IM02 How to manage your Test Data on zenterprise September, 2012 IBM Forum Brussels

Size: px
Start display at page:

Download "IM02 How to manage your Test Data on zenterprise. 18-20 September, 2012 IBM Forum Brussels"

Transcription

1 IM02 How to manage your Test Data on zenterprise September, 2012 IBM Forum Brussels

2 Notices This information was developed for products and services offered in the U.S.A. Note to U.S. Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM's application programming interfaces. 2

3 Trademarks This presentation contains trade-marked IBM products and technologies. Refer to the following Web site: 3

4 Agenda Data Governance - Focus on Test Data creation and masking Obtaining test data. Some common practices. Obtaining test data. Best practices. InfoSphere Optim Test Data Management / Data Privacy Q & A

5 A Smarter Planet harnesses today s information explosion for business benefit creating a need for better Information Governance Instrumented Interconnected Intelligent Streamlining processes to manage business growth with consistency Ensuring compliance with policies, laws and regulations Controlling costs and optimizing infrastructure

6 Success requires governance across the Information Supply Chain Transactional & Collaborative Applications Integrate Analyze Content Analytics Business Analytics Applications Manage Master Data Big Data Cubes Data External Information Sources Content Streaming Information Data Warehouses Govern Information Governance Quality Lifecycle Security & Privacy Standards

7 Requirements for managing data across its lifecycle Information Governance Core Disciplines Lifecycle Management Discover & Define Develop & Test Optimize & Archive Consolidate & Retire Discover where data resides Develop & test database structures/ code Enhance performance Integrate into single data source Classify & define data and relationships Create & refresh test data Manage data growth Move only the needed information Define policies Capture & replay production workloads Report & retrieve archived data Enable compliance with retention & e-discovery

8 Organizations continue to be challenged with building quality applications Increasing Costs Increasing Risk Time to Market Defects are caught late in the cycle Mandatory to protect data and comply with regulations Lack of realistic test data and inadequate environments

9 Organizations continue to be challenged with building quality applications Increasing Costs $300 billion Annual costs of softwarerelated downtime. d 32% Low success rate for software projects e Increasing Risk 45,000+ Number of sensitive records exposed to 3 rd party during testing c 70% companies use actual customer data to test applications a Time to Market 37% Satisfied with speed of software development f 30-50% Time testing teams spend on setting up test environments, instead of testing b a. The Ponemon Institute. The Insecurity of Test Data: The Unseen Crisis b. NIST, Planning Report. The Economic Impacts of Inadequate Infrastructure for Software Testing c. Federal Aviation Administration: Exposes unprotected test data to a third party d. The Standish Group, Comparative Economic Normalization Technology Study, CHAOS Chronicles v12.3.9, June 30, 2008 e. The Standish Group, Chaos Report, April 2009 f. Forrester Research, Corporate Software Development Fails To Satisfy On Speed Or Quality", 2005

10 Vulnerable non-production environments at risk Most ignore security in non-production environments 70% of organizations surveyed use live customer data in non-production environments (testing, Q/A, development) Database Trends and Applications. Ensuring Protection for Sensitive Test Data $194 per record cost of a data breach The Ponemon Institute Cost of Data Beach Study 50% of organizations surveyed have no way of knowing if data used in test was compromised The Ponemon Institute. The Insecurity of Test Data: The Unseen Crisis 52% of surveyed organizations outsource development The Ponemon Institute. The Insecurity of Test Data: The Unseen Crisis

11 CIO Impact Across the Enterprise The benefits of TDM strategy Align application performance to business processes Ensure business continuity Respond quickly and accurately to audit and discovery requests Leverage existing investments in applications, databases and storage Reduce resource requirements for key IT operations Business Profit from superior application performance and availability Provision resources to meet priority business needs Automate data retention to support compliance initiatives Eliminate budget variances IT Streamline application and database upgrades Speed disaster recovery Simplify database administration Reclaim underutilized capacity Protect data privacy, integrity, and security

12 Agenda Data Governance - Focus on Test Data creation and masking Obtaining test data. Some common practices. Obtaining test data. Best practices. InfoSphere Optim Test Data Management / Data Privacy Q & A

13 Test data creation is often accomplished through cloning Simple to do Positives Requires little knowledge of the data model or infrastructure Creates an exact duplication of production Negatives Uses significant storage - Much more than team needs - Often done once and not for each team member Data is production ready and therefore a privacy risk Takes significant amounts of time to create No way to compare to original after test is complete Cannot span multiple data sources/applications Developer/Tester downtime when sharing data accessibility Production Database Test Database Clone

14 The Data Multiplier Effect 500 GB Development 500 GB Production 500 GB Test 500 GB Backup 3000 GB Total 500 GB User Acceptance 500 GB Disaster Recovery Actual Data Burden = Size of production database + all replicated clones

15 Generating synthetictest data Positives Negatives Safe Resource-intensive: - Huge commitment from DBA - Deep knowledge of database schema Tedious: DBA s must intentionally include errors to ensure robust testing process. Created data does not always reflect the integrity of the original data. Time-consuming: process is slower and can be error-prone. Test Database

16 Test data creation by writing SQL Positives Negatives? Write and maintain SQL. Complex and subject to change. Referential Integrity? Right data? Expensive, dedicated staff. Cannot span multiple data sources/applications. Developer/Tester downtime when sharing data accessibility. Production Database Test Database SQL

17 Agenda Data Governance - Focus on Test Data creation and masking Obtaining test data. Some common practices. Obtaining test data. Best practices. InfoSphere Optim Test Data Management / Data Privacy Q & A

18 Test Data Management Concepts Test Data Management (TDM) refers to the need to manage data used in various preproduction environments and is a vital part of Application Quality & Delivery. Extract production data into referentially intact data subsets to be used to support application data in other environments. De-identify (mask) extracted production data to protect privacy. Compare before and after images of test data. Speed application quality and delivery.

19 Test Data Management Best Practices 50 GB 50 GB Unit 2 TB Function 3 TB Integration Performance 4 TB UAT Production Subset Privatize Subset Privatize Inspect/Browse Inspect/Browse & & Seed Seed Test Test Cases Cases Correct Production Errors Refresh Test Data Refresh Test Data Run Test Production Errors Compare Compare Before Before and and After After Results Results No Errors Promote to Production! Source 1 Compare Process Source 2

20 The Test Data Management Process Gold Copy TDM Processes Subset and Privatized Test Data Extract Extract & Subset Subset Convert Convert & Mask Mask Compare Compare & Audit Audit Load Load & Distribute Distribute Subset Subset Masking Masking Source Source Criteria Criteria Rules Rules & Target Target Secured Lock-down Environment DB DB List List & Auth Auth

21 Refresh test data Test Environments Tester Refresh Developer Developer Refresh Test Database 50 GB Training Database 75 GB Tester Tester Refresh Dev Database 25 GB

22 Example process Speed delivery, reduce costs and improve quality while reducing risk and increasing compliance with Test Data Management Without Test Data Management With Test Data Management Tester Submits request for test data DBA Sits in queue for days Create test data Tester Submits request for test data Sits in queue for days Takes several days to create DBA Create test data Tester -Use test data in testing -Request data refresh Sits in queue for days and take several days to create Tester Takes hours to create -Use test data in testing - Refresh test data DBA Create or Refresh test data

23 Agile development relies on agile testing, agile testing relies on continuous access to test data Organization Process Technology an agile test organization and testers need continuous access to test data with agile development you have continuous integration and delivery and have to test often test data management software needs to support agile method by streamlining access to test data and having insight into test data

24 Agenda Data Governance - Focus on Test Data creation and masking Obtaining test data. Some common practices. Obtaining test data. Best practices. InfoSphere Optim Test Data Management / Data Privacy Q & A

25 Enterprise Data Governance for System z Archive inactive data and reduce amount of data exposed and requiring protections. Reduce risk from Security breaches Optim Data Growth Solution Comply with regulatory compliance requirements Manage Data Lifecycle Data Retention Data Retirement Data Governance Secure Prevent Access Restrict Access Monitor Access DB2/RACF Security Tivoli zsecure Audit Protect sensitive customer data and employee data Guardium for z Audit Audit Privileges Audit Users Audit Access Protect & Privacy Mask Data Encrypt Data Data Encryp. for IMS / DB2 Optim TDM and DP IBM is only solution provider with an end to end comprehensive solution 25

26 IBM InfoSphere Optim supports the heterogeneous enterprise Discover Manage Test Data Capture & Replay Archive Partner-delivered Solutions Single, scalable, heterogeneous information lifecycle management solution provides a central point to deploy policies to extract, archive, subset, and protect application data records from creation to deletion

27 OPTIM Server / Repository IMS VSAM / SEQ Files DB2 Orders Products Customers Payments Employee Payroll IMS Native Access Native Access DB2 Access DB2 Optim Directory Workstation ISPF Server Repository Services Data Access Services Subsetting Services Archiving Services An ISPF Data workbench Privacy software Servicesrunning under Z/OS Open utilized Data to design, Management test and deploy projects to the OPTIM Server. The ISPF workbench software Securityenables either Online and Batch (JCL) execution. Metadata Data Data Index Index Artifacts Storage Extract Independent & Archive Files Archive ODBC/JDBC

28 OPTIM Server / Repository IMS VSAM / SEQ Files DB2 Orders Products Customers Payments Employee Payroll IMS Native Access Native Access DB2 Access Utilizes IMS provided Utilizes drivers to VSAM access Native Accesss Utilizes to access SQL data. to access Metadata data. Provides data. Metadata is captured is captured via via copybook imports process (COBOL to capture or PL/1) metadata from DB2 Metadata copybook imports (COBOL or PL/1) catalog. DB2 Server Optim Directory Workstation ISPF Repository Services Data Access Services Subsetting Services Archiving Services Data Privacy Services Open Data Management Security Z/OS Store and retrieve metadata Data Data information, Index Indexproject information, archive catalog in the Optim Access source or destination Databases via Directory Enable data access relational with access Artifacts specific to drivers Archived per Data file type via ODBC/JDBC and Storage SQL-92. Extract and restore Storage relationally Extract Independent & Can Archive be used intact Business Archive Files in Archive conjunction to remote Database services of Objects across multiple DB2 Databases, IMS and VSAM Store ODM (e.g. and to integrate retrieve, Orders from restore, with Enterprise DB2, delete, Customers compress Data Access from VSAM data, Consistently for Business and metadata Credit and Intelligence and Cards predictably artifacts from IMS) mask (e.g. external and documents propagate data as BLOBs) for the related purpose to of Business test data Objects management with data compliance ODBC/JDBC Provide functional and object security to separate product and data access by role and responsibilities using RACF

29 Optim capture the complete Business Object

30 Application view Application-level business rules for data relationships Optim Captures the Complete Business Object Business Object : Represents application data record payment, invoice, customer Referentially-intact subset of data across related tables and applications; includes metadata, DDL, Reference + Transaction. Benefit: Referential Integrity: Ensure data is captured and masked consistently DBA view Referentially-intact subset of data Related LUW Files or Documents Complete Data RI Preserved! OS Independent DB independent ODBC Accessible Federated access to data and metadata IMS IMS DB2 DB2 IMS IMS VSAM VSAM

31 Test Data Management 2TB Production or Production Clone IBM InfoSphere Optim Test Data Management Solution Requirements -Subset -Mask Create right-size production-like environments for application testing 25 GB Unit Test 100 GB -Compare -Refresh Integration Test 25 GB Development 50 GB Training InfoSphere Optim TDM supports data on distributed platforms (LUW) and z/os. Out-of-the-box subset support for packaged applications ERP/CRM solutions as well as : Other Create referentially intact, right-sized test databases Automate test result comparisons to identify hidden errors Protect confidential data used in test, training & development Shorten iterative testing cycles and accelerate time to market Benefits Deploy new functionality more quickly and with improved quality Easily refresh & maintain test environments Protect sensitive information from misuse & fraud with data masking Accelerate delivery of test data through refresh

32 InfoSphere Optim Test Data Management Standard methodology Deploy Application Optim fits with your testing methodology Extract Subset Privatize Load Edit Compare Production Extract / privatize production data Success Unsuccessful Results? Automate all or part of the process Extract file Refresh and Retest Compare results Load test database Test Test Application Edit data

33 Enterprise Testing Solution with Rational and InfoSphere Optim Building better quality applications Comprehensive software quality process to minimize cost and shorten development cycles Manage test labs Create realistic test environments from production data Ensure protection of sensitive data Manage unit, functional and performance testing and quality test cases Streamline your test data management processes and deliver your project sooner and with fewer defects Design & Manage Test Campaign Initiate Data Extract Scripts Subset & Mask Production Data for Testing Refresh Masked Test Data Browse & Edit Test Data Execute Automated Test Routines InfoSphere Optim InfoSphere Optim InfoSphere Optim Fail Compare Before & After Data InfoSphere Optim Go Production!

34 The process : Access Definiton Legacy are VSAM files, seq. files or IMS segments

35 Type of Relationships DB2 DB2 defined relationship OPT Relationship defined with Optim

36 Selection Criteria Only records where State = GA

37 Extract Process PRODDB EXTRACT Point & Shoot CUSTOMERS ORDERS Extract File Use BROWSE to verify extracted data DETAILS Process Report Extract from source tables Extract data and/or object definitions

38 The Extract Report

39 Browse extract file with join

40 Insert Process : Populate Destination Tables Table Map Table names need not match Change qualifier and/or table name Can be saved in PST Directory

41 Insert Process : Populate Destination Tables Column Map Map unlike column names Transform/mask sensitive data Datatype conversions Column-level date aging Literals Special Registers Expressions Default Values User exits

42 Edit / Browse : Traditional vs. Relational Tools Single Table Editors The Relational Editor One table/view at a time No edit of related data from multiple tables Simultaneous browse/edit of related data from multiple tables FIND CUSTOMER NOTE INFO EXIT TABLE FIND ORDERS NOTE INFO EXIT TABLE FIND DETAILS NOTE INFO EXIT TABLE CUSTOMERS ORDERS DETAILS

43 Editing Data Edit data to: Insert Rows Delete Rows Update Rows

44 Relationally Joined Data Browse or edit related rows Scroll of higher-level table automatically synchronizes all lower-joined tables

45 Commit/Restore Commits are automatically made to the database when you move your pointer to a different row Each instance of a commit counts as an undo level Restore changes to a row, table or fetch set

46 Backing Out Changes - Row Level Undo removes last change made to the current row Undo brings up a row list and lets you select how far back you want to restore the current row Undo All removes all changes made to the current row since the last fetch

47 Challenges of Enterprise Data Privacy Multi-platforms Relational database applications in the enterprise Complex data model Multiple databases Legacy data components Interconnected applications Distributed work teams Employees and contractors Global 24 x 7 operations

48 What is data masking? Definition Method for creating a structurally similar but inauthentic version of an organization's data. The purpose is to protect the actual data while having a functional substitute for occasions when the real data is not required. Requirement Effective data masking requires data to be altered in a way that the actual values cannot be determined or reengineered, functional appearance is maintained. Other Terms Used Obfuscation, scrambling, data de-identification Commonly masked data types Name, address, telephone, SSN/national identity number, credit card number Methods Static Masking: Extracts rows from production databases, obfuscating data values that ultimately get stored in the columns in the test databases Dynamic Masking: Masks specific data elements on the fly without touching applications or physical production data store

49 Statically mask data in non-production databases Patient No SSN Name Erica Schafer Address 12 Murray Court City Austin State TX Zip Statically mask Patient No SSN Name Amanda Winters Address 40 Bayberry Drive City Elgin State IL Zip Mask data in non-production databases such as test and development Improve security of non-production environments Facilitate faster testing processes with accurate test data Support referential integrity Mask custom and packaged ERP/CRM applications

50 Optim Data Privacy Solution Production Test VSAM IMS DB2 Contextual, Application- Aware, Persistent Data Data Masking DB2 IMS VSAM Substitute confidential information with fictionalized data Deploy multiple masking algorithms Provide consistency across environments and iterations Enable off-shore testing Protect private data in non-production environments

51 Consistent mapping Across the enterprise Client Billing Application IMS SSN#s DB2 SS#s Data is masked Masked fields are consistent SSN#s SSN#s

52 De-Identify test data During Extract Process Production Data Extract and Convert Masked Test Data Or Standalone Convert Process Or During Insert/Load Process Transform or Replace sensitive data using Standard mapping rules: Literals, Special Registers, Expressions, Default Values, Look-up tables Complex mapping rules: User exits

53 Optim Data Privacy in Application Testing NewDB Extract a relationally intact subset from production database(s) CUSTOMERS CUSTOMERS Create CUST ORD DETL INSERT/ UPDATE TESTDB CUST ORDERS ORDERS DETAILS DETAILS Extract File Transform / mask sensitive data Load Files LOAD ORD DETL QADB CUST ORD DETL Extract data and/or object definitions Define a new set of test tables Apply masking during population process Extract file may be reused but contains un-masked data Good practice for testing masks

54 Optim Data Privacy in Application Testing NewDB Extract a relationally intact subset from production database(s) CUSTOMERS CUSTOMERS ORDERS ORDERS DETAILS DETAILS Extract File Create Transform / mask sensitive data Masked Extract File CUST ORD DETL INSERT/ UPDATE Load Files LOAD TESTDB CUST ORD DETL QADB CUST ORD DETL Extract data and/or object definitions in pre-masked file Use pre-masked Extract file to create new set of tables Convert Pre-masked extract file data into second masked extract file Share masked extract file to be reused for population step Good practice for testing masks using COMPARE

55 Optim Data Privacy in Application Testing Only Users authorized to see Private data Extract a relationally intact subset from production database(s) CUSTOMERS CUSTOMERS ORDERS ORDERS DETAILS DETAILS Transform / mask sensitive data Most Secure Approach Extract data only Convert during extract Extract File Extract file already contains masked data Can be shared with testers to reuse INSERT/ UPDATE Load Files LOAD TESTDB CUST ORD DETL QADB CUST ORD DETL

56 Transformation Techniques String literal values Character substrings Random or sequential numbers Arithmetic expressions Concatenated expressions Date aging Lookup values Intelligence

57 IBM InfoSphere Optim Data Masking JASON MICHAELS De-identify sensitive information with realistic but fictional data ROBERT SMITH Personal identifiable information is masked with realistic but fictional data Requirements Protect confidential data used in test, training & development systems Mask data on screen in applications Implement proven data masking techniques Support compliance with privacy regulations Solution supports custom & packaged ERP applications Benefits Protect sensitive information from misuse and fraud Prevent data breaches and associated fines Achieve better information governance

58 Contextually accurate masked data facilitates business processes Satisfy Privacy regulations String literal values Character substrings & concatenation Random or sequential numbers Reduce risk of data breaches Arithmetic expressions Lookup values Business data types (CCN, NID) Maintain value of test data Generic mask Dates User defined Patient Information Patient Patient No. No SSN SSN Name Name Amanda Erica Schafer Winters Address Bayberry Murray Court Drive City City Elgin Austin State State IL TX Zip Zip Data is masked with contextually correct data to preserve integrity of data Personal Info Table PersNbr FirstName LastName Jeanne Alice Renoir Bennett Claude Carl Davis Monet Pablo Elliot Flynn Picasso Referential integrity is maintained with key propagation Event Table PersNbr FstNEvtOwn LstNEvtOwn Pablo Elliot Flynn Picasso Pablo Elliot Flynn Picasso

59 Total Assets Street Address/City/State/Zip Code Data Sets Customers Street City State Zip Code $534,674,233 54, Buttercup Ln Cleveland OH $8,777,733, , Rte 10 S Princeton NJ ) Client is a Bank who wishes to mask its assets by location 288 Helm St 12 Roden Dr Milwaukee Los Angeles WI CA Address Lookup Table ) Optim provides corresponding Street Address/City/State/Zip Codes for masking 3526 Diamond Rd Seattle WA Street Road 2 Applegarth Ln Total Assets Las Vegas NV Brunswick ME New Table with Masked Data Customers Street City State Zip Code 3) Leverage Multiple Column Replacement. Entire address row can be masked with a valid Coding Accuracy Support System (CASS) address using enhanced random lookup function $534,674,233 54, Diamond Rd Seattle WA $8,777,733, , Street Rd Las Vegas NV 89101

60 First Names and Last Names Data Sets Production Database First Name Last Name GPA High School Advisor State John Bob Danielle Dave Stacey Paul Smith 3.2 Princeton Johnson NJ Kate Last Jones Name 2.7 Albany Kline Lookup NY First Name Lookup Table Newton Nelson Kline Howell Reese Table Test Database First Name Last Name GPA High School Advisor State Dave Nelson 3.2 Princeton Johnson NJ 1) Client is a University who wishes to mask the first and last name fields in their admissions database 2) Optim now has a first name lookup table with over 5,000 male/female names and a last name lookup table with over 80,000 names 3) Use Lookup Tables to randomly replace table first and last names Stacey Reese 2.7 Albany Kline NY

61 Data Privacy Transformation Library Functions TRANS SSN Generates valid and unique U.S. Social Security Number (SSN). By default, algorithmically generates consistently altered destination SSN based on source SSN. Can also generate a random SSN when the source data does not have an SSN value or when there is no need for transforming the source SSN in a consistent manner. TRANS CCN Use the TRANS CCN function to generate a valid and unique credit card number (CCN). By default, randomizes entire string, can also randomize parts of the credit card (example- preserve cc type). TRANS EML Generates a random address. An address consists of two parts, a user name followed by a domain name, separated For example, [email protected]. JASON MICHAELS ROBERT SMITH

62 Without Key Propagation Original Data Customers Table Cust ID Name Street Alice Bennett 2 Park Blvd Carl Davis 258 Main Elliot Flynn 96 Avenue Orders Table Now these are Orphans! Without Key Propagation Customers Table Cust ID Name Street Auguste Smith Mars Claude Jones Venus Pablo Adams Saturn25 Orders Table Cust ID Item # Order Date June October 2005 Cust ID Item # Order Date June October 2005

63 Masking with Key Propagation Original Data Customers Table Cust ID Name Street Alice Bennett 2 Park Blvd Carl Davis 258 Main Elliot Flynn 96 Avenue Orders Table Cust ID Item # Order Date June October 2005 Referential integrity is maintained De-Identified Data Customers Table Cust ID Name Street Auguste Smith Mars Claude Jones Venus Pablo Adams Saturn25 Orders Table Cust ID Item # Order Date June October 2005

64 Using Custom Masking Exits Apply complex data transformation algorithms and populate the resulting value to the destination column Selectively include or exclude rows and apply logic to the masking process Valuable where the desired transformation is beyond the scope of supplied Column Map functions Example: Generate a value for CUST_ID based on customer location, average account balance, and volume of transaction activity

65 Agenda Data Governance - Focus on Test Data creation and masking Obtaining test data. Some common practices. Obtaining test data. Best practices. InfoSphere Optim Test Data Management / Data Privacy Q & A

66 Participate in the System z Expert and Superhero contest! Fill in your answer to the question below on the scorecard and deposit your card in the box! Which IBM Software is key for delivering a completly masked Test data subset? A. Combination of answer B & D B. InfoSphere Optim Test Data Management C. InfoSphere Guardium D. InfoSphere Optim Data Privacy IBM Corporation

67 More information on zenterprise IBM zenterprise / System z Redbooks Portal: IBM zenterprise Announcement Landing Page: ibm.com/systems/zenterprise196 IBM zenterprise HW Landing Page: ibm.com/systems/zenterprise196 IBM zenterprise Events Landing Page: ibm.com/systems/breakthrough IBM Software: ibm.com/software/os/systemz/announcements IBM System Storage: ibm.com/systems/storage/product/z.html IBM Global Financing: ibm.com/financing/us/lifecycle/acquire/zenterprise/ Global Technology Services: 67

68 Traditional Chinese Thai Russian Thank You English Bedankt Nederlands Merci French Obrigado Gracias! Spanish Arabic Brazilian Portuguese Danke German Simplified Chinese Japanese 68

Test Data Management in the New Era of Computing

Test Data Management in the New Era of Computing Test Data Management in the New Era of Computing Vinod Khader IBM InfoSphere Optim Development Agenda Changing Business Environment and Data Management Challenges What is Test Data Management Best Practices

More information

Welcome Tata Consulting Services, DSP Managed Services IBM and Azlan. Oracle e-business Suite. R12 Upgrade Workshop Summer 2011

Welcome Tata Consulting Services, DSP Managed Services IBM and Azlan. Oracle e-business Suite. R12 Upgrade Workshop Summer 2011 Welcome Tata Consulting Services, DSP Managed Services IBM and Azlan Oracle e-business Suite R12 Upgrade Workshop Summer 2011 Agenda 10:00 Welcome & Introductions Industry Implementation Challenges 10:30

More information

IBM InfoSphere Optim Data Masking solution

IBM InfoSphere Optim Data Masking solution IBM InfoSphere Optim Data Masking solution Mask data on demand to protect privacy across the enterprise Highlights: Safeguard personally identifiable information, trade secrets, financials and other sensitive

More information

IBM InfoSphere Optim Test Data Management

IBM InfoSphere Optim Test Data Management IBM InfoSphere Optim Test Data Management Highlights Create referentially intact, right-sized test databases or data warehouses Automate test result comparisons to identify hidden errors and correct defects

More information

IBM InfoSphere Optim Test Data Management Solution

IBM InfoSphere Optim Test Data Management Solution IBM InfoSphere Optim Test Data Management Solution Highlights Create referentially intact, right-sized test databases Automate test result comparisons to identify hidden errors Easily refresh and maintain

More information

IBM DB2 Data Archive Expert for z/os:

IBM DB2 Data Archive Expert for z/os: Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2

More information

IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite

IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite Streamline test-data management and deliver reliable application upgrades and enhancements Highlights Apply test-data management

More information

IBM Software Five steps to successful application consolidation and retirement

IBM Software Five steps to successful application consolidation and retirement Five steps to successful application consolidation and retirement Streamline your application infrastructure with good information governance Contents 2 Why consolidate or retire applications? Data explosion:

More information

IBM Software The fundamentals of data lifecycle management in the era of big data

IBM Software The fundamentals of data lifecycle management in the era of big data IBM Software The fundamentals of in the era of big data How complements a big data strategy The fundamentals of in the era of big data 1 2 3 4 5 6 Introduction Big data, big impact: Dealing with the Best

More information

AD04 - Batch Modernization Strategies for Mainframe Environments

AD04 - Batch Modernization Strategies for Mainframe Environments AD04 - Modernization Strategies for Mainframe Environments Alex Louwe Kooijmans Solution Architect Financial Services CoE E-mail: [email protected] Notices This information was developed for products and

More information

Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide

Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide IBM Cognos Business Intelligence (BI) helps you make better and smarter business decisions faster. Advanced visualization

More information

Integrated Data Management: Discovering what you may not know

Integrated Data Management: Discovering what you may not know Integrated Data Management: Discovering what you may not know Eric Naiburg [email protected] Agenda Discovering existing data assets is hard What is Discovery Discovery and archiving Discovery, test

More information

IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager

IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager Rational Insight and Rational Asset Manager...4 Prerequisites...5 Configuring the XML data configuration for Rational Asset

More information

OS Deployment V2.0. User s Guide

OS Deployment V2.0. User s Guide OS Deployment V2.0 User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government Users

More information

IBM Cognos Controller Version 10.2.0. New Features Guide

IBM Cognos Controller Version 10.2.0. New Features Guide IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies

More information

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

More information

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and

More information

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide Automated Clearing House (ACH) payment volume is on the rise. NACHA, the electronic payments organization, estimates that

More information

Active Directory Synchronization with Lotus ADSync

Active Directory Synchronization with Lotus ADSync Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,

More information

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Introduction This IBM Redpaper gives a example of procedures

More information

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version 5.0.1. First Edition (December 7, 2007)

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version 5.0.1. First Edition (December 7, 2007) IBM Tivoli Identity Manager Version 5.0.1 First Edition (December 7, 2007) This edition applies to version 5.0 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise

More information

Database lifecycle management

Database lifecycle management Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand

More information

Tivoli Endpoint Manager for Configuration Management. User s Guide

Tivoli Endpoint Manager for Configuration Management. User s Guide Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

More information

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based

More information

Why Add Data Masking to Your IBM DB2 Application Environment

Why Add Data Masking to Your IBM DB2 Application Environment Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise

More information

Closing the data privacy gap: Protecting sensitive data in non-production environments

Closing the data privacy gap: Protecting sensitive data in non-production environments Enterprise Data Management Solutions February 2008 IBM Information Management software Closing the data privacy gap: Protecting sensitive data in non-production environments Page 2 Contents 2 Executive

More information

Test Data Management for Security and Compliance

Test Data Management for Security and Compliance White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential

More information

IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note

IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices

More information

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database

More information

Case Study: Process SOA Scenario

Case Study: Process SOA Scenario Redpaper Martin Keen Michele Chilanti Veronique Moses Scott Simmons Srinivasan Vembakkam Case Study: Process SOA Scenario This paper one in a series of service-oriented architecture (SOA) papers that feature

More information

Balance and maximise your Oracle EBS investment with IBM Optim A Priceline and Travel Industry Case Study Philip McBride

Balance and maximise your Oracle EBS investment with IBM Optim A Priceline and Travel Industry Case Study Philip McBride Balance and maximise your Oracle EBS investment with IBM Optim A Priceline and Travel Industry Case Study Philip McBride IBM Senior Consultant, Data Governance Worldwide Centre of Excellence IBM Balance

More information

IBM Enterprise Marketing Management. Domain Name Options for Email

IBM Enterprise Marketing Management. Domain Name Options for Email IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all

More information

Cúram Business Intelligence and Analytics Guide

Cúram Business Intelligence and Analytics Guide IBM Cúram Social Program Management Cúram Business Intelligence and Analytics Guide Version 6.0.4 Note Before using this information and the product it supports, read the information in Notices at the

More information

IBM Enterprise Marketing Management. Domain Name Options for Email

IBM Enterprise Marketing Management. Domain Name Options for Email IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies

More information

IBM Security SiteProtector System Migration Utility Guide

IBM Security SiteProtector System Migration Utility Guide IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition

More information

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies

More information

Tivoli Endpoint Manager for Security and Compliance Analytics

Tivoli Endpoint Manager for Security and Compliance Analytics Tivoli Endpoint Manager for Security and Compliance Analytics User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM

More information

Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02

Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,

More information

Packet Capture Users Guide

Packet Capture Users Guide IBM Security QRadar Version 7.2.2 Packet Capture Users Guide SC27-6512-00 Note Before using this information and the product that it supports, read the information in Notices on page 9. Copyright IBM Corporation

More information

IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide

IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide The new IBM Removable Disk EXchange (RDX) USB 3.0 removable disk backup solution is designed to address your increasing capacity and backup

More information

Linux. Managing security compliance

Linux. Managing security compliance Linux Managing security compliance Linux Managing security compliance Note Before using this information and the product it supports, read the information in Notices on page 7. First Edition (December

More information

IBM Lotus Protector for Mail Encryption

IBM Lotus Protector for Mail Encryption IBM Lotus Protector for Mail Encryption Server Upgrade Guide 2.1.1 Version Information Lotus Protector for Mail Encryption Server Upgrade Guide. Lotus Protector for Mail Encryption Server Version 2.1.1.

More information

InfoSphere Governance Solutions Maximizing your Information Supply Chain

InfoSphere Governance Solutions Maximizing your Information Supply Chain Kimberly Madia, IBM InfoSphere Product Marketing [email protected], 412-667-3256 InfoSphere Governance Solutions Maximizing your Information Supply Chain Information Management Version 2010.09.03 What

More information

IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration

IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9 MagicDraw UML - IBM Rational Rhapsody Integration IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 2/9 Notices Copyright IBM Corporation

More information

IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM

IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM IBM TRIRIGA Version 10 Release 4.2 Inventory Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies to

More information

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM VisualAge for Java,Version3.5. Remote Access to Tool API IBM VisualAge for Java,Version3.5 Remote Access to Tool API Note! Before using this information and the product it supports, be sure to read the general information under Notices. Edition notice This edition

More information

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide Cloud computing has become a business evolution that is impacting all facets of business today, including sales,

More information

Getting Started With IBM Cúram Universal Access Entry Edition

Getting Started With IBM Cúram Universal Access Entry Edition IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry Edition Version 6.0.5 IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry

More information

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,

More information

Software Usage Analysis Version 1.3

Software Usage Analysis Version 1.3 Software Usage Analysis Version 1.3 Catalog Editor s Guide Catalog Editor s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation

More information

IBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note

IBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note IBM Security QRadar Version 7.2.0 Installing QRadar with a Bootable USB Flash-drive Technical Note Note: Before using this information and the product that it supports, read the information in Notices

More information

Business-driven governance: Managing policies for data retention

Business-driven governance: Managing policies for data retention August 2013 Business-driven governance: Managing policies for data retention Establish and support enterprise data retention policies for ENTER» Table of contents 3 4 5 Step 1: Identify the complete business

More information

IBM Optim. The ROI of an Archiving Project. Michael Mittman Optim Products IBM Software Group. 2008 IBM Corporation

IBM Optim. The ROI of an Archiving Project. Michael Mittman Optim Products IBM Software Group. 2008 IBM Corporation IBM Optim The ROI of an Archiving Project Michael Mittman Optim Products IBM Software Group Disclaimers IBM customers are responsible for ensuring their own compliance with legal requirements. It is the

More information

IBM PowerSC Technical Overview IBM Redbooks Solution Guide

IBM PowerSC Technical Overview IBM Redbooks Solution Guide IBM PowerSC Technical Overview IBM Redbooks Solution Guide Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure

More information

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog

More information

IBM Cognos Controller Version 10.2.1. New Features Guide

IBM Cognos Controller Version 10.2.1. New Features Guide IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies

More information

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what

More information

Rational Reporting. Module 2: IBM Rational Insight Data Warehouse

Rational Reporting. Module 2: IBM Rational Insight Data Warehouse Rational Reporting Module 2: IBM Rational Insight Data Warehouse 1 Copyright IBM Corporation 2012 What s next? Module 1: RRDI and IBM Rational Insight Introduction Module 2: IBM Rational Insight Data Warehouse

More information

SupportPac CB12. General Insurance Application (GENAPP) for IBM CICS Transaction Server

SupportPac CB12. General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server SupportPac CB12 General Insurance Application (GENAPP) for IBM CICS Transaction Server ii General Insurance Application

More information

IBM FileNet Capture and IBM Datacap

IBM FileNet Capture and IBM Datacap Front cover IBM FileNet Capture and IBM Datacap Kevin Bowe Redpaper Introduction This IBM Redpaper publication has various objectives. It uses a fictional capture processing scenario to identify the differences

More information

IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide

IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide Upgrading Guide This edition applies to IBM Endpoint Manager

More information

Front cover Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect

Front cover Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect Front cover Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect Redguides for Business Leaders Ken Hogan See how to cut the cost and complexity of protecting large data volumes

More information

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide IBM Client Security Solutions Password Manager Version 1.4 User s Guide IBM Client Security Solutions Password Manager Version 1.4 User s Guide First Edition (October 2004) Copyright International Business

More information

data express DATA SHEET OVERVIEW

data express DATA SHEET OVERVIEW data express DATA SHEET OVERVIEW The reliability of IT systems is a key requirement of almost any organization. Unexpected failure of enterprise systems can be expensive and damaging to an organization.

More information

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the

More information

DevOps for the Mainframe

DevOps for the Mainframe DevOps for the Mainframe Rosalind Radcliffe IBM Distinguished Engineer, Enterprise Modernization Solution Architect [email protected] 1 Please note IBM s statements regarding its plans, directions, and

More information

Industry Models and Information Server

Industry Models and Information Server 1 September 2013 Industry Models and Information Server Data Models, Metadata Management and Data Governance Gary Thompson ([email protected] ) Information Management Disclaimer. All rights reserved.

More information

Manageability with BPM

Manageability with BPM Manageability with BPM Presenter Names: Thierry Hendrickx / Chris den Hoedt 2008 IBM Corporation Agenda What is BPM Managing Internal controls with BPM IBM s Vision to BPM 1 Government leaders know what

More information

CA Repository for z/os r7.2

CA Repository for z/os r7.2 PRODUCT SHEET CA Repository for z/os CA Repository for z/os r7.2 CA Repository for z/os is a powerful metadata management tool that helps organizations to identify, understand, manage and leverage enterprise-wide

More information

IBM Tivoli Service Request Manager 7.1

IBM Tivoli Service Request Manager 7.1 IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager

More information

Best practices for protecting Enterprise Information in BigData & Datawarehouse. Anwar Ali, Senior Solution Consultant, Information Management

Best practices for protecting Enterprise Information in BigData & Datawarehouse. Anwar Ali, Senior Solution Consultant, Information Management Best practices for protecting Enterprise Information in BigData & Datawarehouse Anwar Ali, Senior Solution Consultant, Information Management Big data a growing phenomenon data every day 12+ TBs of tweet

More information

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible

CA Deliver r11.7. Business value. Product overview. Delivery approach. agility made possible PRODUCT SHEET CA Deliver agility made possible CA Deliver r11.7 CA Deliver is an online report management system that provides you with tools to manage and reduce the cost of report distribution. Able

More information

IBM InfoSphere Discovery: The Power of Smarter Data Discovery

IBM InfoSphere Discovery: The Power of Smarter Data Discovery IBM InfoSphere Discovery: The Power of Smarter Data Discovery Gerald Johnson IBM Client Technical Professional [email protected] 2010 IBM Corporation Objectives To obtain a basic understanding of the

More information

Application retirement: enterprise data management strategies for decommissioning projects

Application retirement: enterprise data management strategies for decommissioning projects Enterprise Data Management Solutions April 2008 IBM Information Management software Application retirement: enterprise data management strategies for decommissioning projects Page 2 Contents 2 Executive

More information

IBM CommonStore email Archiving Preload Solution

IBM CommonStore email Archiving Preload Solution Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end

More information

Patch Management for Red Hat Enterprise Linux. User s Guide

Patch Management for Red Hat Enterprise Linux. User s Guide Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,

More information

One Step Closer To Making Data Breaches a Thing of the Past

One Step Closer To Making Data Breaches a Thing of the Past One Step Closer To Making Data Breaches a Thing of the Past Ernie Mancill, IBM Please note IBM Software Group Information Management software IBM s statements regarding its plans, directions, and intent

More information

Tivoli IBM Tivoli Monitoring for Transaction Performance

Tivoli IBM Tivoli Monitoring for Transaction Performance Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00 Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00

More information

Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum

Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum Tivoli Security Compliance Manager Version 5.1 April, 2006 Collector and Message Reference Addendum Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users

More information

Rational Reporting. Module 3: IBM Rational Insight and IBM Cognos Data Manager

Rational Reporting. Module 3: IBM Rational Insight and IBM Cognos Data Manager Rational Reporting Module 3: IBM Rational Insight and IBM Cognos Data Manager 1 Copyright IBM Corporation 2012 What s next? Module 1: RRDI and IBM Rational Insight Introduction Module 2: IBM Rational Insight

More information

IBM Tivoli Web Response Monitor

IBM Tivoli Web Response Monitor IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note

IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.

More information

WebSphere Application Server V6: Diagnostic Data. It includes information about the following: JVM logs (SystemOut and SystemErr)

WebSphere Application Server V6: Diagnostic Data. It includes information about the following: JVM logs (SystemOut and SystemErr) Redbooks Paper WebSphere Application Server V6: Diagnostic Data Carla Sadtler David Titzler This paper contains information about the diagnostic data that is available in WebSphere Application Server V6.

More information

Sterling Supplier Portal. Overview Guide. DocumentationDate:9June2013

Sterling Supplier Portal. Overview Guide. DocumentationDate:9June2013 Sterling Supplier Portal Overview Guide DocumentationDate:9June2013 Sterling Supplier Portal Overview Guide DocumentationDate:9June2013 Note Before using this information and the product it supports,

More information

Installing on Windows

Installing on Windows Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,

More information

Beyond the Single View with IBM InfoSphere

Beyond the Single View with IBM InfoSphere Ian Bowring MDM & Information Integration Sales Leader, NE Europe Beyond the Single View with IBM InfoSphere We are at a pivotal point with our information intensive projects 10-40% of each initiative

More information

IBM Security QRadar Version 7.1.0 (MR1) Configuring Custom Email Notifications Technical Note

IBM Security QRadar Version 7.1.0 (MR1) Configuring Custom Email Notifications Technical Note IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 7. Copyright IBM Corp.

More information

IBM TRIRIGA Application Platform Version 3.3.2. Reporting: Creating Cross-Tab Reports in BIRT

IBM TRIRIGA Application Platform Version 3.3.2. Reporting: Creating Cross-Tab Reports in BIRT IBM TRIRIGA Application Platform Version 3.3.2 Reporting: Creating Cross-Tab Reports in BIRT Cheng Yang Application Developer IBM TRIRIGA Copyright International Business Machines Corporation 2013. US

More information

CA Endevor Software Change Manager Release 15.1

CA Endevor Software Change Manager Release 15.1 PRODUCT SHEET CA Endevor Software Change Manager CA Endevor Software Change Manager Release 15.1 agility made possible CA Endevor Software Change Manager (CA Endevor SCM) helps organizations control all

More information

Redpaper. IBM Workplace Collaborative Learning 2.5. A Guide to Skills Management. Front cover. ibm.com/redbooks. Using the skills dictionary

Redpaper. IBM Workplace Collaborative Learning 2.5. A Guide to Skills Management. Front cover. ibm.com/redbooks. Using the skills dictionary Front cover IBM Workplace Collaborative Learning 2.5 A Guide to Skills Management Using the skills dictionary Using the Career Development portlet and creating a Learning Plan Generating reports for Skills

More information

Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.

Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0. Sametime Version 9 Integration Guide Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.1 Edition Notice Note: Before using this information and the product it

More information

IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager

IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager Version 1.1 Property of IBM Page 1 of 18 Version 1.1, March 2008 This version applies to Version 6.0.0.3 of IBM WebSphere Message

More information

Test Data Management. Services Catalog

Test Data Management. Services Catalog Test Data Management Services Catalog TABLE OF CONTENTS WHY TDM?... 3 CLIENT SUCCESS STORIES... 4 Large Automotive Company Data Generation...4 Large Entertainment Company Coverage Analysis...4 TDM APPROACH...

More information