS Guide, November 2003 Michael H Elliott Drowning in a sea of data? Nervous about 21 CFR Part 11? Worried
More informationNovell File Reporter 2.5 Who Has What?
Novell File Reporter 2.5 Who Has What? Richard Cabana Senior Systems Engineer File Access & Mgmt Solution Principal Attachmate Novell North America rcabana@novell.com Joe Marton Senior Systems Engineer
More informationOracle BI EE Implementation on Netezza. Prepared by SureShot Strategies, Inc.
Oracle BI EE Implementation on Netezza Prepared by SureShot Strategies, Inc. The goal of this paper is to give an insight to Netezza architecture and implementation experience to strategize Oracle BI EE
More informationDatabase as a Service (DaaS) Version 1.02
Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...
More informationScalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com info@arcsight.com Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
More informationCase Study: Load Testing and Tuning to Improve SharePoint Website Performance
Case Study: Load Testing and Tuning to Improve SharePoint Website Performance Abstract: Initial load tests revealed that the capacity of a customized Microsoft Office SharePoint Server (MOSS) website cluster
More informationOracle Database 11g: New Features for Administrators DBA Release 2
Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change
More informationXenData Archive Series Software Technical Overview
XenData White Paper XenData Archive Series Software Technical Overview Advanced and Video Editions, Version 4.0 December 2006 XenData Archive Series software manages digital assets on data tape and magnetic
More informationEnterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services. By Ajay Goyal Consultant Scalability Experts, Inc.
Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services By Ajay Goyal Consultant Scalability Experts, Inc. June 2009 Recommendations presented in this document should be thoroughly
More informationTechnical Specifications
Technical Specifications Deployment and Integration The zero footprint web architecture ensures no intrusion on your users computers. Use ZAP CubeXpress to bring in Microsoft Dynamics customizations and
More informationA TECHNICAL WHITE PAPER ATTUNITY VISIBILITY
A TECHNICAL WHITE PAPER ATTUNITY VISIBILITY Analytics for Enterprise Data Warehouse Management and Optimization Executive Summary Successful enterprise data management is an important initiative for growing
More informationAn Oracle White Paper June 2012. High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database
An Oracle White Paper June 2012 High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database Executive Overview... 1 Introduction... 1 Oracle Loader for Hadoop... 2 Oracle Direct
More information#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance)
#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance) Messina Thursday, 1:30 PM - 2:15 PM Paul F. Deaver, Sr. Consultant Security, Government & Infrastructure
More informationsyslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com
syslog-ng Store Box PRODUCT DESCRIPTION Copyright 2000-2009 BalaBit IT Security All rights reserved. www.balabit.com Introduction Log messages contain information about the events happening on the hosts.
More informationIndexing Techniques for Data Warehouses Queries. Abstract
Indexing Techniques for Data Warehouses Queries Sirirut Vanichayobon Le Gruenwald The University of Oklahoma School of Computer Science Norman, OK, 739 sirirut@cs.ou.edu gruenwal@cs.ou.edu Abstract Recently,
More informationXenData Product Brief: SX-520 Series Servers for Sony Optical Disc Archives
XenData Product Brief: SX-520 Series Servers for Sony Optical Disc Archives The SX-520 Series of Archive Servers creates highly scalable Optical Disc Digital Video Archives that are optimized for broadcasters,
More informationRunning VirtualCenter in a Virtual Machine
VMWARE TECHNICAL NOTE VirtualCenter 2.x Running VirtualCenter in a Virtual Machine Running VirtualCenter in a virtual machine is fully supported by VMware to the same degree as if it were installed on
More information