Microsoft Database security and compliance capabilities, under General Data Protection Regulation (GDPR) perspective

Size: px
Start display at page:

Download "Microsoft Database security and compliance capabilities, under General Data Protection Regulation (GDPR) perspective"

Transcription

1 Microsoft Database security and compliance capabilities, under General Data Protection Regulation (GDPR) perspective

2 A NEW STANDARD TO PROTECT PERSONAL DATA The General Data Protection Regulation provides European Union citizens, wherever they reside, and lawful residents greater control of their data by requiring organizations to maintain appropriate security of personal data. GDPR includes Enhanced personal privacy rights Increased duty for protecting data Mandatory breach reporting Significant penalties for non-compliance

3 SOLUTIONS TO HELP YOU PREPARE FOR THE GDPR

4 DATA PROTECTION WITH SQL-BASED TECHNOLOGIES The SQL platform ensures secure processing and storage of personal data Discover Manage Protect Report Identify and track personal data Discover and classify specific data Tag data with sensitivity labels Track personal data access across resources Control access Help securely authenticate access to your database and apply granular authorization Restrict access to users with easyto-use tools Safeguard data Respond to breaches Help secure data whether at rest, in transit or in client applications Track unusual or suspicious activity to identify threats Keep records Track and report on all database activities Maintain an updated assessment of data security posture

5 SQL-BASED TECHNOLOGIES SUPPORT YOUR SECURITY NEEDS, INCLUDING GDPR Tra ck perso na l data Separation of duties Encryption everywhere Audit capabilities Consistent programmability experience E a sily que r y da tab ases to unc ove r personal data T a g da ta w ith sensitivity la be ls using E xtende d Properties Se c ur e ly a uthentica te to your da ta base a nd a pply gr a nula r a uthorization policies Re str ic t a cce ss to use rs using D yna mic D ata Ma sking a nd Row- L e vel Se c ur ity E nc r ypt da ta w hethe r a t r e st, in tr a nsit or in c lient applications T r a c k a nd r e port on a ll da ta ba se a ctivities w ith gr a nula rly configur able auditing U se c ontinuously lea rning a lgor ithms to ide ntify unusua l or suspicious a ctivity D e ve loper s a nd application pa r tne rs c an build to a single pr ogr amming surface Sc a le a c ross SQ L e ditions a nd the c loud Key features SQ L Q ue r y L a nguage V ulne r a bility A ssessment D a ta D isc ove ry & Classification D yna mic D a ta Ma sking (DDM) Row- L e vel Se c ur ity ( RL S) W indow s a uthentic ation/ AAD authentication T r a nspa rent D ata Encryption A lw a ys E nc rypte d Transport- Layer Se curity A uditing f or SQ L D atabase a nd SQ L Se r ve r a udit T e mpor a l tables SQ L D a ta ba se T hrea t D e te c tion Sinc e SQ L Se r ve r 2016 SP1

6 This image cannot currently be displayed.

7 STEP 1 Process Inventory personal data in database systems Review access model, understand the attack surface area Technology Data Discovery and Classification Vulnerability Assessment

8 DISCOVER AND CLASSIFY PERSONAL DATA Data Discovery & Classification forms a new SQL Information Protection paradigm to protect data Discovery & Classification recommendations engine scans database and identifies columns containing potentially sensitive data Sensitivity classification labels can be tagged on columns for advanced auditing and protection Query result set sensitivity is calculated in real time for auditing The database classification state can be viewed in a detailed dashboard or an Excel report Discover

9 UNCOVER AND MANAGE DATA WITH SPECIFIC TOOLS Easily query databases with SQL query language to identify and uncover personal data Create classified tables with Extended Properties and attribute-based label metadata Use Full-Text Search in Microsoft SQL to search for keywords located within freeform text Search and identify personal data using metadata queries SQL Discover

10 STEP 2 Process Manage authentication and authorization mechanisms Properly configure database firewall Limit application access according to authorization principles Technology Azure Active Directory authentication, role-based security, Windows authentication Azure SQL Firewall Dynamic Data Masking, Row-Level Security

11 MANAGE DATA ACCESS WITH ROW- LEVEL SECURITY Fine-grained access control over specific rows in a database Prevent unauthorized access when filtering in multitenant applications Enforcement logic inside the database and schema bound to the table Centralize Row-Level access logic within the database Provide better support services preventing your representative from getting access to customer s sensitive data Manage

12 CONTROL SENSITIVE DATA ACCESS WITH DYNAMIC DATA MASKING Non-privileged users cannot see sensitive data Table.CreditCardNo Apply data masking in real-time to query results based on security policy Av ailab le in th e Azu re p ortal and also v ia T-SQL CreditCardNo XXXX-XXXX-XXXX XXXX-XXXX-XXXX XXXX-XXXX-XXXX Manage

13 STEP 3 Process Encryption of data at rest, in motion, in use Maintain records and audits of all database activities Detect data breach and respond accordingly Ensure business continuity Technology Transparent Data Encryption, Always Encrypted Auditing Threat Detection Always On, Active Geo-Replication

14 ENCRYPT DATA IN USE WITH ALWAYS ENCRYPTED Protect data in use from highly privileged yet unauthorized users with Always Encrypted Configure Always Encrypted for individual database columns containing sensitive data Leverage column encryption keys and column master keys to protect data Enhanced SQL Server Library SQL Data set CIPHERTEXT Customer Credit card # Exp. Customer Credit card # Exp. Denny Usher 0x7ff654ae6d /17 Tim Irish 1x7fg655se2e /19 Denny Usher 0x7ff654ae6d /17 Alicia Hodge 0y8fj754ea2c /18 Protect Column master key Column encryption key

15 MAXIMIZE AVA ILA B ILITY O N ANY PLATFORM Always On cross-platform capabilities with HA and DR for Linux and Windows Support for clusterless Av ailab ility Gro ups Ultimate HA with OS-level redundancy and low-downtime migration Load balancing of readable secondaries Protect

16 DETECT UNUSUAL AND POTENTIALLY HARMFUL ACTIVITY Azure SQL Threat Detection discovers and identifies anomalous activities Users receive alerts upon suspicious database activities, potential vulnerabilities, and SQL injection attacks Recommended actions on how to investigate and mitigate threats Protect

17 STEP 4 Process Maintain audit records of database activities Continuously assess and analyze security measures Technology Auditing, Temporal tables Vulnerability Assessment

18 TRACK AND LOG EVENTS WITH SQL SERVER AUDIT Enable, store, and view audits on various server and database objects with dedicated tools Define multiple server or database audits to run simultaneously Track and log user-defined database-level audits with the help of predefined templates Report

19 KNOW YOUR SECURITY STATE WITH SQL VULNERABILITY ASSESSMENT Meet compliance requirements that require database scan reports Meet security standards of GDPR Monitor a dynamic database environment where changes are difficult to track Drill-down on assessment results to understand the impacts of findings and use actionable remediation information to resolve issues Report

20 Discover Data identifica tion Tracking Manage Access control Granular authorization Protect Data security Data Discovery & Classification Scan, identify, and label columns containing potentially sensitive data in your database Access control Administrators can manage and govern access to personal data with Windows authentication and Azure Active Directory authentication Transparent Data Encryption Help secure personal data through encryption at the physical storage layer using encryptionat-rest Metadata queries, SQL queries and statements Helps you search and identify personal data using queries Role-based access control Apply role-based access control to help manage authorization policies in the database, and to implement the separation of duties principle Always Encrypted Prevent unauthorized, high-privileged users from accessing data in transit, at rest, and while in use DATA SECURITY SOLUTIONS WITH SQL-BASED TECHNOLOGIES Full text queries Using full-text queries against characterbased data in SQL Server tables Azure Data Catalog Unlock tribal knowledge by sharing information about data usage and intent throughout the organization Report Documentation Assessment of security Row-level security Prevent access to rows in a table (such as those that may contain sensitive information) based on characteristics of the user trying to access the data Dynamic Data Masking Control access to sensitive data by enabling how much data to reveal with minimal impacts to app layers SQL Server Audit Verify changes to data that occur in a SQL Server table Always On Availability Groups Maximize the availability of a group of user databases for an enterprise SQL Database Threat Detection Get help detecting anomalous database activities indicating potential security threats to the database SQL Server Audit Understand ongoing database activities, and analyze and investigate historical activity to identify potential threats or suspected abuse and security violations SQL Server Audit Maintain audit trails and gain useful input for performing a Data Protection Impact Assessment (DPIA) Master data services Keep personal data complete and ensure that requests to edit, delete, or discontinue the processing of data are propagated throughout the system Vulnerability assessment Reports that can serve as a security assessment for your database. These reports can also be used as part of a Data Protection Impact Assessment (DPIA)

21 MODERNIZE YOUR DATA PLATFORM TODAY Upgrade scenarios Shared Infrastructure / Lower cost Hybrid Cloud SQL PaaS & SaaS Azure SQL Database Virtualized Database On-premises: Complete data platform with mission critical performance and real time reporting IaaS SQL Server in Azure VM Virtualizes Machines Private Cloud: Dedicated business resources inside the enterprise IaaS: Keep management while reducing TCO with Azure VMs SaaS: No application code change, while taking advantage of scalable and highly available DBaaS PaaS: Fully managed solution with high availability and scalability Dedicated Infrastructure/ Higher cost SQL Physical SQL Server Physical Machine (raw iron) Virtu al SQL Server Private Cloud Virtualized Machine + Appliance Higher administration Lower administration

22 END OF SUPPORT MEANS END OF COMPLIANCE Businesses using unsupported SQL Server versions may not meet GDPR standards End of support means no more critical security updates, leading to greater threats and increased maintenance costs SQL Server end of support schedule Versi on Cu rren t support level End mainstream End extended SQL Server 2014 Currently supporting all versions July 9, 2019 July 9, 2024 SQL Server 2012 SQL Server 2008 and SQL Server 2008 R2 SQL Server 2012 SP2+ is in mainstream support until CY 2017 SQL Server 2008 and 2008 R2 are in extended support which includes security updates, paid support, and requires purchasing non-security hotfix support July 11, 2017 July 12, 2022 July 8, 2014 July 9, 2019 SQL Server 2005 SQL Server 2005 support ended on April 12, 2016 April 12, 2011 April 12, 2016

23 SQL SERVER 2017 Strengthen data security on a leading data platform Choice of platform and language Industry-leading performance Most secure over the last 8 years 6 Only commercial DB with AI built-in End-to-end mobile BI on any device 200+ $2, T-SQL Java C/C++ C#/VB.NET PHP Node.js Python Ruby #1 OLTP performance 1 #1 DW performance on 1TB 2, 10TB 3, and 30TB 4 #1 OLTP price/performance 5 #1 DW price/performance on 1TB 2, 10TB 3, and 30TB 4 Vulnerabilities ( ) R R and Python + in-memory at massive scale Native T-SQL scoring Self-service BI per user $480 $120 Microsoft Tableau Oracle A fraction of the cost In-memory across all workloads Private cloud Most consistent data platform Public cloud National Institute of Standards and Technology Comprehensive Vulnerability Database

24

Transform your data estate with cloud, data and AI

Transform your data estate with cloud, data and AI Transform your data estate with cloud, data and AI The world is changing Data will grow to 44 ZB in 2020 Today, 80% of organizations adopt cloud-first strategies AI investment increased by 300% in 2017

More information

28 February 1 March 2018, Trafo Baden. #techsummitch

28 February 1 March 2018, Trafo Baden. #techsummitch #techsummitch 28 February 1 March 2018, Trafo Baden #techsummitch Transform your data estate with cloud, data and AI #techsummitch The world is changing Data will grow to 44 ZB in 2020 Today, 80% of organizations

More information

SQL Server SQL Server 2008 and 2008 R2. SQL Server SQL Server 2014 Currently supporting all versions July 9, 2019 July 9, 2024

SQL Server SQL Server 2008 and 2008 R2. SQL Server SQL Server 2014 Currently supporting all versions July 9, 2019 July 9, 2024 Current support level End Mainstream End Extended SQL Server 2005 SQL Server 2008 and 2008 R2 SQL Server 2012 SQL Server 2005 SP4 is in extended support, which ends on April 12, 2016 SQL Server 2008 and

More information

Microsoft vision for a new era

Microsoft vision for a new era Microsoft vision for a new era United platform for the modern service provider MICROSOFT AZURE CUSTOMER DATACENTER CONSISTENT PLATFORM SERVICE PROVIDER Enterprise-grade Global reach, scale, and security

More information

Microsoft SQL Server on SUSE Linux. Radosław Łebkowski Microsoft

Microsoft SQL Server on SUSE Linux. Radosław Łebkowski Microsoft Microsoft SQL Server on SUSE Linux Radosław Łebkowski Microsoft Partnership milestones Partnership milestones SUSE Linux Enterprise Server + Microsoft SQL Server Ewolucja SQL Server Heterogeneous environments

More information

Data 101 Which DB, When. Joe Yong Azure SQL Data Warehouse, Program Management Microsoft Corp.

Data 101 Which DB, When. Joe Yong Azure SQL Data Warehouse, Program Management Microsoft Corp. Data 101 Which DB, When Joe Yong (joeyong@microsoft.com) Azure SQL Data Warehouse, Program Management Microsoft Corp. The world is changing AI increased by 300% in 2017 Data will grow to 44 ZB in 2020

More information

SQL Server 2017 Power your entire data estate from on-premises to cloud

SQL Server 2017 Power your entire data estate from on-premises to cloud SQL Server 2017 Power your entire data estate from on-premises to cloud PREMIER SPONSOR GOLD SPONSORS SILVER SPONSORS BRONZE SPONSORS SUPPORTERS Vulnerabilities (2010-2016) Power your entire data estate

More information

SQL Server Everything built-in

SQL Server Everything built-in 2016 Everything built-in 2016: Everything built-in built-in built-in built-in built-in built-in $2,230 80 70 60 50 43 69 49 40 30 20 10 0 34 6 0 1 29 4 22 20 15 5 0 0 2010 2011 2012 2013 2014 2015 18 3

More information

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Providing clarity and consistency for the protection of personal data The General

More information

SQL Server Pre Lanzamiento. Federico Marty. Mariano Kovo. Especialista en Plataforma de Aplicaciones Microsoft Argentina & Uruguay

SQL Server Pre Lanzamiento. Federico Marty. Mariano Kovo. Especialista en Plataforma de Aplicaciones Microsoft Argentina & Uruguay 2016 Pre Lanzamiento Federico Marty Especialista en Plataforma de Aplicaciones Microsoft Argentina & Uruguay Mariano Kovo Especialista en Precision IT 2016: Everything built-in built-in built-in built-in

More information

Understanding the latent value in all content

Understanding the latent value in all content Understanding the latent value in all content John F. Kennedy (JFK) November 22, 1963 INGEST ENRICH EXPLORE Cognitive skills Data in any format, any Azure store Search Annotations Data Cloud Intelligence

More information

IBM Security Guardium Analyzer

IBM Security Guardium Analyzer IBM Guardium Analyzer Highlights Assess security & compliance risk associated with GDPR data Find GDPR data across onpremises and cloud databases Scan for database vulnerabilities Leverage next-generation

More information

SQL 2016 Performance, Analytics and Enhanced Availability. Tom Pizzato

SQL 2016 Performance, Analytics and Enhanced Availability. Tom Pizzato SQL 2016 Performance, Analytics and Enhanced Availability Tom Pizzato On-premises Cloud Microsoft data platform Transforming data into intelligent action Relational Beyond relational Azure SQL Database

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

Data 101 Which DB, When Joe Yong Sr. Program Manager Microsoft Corp.

Data 101 Which DB, When Joe Yong Sr. Program Manager Microsoft Corp. 17-18 March, 2018 Beijing Data 101 Which DB, When Joe Yong Sr. Program Manager Microsoft Corp. The world is changing AI increased by 300% in 2017 Data will grow to 44 ZB in 2020 Today, 80% of organizations

More information

CAN MICROSOFT HELP MEET THE GDPR

CAN MICROSOFT HELP MEET THE GDPR CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com

More information

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway

Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway Accelerate GDPR compliance with the Microsoft Cloud Ole Tom Seierstad National Security Officer Microsoft Norway This presentation is intended to provide an overview of GDPR and is not a definitive statement

More information

IBM services and technology solutions for supporting GDPR program

IBM services and technology solutions for supporting GDPR program IBM services and technology solutions for supporting GDPR program 1 IBM technology solutions as key enablers - Privacy GDPR Program Work-stream IBM software 2.1 Privacy Risk Assessment and Risk Treatment

More information

Microsoft Security Management

Microsoft Security Management Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their

More information

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the

More information

Randy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED

Randy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED Randy Pagels Sr. Developer Technology Specialist DX US Team rpagels@microsoft.com AZURE PRIMED 2016.04.11 Interactive Data Analytics Discover the root cause of any app performance behavior almost instantaneously

More information

SQL Server on Linux and Containers

SQL Server on Linux and Containers http://aka.ms/bobwardms https://github.com/microsoft/sqllinuxlabs SQL Server on Linux and Containers A Brave New World Speaker Name Principal Architect Microsoft bobward@microsoft.com @bobwardms linkedin.com/in/bobwardms

More information

SQL Organizational Security & Compliance. George Walters Senior Technical Evangelist for ISV Partners

SQL Organizational Security & Compliance. George Walters Senior Technical Evangelist for ISV Partners Organizational Security & Compliance SQL 2012-2017 George Walters Senior Technical Evangelist for ISV Partners george.walters@microsoft.com @gwalters69 on twitter Why is security important? 4 Progress

More information

Azure SQL Database Training. Complete Practical & Real-time Trainings. A Unit of Sequel Gate Innovative Technologies Pvt. Ltd.

Azure SQL Database Training. Complete Practical & Real-time Trainings. A Unit of Sequel Gate Innovative Technologies Pvt. Ltd. Azure SQL Database Training Complete Practical & Real-time Trainings A Unit of Sequel Gate Innovative Technologies Pvt. Ltd. AZURE SQL / DBA Training consists of TWO Modules: Module 1: Azure SQL Database

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information

Sponsored by Oracle. SANS Institute Product Review: Oracle Audit Vault. March A SANS Whitepaper. Written by: Tanya Baccam

Sponsored by Oracle. SANS Institute Product Review: Oracle Audit Vault. March A SANS Whitepaper. Written by: Tanya Baccam Sponsored by Oracle SANS Institute Product Review: Oracle Audit Vault March 2012 A SANS Whitepaper Written by: Tanya Baccam Product Review: Oracle Audit Vault Page 2 Auditing Page 2 Reporting Page 4 Alerting

More information

SQL Server Evolution. SQL 2016 new innovations. Trond Brande

SQL Server Evolution. SQL 2016 new innovations. Trond Brande SQL Server Evolution SQL 2016 new innovations Trond Brande SQL Server 2016 Editions Enterprise Express SMALL-SCALE DATABASES Development and management tools Easy backup and restore to Microsoft Azure

More information

Security Readiness Assessment

Security Readiness Assessment Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

28 February 1 March 2018, Trafo Baden. #techsummitch

28 February 1 March 2018, Trafo Baden. #techsummitch #techsummitch 28 February 1 March 2018, Trafo Baden #techsummitch marko.hotti@microsoft.com #techsummitch E V O L U T I O N O F S Q L S E R V E R Businesses are embracing choice Microsoft is delivering

More information

Data Privacy and Protection GDPR Compliance for Databases

Data Privacy and Protection GDPR Compliance for Databases Data Privacy and Protection GDPR Compliance for Databases Walo Weber, Senior Sales Engineer September, 2016 Agenda GDPR: who, what, why, when Requirements for databases Discovery Classification Masking

More information

Accelerate GDPR compliance with the Microsoft Cloud

Accelerate GDPR compliance with the Microsoft Cloud Regional Forum on Cybersecurity in the Era of Emerging Technologies & the Second Meeting of the Successful Administrative Practices -2017 Cairo, Egypt 28-29 November 2017 Accelerate GDPR compliance with

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Index. Pranab Mazumdar, Sourabh Agarwal, Amit Banerjee 2016 P. Mazumdar et al., Pro SQL Server on Microsoft Azure, DOI /

Index. Pranab Mazumdar, Sourabh Agarwal, Amit Banerjee 2016 P. Mazumdar et al., Pro SQL Server on Microsoft Azure, DOI / Index A Azure Active Directory (AAD), 17 Azure architecture compute, 20 fault domain, 31 IaaS, 19 models classic deployment model, 32 deployment automation, 34 RBAC, 33 Resource Manager deployment model,

More information

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate

More information

Fabrizio Patriarca. Come creare valore dalla GDPR

Fabrizio Patriarca. Come creare valore dalla GDPR Fabrizio Patriarca Come creare valore dalla GDPR Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data

More information

Windows Server The operating system

Windows Server The operating system Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2, IT Security Training MS-500: Microsoft 365 Security Administration $2,595.00 4 Days Upcoming Dates Course Description Day 1: Managing Microsoft 365 Identity and Access (MS-500T01-A) Help protect against

More information

Managing Microsoft 365 Identity and Access

Managing Microsoft 365 Identity and Access Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential

More information

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting Microsoft Cloud Evangelist at Patriot Consulting Principal Systems Architect with 17 Years of experience Technical certifications: MCSE, MCITP Office

More information

Welcome to IBM Security Guardium Analyzer!

Welcome to IBM Security Guardium Analyzer! Welcome to IBM Security Guardium Analyzer! To help you get started with IBM Security Guardium Analyzer, please refer to these frequently asked questions: What is IBM Security Guardium Analyzer? Guardium

More information

The Pathway to the Cloud Using Azure SQL Managed Instance

The Pathway to the Cloud Using Azure SQL Managed Instance 1 Sales Order Management Product Manuals 2 Agility Assurance (Security) Efficiency Experience (Apps) Business Growth 3 Catalog Existing application Define criteria for moving to or starting applications

More information

A Security Admin's Survival Guide to the GDPR.

A Security Admin's Survival Guide to the GDPR. A Security Admin's Survival Guide to the GDPR www.manageengine.com/log-management Table of Contents Scope of this guide... 2 The GDPR requirements that need your attention... 2 Prep steps for GDPR compliance...

More information

Comprehensive Database Security

Comprehensive Database Security Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

McAfee MVISION Cloud. Data Security for the Cloud Era

McAfee MVISION Cloud. Data Security for the Cloud Era McAfee MVISION Cloud Data Security for the Cloud Era McAfee MVISION Cloud protects data where it lives today, with a solution that was built natively in the cloud, for the cloud. It s cloud-native data

More information

Symantec Endpoint Protection Family Feature Comparison

Symantec Endpoint Protection Family Feature Comparison Symantec Endpoint Protection Family Feature Comparison SEP SBE SEP Cloud SEP Cloud SEP 14.2 Device Protection Laptop, Laptop Laptop, Tablet Laptop Tablet & & Smartphone Smartphone Meter Per Device Per

More information

GUIDE. Navigating the General Data Protection Regulation Mini Guide

GUIDE. Navigating the General Data Protection Regulation Mini Guide GUIDE Navigating the General Data Protection Regulation Mini Guide Introduction The General Data Protection Regulation (GDPR) will deliver a long overdue modernization and harmonization of privacy and

More information

Closing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies. Ronit Reger, Senior Program Manager at Microsoft

Closing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies. Ronit Reger, Senior Program Manager at Microsoft Closing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies Ronit Reger, Senior Program Manager at Microsoft Session goals 1. Data Privacy and the GDPR - Data privacy as a

More information

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer

Netwrix Auditor. Visibility platform for user behavior analysis and risk mitigation. Mason Takacs Systems Engineer Netwrix Auditor Visibility platform for user behavior analysis and risk mitigation Mason Takacs Systems Engineer Agenda Product Overview Product Demonstration Q&A About Netwrix Auditor Netwrix Auditor

More information

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY

HCX SERVER PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF & TECHNICAL FEATURES SUMMARY PRODUCT BRIEF A SERVER OPTIMIZED FOR A HYBRID WORLD The HCX Server is a Windows Server pre-bundled with integrated core IT services designed for small and midsize

More information

Architecting Microsoft Azure Solutions (proposed exam 535)

Architecting Microsoft Azure Solutions (proposed exam 535) Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and

More information

GDPR Controls and Netwrix Auditor Mapping

GDPR Controls and Netwrix Auditor Mapping GDPR Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About GDPR The General Data Protection Regulation (GDPR) is a legal act of the European Parliament and the Council (Regulation

More information

align security instill confidence

align security instill confidence align security instill confidence cyber security Securing data has become a top priority across all industries. High-profile data breaches and the proliferation of advanced persistent threats have changed

More information

GDPR: An Opportunity to Transform Your Security Operations

GDPR: An Opportunity to Transform Your Security Operations GDPR: An Opportunity to Transform Your Security Operations McAfee SIEM solutions improve breach detection and response Is your security operations GDPR ready? General Data Protection Regulation (GDPR)

More information

Identity & Access Management

Identity & Access Management Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY

More information

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER Cloud Data Warehouse Security HOW SNOWFLAKE SETS THE STANDARD The threat of a data security breach, someone gaining unauthorized access to an organization s data, is what keeps CEOs and CIOs awake at night.

More information

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY SOLUTION OVERVIEW BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY Every organization is exploring how technology can help it disrupt current operating models, enabling it to better serve

More information

WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES?

WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES? WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES? Timothy P. McAliley CISA, CISM, CISSP, ITIL V3, MCSA, MCSE, MCT, PMP Microsoft Account Technology Strategist Try It Yourself! Two TechNet Virtual Labs

More information

Move Cyber Threats On To Another Target. Encrypt Everything, Everywhere. Imam Sheikh Director, Product Management Vormetric

Move Cyber Threats On To Another Target. Encrypt Everything, Everywhere. Imam Sheikh Director, Product Management Vormetric Move Cyber Threats On To Another Target Encrypt Everything, Everywhere Imam Sheikh Director, Product Management Vormetric State of the Market Evolving Threats Today s spectrum of Insider Threats TRADITIONAL

More information

Mitigating Risks with Cloud Computing Dan Reis

Mitigating Risks with Cloud Computing Dan Reis Mitigating Risks with Cloud Computing Dan Reis Director of U.S. Product Marketing Trend Micro Agenda Cloud Adoption Key Characteristics The Cloud Landscape and its Security Challenges The SecureCloud Solution

More information

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002 ISO 27002 COMPLIANCE GUIDE How Rapid7 Can Help You Achieve Compliance with ISO 27002 A CONTENTS Introduction 2 Detailed Controls Mapping 3 About Rapid7 8 rapid7.com ISO 27002 Compliance Guide 1 INTRODUCTION

More information

Crash course in Azure Active Directory

Crash course in Azure Active Directory Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.

More information

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops.

Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. George Gerchow, Sumo Logic Chief Information Security Officer Cloud is the 'Only' Way Forward in Information Security. Leveraging Scale to Make the Unknown Known, in Dev, Sec & Ops. Agenda Sumo Security

More information

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling

More information

PROTECT AND AUDIT SENSITIVE DATA

PROTECT AND AUDIT SENSITIVE DATA PROTECT AND AUDIT SENSITIVE DATA Teleran Data and Compliance KEY FEATURES Monitors user, application, query and data usage activity Enforces data access policies in real-time Alerts staff in real-time

More information

Database Centric Information Security. Speaker Name / Title

Database Centric Information Security. Speaker Name / Title Database Centric Information Security Speaker Name / Title The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS

SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS SHAREPOINT 2016 ADMINISTRATOR BOOTCAMP 5 DAYS WHY TAKE 10 DAYS AWAY FROM THE OFFICE WHEN YOU ONLY NEED 5? Need to gain knowledge for both the 203391 Planning and Administering Microsoft SharePoint 2016

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite McAfee Public Cloud Server Security Suite Comprehensive security for AWS and Azure cloud workloads As enterprises shift their data center strategy to include and often lead with public cloud server instances,

More information

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT Introduction Amazon Web Services (AWS) provides Infrastructure as a Service (IaaS) cloud offerings for organizations. Using AWS,

More information

Private Cloud Database Consolidation Alessandro Bracchini Sales Consultant Oracle Italia

Private Cloud Database Consolidation Alessandro Bracchini Sales Consultant Oracle Italia Private Cloud Database Consolidation Alessandro Bracchini Sales Consultant Oracle Italia Private Database Cloud Business Drivers Faster performance Resource management Higher availability Tighter security

More information

VMware, SQL Server and Encrypting Private Data Townsend Security

VMware, SQL Server and Encrypting Private Data Townsend Security VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! Compliance, standards, and best practices! Encryption and

More information

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help

WHITE PAPER. The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help WHITE PAPER The General Data Protection Regulation: What Title It Means and How SAS Data Management Can Help ii Contents Personal Data Defined... 1 Why the GDPR Is Such a Big Deal... 2 Are You Ready?...

More information

5/24/ MVP SQL Server: Architecture since 2010 MCT since 2001 Consultant and trainer since 1992

5/24/ MVP SQL Server: Architecture since 2010 MCT since 2001 Consultant and trainer since 1992 2014-05-20 MVP SQL Server: Architecture since 2010 MCT since 2001 Consultant and trainer since 1992 @SoQooL http://blog.mssqlserver.se Mattias.Lind@Sogeti.se 1 The evolution of the Microsoft data platform

More information

Security

Security Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from

More information

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across

More information

Private Cloud Database Consolidation Name, Title

Private Cloud Database Consolidation Name, Title Private Cloud Database Consolidation Name, Title Agenda Cloud Introduction Business Drivers Cloud Architectures Enabling Technologies Service Level Expectations Customer Case Studies Conclusions

More information

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018

GDPR How to Comply in an HPE NonStop Environment. Steve Tcherchian GTUG Mai 2018 GDPR How to Comply in an HPE NonStop Environment Steve Tcherchian GTUG Mai 2018 Agenda About XYPRO What is GDPR Data Definitions Addressing GDPR Compliance on the HPE NonStop Slide 2 About XYPRO Inc. Magazine

More information

Securing Your Most Sensitive Data

Securing Your Most Sensitive Data Software-Defined Access Securing Your Most Sensitive Data Company Overview Digital Growth Means Digital Threats Digital technologies offer organizations unprecedented opportunities to innovate their way

More information

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017 ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS December 1, 2017 Table of Contents Oracle Managed Security Database Encryption Service for Oracle IaaS... 3 Oracle Managed Security Database

More information

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION The process of planning and executing SQL Server migrations can be complex and risk-prone. This is a case where the right approach and

More information

Understand & Prepare for EU GDPR Requirements

Understand & Prepare for EU GDPR Requirements Understand & Prepare for EU GDPR Requirements The information landscape has changed significantly since the European Union (EU) introduced its Data Protection Directive in 1995 1 aimed at protecting the

More information

Watson Developer Cloud Security Overview

Watson Developer Cloud Security Overview Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for

More information

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations

Compliance Brief: The National Institute of Standards and Technology (NIST) , for Federal Organizations VARONIS COMPLIANCE BRIEF NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) 800-53 FOR FEDERAL INFORMATION SYSTEMS CONTENTS OVERVIEW 3 MAPPING NIST 800-53 CONTROLS TO VARONIS SOLUTIONS 4 2 OVERVIEW

More information

Go mobile. Stay in control.

Go mobile. Stay in control. Go mobile. Stay in control. Enterprise Mobility + Security Jeff Alexander Sr. Technical Evangelist http://about.me/jeffa36 Mobile-first, cloud-first reality 63% 80% 0.6% Data breaches Shadow IT IT Budget

More information

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] s@lm@n IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ] Question No : 1 What lists of key words tell you a prospect is looking to buy a SIEM or Log Manager Product?

More information

EXPLORE MICROSOFT SHAREPOINT SERVER 2016 AND BEYOND #ILTAG70

EXPLORE MICROSOFT SHAREPOINT SERVER 2016 AND BEYOND #ILTAG70 EXPLORE MICROSOFT SHAREPOINT SERVER 2016 AND BEYOND #ILTAG70 EXPLORE MICROSOFT SHAREPOINT SERVER 2016 In this session, we ll cover: Mike Ammerlaan Director Office Ecosystem Microsoft SharePoint Server

More information

Javier Villegas. Azure SQL Server Managed Instance

Javier Villegas. Azure SQL Server Managed Instance Javier Villegas Azure SQL Server Managed Instance Javier Villegas DBA Manager at Mediterranean Shipping Company Involved with the Microsoft SQL Server since SQL Server 6.5 Specialization in SQL Server

More information

CLOUD WORKLOAD SECURITY

CLOUD WORKLOAD SECURITY SOLUTION OVERVIEW CLOUD WORKLOAD SECURITY Bottom line: If you re in IT today, you re already in the cloud. As technology becomes an increasingly important element of business success, the adoption of highly

More information

<Insert Picture Here> Oracle Database Security

<Insert Picture Here> Oracle Database Security Oracle Database Security Ursula Koski Senior Principal Architect ursula.koski@oracle.com Ursula Koski Senior Principal Architect Senior Principal Architect Oracle User Group Liaison

More information

The Freedom to Choose

The Freedom to Choose Anat Dror The Freedom to Choose Choosing between SQL Server offerings Anat Dror SQL Server Expert, Quest SQL Server and DB2 domain expert with over 20 years of experience in a long list of IT related roles.

More information

Oracle Audit Vault Implementation

Oracle Audit Vault Implementation Oracle Audit Vault Implementation For SHIPPING FIRM Case Study Client Company Profile It has been involved in banking for over 300 years. It operates in over 50 countries with more than 1, 47,000 employees.

More information

McAfee Total Protection for Data Loss Prevention

McAfee Total Protection for Data Loss Prevention McAfee Total Protection for Data Loss Prevention Protect data leaks. Stay ahead of threats. Manage with ease. Key Advantages As regulations and corporate standards place increasing demands on IT to ensure

More information

PCS Cloud Solutions. Create highly-available, infinitely-scalable applications and APIs

PCS Cloud Solutions. Create highly-available, infinitely-scalable applications and APIs PCS Cloud Solutions Create highly-available, infinitely-scalable applications and APIs Develop, package, and deploy powerful applications and services to the cloud with Cloud Services and the click of

More information

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer

Netwrix Auditor. Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer Netwrix Auditor Know Your Data. Protect What Matters. Roy Lopez Solutions Engineer Agenda Company overview Briefly about Netwrix Auditor Netwrix Auditor Data Discovery and Classification Edition Product

More information

Database Security Service. Service Overview. Issue 16 Date HUAWEI TECHNOLOGIES CO., LTD.

Database Security Service. Service Overview. Issue 16 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 16 Date 2019-03-08 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Transforming Security Part 2: From the Device to the Data Center

Transforming Security Part 2: From the Device to the Data Center SESSION ID: SP01-R11 Transforming Security Part 2: From the Device to the Data Center John Britton Director, EUC Security VMware @RandomDevice The datacenter as a hospital 3 4 5 Digital transformation

More information

Oracle Database 18c and Autonomous Database

Oracle Database 18c and Autonomous Database Oracle Database 18c and Autonomous Database Maria Colgan Oracle Database Product Management March 2018 @SQLMaria Safe Harbor Statement The following is intended to outline our general product direction.

More information