Data Masking for Adabas. Becky Albin Chief IT Architect

Size: px
Start display at page:

Download "Data Masking for Adabas. Becky Albin Chief IT Architect"

Transcription

1 Data Masking for Adabas Becky Albin Chief IT Architect

2 Find Your Inner Genius at ProcessWorld 2012! Get smarter about using IT to improve business performance Discover inspiring solutions to your pressing business challenges Open your mind to new approaches, new tools and new people Save the Date ProcessWorld 2012 Orlando, Florida October

3 "Moving Forward with Adabas 8" Duration 3.0 hours Audience: DBA's and Programmers. Speaker: Jim Poole (Verizon) Adabas 8 has been a whirlwind of changes where there is a fear that shops have overlooked the incredible range of new features and possibilities. With Adabas 8.2 alone, there were over 40 changes that provide opportunities for DBA and programmers alike. In this fast-paced technical presentation, many of the Adabas 8 changes are explained and how they impact the ways we do business. Enroute, recent benchmark performance studies were done on Adabas caching, changing some long-held paradigms. Those results are presented. Topics include: -Adabas Caching (what, when, why) -Date/Time System Fields -Spanned Records, prevent future risk -Logical removal of fields and descriptors -Improvements to PLOG and WORK -Event Log -A Panoply of other

4 " Legacy Natural GUI Application Modernization using ONE" Duration 3.0 hours Audience: DBA's and Programmers. Speaker: Steve Robinson of S.L. Robinson and Associates Inc. Many Adabas/Natural applications are being transferred to other platforms or software based on a misconception, namely, that Natural is not capable of producing many of the GUI effects seen on web and PC software. This is an erroneous rationale. Natural has many facilities that most Natural programmers are unaware of. Natural has screen scrapping commands, colored bar charts, animation, and many other facilities. The net effect of using such facilities are systems which closely resemble web and PC systems. Natural can provide the same GUI bling that one finds on a web based application? There are many new and existing tools to do this. So why not leave the Adabas/Natural world? Topics include: NaturalONE Overview - Introduce attendees to NaturalOne; the component parts, the rationale for using NaturalOne, the advantages to using NaturalOne for application modernization. We will see how to revitalize existing Natural applications without a lot of expense

5 Adabas and Natural Sessions for Process World 2012 Customer Presentations Presenter Managing DMV Pictures & Signatures with Adabas Large Object (LOB) Fields State of South Dakota What s Next for Adabas and Natural? The Strategic Direction Software AG Active Data Warehousing Made Easy with Adabas SQL Gateway Royal Bank of Canada Achieve Significant Quality Improvements by using Better Test Data with Data Masking for Adabas Pennsylvania State University EntireX Broker Centralizes Drivers License Management State-wide State of Virginia Natural Remote Data Collector (RDC); Monitoring and much more State of Washington Retirement System Case Study FSCJ: College Inventory Management using a Mobile Application Adabas Replication: How we do it at NYC DoITT New York City Department of Information Technology Alan Peterson Guido Falkenberg Nikolai Chmatov Carl Seybold Pam Schwartz Darrell Davenport Chris Martin George Wolff

6 Data Masking - What the Analysts say Forrester Group (Noel Yuhanna) states: All enterprises dealing with private in test environments should mask or generate test to comply with regulations such as PCI, HIPAA, SOX and European Union (EU) 80% of all threats come from inside and 65% are undetected Accenture and Information Week Security breaches are increasingly coming from inside an organization Gartner 70% of all security incidents come from insiders Ernst & Young An insider attack against a large company causes an average of $2.7 million US in damages, whereas the average outside attack costs only $57,000

7 Data Masking Why would you use it? Improve application quality - artificially generated test is usually insufficient Secure sensitive in Development environments Test centers Offshore activities Provide a real business training environment without publishing sensitive Compliance with legal regulations such as HIPAA, SOX and others

8 Data Masking - Value Proposition - Ability to consistently create reduced and secured test - Rapid masking of from across the enterprise to, deliver de-identified for testing - Provides a repeatable and automated solution to reduce the resources needed to create test - Easily create high quality training with a low cost investment - Facilitates an essential and safe training environment for end-users, when using live for training - Reduce risk of legal exposure for compromised

9 Data Masking Current Status - General Availability end of 1 st quarter Trial copies can be obtained; contact your Software AG Account Representative - Supported Source Databases: Adabas Oracle DB2 (UDB and z/os) Microsoft SQL Server MySQL Sybase Ingres SQLAnywhere Informix Cache VSAM Flat Files

10 Data Masking Hype or Requirement? Challenge High quality test is required for: Improved application quality Test and training environments Most organizations use home-grown scrambling methods or even Production Legal regulations do not allow use of Scrambling methods do not always consider semantics Applications do not always function using such Preparation is a time consuming and inconsistent manual process Cross references are not often considered/maintained

11 Data Masking Hype or Requirement? Business aspect Business needs high quality applications Online shops are open for 24 hours a day The competition is one click away Pressure to reduce cost Creating artificial test is expensive Manual process Each project team does more or less the same Not all use cases can be built References across tables are difficult to handle Difficult to create the same values every time Define rules Select Copy Copied Mask According to rules Masked Creating test can delay projects which affects business negatively Software package needs to fulfill all requirements and have an early ROI Create repeatable processes/procedures

12 Data Masking Software that fulfills the requirements Criteria for a solution Ease-of-use Almost no training needed on the software Easy to exchange obfuscation rules with non-it staff First results needed quickly (<1 day) Define rules Select Copy Copied Mask According to rules Results that are key Masked must look like Semantics must be maintained Reverse engineering must not be possible Masked Production needs to be used as input for the masking process

13 Data Masking Software that fulfills the Requirements Criteria for a solution Data source coverage One tool, not one per base type Adabas, all market relevant RDBMS and flat files need to be supported Platform coverage Mainframe Distributed environments (LUW) Define rules Select Copy Copied Mask According to rules Masked

14 Data Masking Software that fulfills the Requirements Criteria for a solution A rich set of rules need to be available Replacement Custom functions/seed tables Hashing Translation Substitution Multi-table columns ZIP code Credit cards number manipulation Social security number manipulation Random numeric/text Etc. Define rules Select Copy Copied Mask According to rules Masked

15 Data Masking Data Masking for Adabas A solution that fulfills the criteria Supports the requested rules Extended features are available Cross reference masking beyond Referential Integrity Reference can be used Using where clauses Ease to learn and run Use a sophisticated user interface to define rules and run-time option Non-IT professionals understand rules easily Run the masking process as a background task Using a simulation before changing in a base Define rules Select Copy Copied Mask According to rules Masked

16 Data Masking Data Masking for Adabas A successful approach requires knowledge of your Which is sensitive and need to be masked? Which columns contain what? Which relationship consists between, maybe across tables? Are there invalid in your sources? What is the goal? Test a new part of an application Achieve legal compliance Define rules Select Copy Copied Mask According to rules Ready to start? Masked

17 Close a Gap Provide what s required Hide what s necessary Provide high quality test Test Application Data Masking Masked Copy of Production Enhance Use Adabas Tools to create Rules Run-time parameter Data Mapping Production Application Meta- Production Protect sensitive

18 Data Masking for Adabas Architecture Production Application Test Application Adabas Nucleus Adabas Nucleus Adabas SQL Gateway Data Server Adabas SQL Gateway SQL Engine Masking Engine Mapping Tool Adabas Tools to create Rules Run-time Options Production Copy Masked Production Production Meta- Repository Mainframe / Distributed Environments Distributed Environments

19 Prepare your Database Environment Create a copy of the Adabas base Define the file/table GTSRC_XREF for cross reference masking Masking consistently across different tables Prepare an Adabas SQL Gateway meta- repository (CDD)

20 Getting familiar with the SDM Environment Structure after installation Windows/Linux/Unix Main directory contains The software connect file A number of home-grown test cases Sub-directories Audits Backups DDM result file if defined backup of rule files Natural DDMs Errorlogs Logs Seedtables run logs contains a number of reference

21 Getting familiar with the SDM Environment Start Mapping Process connectadabas GTMAPPER is the tool to define masking rules and run-time options Start the Mapper, select the appropriate connect file and Connect connect parameter file The connectadabas file is used to connect to the Adabas SQL Gateway User name, password, default schema are defined in the Adabas SQL Gateway meta- repository (CDD) Host refers to the JDBC definition made through the DSNRegistry tool

22 Simple Data Masking Getting Started Connect to the Meta repository of the Adabas SQL Gateway Open rules file if available Define rules Define run-time options Save rules and options in files Run the masking process

23 Getting familiar with the SDM Environment Define Rules - Main Functions Select a Table Select a Column Select a Rule Define Values or Open an existing File

24 Getting familiar with the SDM Environment Define Run-time Options Define Audit Option Define Reference File Cross Connection File Define Reference Table Specify update mode or Open an existing File

25 Getting familiar with the SDM Environment Define Rules - Main Functions Save Definitions Close the GTMAPPER The save operation creates A file containing - Rules - Run-time Options - Start Script Check Parameter Run Masking Check Results

26 SDM Auditing and Logging Options Depending on the option An audit file is generated containing all actions along with the original and the new values Log files are written which contain information about the masking run and possible errors

27 Next Steps Order a test copy of Data masking for Adabas Get assistance if needed Saving money by reducing project time Reduce demands on application staff Improve application quality Achieve compliance

Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect Becky.Albin@softwareag.com

Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect Becky.Albin@softwareag.com Data Masking Secure Sensitive Data Improve Application Quality Becky Albin Chief IT Architect Becky.Albin@softwareag.com Data Masking for Adabas The information provided in this PPT is entirely subject

More information

Active Data Warehousing With ADABAS SQL GATEWAY

Active Data Warehousing With ADABAS SQL GATEWAY Active Data Warehousing With ADABAS SQL GATEWAY ADABAS SQL GW is Non a Sacrificial Gateway to ADABAS! Nikolai Chmatov Manager, Tactical Solution, Market Product & Services October 16, 2012 nikolai.chmatov@rbc.com

More information

Managing DMV Pictures & Signatures with Adabas Large Object (LOB) Fields Image storage on the mainframe

Managing DMV Pictures & Signatures with Adabas Large Object (LOB) Fields Image storage on the mainframe Managing DMV Pictures & Signatures with Adabas Large Object (LOB) Fields Image storage on the mainframe Alan Peterson Technology Engineer IV 2 State of South Dakota Department of Public Safety upgrades

More information

Software AG ADABAS Update

Software AG ADABAS Update Software AG ADABAS Update Becky Albin Chief IT Architect Software AG US 2013 Software AG. All rights reserved. Now Available Adabas-Natural Security Whitepaper 2 2013 Software AG. All rights reserved.

More information

What s next for Adabas and Natural. Blair Harding Lead Pre-Sales Consultant Software AG

What s next for Adabas and Natural. Blair Harding Lead Pre-Sales Consultant Software AG What s next for Adabas and Natural Blair Harding Lead Pre-Sales Consultant Software AG The Future of Application Development Best-of-breed approach of custom and standard applications Solutions Importance

More information

data express DATA SHEET OVERVIEW

data express DATA SHEET OVERVIEW data express DATA SHEET OVERVIEW The reliability of IT systems is a key requirement of almost any organization. Unexpected failure of enterprise systems can be expensive and damaging to an organization.

More information

Optimize for Infrastructure Moving from reactive to proactive IT infrastructure management

Optimize for Infrastructure Moving from reactive to proactive IT infrastructure management Optimize for Infrastructure Moving from reactive to proactive IT infrastructure management Becky Albin Chief IT Architect Optimize for Infrastructure Mainframe Edition Agenda October 9, 2012 2 What is

More information

Real-Time Database Protection and. Overview. 2010 IBM Corporation

Real-Time Database Protection and. Overview. 2010 IBM Corporation Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio

More information

Security Solutions. MyDBA s. Security Solutions. For Databases. October 2012. Copyright 2012 MyDBA CC. Version 3

Security Solutions. MyDBA s. Security Solutions. For Databases. October 2012. Copyright 2012 MyDBA CC. Version 3 MyDBA s Security Solutions For Databases October 2012 Version 3 The Protection of Personal Information (POPI) Bill The Bill requires that: Anyone who processes personal information will need to take appropriate

More information

Why Add Data Masking to Your IBM DB2 Application Environment

Why Add Data Masking to Your IBM DB2 Application Environment Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise

More information

Enterprise Data Solutions Product Strategy and Vision Process-driven IT Modernization, Natural and Adabas

Enterprise Data Solutions Product Strategy and Vision Process-driven IT Modernization, Natural and Adabas Enterprise Data Solutions Product Strategy and Vision Process-driven IT Modernization, Natural and Adabas Guido Falkenberg VP Enterprise Transaction Systems Software AG 8 June 2011 ProcessWorld 2011 2

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Introducing Oracle Audit Vault and Database Firewall Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached

More information

Making Database Security an IT Security Priority

Making Database Security an IT Security Priority Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Maximize and Revitalize Adabas/Natural

Maximize and Revitalize Adabas/Natural Maximize and Revitalize Adabas/Natural J. Wayne Lashley Chief Business Development Officer Treehouse Software 1 Agenda (Re-)introduction to Treehouse Helping you meet the challenges The take-away message

More information

Process-Driven IT Modernization Strategy. Tim Ward tim.ward@softwareag.com

Process-Driven IT Modernization Strategy. Tim Ward tim.ward@softwareag.com Process-Driven IT Modernization Strategy Tim Ward tim.ward@softwareag.com The Value of the Process Business Process is driving modernization activities, not the other way around it is about the most bang

More information

IBM Optim. The ROI of an Archiving Project. Michael Mittman Optim Products IBM Software Group. 2008 IBM Corporation

IBM Optim. The ROI of an Archiving Project. Michael Mittman Optim Products IBM Software Group. 2008 IBM Corporation IBM Optim The ROI of an Archiving Project Michael Mittman Optim Products IBM Software Group Disclaimers IBM customers are responsible for ensuring their own compliance with legal requirements. It is the

More information

PCI Compliance in Oracle E-Business Suite

PCI Compliance in Oracle E-Business Suite PCI Compliance in Oracle E-Business Suite October 22, 2014 Mike Miller Chief Security Officer Integrigy Corporation Megan Kelly Senior Director of ERP Integrations CardConnect Moderated by Phil Reimann,

More information

Consolidate by Migrating Your Databases to Oracle Database 11g. Fred Louis Enterprise Architect

Consolidate by Migrating Your Databases to Oracle Database 11g. Fred Louis Enterprise Architect Consolidate by Migrating Your Databases to Oracle Database 11g Fred Louis Enterprise Architect Agenda Why migrate to Oracle What is migration? What can you migrate to Oracle? SQL Developer Migration Workbench

More information

Submitted to: Service Definition Document for Database Management for IT Infrastructure Management

Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Submitted to: Service Definition Document for Database Management for IT Infrastructure Management Table of Contents 1 Service Description... 3 2 Support Process and Methodology... 10 3 Standard Questionnaire...

More information

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking. THE FIRST UNIFIED DATABASE SECURITY SOLUTION Product Overview Security. Auditing. Caching. Masking. 2 The First Unified Database Security Solution About the products The GreenSQL family of Unified Database

More information

Keeping Databases in Sync during migration from z/os to a distributed platform

Keeping Databases in Sync during migration from z/os to a distributed platform Keeping Databases in Sync during migration from z/os to a distributed platform Avijit Goswami, PMP, ITIL, IBM Certified DB2 DBA, Sr. Technology Architect, Infosys Limited avijit_goswami@infosys.com Abstract

More information

Auditing Data Access Without Bringing Your Database To Its Knees

Auditing Data Access Without Bringing Your Database To Its Knees Auditing Data Access Without Bringing Your Database To Its Knees Black Hat USA 2006 August 1-3 Kimber Spradlin, CISA, CISSP, CPA Sr. Manager Security Solutions Dale Brocklehurst Sr. Sales Consultant Agenda

More information

Enforcive /Cross-Platform Audit

Enforcive /Cross-Platform Audit Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)

More information

Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute

Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute Accessing Your Database with JMP 10 JMP Discovery Conference 2012 Brian Corcoran SAS Institute JMP provides a variety of mechanisms for interfacing to other products and getting data into JMP. The connection

More information

Test Data Management. Services Catalog

Test Data Management. Services Catalog Test Data Management Services Catalog TABLE OF CONTENTS WHY TDM?... 3 CLIENT SUCCESS STORIES... 4 Large Automotive Company Data Generation...4 Large Entertainment Company Coverage Analysis...4 TDM APPROACH...

More information

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery

SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software

More information

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy

More information

PCI Compliance in Oracle E-Business Suite

PCI Compliance in Oracle E-Business Suite PCI Compliance in Oracle E-Business Suite May 14, 2015 Mike Miller Chief Security Officer Integrigy Corporation David Kilgallon Oracle Integration Manager CardConnect Moderated by Phil Reimann, Director

More information

Self Service Business Intelligence - how to bring Oracle and DB2 z/os data together

Self Service Business Intelligence - how to bring Oracle and DB2 z/os data together Self Service Business Intelligence - how to bring Oracle and DB2 z/os data together During my work as presales consultant I found in a lot of big companies this typical data environment: legacy applications,

More information

Integrated Data Management: Discovering what you may not know

Integrated Data Management: Discovering what you may not know Integrated Data Management: Discovering what you may not know Eric Naiburg ericnaiburg@us.ibm.com Agenda Discovering existing data assets is hard What is Discovery Discovery and archiving Discovery, test

More information

Securing and Accelerating Databases In Minutes using GreenSQL

Securing and Accelerating Databases In Minutes using GreenSQL Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

Comprehensive Approach to Database Security

Comprehensive Approach to Database Security Comprehensive Approach to Database Security asota@hotmail.com NYOUG 2008 1 What will I discuss today Identify Threats, Vulnerabilities and Risk to Databases Analyze the drivers for Database Security Identify

More information

Oracle Data Integrator 12c: Integration and Administration

Oracle Data Integrator 12c: Integration and Administration Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration

More information

Oracle Data Integrator 11g: Integration and Administration

Oracle Data Integrator 11g: Integration and Administration Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive

More information

Oracle Audit Vault and Database Firewall

Oracle Audit Vault and Database Firewall Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with

More information

can I customize my identity management deployment without extensive coding and services?

can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF Connector Xpress and Policy Xpress Utilities in CA IdentityMinder can I customize my identity management deployment without extensive coding and services? agility made possible You can.

More information

Security and Control Issues within Relational Databases

Security and Control Issues within Relational Databases Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats

More information

A Database Re-engineering Workbench

A Database Re-engineering Workbench A Database Re-engineering Workbench A project proposal by Anmol Sharma Abstract Data is not always available in the best form for processing, it is often provided in poor format or in a poor quality data

More information

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600 Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle

More information

IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite

IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite Streamline test-data management and deliver reliable application upgrades and enhancements Highlights Apply test-data management

More information

High-Volume Data Warehousing in Centerprise. Product Datasheet

High-Volume Data Warehousing in Centerprise. Product Datasheet High-Volume Data Warehousing in Centerprise Product Datasheet Table of Contents Overview 3 Data Complexity 3 Data Quality 3 Speed and Scalability 3 Centerprise Data Warehouse Features 4 ETL in a Unified

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Introduction. Introduction: Database management system. Introduction: DBS concepts & architecture. Introduction: DBS versus File system

Introduction. Introduction: Database management system. Introduction: DBS concepts & architecture. Introduction: DBS versus File system Introduction: management system Introduction s vs. files Basic concepts Brief history of databases Architectures & languages System User / Programmer Application program Software to process queries Software

More information

Real-time Data Replication

Real-time Data Replication Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different

More information

Software AG TechEd 2015 User Conference Mobile Enabler for Natural

Software AG TechEd 2015 User Conference Mobile Enabler for Natural Software AG TechEd 2015 User Conference Mobile Enabler for Natural April 21-22, 2015 Eric Wood Principal Systems Engineer, Adabas-Natural Software AG 1 Mobile use Continues to Grow Of US adult population

More information

DMZ Gateways: Secret Weapons for Data Security

DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE

More information

Introduction: Database management system

Introduction: Database management system Introduction Databases vs. files Basic concepts Brief history of databases Architectures & languages Introduction: Database management system User / Programmer Database System Application program Software

More information

Presented by Evan Sylvester, CISSP

Presented by Evan Sylvester, CISSP Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information

More information

Database Assessment. Vulnerability Assessment Course

Database Assessment. Vulnerability Assessment Course Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. http://creativecommons.org/licenses/by-sa/3.0/ 2 Agenda Introduction Configuration

More information

Expert Oracle Application. Express Security. Scott Spendolini. Apress"

Expert Oracle Application. Express Security. Scott Spendolini. Apress Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat

More information

Oracle Database 10g: Introduction to SQL

Oracle Database 10g: Introduction to SQL Oracle University Contact Us: 1.800.529.0165 Oracle Database 10g: Introduction to SQL Duration: 5 Days What you will learn This course offers students an introduction to Oracle Database 10g database technology.

More information

Additional Offeror Qualifications: Not applicable.

Additional Offeror Qualifications: Not applicable. Category 1: IBM Host Systems Support Services shall include configuration design, installation, maintenance, modification, monitoring and/or evaluation of operating systems and secondary support software

More information

Adabas und Natural für das Digitale Unternehmen

Adabas und Natural für das Digitale Unternehmen Adabas und Natural für das Digitale Unternehmen Innovation Day 2014, Bonn Guido Falkenberg Enterprise Transaction Systems Software AG The world becomes more digital 2 The impact of a world that becomes

More information

dbspeak DBs peak when we speak

dbspeak DBs peak when we speak Data Profiling: A Practitioner s approach using Dataflux [Data profiling] employs analytic methods for looking at data for the purpose of developing a thorough understanding of the content, structure,

More information

Oracle Data Integrator: Administration and Development

Oracle Data Integrator: Administration and Development Oracle Data Integrator: Administration and Development What you will learn: In this course you will get an overview of the Active Integration Platform Architecture, and a complete-walk through of the steps

More information

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004 A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:

More information

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server InfoSphere Guardium Ingmārs Briedis (ingmars.briedis@also.com) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions

More information

Legacy Data Migration: DIY Might Leave You DOA

Legacy Data Migration: DIY Might Leave You DOA Legacy Data Migration: DIY Might Leave You DOA By Wayne Lashley, Chief Business Development Officer White Paper 1 In any application migration/renewal project, data migration is 4. Capture of all source

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS

DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS DATABASE SECURITY MECHANISMS AND IMPLEMENTATIONS Manying Qiu, Virginia State University, mqiu@vsu.edu Steve Davis, Clemson University, davis@clemson.edu ABSTRACT People considering improvements in database

More information

Can I customize my identity management deployment without extensive coding and services?

Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CONNECTOR XPRESS AND POLICY XPRESS UTILITIES IN CA IDENTITY MANAGER Can I customize my identity management deployment without extensive coding and services? SOLUTION BRIEF CA DATABASE MANAGEMENT

More information

New York Health Benefit Exchange

New York Health Benefit Exchange New York Health Benefit Exchange Blueprint Summary for 9.7.4 Data Management Plan October 26, 2012 Item Number Topic 9.7.4 Data Management Plan Version Number Modified By Revision Date Description of Change

More information

Micro Focus Database Connectors

Micro Focus Database Connectors data sheet Database Connectors Executive Overview Database Connectors are designed to bridge the worlds of COBOL and Structured Query Language (SQL). There are three Database Connector interfaces: Database

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Obtaining Value from Your Database Activity Monitoring (DAM) Solution Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation

More information

Architecture and Mode of Operation

Architecture and Mode of Operation Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security

More information

Complete Database Security. Thomas Kyte http://asktom.oracle.com/

Complete Database Security. Thomas Kyte http://asktom.oracle.com/ Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright

More information

New Oracle 12c Security Features Oracle E-Business Suite Perspective

New Oracle 12c Security Features Oracle E-Business Suite Perspective New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations

<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

<Insert Picture Here> Application Change Management and Data Masking

<Insert Picture Here> Application Change Management and Data Masking Application Change Management and Data Masking Jagan R. Athreya (jagan.athreya@oracle.com) Director of Database Manageability Oracle Corporation 1 The following is intended to outline

More information

enterprise professional expertise distilled

enterprise professional expertise distilled Oracle Information Integration, Migration, and Consolidation The definitive guide to information integration and migration in a heterogeneous world Use Oracle technologies and best practices to manage,

More information

DATABASE ADMINISTRATION (DBA) SERVICES

DATABASE ADMINISTRATION (DBA) SERVICES DATABASE ADMINISTRATION (DBA) SERVICES Expert, Cost-effective DBA Services As An Extension of Your IT Staff Connectria s Database Administration Services allow you to free your staff and resources to focus

More information

Migrations from Oracle/Sybase/DB2 to Microsoft SQL Server it s easy!

Migrations from Oracle/Sybase/DB2 to Microsoft SQL Server it s easy! Migrations from Oracle/Sybase/DB2 to Microsoft SQL Server it s easy! January 2010 Dmitry Balin dmitry@dbbest.com Academy Enterprise Partner Group Successful migrations DB Best Technologies about us Established

More information

PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication

PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication PrivateWire Gateway Load Balancing and High Availability using Microsoft SQL Server Replication Introduction The following document describes how to install PrivateWire in high availability mode using

More information

Realizing the Benefits of Data Modernization

Realizing the Benefits of Data Modernization February 2015 Perspective Realizing the Benefits of How to overcome legacy data challenges with innovative technologies and a seamless data modernization roadmap. Companies born into the digital world

More information

MS SQL Server DBA Training Course. Table of Contents

MS SQL Server DBA Training Course. Table of Contents Table of Contents Overview... 4 About DBA University, Inc.... 4 Malathy Mani Microsoft Certified Solutions Expert (MCSA)... 5 Pricing and Registration... 5 Course Duration and Timings... 5 Sunday, Monday,

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager

More information

Welcome. Changes and Choices

Welcome. Changes and Choices Welcome Changes and Choices Today s Session Thursday, February 23, 2012 Agenda 1. The Fillmore Group Introduction 2. Reasons to Implement Replication 3. IBM s Replication Options How We Got Here 4. The

More information

How to address top problems in test data management

How to address top problems in test data management How to address top problems in test data management Data reuse, sub-setting and masking Business white paper Table of contents Why you need test data management... 3 The challenges of preparing and managing

More information

Designing Database Solutions for Microsoft SQL Server 2012

Designing Database Solutions for Microsoft SQL Server 2012 Course 20465A: Designing Database Solutions for Microsoft SQL Server 2012 Length: Audience(s): 5 Days Level: 300 IT Professionals Technology: Microsoft SQL Server 2012 Type: Delivery Method: Course Instructor-led

More information

Compared to MySQL database, Oracle has the following advantages:

Compared to MySQL database, Oracle has the following advantages: To: John, Jerry Date: 2-23-07 From: Joshua Li Subj: Migration of NEESit Databases from MySQL to Oracle I. Why do we need database migration? Compared to MySQL database, Oracle has the following advantages:

More information

Installation and User Guide

Installation and User Guide Installation and User Guide Confio IgniteVM Copyright 2013 Confio Corporation. All rights reserved. The programs (which include both the software and documentation) contain proprietary information of

More information

SPI Backup via Remote Terminal

SPI Backup via Remote Terminal FLUOR SPI Backup via Remote Terminal SmartPlant Implementation Team By Mitch Fortey Copyright 2014 Fluor Corporation all rights reserved SPI Back Up via Remote Terminal Data Backup 101 Why do we backup

More information

Identify resource intensive sessions in heterogeneous database environments with TOAD

Identify resource intensive sessions in heterogeneous database environments with TOAD Identify resource intensive sessions in heterogeneous database environments with TOAD The modern database administrator (DBA) is under pressure. Here are some points of the challenges he has today: Varying

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Security Trends and Client Approaches

Security Trends and Client Approaches Security Trends and Client Approaches May 2010 Bob Bocchino, CISA ERM Security and Compliance Business Advisor IBU Technology Sales Support Industries Business Unit, Technology Sales Support 1 Mark Dixon

More information

MySQL Enterprise Edition Most secure, scalable MySQL Database, Online Backup, Development/Monitoring Tools, backed by Oracle Premier Lifetime Support

MySQL Enterprise Edition Most secure, scalable MySQL Database, Online Backup, Development/Monitoring Tools, backed by Oracle Premier Lifetime Support MySQL Enterprise Edition Most secure, scalable MySQL Database, Online Backup, Development/Monitoring Tools, backed by Oracle Premier Lifetime Support Elevator Pitch With 12 millions of active installs,

More information

SAP Sybase Replication Server What s New in 15.7.1 SP100. Bill Zhang, Product Management, SAP HANA Lisa Spagnolie, Director of Product Marketing

SAP Sybase Replication Server What s New in 15.7.1 SP100. Bill Zhang, Product Management, SAP HANA Lisa Spagnolie, Director of Product Marketing SAP Sybase Replication Server What s New in 15.7.1 SP100 Bill Zhang, Product Management, SAP HANA Lisa Spagnolie, Director of Product Marketing Agenda SAP Sybase Replication Server Overview Replication

More information

Database FAQs - SQL Server

Database FAQs - SQL Server Database FAQs - SQL Server Kony Platform Release 5.0 Copyright 2013 by Kony, Inc. All rights reserved. August, 2013 This document contains information proprietary to Kony, Inc., is bound by the Kony license

More information

ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001

ICOM 6005 Database Management Systems Design. Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 ICOM 6005 Database Management Systems Design Dr. Manuel Rodríguez Martínez Electrical and Computer Engineering Department Lecture 2 August 23, 2001 Readings Read Chapter 1 of text book ICOM 6005 Dr. Manuel

More information

ICAB4136B Use structured query language to create database structures and manipulate data

ICAB4136B Use structured query language to create database structures and manipulate data ICAB4136B Use structured query language to create database structures and manipulate data Release: 1 ICAB4136B Use structured query language to create database structures and manipulate data Modification

More information

Enforcive / Enterprise Security

Enforcive / Enterprise Security TM Enforcive / Enterprise Security End to End Security and Compliance Management for the IBM i Enterprise Enforcive / Enterprise Security is the single most comprehensive and easy to use security and compliance

More information

Facilitating Efficient Data Management by Craig S. Mullins

Facilitating Efficient Data Management by Craig S. Mullins Facilitating Efficient Data Management by Craig S. Mullins Most modern applications utilize database management systems (DBMS) to create, store and manage business data. The DBMS software enables end users

More information

Security, Privacy, Compliance

Security, Privacy, Compliance Security, Privacy, Compliance Tech-Security Conference Chicago, IL January 19, 2012 Vitaly Dubravin, CTO f r o m i n f o r m a t i o n t o i n t e l l i g e n c e Premium IT Services Boutique Information

More information