|
|
- Tracy Bates
- 6 years ago
- Views:
Transcription
1
2 Wolfgang Epting: Testdaten versteckte Geschäftschance oder immanentes Sicherheitsrisiko?
3 Test Data Management: Testing Matters Testing is not noticed when it goes well Challenges and Costs Production Defects Missing Data for Testing Blown Budgets 8-12 Copies of Production Old, irrelevant Test data Testing is 30-40% of the Application Development Cycle Testing Defects Missed Deadlines Data Breach Risk
4 Agile Development Needs Test Data Management The Majority of Application Development Lifecycles are Spend on Development Tasks
5 Agile Development Customer Challenges Priority Challenge Cause Delivery Schedules Delays, unreliable schedules Lengthy test data provisioning processes Application Quality Data Security Poor, High Error Rates Sensitive or private information is exposed to test teams, consultants and outsourcers Poor quality test data Production data is often used in test / development Budget Overruns Exceeding costs Resource intensive manual test data processes 4
6 Test Data is Not Immune
7 Estimated Cost Examples for TDM Based on interviews with Informatica partners and SMEs (1bil+ org) Manual Project Testers Iterations Hours Burdened Labor Test Total TDG Only $150 $14,400,000 $1,440,000 Automated Project Testers Iterations Hours Burdened Labor Test Total TDG Only $150 $10,080,000 $1,008,000 6
8 Business Solution: Test Data Management (TDM) IT organizations need a solution that can speed testing cycles by automatically creating and provisioning test data with high precision; without introducing risk by protecting sensitive and private information. Test Data Subset Test Data Generation Secure and speed application development times Production data is analyzed for sensitive data and then masked to ensure that data privacy is not compromised in test systems. TDM eliminates the need for full production copies by allowing testers to create fully-functional data subsets at lower costs. 7
9 Informatica Secure Testing Solution Architecture DISCOVER Relationships Keys Sensitive Data Informatica Test Tool Integration Production Custom Apps Library of Test Data Sets Self-Service Test Data Provisioning Dev Test Train Synthetic Test Data Informatica Test Data Generation Informatica Test Data Warehouse Informatica Persistent Data Masking Informatica Data Subset Informatica Test Data Management
10 Purpose Built Solution Maximizes Productivity Role Specific Tools, Task Specific Interfaces Define Compliance Officers Business Analysts Compliance Officers Application Administrators Measure and Monitor Data Governance Discover Data Analysts Auditors Application Owners & Administrators Apply 9
11 Define Enterprise Masking Policies Define Sensitive Data & Remediation Plan Measure and Monitor Define Data Governance Discover Compliance, Privacy and Security Officers Business Analysts Apply Standardize policies across the enterprise with predefined packs for PII, PCI, and PHI Accelerate deployments with standard data domains, element definitions and preferred masking rules
12 Discover Sensitive Data and Table Relationships Measure and Monitor Define Data Governance Discover Data Analysts, Architects Auditors Assess exposure by thoroughly identifying all sensitive data Improve user productivity with automated discovery-- predefined patterns, data domains, Natural Language Processing, etc. Apply Auto-learned Data Relationships and Model
13 Informatica Persistent Data Masking Protect Sensitive Information in Nonproduction Permanently alter sensitive data such as credit cards, address information, or names Variety of Techniques: Shuffle Employee ID s Substitute Names Constant for City Special Credit Card Technique ID Name City Credit Card 0964 John Smith Plano Mark Jones Rob Davis Jeff Richards Modesto Hartford Tampa
14 Data Masking Cascade Masked values cascade to all related tables and fields 1. Process main table and create crossreference 2. Cascade changes to child tables 3. Cascade changes to related tables 4. Cascade changes to cluster database tables (mainly HR) PCL2 (HR Cluster 2) RELID SRTFD CLUSTD RU RU RU RU PA0002 (personal data) PERNR NACHN VORNA 1221 Smith Jeff 222 Jones Mike 3223 Washington Tina 4224 Jenkins Janet PA0003 (payroll status) PERNR SUBTY OBJPS C a s c a d e BSEG (Accounting Line Item) BUKRS BELNR PERNR RU RU RU RU
15 Test Data Management Execute Masking and Subset Jobs Original Source Masked and Subsetted Target Create Environments as Needed Etc. Universal Connectivity Application Administrator
16 Audit Data Masking Results Set up independent masking validation rules Complete the audit process by proving that sensitive values have changed Ensure that formats are preserved Validate that data comes from a dictionary of values Validate that no original values exist in the masked database
17 Test Data Generation Getting Good Data to Test New tables related to the functionality have no data in production Data needs to be generated and related to existing PROD data New Functionality Access to production is limited by IT policies Test Data Generation Existing capabilities rolled out to new markets Data specific to new markets needs to be generated and related to existing PROD data No Access to PROD PROD Data not Representative 16 1
18 Without Test Data Warehouse Full Data Set (Masked) Product_id P1 P2 P3 P4 P5 P6 P7 Product Name Benz BMW Toyota Ford GM VW Audi Test Team One Identify Data Set Run Tests Update/Insert Data Record Results Request Database Refresh Order_ID O1 O2 O3 O4 O5 O6 O99 Order_Status Shipped In-Process Shipped Open In-Process Cancelled Shipped Order_ Line_ID Order_ID Product_Id OL1 O1 P1 OL2 O2 P2 OL3 O3 P3 OL4 O4 P1 OL5 O5 P7 Need to avoid collisions amongst teams Provision full database copies per team (virtual or physical) Refresh full databases to reset a small amount of data No ability to have metadata descriptions attached to test data sets 17
19 With Test Data Warehouse Full Data Set (Masked) Product_id P1 P2 P3 P4 P5 P6 P7 Order_ID O1 O2 O3 O4 O5 O6 O99 Product Name Benz BMW Toyota Ford GM VW Audi Order_Status Shipped In-Process Shipped Open In-Process Cancelled Delivered Order_ Line_ID Order_ID Product_Id OL1 O1 P1 OL2 O2 P2 OL3 O3 P3 OL4 O4 P1 OL5 O5 P7 Test Team One Test Team Two Identify Data Sets Run Tests Update/Insert Data Record Results Test Data Reset - weekly Identify Version Run Tests No Updates Record Results Test Data Reset - quarterly 18
20
21 Informatica Secure Testing Platform Test Data Management Dynamic Data Masking Production Sensitive Data Discovery Persistent Data Masking Non-Production Dev Test Risk & Compliance Officers Offshore, Outsourced Test Data Subset UAT Test Data Generation Train Testers Developers Trainers Cloud Test Tool Integration HP ALM Test Data Warehouse DBA & Infrastructure Managers
22 TDM Factory Design Importance of Repeatable Processes Data Masking and Data Subset is Not a Once-and-Done Project Raw Material Finished Goods TDM Factory Holistic, Timely Authoritative, Secure Application Data Create your process Define your masking rules Define your subset templates Test on a subset of the data Test to ensure that your processes work as you build them Continually improve the process based on the feedback
23 Data Masking On Hadoop v9.7 Use Cases (1) Persistent masking during import process: a) For Structured Data b) For Semi-structured Data (4) Persistent masking during export process: a) For Structured Data b) For Semi-structured Data (2) Persistent masking of sensitive data in Hadoop: a) For Analytics b) Data Provisioning c) Test Data (3) Dynamic masking of sensitive data in Hadoop based on user role.
24 Data Masking and Subset for salesforce.com Secure and Populate Sandbox Copies Masks existing SFDC sandbox environments Ensures data privacy Populate empty sandboxes Out of the box data masking rules Minimal options for speed of deployment Create test data sets for sandboxes Rationalize existing SFDC investment 23
25 Insurance company complies with GDV Code of Conduct mandate to protect insured sensitive data KEY BUSINESS IMPERATIVE AND IT INITIATIVE Business Imperative: Guarantee Security and Privacy are taken into account in the design and processing of products and services IT Initiative: Test Data Management for Secure Test Environments THE CHALLENGE Compliance with German Code of Conduct for PII, PHI and banking information Compliance to be achieved by January 2016 Multiple systems to be protected including SAP and Mainframe integrations INFORMATICA ADVANTAGE Out-of-the-box data masking packs to be applied in both SAP and mainframe environment Consistently mask sensitive data across multiple applications. Ability to handle complexity in data models (SAP ~ tables) Connectivity to all required data sources including Oracle, DB2, VSAM and IMS RESULTS/BENEFITS Comply with GDV Code of Conduct 12 months prior to deadline Consistently, reliably, and quickly mask sensitive data Create a consistent test environment with multiple systems (SAP and Mainframe) Go live with complete scope in 9 months
26 Global Team of 700 Testers Benefit from Instantaneous Quality Test Data KEY BUSINESS IMPERATIVE AND IT INITIATIVE Business Imperative: Enable testing teams across the globe to self provision test data securely and on-demand IT Initiative: Enterprise Test Data Management Platform and Center of Excellence THE CHALLENGE Global team of 700+ testers including employees, contractors and consultants need test data faster Need to adhere to strict data privacy regulations Needed a platform that would work across integrated new and legacy applications INFORMATICA ADVANTAGE Works across all applications Integrated data masking Ability to handle complexity Enabled consistent and repeatable test data sets RESULTS/BENEFITS Test data that was available in 10 days is now available instantaneously Saved $2.2M with first application Went live in 5 months
27 Questions
28 27
Test Data Management for Security and Compliance
White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
More informationCA Test Data Manager Key Scenarios
WHITE PAPER APRIL 2016 CA Test Data Manager Key Scenarios Generate and secure all the data needed for rigorous testing, and provision it to highly distributed teams on demand. Muhammad Arif Application
More informationApplication Information Lifecycle Management Control Both the Size of Your Data and the Cost of Managing It
Application Information Lifecycle Management Control Both the Size of Your Data and the Cost of Managing It Data volume isn t just growing it s exploding. The amount of data housed in large data warehouses
More informationProtecting Sensitive Data Using Informatica s Test Data Management Solution Denise Jeffries Director Data Warehouse
Protecting Sensitive Using Informatica s Test Management Solution Denise Jeffries Director Warehouse Karen Hsu Director Product Marketing 2 Agenda Trends & Challenges Privacy Best Practices Methodology
More informationOracle Data Masking and Subsetting
Oracle Data Masking and Subsetting Frequently Asked Questions (FAQ) S E P T E M B E R 2 0 1 6 Product Overview Q: What is Data Masking and Subsetting? A: Data Masking or Static Data Masking is the process
More informationSOLUTION BRIEF CA TEST DATA MANAGER FOR HPE ALM. CA Test Data Manager for HPE ALM
SOLUTION BRIEF CA TEST DATA MANAGER FOR HPE ALM CA Test Data Manager for HPE ALM Generate all the data needed to deliver fully tested software, and export it directly into Hewlett Packard Enterprise Application
More informationOptim. Optim Solutions, Benefits and Value Propositions. Kari Hirvonen - SoftwareGroup/Techsales IBM Finland
Optim Solutions, Benefits and Value Propositions Kari Hirvonen - SoftwareGroup/Techsales IBM Finland Template Documentation 29/10/2008 Optim Solutions 1. Data Growth Solution (Archiving) 4. Database consolidation
More informationBrochure. Data Masking. Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems
Brochure Data Masking Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems How Can Your IT Organization Protect Data Privacy? The High Cost of Data Breaches It s estimated that
More informationidiscover RELATIONSHIPS Next find any documented relationships (database level). Ex., foreign keys
idiscover Discover Accurately In every implementation without exception, MENTIS has found unprotected data in tens to hundreds, and in some cases, thousands of undocumented locations. If you aren t finding
More informationCA ERwin Data Profiler
PRODUCT BRIEF: CA ERWIN DATA PROFILER CA ERwin Data Profiler CA ERWIN DATA PROFILER HELPS ORGANIZATIONS LOWER THE COSTS AND RISK ASSOCIATED WITH DATA INTEGRATION BY PROVIDING REUSABLE, AUTOMATED, CROSS-DATA-SOURCE
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationData Protection. Plugging the gap. Gary Comiskey 26 February 2010
Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationDataView Suite. The Face to your Test Data. Call: » L5, 14 Martin Place, Sydney, NSW,
View Suite The Face to your Test www.enov8.com Call: +61 2 8916 6391» L5, 14 Martin Place, Sydney, NSW, 2000 1 Requirements Capture E8* View Profiling E8* HotSpot Extract Transform Subset Transform Privatize
More informationSelling Improved Testing
Selling Improved Testing Reducing Customer Pain Technology Advance Partners Technology Advance Partners is a software services consulting firm with deep experience in Information Technology management,
More informationEmbedding Privacy by Design
Embedding Privacy by Design Metric Stream Customer Conference May 12, 2015 TRUSTe Data Privacy Management Solutions 1 Today s Agenda Privacy in the Context of GRC Data Privacy Management and Top Privacy
More informationIBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT
IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the
More informationAppScan Deployment APPLICATION SECURITY SERVICES. Colin Bell. Applications Security Senior Practice Manager
APPLICATION SECURITY SERVICES AppScan Deployment Colin Bell Applications Security Senior Practice Manager Copyright 2017 HCL Products & Platforms www.hcltech.com The Evolution of Devops 2001 - Continuous
More informationOptim. Optim Solutions for Data Governance. R. Kudžma Information management technical sales
Optim Solutions for Data Governance R. Kudžma Information management technical sales kudzma@lt.ibm.com IBM Software Group 10/23/2009 2008 IBM Corporation What is Data Governance Data Governance is the
More informationWHITE PAPER. Moving Fragmented Test Data Management Towards a Centralized Approach. Abstract
WHITE PAPER Moving Fragmented Test Data Management Towards a Centralized Approach Abstract Test Data Management (TDM) ensures managing test data requests in an automated way to ensure a high degree of
More informationYour organization asks more of its SAP systems every day. At the same time, your team is required
Data Sync Manager Fast, powerful and secure SAP data copying Your organization asks more of its SAP systems every day. At the same time, your team is required to do more with fewer resources and less time,
More informationModern Database Architectures Demand Modern Data Security Measures
Forrester Opportunity Snapshot: A Custom Study Commissioned By Imperva January 2018 Modern Database Architectures Demand Modern Data Security Measures GET STARTED Introduction The fast-paced, ever-changing
More informationIBM s Integrated Data Management Solutions for the DBA
Information Management IBM s Integrated Data Management Solutions for the DBA Stop Stressing and Start Automating! Agenda Daily Woes: Trials and tribulations of the DBA Business Challenges: Beyond the
More informationThe Truth About Test Data Management & Its Impact on Agile Development
The Truth About Test Data Management & Its Impact on Agile Development The Truth About Test Data Management and its Impact on Agile Development Despite the agile methods and automated functionality you
More informationNicman Group Test Data Management 2.0 Leveraging Copy Data Virtualization Technology in QA for SQuAD. November 2016
Nicman Group Test Data Management 2.0 Leveraging Copy Data Virtualization Technology in QA for SQuAD November 2016 Agenda Test Data Management 2.0 Leveraging Copy Data Virtualization Technology in QA Copy
More informationQuality Assurance and IT Risk Management
Quality Assurance and IT Risk Deutsche Bank s QA and Testing Transformation Journey Michael Venditti Head of Enterprise Testing Services, Deutsche Bank IT RISK - REGULATORY GOVERNANCE Major shifts in the
More informationActifio Test Data Management
Actifio Test Data Management Oracle MS SQL Faster Time To Market Start Release Time To Market (TTM) Finish Faster App Releases Faster Application Releases Faster TTM Increases Revenue Market Share Competitive
More informationPut Security Into Your DevOps NOW. Or Prepare for the Flood Matthew Fisher Solution Architect, Fortify Federal 08MAR2018
Put Security Into Your DevOps NOW Or Prepare for the Flood Matthew Fisher Solution Architect, Fortify Federal 08MAR2018 Defining Devops State of Devops Report (Puppet, Dora):..set of practices and cultural
More information2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,
2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered
More informationOracle Audit Vault Implementation
Oracle Audit Vault Implementation For SHIPPING FIRM Case Study Client Company Profile It has been involved in banking for over 300 years. It operates in over 50 countries with more than 1, 47,000 employees.
More informationCipherCloud CASB+ Connector for ServiceNow
ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level
More informationData Governance Quick Start
Service Offering Data Governance Quick Start Congratulations! You ve been named the Data Governance Leader Now What? Benefits Accelerate the initiation of your Data Governance program with an industry
More informationEnsuring Compliance with Data Privacy Directives using Virtual Databases
Ensuring Compliance with Data Privacy Directives using Virtual Databases June 2017 Steve Karam, Director of Customer Education and Experience at Delphix Agenda 1 2 3 Ensure compliance to disparate data
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Subsetting and Masking: Advanced Techniques for Test Management Jagan R. Athreya, Director, base and Exadata Manageability Derek Messie,
More informationWHITE PAPER MARCH Automating Data Masking and Reduction for SAP System Copy
WHITE PAPER MARCH 2018 Automating Data Masking and Reduction for SAP System Copy 2 WHITE PAPER AUTOMATING DATA MASKING AND REDUCTION FOR SAP SYSTEM COPY ca.com Table of Contents Executive Summary 3 Section
More informationDiscover Best of Show März 2016, Düsseldorf
Discover Best of Show 2016 2. - 3. März 2016, Düsseldorf Transformation Area: Database Application Optimisation & Archiving mit Structured Data Manager Matthias Binder, Technical Consultant Hewlett Packard
More informationTest Automation for data teams with Tosca BI
Data migration / DWH / BI testing Test Automation for data teams with Tosca BI By Daina Dirmaitė I Nov 13, 2018 Data Testing Challenges 1. Data models and data mapping documents in many ways represent
More informationOrchestrating the Continuous Delivery Process
Orchestrating the Continuous Delivery Process steven.g.harris@cloudbees.com @stevengharris SVP Products, CloudBees 1 Continuous Delivery Overview Feedback Loop App Lifecycle BUILD TEST STAGE Deploy Run
More informationUK Permanent Salary Index November 2013 Based on registered vacancies and actual placements
UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation
More informationIT Audit Process Prof. Liang Yao Week Six IT Audit Planning
Week Six IT Audit Planning IT Audit Planning Process Institute of Internal Audit Standards - Section 2010: Planning The chief audit executive must establish a risk-based plan to determine the priorities
More informationIBM Security Guardium Analyzer
IBM Guardium Analyzer Highlights Assess security & compliance risk associated with GDPR data Find GDPR data across onpremises and cloud databases Scan for database vulnerabilities Leverage next-generation
More informationROTATE TO THE NEW: FROM TESTING TO QUALITY ENGINEERING
ROTATE TO THE NEW: FROM TESTING TO QUALITY ENGINEERING INDUSTRY TRENDS AND PRESSURES IMPACTING QA IT organisations are being impacted by the convergence of three disciplines that were once operated as
More informationIntelligent Data Privacy
White Paper Intelligent Data Privacy Discover, Classify, and Protect Personal and Sensitive Data About Informatica Digital transformation changes expectations: better service, faster delivery, with less
More informationOracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero
Oracle Security Products and Their Relationship to EBS Presented By: Christopher Carriero 1 Agenda Confidential Data in Corporate Systems Sensitive Data in the Oracle EBS What Are the Oracle Security Products
More informationSteps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT.
Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. White Paper Dataguise, Inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., Ste. 260 Fremont, CA 94538 (510)
More informationFabrizio Patriarca. Come creare valore dalla GDPR
Fabrizio Patriarca Come creare valore dalla GDPR Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data
More informationSOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE
HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE PREPARATION FOR GDPR IS ESSENTIAL The EU GDPR imposes interrelated obligations for organizations handling
More informationTest Data Management Data Sheet
Test Data Management Data Sheet 1 K2View TDM: A new approach to test data management Speed up your development cycle by eliminating what makes testing cumbersome, expensive & slow The problem Software
More informationInteract with Mainframe and Non-mainframe Data in a Common, Intuitive Manner
Interact with Mainframe and Non-mainframe Data in a Common, Intuitive Manner Topaz for Enterprise Data, part of the Topaz suite of mainframe development and testing tools, enables developers and data architects
More informationInformatica Enterprise Information Catalog
Data Sheet Informatica Enterprise Information Catalog Benefits Automatically catalog and classify all types of data across the enterprise using an AI-powered catalog Identify domains and entities with
More informationFujitsu digital. Business Value of the Oracle Cloud HYBRID IT. Human Centric Innovation Co-creation for Success 2018 FUJITSU
Fujitsu digital Business Value of the Oracle Cloud HYBRID IT Human Centric Innovation Co-creation for Success 2018 FUJITSU Cloud Adoption Made Easy. Innovation Simplified. Hybrid IT Managed. 1 2018 FUJITSU
More informationPerfect Balance of Public and Private Cloud
Perfect Balance of Public and Private Cloud Delivered by Fujitsu Introducing A unique and flexible range of services, designed to make moving to the public cloud fast and easier for your business. These
More informationCloud Adoption Made Easy.
DRAFT Fujitsu digital Business Value of the Oracle Cloud HYBRID IT Human Centric Innovation Co-creation Cloud Adoption Made Easy. Innovation Simplified. Hybrid IT Managed. for Success Copyright FUJITSU
More informationIn 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.
REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January
More informationSYMANTEC DATA CENTER SECURITY
SYMANTEC DATA CENTER SECURITY SYMANTEC UNIFIED SECURITY STRATEGY Users Cyber Security Services Monitoring, Incident Response, Simulation, Adversary Threat Intelligence Data Threat Protection Information
More informationThe Future of IT Internal Controls Automation: A Game Changer. January Risk Advisory
The Future of IT Internal Controls Automation: A Game Changer January 2018 Risk Advisory Contents Introduction 01 Future Operating Models for Managing Internal Controls 02 Summary 07 Introduction Internal
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationSecurity Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
More informationMOBIUS + ARKIVY the enterprise solution for MIFID2 record keeping
+ Solution at a Glance IS A ROBUST AND SCALABLE ENTERPRISE CONTENT ARCHIVING AND MANAGEMENT SYSTEM. PAIRED WITH THE DIGITAL CONTENT GATEWAY, YOU GET A UNIFIED CONTENT ARCHIVING AND INFORMATION GOVERNANCE
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationEMC Ionix IT Compliance Analyzer Application Edition
DATA SHEET EMC Ionix IT Compliance Analyzer Application Edition Part of the Ionix Data Center Automation and Compliance Family Automatically validates application-related compliance with IT governance
More informationORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017
ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS December 1, 2017 Table of Contents Oracle Managed Security Database Encryption Service for Oracle IaaS... 3 Oracle Managed Security Database
More informationTSC Business Continuity & Disaster Recovery Session
TSC Business Continuity & Disaster Recovery Session Mohamed Ashmawy Infrastructure Consulting Pursuit Hewlett-Packard Enterprise Saudi Arabia Mohamed.ashmawy@hpe.com Session Objectives and Outcomes Objectives
More informationData Privacy and Protection GDPR Compliance for Databases
Data Privacy and Protection GDPR Compliance for Databases Walo Weber, Senior Sales Engineer September, 2016 Agenda GDPR: who, what, why, when Requirements for databases Discovery Classification Masking
More informationIT Consulting and Implementation Services
PORTFOLIO OVERVIEW IT Consulting and Implementation Services Helping IT Transform the Way Business Innovates and Operates 1 2 PORTFOLIO OVERVIEW IT Consulting and Implementation Services IT is moving from
More informationTrustwave Managed Security Testing
Trustwave Managed Security Testing SOLUTION OVERVIEW Trustwave Managed Security Testing (MST) gives you visibility and insight into vulnerabilities and security weaknesses that need to be addressed to
More informationA Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud
A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,
More information11/14/2018. Istanbul Governance, risk, and compliance (GRC)
11/14/2018 Governance, risk, and compliance (GRC) Contents Contents... 4 Policy and Compliance Management...5 Activate Policy and Compliance Management... 6 Dependency modeling and mapping...13 Compliance...
More informationOracle HCM Cloud Common Release 12. What s New
Oracle HCM Cloud Common Release 12 What s New TABLE OF CONTENTS REVISION HISTORY... 4 OVERVIEW... 7 RELEASE FEATURE SUMMARY... 8 HCM COMMON FEATURES... 11 APPLICATIONS SECURITY... 11 User Account Management...
More informationTHE TOP 5 DEVOPS CHALLENGES
W H I T E PA P E R THE TOP 5 DEVOPS CHALLENGES w w w. d e l p h i x. c o m IN MANY ORGANIZATIONS, the key challenge in deploying DevOps is a data management project. IT professionals are familiar with
More informationSECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.
SECURITY REDEFINED Managing risk and securing the business in the age of the third platform 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices
More informationAT FIRST VIEW C U R R I C U L U M V I T A E. Diplom-Betriebswirt (FH) Peter Konrad. Executive Partner Senior Consultant
Our Contact Details IT-SCAN GMBH c/o: DOCK3 Hafenstrasse 25-27 68159 Mannheim E: info@it-scan.de W: www.it-scan.de Nationalität Berufserfahrung C U R R I C U L U M V I T A E Diplom-Betriebswirt (FH) Peter
More informationConverged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products
Converged security Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products Increased risk and wasted resources Gartner estimates more than $1B in
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationSIEMLESS THREAT DETECTION FOR AWS
SOLUTION OVERVIEW: ALERT LOGIC FOR AMAZON WEB SERVICES (AWS) SIEMLESS THREAT DETECTION FOR AWS Few things are as important to your business as maintaining the security of your sensitive data. Protecting
More informationAgile Test Data Management
ebook O V E R C O M I N G L I M I T S Agile Test Data Management - An Emerging Best Practice in Digital Economy Table of Contents Impact of Poorly Managed/Implemented Test Data... 4 Why Does Test Data
More informationData Management and Security in the GDPR Era
Data Management and Security in the GDPR Era Franck Hourdin; Vice President, EMEA Security Russ Lowenthal; Director, Database Security Product Management Mike Turner; Chief Operating Officer, Capgemini
More informationCA Services Partner. Implementation Enablement. Eugene Banks FY18
CA Services Partner Implementation Enablement Eugene Banks FY18 Without partners, CA Services and Education would be unable to scale to meet the growing demands of the business. If our strategy is effective,
More informationORACLE DATABASE LIFECYCLE MANAGEMENT PACK
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
More informationDynamic Data Masking Implementation Best Practices
Dynamic Data Masking Implementation Best Practices 1993-2015 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording
More informationCopyright 2014, Oracle and/or its affiliates. All rights reserved.
1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges
More informationAccelerate High-Quality App Delivery with the Micro Focus DevOps Suite March 28, 2018
Accelerate High-Quality App Delivery with the Micro Focus DevOps Suite March 28, 2018 Today s Speakers: David Landsberg Director of Product Management Micro Focus Ayal Cohen Chief Functional Architect
More informationProtecting Your Data in the Cloud. Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com
Protecting Your Data in the Cloud Ulf Mattsson Chief Technology Officer ulf.mattsson [at] protegrity.com Ulf Mattsson 20 years with IBM Development & Global Services Inventor of 22 patents Encryption and
More informationAnything-as-a-Service. Mike Pilbeam Director of Presales UKI
Anything-as-a-Service Mike Pilbeam Director of Presales UKI 1 The Business Drivers RESPOND FASTER TO DRIVE NEW REVENUE REFOCUS RESOURCES TOWARD BUSINESS VALUE INCREASE AGILITY INCREASE VISIBILITY & CONTROL
More information2018 Database DevOps Survey DBmaestro 1
2018 Database DevOps Survey 2017 DBmaestro 1 Table of Contents Executive Summary... 3 What Percentage of IT Projects in Your Company Use a DevOps Approach?... 4 Integration of DBAs with DevOps Teams...
More informationGDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper
White paper GDPR preparedness with OpenText InfoArchive The new EU privacy law, GDPR, will be in effect in less than a year. OpenText has the solutions to help you prepare and comply to this new law. Contents
More informationTRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE John McDonald 1 What is Trust? Can I trust that my assets will be available when I need them? Availability Critical Assets Security Can I trust
More informationcdsummit Continuous Delivery Seminars Automating the deployment process 9 th September 2014
cdsummit Continuous Delivery Seminars Automating the deployment process 9 th September 2014 A bit about me Co-founder and Director Worked in Deployment Automation Solutions in regulated environments for
More informationMcAfee Database Security
McAfee Database Security Sagena Security Day 6 September 2012 September 20, 2012 Franz Hüll Senior Security Consultant Agenda Overview database security DB security from McAfee (Sentrigo) VMD McAfee Vulnerability
More informationTen Innovative Financial Services Applications Powered by Data Virtualization
Ten Innovative Financial Services Applications Powered by Data Virtualization DATA IS THE NEW ALPHA In an industry driven to deliver alpha, where might financial services firms find opportunities when
More informationExample Architectures for Data Security and the GDPR
White Paper Example Architectures for Data Security and the GDPR Use Cases for Application of Pseudonymization and Encryption to Protect Data Table of Contents Introduction... 3 Technology Considerations
More informationSolving the Enterprise Data Dilemma
Solving the Enterprise Data Dilemma Harmonizing Data Management and Data Governance to Accelerate Actionable Insights Learn More at erwin.com Is Our Company Realizing Value from Our Data? If your business
More informationSnapshot Best Practices: Continuous Integration
Snapshot Best Practices: Continuous Integration Snapshot provides sophisticated and flexible tools for continuously keeping Salesforce accounts, developer projects, and content repositories synchronized.
More informationMartijn Loderus. Merritt Maxim. Principal Analyst Forrester. Director & Global Practice Partner for Advisory Consulting Janrain
Merritt Maxim Principal Analyst Forrester Martijn Loderus Director & Global Practice Partner for Advisory Consulting Janrain Merritt and Martijn will share insights on Digital Transformation & Drivers
More informationProven Integration Strategies for Government
Opening Slide Proven Integration Strategies for Government Larry Singer, Vice President, US State and Local Government and Education Sales Technology for better business outcomes 2007 Hewlett-Packard Development
More informationCloud Computing Risks & Reality. Sandra Liepkalns, CRISC
Cloud Computing Risks & Reality Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from
More informationWays Global FOR RETAIL
5 Ways Global RETAILERS Protect THEIR CUSTOMER Data In the new digital environment, keeping pace with security is the new reality Digital disruption over the last decade has impacted how retailers communicate,
More informationNEW ENGLAND: Connecticut - Maine - Massachusetts - New Hampshire - Rhode Island - Vermont CONTRACTOR: Uwork.com dba Covendis
UWork.com dba Covendis Page 1of 10 NEW ENGLAND: Connecticut - Maine - Massachusetts - New Hampshire - Rhode Island - Vermont CONTRACTOR: Uwork.com dba Covendis Portion of business to Micro/Small/Minority/Woman-owned
More informationForeScout ControlFabric TM Architecture
ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%
More informationOnapsis: The CISO Imperative Taking Control of SAP
Onapsis: The CISO Imperative Taking Control of SAP Cyberattacks @onapsis 2016 Key SAP Cyber-Security Trends Over 95% of the SAP systems we have assessed, were exposed to vulnerabilities that could lead
More information