Data Masking for Adabas. Becky Albin Chief IT Architect
|
|
- Gerald Wade
- 8 years ago
- Views:
Transcription
1 Data Masking for Adabas Becky Albin Chief IT Architect
2 Find Your Inner Genius at ProcessWorld 2012! Get smarter about using IT to improve business performance Discover inspiring solutions to your pressing business challenges Open your mind to new approaches, new tools and new people Save the Date ProcessWorld 2012 Orlando, Florida October
3 "Moving Forward with Adabas 8" Duration 3.0 hours Audience: DBA's and Programmers. Speaker: Jim Poole (Verizon) Adabas 8 has been a whirlwind of changes where there is a fear that shops have overlooked the incredible range of new features and possibilities. With Adabas 8.2 alone, there were over 40 changes that provide opportunities for DBA and programmers alike. In this fast-paced technical presentation, many of the Adabas 8 changes are explained and how they impact the ways we do business. Enroute, recent benchmark performance studies were done on Adabas caching, changing some long-held paradigms. Those results are presented. Topics include: -Adabas Caching (what, when, why) -Date/Time System Fields -Spanned Records, prevent future risk -Logical removal of fields and descriptors -Improvements to PLOG and WORK -Event Log -A Panoply of other
4 " Legacy Natural GUI Application Modernization using ONE" Duration 3.0 hours Audience: DBA's and Programmers. Speaker: Steve Robinson of S.L. Robinson and Associates Inc. Many Adabas/Natural applications are being transferred to other platforms or software based on a misconception, namely, that Natural is not capable of producing many of the GUI effects seen on web and PC software. This is an erroneous rationale. Natural has many facilities that most Natural programmers are unaware of. Natural has screen scrapping commands, colored bar charts, animation, and many other facilities. The net effect of using such facilities are systems which closely resemble web and PC systems. Natural can provide the same GUI bling that one finds on a web based application? There are many new and existing tools to do this. So why not leave the Adabas/Natural world? Topics include: NaturalONE Overview - Introduce attendees to NaturalOne; the component parts, the rationale for using NaturalOne, the advantages to using NaturalOne for application modernization. We will see how to revitalize existing Natural applications without a lot of expense
5 Adabas and Natural Sessions for Process World 2012 Customer Presentations Presenter Managing DMV Pictures & Signatures with Adabas Large Object (LOB) Fields State of South Dakota What s Next for Adabas and Natural? The Strategic Direction Software AG Active Data Warehousing Made Easy with Adabas SQL Gateway Royal Bank of Canada Achieve Significant Quality Improvements by using Better Test Data with Data Masking for Adabas Pennsylvania State University EntireX Broker Centralizes Drivers License Management State-wide State of Virginia Natural Remote Data Collector (RDC); Monitoring and much more State of Washington Retirement System Case Study FSCJ: College Inventory Management using a Mobile Application Adabas Replication: How we do it at NYC DoITT New York City Department of Information Technology Alan Peterson Guido Falkenberg Nikolai Chmatov Carl Seybold Pam Schwartz Darrell Davenport Chris Martin George Wolff
6 Data Masking - What the Analysts say Forrester Group (Noel Yuhanna) states: All enterprises dealing with private in test environments should mask or generate test to comply with regulations such as PCI, HIPAA, SOX and European Union (EU) 80% of all threats come from inside and 65% are undetected Accenture and Information Week Security breaches are increasingly coming from inside an organization Gartner 70% of all security incidents come from insiders Ernst & Young An insider attack against a large company causes an average of $2.7 million US in damages, whereas the average outside attack costs only $57,000
7 Data Masking Why would you use it? Improve application quality - artificially generated test is usually insufficient Secure sensitive in Development environments Test centers Offshore activities Provide a real business training environment without publishing sensitive Compliance with legal regulations such as HIPAA, SOX and others
8 Data Masking - Value Proposition - Ability to consistently create reduced and secured test - Rapid masking of from across the enterprise to, deliver de-identified for testing - Provides a repeatable and automated solution to reduce the resources needed to create test - Easily create high quality training with a low cost investment - Facilitates an essential and safe training environment for end-users, when using live for training - Reduce risk of legal exposure for compromised
9 Data Masking Current Status - General Availability end of 1 st quarter Trial copies can be obtained; contact your Software AG Account Representative - Supported Source Databases: Adabas Oracle DB2 (UDB and z/os) Microsoft SQL Server MySQL Sybase Ingres SQLAnywhere Informix Cache VSAM Flat Files
10 Data Masking Hype or Requirement? Challenge High quality test is required for: Improved application quality Test and training environments Most organizations use home-grown scrambling methods or even Production Legal regulations do not allow use of Scrambling methods do not always consider semantics Applications do not always function using such Preparation is a time consuming and inconsistent manual process Cross references are not often considered/maintained
11 Data Masking Hype or Requirement? Business aspect Business needs high quality applications Online shops are open for 24 hours a day The competition is one click away Pressure to reduce cost Creating artificial test is expensive Manual process Each project team does more or less the same Not all use cases can be built References across tables are difficult to handle Difficult to create the same values every time Define rules Select Copy Copied Mask According to rules Masked Creating test can delay projects which affects business negatively Software package needs to fulfill all requirements and have an early ROI Create repeatable processes/procedures
12 Data Masking Software that fulfills the requirements Criteria for a solution Ease-of-use Almost no training needed on the software Easy to exchange obfuscation rules with non-it staff First results needed quickly (<1 day) Define rules Select Copy Copied Mask According to rules Results that are key Masked must look like Semantics must be maintained Reverse engineering must not be possible Masked Production needs to be used as input for the masking process
13 Data Masking Software that fulfills the Requirements Criteria for a solution Data source coverage One tool, not one per base type Adabas, all market relevant RDBMS and flat files need to be supported Platform coverage Mainframe Distributed environments (LUW) Define rules Select Copy Copied Mask According to rules Masked
14 Data Masking Software that fulfills the Requirements Criteria for a solution A rich set of rules need to be available Replacement Custom functions/seed tables Hashing Translation Substitution Multi-table columns ZIP code Credit cards number manipulation Social security number manipulation Random numeric/text Etc. Define rules Select Copy Copied Mask According to rules Masked
15 Data Masking Data Masking for Adabas A solution that fulfills the criteria Supports the requested rules Extended features are available Cross reference masking beyond Referential Integrity Reference can be used Using where clauses Ease to learn and run Use a sophisticated user interface to define rules and run-time option Non-IT professionals understand rules easily Run the masking process as a background task Using a simulation before changing in a base Define rules Select Copy Copied Mask According to rules Masked
16 Data Masking Data Masking for Adabas A successful approach requires knowledge of your Which is sensitive and need to be masked? Which columns contain what? Which relationship consists between, maybe across tables? Are there invalid in your sources? What is the goal? Test a new part of an application Achieve legal compliance Define rules Select Copy Copied Mask According to rules Ready to start? Masked
17 Close a Gap Provide what s required Hide what s necessary Provide high quality test Test Application Data Masking Masked Copy of Production Enhance Use Adabas Tools to create Rules Run-time parameter Data Mapping Production Application Meta- Production Protect sensitive
18 Data Masking for Adabas Architecture Production Application Test Application Adabas Nucleus Adabas Nucleus Adabas SQL Gateway Data Server Adabas SQL Gateway SQL Engine Masking Engine Mapping Tool Adabas Tools to create Rules Run-time Options Production Copy Masked Production Production Meta- Repository Mainframe / Distributed Environments Distributed Environments
19 Prepare your Database Environment Create a copy of the Adabas base Define the file/table GTSRC_XREF for cross reference masking Masking consistently across different tables Prepare an Adabas SQL Gateway meta- repository (CDD)
20 Getting familiar with the SDM Environment Structure after installation Windows/Linux/Unix Main directory contains The software connect file A number of home-grown test cases Sub-directories Audits Backups DDM result file if defined backup of rule files Natural DDMs Errorlogs Logs Seedtables run logs contains a number of reference
21 Getting familiar with the SDM Environment Start Mapping Process connectadabas GTMAPPER is the tool to define masking rules and run-time options Start the Mapper, select the appropriate connect file and Connect connect parameter file The connectadabas file is used to connect to the Adabas SQL Gateway User name, password, default schema are defined in the Adabas SQL Gateway meta- repository (CDD) Host refers to the JDBC definition made through the DSNRegistry tool
22 Simple Data Masking Getting Started Connect to the Meta repository of the Adabas SQL Gateway Open rules file if available Define rules Define run-time options Save rules and options in files Run the masking process
23 Getting familiar with the SDM Environment Define Rules - Main Functions Select a Table Select a Column Select a Rule Define Values or Open an existing File
24 Getting familiar with the SDM Environment Define Run-time Options Define Audit Option Define Reference File Cross Connection File Define Reference Table Specify update mode or Open an existing File
25 Getting familiar with the SDM Environment Define Rules - Main Functions Save Definitions Close the GTMAPPER The save operation creates A file containing - Rules - Run-time Options - Start Script Check Parameter Run Masking Check Results
26 SDM Auditing and Logging Options Depending on the option An audit file is generated containing all actions along with the original and the new values Log files are written which contain information about the masking run and possible errors
27 Next Steps Order a test copy of Data masking for Adabas Get assistance if needed Saving money by reducing project time Reduce demands on application staff Improve application quality Achieve compliance
Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect Becky.Albin@softwareag.com
Data Masking Secure Sensitive Data Improve Application Quality Becky Albin Chief IT Architect Becky.Albin@softwareag.com Data Masking for Adabas The information provided in this PPT is entirely subject
More informationActive Data Warehousing With ADABAS SQL GATEWAY
Active Data Warehousing With ADABAS SQL GATEWAY ADABAS SQL GW is Non a Sacrificial Gateway to ADABAS! Nikolai Chmatov Manager, Tactical Solution, Market Product & Services October 16, 2012 nikolai.chmatov@rbc.com
More informationManaging DMV Pictures & Signatures with Adabas Large Object (LOB) Fields Image storage on the mainframe
Managing DMV Pictures & Signatures with Adabas Large Object (LOB) Fields Image storage on the mainframe Alan Peterson Technology Engineer IV 2 State of South Dakota Department of Public Safety upgrades
More informationSoftware AG ADABAS Update
Software AG ADABAS Update Becky Albin Chief IT Architect Software AG US 2013 Software AG. All rights reserved. Now Available Adabas-Natural Security Whitepaper 2 2013 Software AG. All rights reserved.
More informationWhat s next for Adabas and Natural. Blair Harding Lead Pre-Sales Consultant Software AG
What s next for Adabas and Natural Blair Harding Lead Pre-Sales Consultant Software AG The Future of Application Development Best-of-breed approach of custom and standard applications Solutions Importance
More informationdata express DATA SHEET OVERVIEW
data express DATA SHEET OVERVIEW The reliability of IT systems is a key requirement of almost any organization. Unexpected failure of enterprise systems can be expensive and damaging to an organization.
More informationOptimize for Infrastructure Moving from reactive to proactive IT infrastructure management
Optimize for Infrastructure Moving from reactive to proactive IT infrastructure management Becky Albin Chief IT Architect Optimize for Infrastructure Mainframe Edition Agenda October 9, 2012 2 What is
More informationReal-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
More informationSecurity Solutions. MyDBA s. Security Solutions. For Databases. October 2012. Copyright 2012 MyDBA CC. Version 3
MyDBA s Security Solutions For Databases October 2012 Version 3 The Protection of Personal Information (POPI) Bill The Bill requires that: Anyone who processes personal information will need to take appropriate
More informationWhy Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
More informationEnterprise Data Solutions Product Strategy and Vision Process-driven IT Modernization, Natural and Adabas
Enterprise Data Solutions Product Strategy and Vision Process-driven IT Modernization, Natural and Adabas Guido Falkenberg VP Enterprise Transaction Systems Software AG 8 June 2011 ProcessWorld 2011 2
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationKey Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Introducing Oracle Audit Vault and Database Firewall Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached
More informationMaking Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
More informationData Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
More informationMaximize and Revitalize Adabas/Natural
Maximize and Revitalize Adabas/Natural J. Wayne Lashley Chief Business Development Officer Treehouse Software 1 Agenda (Re-)introduction to Treehouse Helping you meet the challenges The take-away message
More informationProcess-Driven IT Modernization Strategy. Tim Ward tim.ward@softwareag.com
Process-Driven IT Modernization Strategy Tim Ward tim.ward@softwareag.com The Value of the Process Business Process is driving modernization activities, not the other way around it is about the most bang
More informationIBM Optim. The ROI of an Archiving Project. Michael Mittman Optim Products IBM Software Group. 2008 IBM Corporation
IBM Optim The ROI of an Archiving Project Michael Mittman Optim Products IBM Software Group Disclaimers IBM customers are responsible for ensuring their own compliance with legal requirements. It is the
More informationPCI Compliance in Oracle E-Business Suite
PCI Compliance in Oracle E-Business Suite October 22, 2014 Mike Miller Chief Security Officer Integrigy Corporation Megan Kelly Senior Director of ERP Integrations CardConnect Moderated by Phil Reimann,
More informationConsolidate by Migrating Your Databases to Oracle Database 11g. Fred Louis Enterprise Architect
Consolidate by Migrating Your Databases to Oracle Database 11g Fred Louis Enterprise Architect Agenda Why migrate to Oracle What is migration? What can you migrate to Oracle? SQL Developer Migration Workbench
More informationSubmitted to: Service Definition Document for Database Management for IT Infrastructure Management
Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Table of Contents 1 Service Description... 3 2 Support Process and Methodology... 10 3 Standard Questionnaire...
More informationTHE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.
THE FIRST UNIFIED DATABASE SECURITY SOLUTION Product Overview Security. Auditing. Caching. Masking. 2 The First Unified Database Security Solution About the products The GreenSQL family of Unified Database
More informationKeeping Databases in Sync during migration from z/os to a distributed platform
Keeping Databases in Sync during migration from z/os to a distributed platform Avijit Goswami, PMP, ITIL, IBM Certified DB2 DBA, Sr. Technology Architect, Infosys Limited avijit_goswami@infosys.com Abstract
More informationAuditing Data Access Without Bringing Your Database To Its Knees
Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda
More informationEnforcive /Cross-Platform Audit
Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)
More informationAccessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute
Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute JMP provides a variety of mechanisms for interfacing to other products and getting data into JMP. The connection
More informationTest Data Management. Services Catalog
Test Data Management Services Catalog TABLE OF CONTENTS WHY TDM?... 3 CLIENT SUCCESS STORIES... 4 Large Automotive Company Data Generation...4 Large Entertainment Company Coverage Analysis...4 TDM APPROACH...
More informationSQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery
SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software
More informationCredit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
More informationPCI Compliance in Oracle E-Business Suite
PCI Compliance in Oracle E-Business Suite May 14, 2015 Mike Miller Chief Security Officer Integrigy Corporation David Kilgallon Oracle Integration Manager CardConnect Moderated by Phil Reimann, Director
More informationSelf Service Business Intelligence - how to bring Oracle and DB2 z/os data together
Self Service Business Intelligence - how to bring Oracle and DB2 z/os data together During my work as presales consultant I found in a lot of big companies this typical data environment: legacy applications,
More informationIntegrated Data Management: Discovering what you may not know
Integrated Data Management: Discovering what you may not know Eric Naiburg ericnaiburg@us.ibm.com Agenda Discovering existing data assets is hard What is Discovery Discovery and archiving Discovery, test
More informationSecuring and Accelerating Databases In Minutes using GreenSQL
Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update
More informationSafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
More informationComprehensive Approach to Database Security
Comprehensive Approach to Database Security asota@hotmail.com NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify
More informationOracle Data Integrator 12c: Integration and Administration
Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration
More informationOracle Data Integrator 11g: Integration and Administration
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive
More informationOracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with
More informationcan I customize my identity management deployment without extensive coding and services?
SOLUTION BRIEF Connector Xpress and Policy Xpress Utilities in CA IdentityMinder can I customize my identity management deployment without extensive coding and services? agility made possible You can.
More informationSecurity and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
More informationA Database Re-engineering Workbench
A Database Re-engineering Workbench A project proposal by Anmol Sharma Abstract Data is not always available in the best form for processing, it is often provided in poor format or in a poor quality data
More informationCredit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600
Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle
More informationIBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite
IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite Streamline test-data management and deliver reliable application upgrades and enhancements Highlights Apply test-data management
More informationHigh-Volume Data Warehousing in Centerprise. Product Datasheet
High-Volume Data Warehousing in Centerprise Product Datasheet Table of Contents Overview 3 Data Complexity 3 Data Quality 3 Speed and Scalability 3 Centerprise Data Warehouse Features 4 ETL in a Unified
More information05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
More informationIntroduction. Introduction: Database management system. Introduction: DBS concepts & architecture. Introduction: DBS versus File system
Introduction: management system Introduction s vs. files Basic concepts Brief history of databases Architectures & languages System User / Programmer Application program Software to process queries Software
More informationReal-time Data Replication
Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different
More informationSoftware AG TechEd 2015 User Conference Mobile Enabler for Natural
Software AG TechEd 2015 User Conference Mobile Enabler for Natural April 21-22, 2015 Eric Wood Principal Systems Engineer, Adabas-Natural Software AG 1 Mobile use Continues to Grow Of US adult population
More informationDMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
More informationIntroduction: Database management system
Introduction Databases vs. files Basic concepts Brief history of databases Architectures & languages Introduction: Database management system User / Programmer Database System Application program Software
More informationPresented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
More informationDatabase Assessment. Vulnerability Assessment Course
Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration
More informationExpert Oracle Application. Express Security. Scott Spendolini. Apress"
Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat
More informationOracle Database 10g: Introduction to SQL
Oracle University Contact Us: 1.800.529.0165 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database technology.
More informationAdditional Offeror Qualifications: Not applicable.
Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software
More informationAdabas und Natural für das Digitale Unternehmen
Adabas und Natural für das Digitale Unternehmen Innovation Day 2014, Bonn Guido Falkenberg Enterprise Transaction Systems Software AG The world becomes more digital 2 The impact of a world that becomes
More informationdbspeak DBs peak when we speak
Data Profiling: A Practitioner s approach using Dataflux [Data profiling] employs analytic methods for looking at data for the purpose of developing a thorough understanding of the content, structure,
More informationOracle Data Integrator: Administration and Development
Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps
More informationA Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
More informationHow To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis (ingmars.briedis@also.com) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
More informationLegacy Data Migration: DIY Might Leave You DOA
Legacy Data Migration: DIY Might Leave You DOA By Wayne Lashley, Chief Business Development Officer White Paper 1 In any application migration/renewal project, data migration is 4. Capture of all source
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More informationDATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS
DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, mqiu@vsu.edu Steve Davis, Clemson University, davis@clemson.edu ABSTRACT People considering improvements in database
More informationCan I customize my identity management deployment without extensive coding and services?
SOLUTION BRIEF CONNECTOR XPRESS AND POLICY XPRESS UTILITIES IN CA IDENTITY MANAGER Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CA DATABASE MANAGEMENT
More informationNew York Health Benefit Exchange
New York Health Benefit Exchange Blueprint Summary for 9.7.4 Data Management Plan October 26, 2012 Item Number Topic 9.7.4 Data Management Plan Version Number Modified By Revision Date Description of Change
More informationMicro Focus Database Connectors
data sheet Database Connectors Executive Overview Database Connectors are designed to bridge the worlds of COBOL and Structured Query Language (SQL). There are three Database Connector interfaces: Database
More informationB.Sc (Computer Science) Database Management Systems UNIT-V
1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used
More informationObtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
More informationArchitecture and Mode of Operation
Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security
More informationComplete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
More informationNew Oracle 12c Security Features Oracle E-Business Suite Perspective
New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
More informationSecurity Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
More information<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations
Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and
More information<Insert Picture Here> Application Change Management and Data Masking
Application Change Management and Data Masking Jagan R. Athreya (jagan.athreya@oracle.com) Director of Database Manageability Oracle Corporation 1 The following is intended to outline
More informationenterprise professional expertise distilled
Oracle Information Integration, Migration, and Consolidation The definitive guide to information integration and migration in a heterogeneous world Use Oracle technologies and best practices to manage,
More informationDATABASE ADMINISTRATION (DBA) SERVICES
DATABASE ADMINISTRATION (DBA) SERVICES Expert, Cost-effective DBA Services As An Extension of Your IT Staff Connectria s Database Administration Services allow you to free your staff and resources to focus
More informationMigrations from Oracle/Sybase/DB2 to Microsoft SQL Server it s easy!
Migrations from Oracle/Sybase/DB2 to Microsoft SQL Server it s easy! January 2010 Dmitry Balin dmitry@dbbest.com Academy Enterprise Partner Group Successful migrations DB Best Technologies about us Established
More informationPrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication
PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication Introduction The following document describes how to install PrivateWire in high availability mode using
More informationRealizing the Benefits of Data Modernization
February 2015 Perspective Realizing the Benefits of How to overcome legacy data challenges with innovative technologies and a seamless data modernization roadmap. Companies born into the digital world
More informationMS SQL Server DBA Training Course. Table of Contents
Table of Contents Overview... 4 About DBA University, Inc.... 4 Malathy Mani Microsoft Certified Solutions Expert (MCSA)... 5 Pricing and Registration... 5 Course Duration and Timings... 5 Sunday, Monday,
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
More informationWelcome. Changes and Choices
Welcome Changes and Choices Today s Session Thursday, February 23, 2012 Agenda 1. The Fillmore Group Introduction 2. Reasons to Implement Replication 3. IBM s Replication Options How We Got Here 4. The
More informationHow to address top problems in test data management
How to address top problems in test data management Data reuse, sub-setting and masking Business white paper Table of contents Why you need test data management... 3 The challenges of preparing and managing
More informationDesigning Database Solutions for Microsoft SQL Server 2012
Course 20465A: Designing Database Solutions for Microsoft SQL Server 2012 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft SQL Server 2012 Type: Delivery Method: Course Instructor-led
More informationCompared to MySQL database, Oracle has the following advantages:
To: John, Jerry Date: 2-23-07 From: Joshua Li Subj: Migration of NEESit Databases from MySQL to Oracle I. Why do we need database migration? Compared to MySQL database, Oracle has the following advantages:
More informationInstallation and User Guide
Installation and User Guide Confio IgniteVM Copyright 2013 Confio Corporation. All rights reserved. The programs (which include both the software and documentation) contain proprietary information of
More informationSPI Backup via Remote Terminal
FLUOR SPI Backup via Remote Terminal SmartPlant Implementation Team By Mitch Fortey Copyright 2014 Fluor Corporation all rights reserved SPI Back Up via Remote Terminal Data Backup 101 Why do we backup
More informationIdentify resource intensive sessions in heterogeneous database environments with TOAD
Identify resource intensive sessions in heterogeneous database environments with TOAD The modern database administrator (DBA) is under pressure. Here are some points of the challenges he has today: Varying
More informationEC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
More informationSecurity Trends and Client Approaches
Security Trends and Client Approaches May 2010 Bob Bocchino, CISA ERM Security and Compliance Business Advisor IBU Technology Sales Support Industries Business Unit, Technology Sales Support 1 Mark Dixon
More informationMySQL Enterprise Edition Most secure, scalable MySQL Database, Online Backup, Development/Monitoring Tools, backed by Oracle Premier Lifetime Support
MySQL Enterprise Edition Most secure, scalable MySQL Database, Online Backup, Development/Monitoring Tools, backed by Oracle Premier Lifetime Support Elevator Pitch With 12 millions of active installs,
More informationSAP Sybase Replication Server What s New in 15.7.1 SP100. Bill Zhang, Product Management, SAP HANA Lisa Spagnolie, Director of Product Marketing
SAP Sybase Replication Server What s New in 15.7.1 SP100 Bill Zhang, Product Management, SAP HANA Lisa Spagnolie, Director of Product Marketing Agenda SAP Sybase Replication Server Overview Replication
More informationDatabase FAQs - SQL Server
Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license
More informationICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001
ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel
More informationICAB4136B Use structured query language to create database structures and manipulate data
ICAB4136B Use structured query language to create database structures and manipulate data Release: 1 ICAB4136B Use structured query language to create database structures and manipulate data Modification
More informationEnforcive / Enterprise Security
TM Enforcive / Enterprise Security End to End Security and Compliance Management for the IBM i Enterprise Enforcive / Enterprise Security is the single most comprehensive and easy to use security and compliance
More informationFacilitating Efficient Data Management by Craig S. Mullins
Facilitating Efficient Data Management by Craig S. Mullins Most modern applications utilize database management systems (DBMS) to create, store and manage business data. The DBMS software enables end users
More informationSecurity, Privacy, Compliance
Security, Privacy, Compliance Tech-Security Conference Chicago, IL January 19, 2012 Vitaly Dubravin, CTO f r o m i n f o r m a t i o n t o i n t e l l i g e n c e Premium IT Services Boutique Information
More information