How to Identify Datasets Containing PCI, PII or Other Sensitive Information
|
|
|
- Jean Osborne
- 10 years ago
- Views:
Transcription
1 How to Identify Datasets Containing PCI, PII or Other Sensitive Information David Wade CIO/EVP Primerica, Inc. February 5, 2013 Session 12943
2 Primerica: Who We Are Life Insurance and Investments Middle-income families Main Street, not Wall Street Entrepreneurial business model 4.3 million lives insured 2 million investment clients Publicly traded PRI 2
3 Infrastructure Architecture Applications Field Registration & Licensing Field Compensation Field Technology Life Administration Image Technology Securities Administration National Benefit Life PeopleSoft / Cognos TM1 HR Administrative Systems Application Infrastructure Support Presentation Layer MS Internet Explorer, Firefox, Safari, Chrome IBM Websphere Application Server v6.1 & v7.0 IBM Transaction Server v4.2 (CICS) Transaction Gateway v7.2 IBM TSO/E v1.12 MS.NET Framework v4.0 Tomcat v6 Database Management Information Security Telecom Operating Systems Platforms Disaster Recovery IBM DB2 v10 for z/os IBM Security Server v1.12 (RACF) Diverse, AT&T Multi-link 155/100 Mbps Internet Access PR/SM IBM Mainframe Z/OS v1.12 Mature Recovery Plans Oracle 11g IBM DB2 for LUW v9.7 Native UNIX & CA etrust v8 AT&T OC48 SONET Metropolitan Area Network Power VM IBM Unix-AIX v5.3/6.1 End-to-End Application Testing Microsoft SQL Server for Integrated 3 rd Party Application Novell v6.5 edirectory v8.7 Single & Multi-Mode Fiber & CAT 5e Wiring VMWare Vsphere 4 Microsoft Windows 2003/2008 Network Connectivity VSAM QSAM MS Active Directory 2003 Siemens 9751 PBXs SUSE V10 SP3 Edirectory v8.8 and Novell v6.5 Edirectory v8.7 IBM Out of Region Recovery Center NAS MySQL v5.5 CISCO 65xx & 72xx Equipment Red Hat v6 Update 2 Business Recovery Center - Hembree 3
4 DataSniff What s in your mainframe? Finding PCI, PII and other sensitive information in your legacy mainframe 4
5 Mainframe Legacy 30+ years of legacy data Production data classified manually End user and Test data not classified Structured Data VSAM DB2 (includes user-owned tables) Unstructured Data (Disk and Tape) QSAM / Sequential, GDG PDS, PDSE Packed Decimal DFHSM ML1 / ML2 5
6 Data Loss Prevention Initiative Effective DLP Programs Utilize a Multitude of People, Process and Technology Data Governance Policies and Standards Identification Risk Assessment Classification Architecture Quality 6 Source: Ernst & Young, LLP, Data Loss Prevention, Keeping your sensitive data out of the public domain
7 Data Loss Prevention Initiative Data Control Key Focus Areas for DLP Controls Data in Motion Perimeter security Network monitoring Internet access control Data collection and exchange Messaging ( , IM) Remote access Structured data Data in Use Privileged user monitoring Access/Usage monitoring Data anonymisation Use of test data Data redaction Export/Save control Data at Rest EndPoint security Host Resident/Encryption Mobile device protection Network/Intranet storage Physical media control Disposal and destruction 7 Unstructured data Source: Ernst & Young, LLP, Data Loss Prevention, Keeping your sensitive data out of the public domain
8 Data Loss Prevention Initiative Supporting Information Security Processes Identity/Access Management Security information/event management Configuration management Vulnerability management Digital rights management Incident response Physical security Training and awareness Asset management Data privacy/document protection Employee screening and vetting Third-party management and assurance Business continuity Disaster recovery Regulatory compliance management Change management/sdlc 8 Source: Ernst & Young, LLP, Data Loss Prevention, Keeping your sensitive data out of the public domain
9 If You Can t Measure It You Can t Manage It! 9
10 The Task at Hand Classify all mainframe data files Who owns them? What do they contain? Where is the confidential, PII, PCI or other sensitive information? 10
11 DataSniff by XBridge Systems Data Discovery Tool Runs on the mainframe Automated, native scanning of mainframe data Schedule by Media Type Analytical Engine Appliance or Windows-based Browser-based User Interface Schedule scans Manage reporting 11
12 DataSniff Evaluation Identify and secure Payment Card Numbers (PCN) Personally Identifiable Information (PII) especially Social Security/Tax ID numbers, home address Support all Mainframe data structures DB2 databases VSAM KSDS & ESDS QSAM, GDG files on both disk and tape PDS & PDSE DFHSM ML1 & ML2 on tape Packed decimal data 12
13 Features Evaluated Locate SSN/PCN format data in DB2 tables, QSAM/VSAM, & PDS(E)s Selection of data using regular expressions User control of mainframe resources HSM re-migration User-written regular expressions Results reporting Impact on mainframe performance 13
14 14 Management Console
15 15 Management Console
16 16 Management Console
17 Successes PCN/SSN data located with minimum of false positives User-defined selection filters Scanned all required data structures: DB2, VSAM, Sequential / QSAM, PDS/PDSE, HSM migrated data sets Scanned packed decimal structures Controlled use of scarce mainframe resources (tape, disk) HSM migrated files automatically recalled and re-migrated to original migration level (ML1, ML2) Scanned large numbers of data stores with no performance impact 17
18 Issues Resolved during evaluation Dynamic allocation of HSM migration control dataset caused contention with HSM CDS reorgs. Excessive runtimes for PDS/PDSE scans. Fix has been developed. 18
19 Performance Quick data analysis; select group of datastores Test LPAR Prod LPAR Total Files Scanned 34, ,195 By File Type: PDS/E 669 1,804 QSAM 5, ,852 VSAM 28,447 37,112 DB2 Tables 795 9,428 By Media Type: DASD (non-migrated) 32,169 67,812 Tape ,905 Migrated (ML1/ML2) 2, ,478 Minimal mainframe resource usage User-controlled mainframe resources: Tape HSM recalls 19
20 Custom Regular Expressions Identify SSNs with specific state codes Addresses and zip+4 s in the form xxxxx-xxxx. Example of SSN regular expression (?:[0-6]\d{2} 7[0-6]\d 77[0-2])(?: {0,2}(?(-)(?:-\ {0,2})))(?:\d{2})(?: {0,2}(?(-)(?:-\ {0,2})))(?:\d{4}) (( )[0-9]{6}) (( )-[0-9]{2}-[0-9]{4}) 20
21 Conclusion Data identification and classification Mainframe data at rest Easy to use Quick and efficient Little or no impact to the operational environment DataSniff is a valuable part of Primerica s comprehensive DLP program. 21
22 XBridge Systems, Inc. Mountain View, CA Primerica, Inc. Duluth, GA 22
data express DATA SHEET OVERVIEW
data express DATA SHEET OVERVIEW The reliability of IT systems is a key requirement of almost any organization. Unexpected failure of enterprise systems can be expensive and damaging to an organization.
How To Write An Ets Request For Proposal (Rfp)
Oregon Enterprise Technology Services (ETS) Customer Requests ETS customers issuing RFPs to support application development initiatives often have hardware requirements. Standards and guidelines for equipment
Data Masking Secure Sensitive Data Improve Application Quality. Becky Albin Chief IT Architect [email protected]
Data Masking Secure Sensitive Data Improve Application Quality Becky Albin Chief IT Architect [email protected] Data Masking for Adabas The information provided in this PPT is entirely subject
08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview
Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Asset Management Suite Backup Exec Certificate Intelligence
Measurably reducing risk through collaboration, consensus & practical security management. 2015 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2015 CIS Security Benchmarks 1 Background State of Idaho s Rights and Benefits as a CIS Security Benchmarks Member
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
Virtualization Journey Stages
Deep Security 7.5 Todd Thiemann Sr. Dir. of Datacenter Security Marketing Trend Micro Harish Agastya Director of Datacenter Security Marketing Trend Micro Classification 11/12/2010 1 Virtualization Journey
SPSS Statistics Server 22.0.0.0 on Windows Detailed system requirements
Report data as of 2013-08-21 03:01:57 MDT SPSS Statistics 22.0.0.0 on Windows Detailed system requirements Operating systems The operating systems section specifies the operating systems within the Windows
Required Software Product List
Symantec ($3.2 million, 35% weight) AdVantage AdvisorMail AntiVirus (Endpoint Protection) AntiVirus Enterprise Edition App Center Application HA Arellia Application Control Solution Arellia Endpoint Security
SNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration
SNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Linux Client for Unix
Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle
Citrix XenDesktop & XenApp
VMware Management Pack for Citrix XenDesktop & XenApp How Blue Medora Complements vrealize VMware provides best-ofbreed management for Virtualization / Cloud vsphere via vrealize Operations How Blue Medora
IBM InfoSphere Guardium
IBM InfoSphere Guardium Enterprise-wide Database Protection and Compliance Jānis Bērziņš, DPA 08.11.2012 Data is the key target for security breaches.. and Database Servers Are The Primary Source of Breached
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Patrick Townsend Software Diversified Services/Townsend Security August 9, 2011 Session Number 9347 PGP
Altiris Inventory Solution 7.1 SP2 from Symantec User Guide
Altiris Inventory Solution 7.1 SP2 from Symantec User Guide Altiris Inventory Solution 7.1 SP2 from Symantec User Guide The software described in this book is furnished under a license agreement and may
List of Supported Systems & Devices
List of Supported Systems & Devices February 2012 Cyber-Ark's Privileged Identity Management (PIM) Suite is an enterprise-class, unified policy-based solution that secures, manages and monitors all privileged
SNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner External Data Provider Snow Distribution
Symantec NetBackup 5000 Appliance Series
A turnkey, end-to-end, global deduplication solution for the enterprise. Data Sheet: Data Protection Overview Symantec NetBackup 5000 series offers your organization a content aware, end-to-end, and global
SNOW LICENSE MANAGER (8.X)... 4
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Unix Client for OS
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
Microsoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OSX Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-02-12
CA Service Desk Manager Release 12.5 Certification Matrix
CA Service Desk Manager Release 12.5 Certification Matrix Last Updated: February 11, 2014 End-of-Service: May 31, 2013 CA Service Desk Manager will support service-packs and point-releases of Operating
Enforcive /Cross-Platform Audit
Enforcive /Cross-Platform Audit Enterprise-Wide Log Manager and Database Activity Monitor Real-time Monitoring Alert Center Before & After Change Image Custom Reports Enforcive's Cross-Platform Audit (CPA)
Business Application Continuity CA ARCserve Backup CA ARCserve D2D CA ARCserve Replication and High Availability
Business Application Continuity CA ARCserve Backup CA ARCserve D2D CA ARCserve Replication and High Availability [email protected] CEE RMDM Technical Sales CA Recovery Management R 15 Total protection
Altiris Inventory Solution 7.1 SP2 from Symantec User Guide
Altiris Inventory Solution 7.1 SP2 from Symantec User Guide Altiris Inventory Solution 7.1 SP2 from Symantec User Guide The software described in this book is furnished under a license agreement and may
Managed Backup Service Supported Platforms
Managed Backup Service Supported Platforms 2 Managed Backup Service Supported Platforms Updated: 16 th September 2009 InTechnology Supported Platforms The Managed Backup Service supports the following
Microsoft Windows Apple Mac OS X
Products Snow License Manager Snow Inventory Server, IDP, IDR Client for Windows Client for OS X Client for Linux Client for Unix Oracle Scanner External Data Provider Snow Distribution Date 2014-04-02
SnapServer NAS GuardianOS 6.5 Compatibility Guide May 2011
SnapServer NAS GuardianOS 6.5 Compatibility Guide May 2011 1 Table of Contents 1 Introduction... 3 2 Supported SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Recommended Active Concurrent
Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.
Redefining Backup for VMware Environment 1 Agenda VMware infrastructure backup and recovery challenges Introduction to EMC Avamar Avamar solutions for VMware infrastructure Key takeaways Copyright 2009
VMware vrealize Operations. Management Pack for. PostgreSQL
VMware for PostgreSQL How Blue Medora Complements vrealize VMware provides best-ofbreed management for Virtualization / Cloud vsphere via vrealize Operations How Blue Medora Complements vrealize Applications
Symantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive
IBM InfoSphere Guardium for DB2 on z/os Technical Deep Dive One of a series of InfoSphere Guardium Technical Talks Ernie Mancill Executive IT Specialist Logistics This tech talk is being recorded. If you
Module 5 Introduction to Processes and Controls
IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development
BMC Client Management - Technical Specifications. Version 12.0
BMC Client Management - Technical Specifications Version 12.0 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo
z/os Curriculum Job Control Language (JCL) Curriculum JES Curriculum WebSphere Curriculum TSO/ISPF for z/os Curriculum
A relação de cursos de mainfame a seguir representa mais de 1.000 horas de treinamento e-learning, fornecendo uma abordagem ampla e atual sobre o assunto. z/os Curriculum z/os 1.13 Series o z/os Concepts
System Requirements Across v6 (Revision: April 29, 2015)
(Revision: April 29, 2015) Copyright 2014-2015 Across Systems GmbH The contents of this document may not be copied or made available to third parties in any other way without the written permission of
IBM Tivoli Application Dependency Discovery Manager
Automatically discover application dependencies and configurations providing the visibility necessary to improve IT Service Management IBM Tivoli Application Dependency Discovery Manager Highlights Gain
Welcome. Changes and Choices
Welcome Changes and Choices Today s Session Thursday, February 23, 2012 Agenda 1. The Fillmore Group Introduction 2. Reasons to Implement Replication 3. IBM s Replication Options How We Got Here 4. The
Service Description Remote Yearly Maintenance of Dell PowerEdge Servers and PowerVault Storage
Service Description Remote Yearly Maintenance of Dell PowerEdge Servers and PowerVault Storage Service SKUs See Appendix A Service Overview This service provides for a yearly health check (the Service
IBM INFORMATION MANAGEMENT SYSTEMS (IMS ) MIGRATION AND MODERNIZATION - CONVERSION OF HIERARCHICAL DL/1 STRUCTURES TO RDBMS
IBM INFORMATION MANAGEMENT SYSTEMS (IMS ) MIGRATION AND MODERNIZATION - CONVERSION OF HIERARCHICAL DL/1 STRUCTURES TO RDBMS Leverage the technology and operational advantages inherent within the modern
SIEMENS. Teamcenter 11.2. Windows Server Installation PLM00013 11.2
SIEMENS Teamcenter 11.2 Windows Server Installation PLM00013 11.2 Contents Part I: Getting started with Teamcenter server installation Requirements and overview.............................................
StreamServe Persuasion SP5 Supported platforms and software
StreamServe Persuasion SP5 Supported platforms and software Reference Guide Rev A StreamServe Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520
Symantec Backup Exec 2010
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
Shipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11c ()... 2 Director Management Console (console
A Comparison of VMware and {Virtual Server}
A Comparison of VMware and {Virtual Server} Kurt Lamoreaux Consultant, MCSE, VCP Computer Networking and Consulting Services A Funny Thing Happened on the Way to HP World 2004 Call for speakers at the
Micro Focus Server Enterprise Edition
product white paper review Micro Focus Server Enterprise Edition Micro Focus Server Enterprise Edition is a deployment environment for hosting applications that have been migrated from mainframes. It provides
RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION
RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on
VMware vsphere 5.1 Advanced Administration
Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.
MEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions
MEEC Webinar Daly and EMC BRS - EMC Backup & Archive Solutions Accelerating Transformation Presented By: Gabe Sales-Smith Backup & Recovery Specialist EMC Jim Rowland Senior System Architect and Project
IBM Unica Enterprise Products Version 8.6.0 Publication Date: May 26, 2014. Recommended Software Environments and Minimum System Requirements
IBM Unica Enterprise Products Version 8.6.0 Publication Date: May 26, 2014 Recommended Software Environments and Minimum System Requirements Copyright Copyright IBM 2014 IBM Corporation Reservoir Place
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
Big Data Storage in the Cloud
Big Data Storage in the Cloud Russell Witt Scott Arnett CA Technologies Tuesday, March 11 Session Number 15288 Tuesday, March 11Tuesday, March 11 Abstract Need to reduce the cost of managing storage while
SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009
SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 1 Table of Contents 1 Introduction... 3 2 ed SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Microsoft Windows... 3 3.2 Apple
EMC DISK LIBRARY FOR MAINFRAME
EMC DISK LIBRARY FOR MAINFRAME A complete suite of solutions to meet any mainframe tape requirement Carlo Dioos [email protected] BRS EMEA TC 1 EMC Mainframe Solutions in the News 2 1 Typical Mainframe
Rehosting Mainframe Workloads
WHITE PAPER Rehosting Mainframe Workloads Lower costs while maintaining functionality, meeting service level agreements and minimizing risk Copyright 2011 9930 Derby Lane, Suite 202. Westchester, IL 60154,
Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
Symantec Client Management Suite 7.6 powered by Altiris technology
Symantec Client Management Suite 7.6 powered by Altiris technology IT flexibility. User freedom. Data Sheet: Endpoint Management Overview With so many new devices coming into the workplace and users often
Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide
Lumension Endpoint Management and Security Suite Patch and Remediation 7.0 Service Pack 1 Migration Guide Planning your migration with Service Pack 1 This document provides guidance for customers who plan
BMC Mainframe Solutions. Optimize the performance, availability and cost of complex z/os environments
BMC Mainframe Solutions Optimize the performance, availability and cost of complex z/os environments If you depend on your mainframe, you can rely on BMC Sof tware. Yesterday. Today. Tomorrow. You can
Symantec Disaster Recovery Advisor
Protect your business: Automatically detect and report on risks in your High Availability and Disaster Recovery Infrastructure Data Sheet: Disaster Recovery A single undetected configuration error can
Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered
ERP Infrastructure Guide APPENDIX B
ERP Infrastructure Guide APPENDIX B for State of Georgia State Road and Tollway Authority 47 Trinity Avenue, SW Atlanta, GA 30334 June 2013 Updated by: Updated on: Description of Update: Revision # DRY
Veritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Backup Exec 15 Agents and Options
DATA PROTECTION Backup Exec 15 Agents and Options Enhance and extend Backup Exec features, capabilities, and platform support Overview enhance and extend Backup Exec features, capabilities, and platform
FDR/UPSTREAM INNOVATION Data Processing Providing a Long Line of Solutions
Presented to FDR/UPSTREAM Innovation Data Processing [email protected] Copyright 2015 2015 All rights INNOVATION reserved. Data Processing. All rights reserved. 1 Presented to INNOVATION Data Processing
The operating system requirements listed in this document include the most current patches and service packs.
System requirements The Quark Publishing Platform system requirements listed below are baseline requirements, but your number of users, number of assets, and number of asset revisions affect system performance.
SEP sesam Backup & Disaster Recovery Overview
SEP sesam Backup & Disaster Recovery Overview Lanai Bayne VP of Business Development SEP Software Corp. [email protected] Christian Ruoff Sr. Technical Support Manager SEP Software Corp. [email protected] Why SEP
Novell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 INSTALLATION GUIDE Table Of Contents 1. Installation Overview... 1 If you are upgrading... 1 Installation Choices... 1 ZENworks
Technical Specification Data 1
Equitrac Office 5.1 Software Suite Equitrac Office Software Suite Equitrac Office Suite Equitrac Office Small Business Edition (SBE) Applications Any size network with single or multiple accounting and/or
CA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
Backup Exec System Recovery Management Solution 2010 FAQ
Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation
Shipping Products Chart. Contents
Shipping Products Chart Currently shipping EVault Software products and supported platforms Contents Director (Vault) and Related Products Director (Vault) 7.11d ()... 2 Director Management Console (console
VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER
VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)
PUBLISH YOUR COLLECTIONS TO THE WEB
emuseum PUBLISH YOUR COLLECTIONS TO THE WEB Easily Integrates with TMS Powerful Searching Fully Customizable User Created Collections Mobile Enabled Multiple Media Support Visit www.gallerysystems.com/emuseum
$45.00 per VM per month base cost, plus $4.50 per virtual CPU (vcpu) per month. $0.16 per GB Disk Storage per month
Information Technology @ Johns Hopkins Enterprise Technology Services (ETS) Systems Management Service Level Agreement February 2015 (rates effective FY16) Information Technology at Johns Hopkins (IT@JH)
Real-Time Database Protection and. Overview. 2010 IBM Corporation
Real-Time Database Protection and Monitoring: IBM InfoSphere Guardium Overview Agenda Business drivers for database security InfoSphere Guardium architecture Common applications The InfoSphere portfolio
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Backup Exec 2010 Deduplication Protect More, Store Less, Save More
Backup Exec 2010 Deduplication Protect More, Store Less, Save More Lim Andre Xavier Regional Product Manager Asia Pacific & Japan Information Management Group - SMB 2 3 Symantec Backup Exec 2010 Agenda
Replicating Mainframe Tape Data for DR Best Practices Session #10929
Replicating Mainframe Tape Data for DR Best Practices Session #10929 Lee Reiersgord Systems Engineer Luminex Software, Inc. Scott James VP Global Alliances & Marketing Luminex Software, Inc Steve Schwietz
STRATEGIC PLANNING ASSUMPTION(S)
STRATEGIC PLANNING ASSUMPTION(S) By 2016, one-third of organizations will change backup vendors due to frustration over cost, complexity and/or capability. By 2014, 80% of the industry will choose disk-based
CA Telon Application Generator r5.1
PRODUCT SHEET CA Telon Application Generator CA Telon Application Generator r5.1 CA Telon Application Generator r5.1 (CA Telon AG) is an easy-tolearn, powerful application generator that provides the ability
File Manager base component
Providing flexible, easy-to-use application development tools designed to enhance file processing IBM File Manager for z/os, V13.1 Figure 1: File Manager environment Highlights Supports development and
Protecting your Data in a New Generation Virtual and Physical Environment
Protecting your Data in a New Generation Virtual and Physical Environment Read this white paper to learn how you can easily and safely protect your data in a new generation virtual and physical IT environment,
Practical DLP Deployment
Practical DLP Deployment Practical DLP Deployment for your Organization Jon Damratoski, DLP Architect DLP Basics Overview A few items discussed today What is DLP? Define a DLP program using business driven
License table for Microsoft Action Pack partners
License table for Microsoft Action Pack partners Benefits include the latest internal-use software that you can use to run your business, sell your solutions, develop applications, and train your employees.
ACCELERATE YOUR VIRTUALIZATON JOURNEY WITH BACKUP BUILT FOR VMWARE
ACCELERATE YOUR VIRTUALIZATON JOURNEY WITH BACKUP BUILT FOR VMWARE and more... Opher Bettan director of Engineering 1 Agenda Virtualization trend and benefits Must-have list Deduplication Avamar is optimized
Enhancing Lotus Domino search
Enhancing Lotus Domino search Efficiency & productivity through effective information location 2009 Diegesis Limited Enhanced Search for Lotus Domino Efficiency and productivity - effective information
