Performance tuning in SDS VA with a remote DB2 DB

Size: px
Start display at page:

Download "Performance tuning in SDS VA with a remote DB2 DB"

Transcription

1 Performance tuning in SDS VA with a remote DB2 DB IBM SECURITY SUPPORT OPEN MIC PRESENTATION Ramamohan T Reddy - Senior Software Engineer / L2 Team Tech Lead - Directory Support Team Dave Bachmann - STSM / Performance Guru, IBM Security Systems performance Brook Heimbaugh - L3 Team Lead / Tech Lead - Directory Support Team Juan Quema - Software Engineer / L2 Team Member - Directory Support Team Tuesday, 18 April 2017

2 Agenda

3 Agenda SDS Virtual Appliance - Remote Database - Previous Presentations Directory Server Components - Tuning Perspective LDAP Server Caches DB2 Memory Management and Buffer Pools LDAP Server worker threads and DB2 connections Data import / load considerations Data Organization Data Optimization Indexing the attributes used in search filters Additional DB2 tuning Additional performance tuning resources Useful Links Questions for the Panel 3 IBM Security

4 SDS Virtual Appliance - Remote Database - Previous Presentations

5 SDS VA - Remote Database - Previous Presentations Configuring SDS Virtual Appliance with a remote DB2 database Securing communication between SDS VA and its remote DB2 DB Upgrade from SDS 6.4 to SDS 8.01 VA to use existing remote DB2 DB 5 IBM Security

6 Directory Server Components - Tuning Perspective

7 Network Network Directory Server Components - Tuning Perspective Main goal of this presentation is to understand and perform several performance tuning aspects of SDS VA Directory Server with Remote DB. Performance tuning is iterative and periodic task. SDS VA Remote DB2 System LDAP Server DB2 Server Client Applications Filter Cache Entry Cache STMM Instance Memory Database Memory IBM Default Buffer Pool IBMDEFAULTBP (Page Size: 4K) Disks Disks ACL Cache LDAP Buffer Pool LDAPBP (Page Size: 32K) 7 IBM Security

8 LDAP Server Caches

9 LDAP Server Caches Faster data retrieval - Benefits Search operations. ACL Cache: Stores info about access permissions for recently queried entries Entry Cache: Stores ldap entries retrieved from DB2 upon first search/query. Returns the same entry, if unchanged for subsequent searches. Filter Cache: Stores entry IDs that match specific search filters that were previously resolved in DB2 Attribute Cache: Stores configured attributes and their values. Gets used if the filter/entry caches doesn t resolve the results before going to DB2. This feature is deprecated and disabled by default. Group Members Cache: Extension of Entry Cache, stores member and uniquemember attributes. By default 25 groups with 25K members (or less) can be cached Recommendations for dynamic ldap data update environments Default cache settings are better for almost 95% customers. Higher cache sizes may degrade performance due to cache invalidations LDAP caches can be configured either using Web Admin Tool or idsldapmodify with proper ldif. 9 IBM Security

10 LDAP Server Caches Monitor cache utilization using cn=monitor search: sdsva > sds client_tools idsldapsearch -h server -p port -s base Cache related parameters of interest from cn=monitor search: -b cn=monitor objectclass=* filter_cache_size: The maximum number of filters that are supported by the cache. filter_cache_current: The number of filters currently in the cache. filter_cache_hit: The number of filters that are retrieved from the cache rather than being resolved in DB2. filter_cache_miss: The number of filters that were not found in the cache that then needed to be resolved by DB2. filter_cache_bypass_limit: Search filters that return more entries than this limit are not cached. entry_cache_size: The maximum number of entries that are supported by the cache. entry_cache_current: The number of entries currently in the cache. entry_cache_hit: The number of entries that were retrieved from the cache. entry_cache_miss: The number of entries that were not found in cache that then needed to be retrieved from DB2. acl_cache: A boolean value that indicates whether the ACL cache is active (TRUE) or inactive (FALSE). acl_cache_size: The maximum number of entries in the ACL cache. idsmonitor tool is now available on SDSVA Provides repeated cn=monitor searches at regular intervals of time. sdsva > sds client_tools idsmonitor -H <Host IP> -p <port> -D cn=root -w <passwd> -d <delay_in_secs> -o <outputfile> 10 IBM Security

11 DB2 Memory Management and Buffer Pools

12 DB2 Memory Management and Buffer Pools DB by default uses STMM (Self Tuning Memory Manager) Configuration update is required for migrated DB2 instances / databases to enable self tuning memory. The following DB2 memory consumers are automatically tuned: database_memory Database shared memory size buffer pools Number of pages in IBMDEFAULTBP and LDAPBP locklist Maximum storage for lock list maxlocks Maximum percent of lock list before escalation pckcachesz Package cache size sheapthres_shr Sort heap threshold for shared sorts sortheap Sort heap size Most of the System Memory should be allocated to DB2 memory. If DB2 memory parameters (Instance_memory or database_memory) and/or DB2 buffer pools are manually configured, the total DB2 memory consumption should be lower than system memory to avoid OS paging. Recommendation: System memory should be planned in accordance to the size of the database. Prefer automatic tuning (STMM) of DB2 memory and buffer pools 12 IBM Security

13 DB2 Memory Management and Buffer Pools Buffer pool utilization can be monitored using perfanalyze_database script from Performance tuning scripts. # su - db2inst1 $ db2 connect to LDAPDB $ db2 update monitor switches using bufferpool on sort on table on statement on $ db2 reset monitor all < Wait for your work load / searches etc > uow on lock on $ db2 get snapshot for all on LDAPDB > snap_1.out $./tuning_scripts/perfanalyze_database.pl -i snap_2.out... Bufferpool: IBMDEFAULTBP... Current size: pages Hit ratios (the higher the better) Data: % Index: % Total: % NOTICE: Total Hit Ratio should be >= 90% (the higher the better) Increase the size of the bufferpool until this value approaches 99%. 13 IBM Security

14 LDAP Server worker threads and DB2 connections

15 LDAP Server worker threads and DB2 connections To handle concurrent load from client applications, increase the number of ibmslapd worker threads. Number of worker threads is controlled by ibm-slapddbconnections attribute value under cn=directory, cn=rdbm Backends, cn=ibm Directory, cn=schemas, cn=configuration ibm-slapddbconnections also controls number of DB2 connections from ibmslapd to DB2 server In DB2 server process there will be as many agent threads as the number of client connections Increasing ibm-slapddbconnections requires more CPU / Memory resources Applies for both LDAP server as well as DB2 server. Monitoring ibmslapd worker thread utilization: sdsva > sds client_tools idsldapsearch -h server -p port -s base CN=MONITOR livethreads=3 available_workers=12 Recommendations: -b cn=monitor objectclass=* available_workers livethreads Increasing ibm-slapddbconnections may NOT improve performance in all cases Evaluate other performance bottlenecks using audit log and db2 snap shot analysis Do not configure very high number of ibm-slapddbconnections with out enough CPU / Memory resources 15 IBM Security

16 Data import / load considerations

17 Data import / load considerations For online update when ibmslapd (directory server) process is running: sdsva > sds client_tools idsldapadd -h sdsva -p 389 -D cn=root -w pw -i smalldata.ldif For offline small ldif data import / load use idsldif2db after uploading ldif file to virtual appliance sdsva > sds server_tools idsldif2db -I sdsinst1 -i smalldata.ldif For larger ldif data import / load use idsbulkload after uploading ldif file to virtual appliance. Use idsbulkload command to parse ldif file and create a tar.gz file containing table specific load files: sdsva > sds server_tools idsbulkload -I sdsinst1 -i data.ldif -a parseonly -Y... GLPBLK073I Bulkload completed. The file 'remote_bulkload.tar.gz' can be downloaded and viewed under CustomOut folder in LMI. On remote DB2 server system - Download remote_bulkload.tar.gz file and extract: ==> su - db2inst1 $ mkdir remote_bulkload_data $ cd remote_bulkload_data/ $ mv../remote_bulkload.tar.gz. $ gunzip -c remote_bulkload.tar.gz tar -xf - From the same folder review the script ldapdb_remote.sh (for AIX/Linux) [ldapdb_remote.bat for windows] Edit script and update the DB2INSTANCE variable to the correct db2 instance name and run the script as below $./ldapdb_remote.sh db2inst1 passwd 17 IBM Security

18 Data Organization

19 Data Organization High volume of insert, update & delete activity causes data fragmentation in tables and indexes. Reorganization compacts the data, reclaims disk space, improves data access Use reorgchk to determine the need for table / index reorganization # su - db2inst1 $ db2 connect to LDAPDB $ db2 reorgchk update statistics on table all > reorgchk.out Based on reorgchk.out file contents, all tables/indexes with asterisk requires reorg # su - db2inst1 $ db2 connect to LDAPDB $ db2 reorg table <table_name> $ db2 reorg indexes all for table <table_name> Recommendations: Reorganize all the attribute tables that you want to use in searches Perform Reorgchk periodically and based on that output perform Reorg on required tables/indexes Table level reorg also performs index organization Post reorg, perform runstats to take advantage of reorganized tables/indexes Reorg must be performed when ibmslapd is stopped Reorg on large tables may take long time, plan accordingly, perform reorg in batches at available maintenance times Use perftune_reorg script from Performance tuning scripts, to perform reorg on all / specific tables $./tuning_scripts/perftune_reorg.sh LDAPDB SDSINST1 [Table1 Table2...] 19 IBM Security

20 Data Optimization

21 Data Optimization The DB2 manager maintains a set of statistics to represent distributed data Optimization includes runstats command to update these statistics to improve query performance. reorgchk command may be used to update statistics, in the same way the runstats was performed last time. Use runstats to update statistics on a given table. # su - db2inst1 $ db2 connect to LDAPDB $ db2 runstats on table <tablename> on all columns with distribution and detailed indexes all Recommendations: In SDS v8.0.1.* env, with runstats, use distribution and detailed indexes all Perform runstats periodically (once in a day / week based on update rate). Perform runstats during a low activity time frame, Manual runstats is preferred over the DB2 auto runstats. Remove LDAP_MAXCARD and IBMSLAPD_USE_SELECTIVITY lines from ibmslapd.conf (restart ibmslapd) Benefit: Uses latest performance model of using actual ancestor/parent eid values with sub/one scope related queries. Use perftune_runstats script from Performance tuning scripts, to perform runstats on all / specific tables $./tuning_scripts/perftune_runstats.sh LDAPDB SDSINST1 21 IBM Security

22 Indexing the attributes used in search filters

23 Indexing the attributes used in search filters Indexing attributes used in search filters improves search performance Indexing an attribute may be performed using either Web Admin Tool or using idsldapmodify: Updates LDAP Server schema definition (ibmattributetypes) for the attribute Adds necessary indexes in DB2 layer for the corresponding attribute specific table Recommendations: Use ibmslapd.log GLPRDB091W messages to find a list of attributes that require indexing: GLPRDB091W Attribute <attributename> is not indexed but is used in searches 1000 times. Use audit log to determine the indexing rule for a given attribute based on filter: Attribute with filter such as "cn=john Doe requires EQUALITY indexing rule Attribute with filter such as sn>=doe requires ORDERING Attribute with filter such as "sn~=doe requires APPROX Attribute with filter such as "sn=mcd*" requires SUBSTR Attribute with filter such as "sn=*onald" requires REVERSE At the minimum EQUALITY is required on an attribute that s used in search filters Do not index attributes that are NOT used in search filters Perform runstats post indexing operation to take full advantage of the index Prefer to run the indexing operation during a service window when ibmslapd is not available to applications Use perfanalyze_indexes script from Performance tuning scripts, to analyze an audit log to get an ldif with index modifications $./tuning_scripts/perfanalyze_indexes.pl -d <ldap_schema_dir> -i audit.log -l indexupdate.ldif 23 IBM Security

24 Additional DB2 tuning

25 Additional DB2 tuning Add explicit/direct DB2 Index OBJECTCLASS_EOC Improves objectclass=<value> sub-filter performance $ db2 'create index schema_name.objectclass_eoc on schema_name.objectclass ("EID" ASC, "OBJECTCLASS" ASC) MINPCTUSED 10 ALLOW REVERSE SCANS' DB2 transaction log file size (LOGFILSIZ) - needs to be increased to accommodate large entry updates. $ db2 get database configuration for ldapdb grep LOGFILSIZ Log file size (4KB) (LOGFILSIZ) = 2000 $ db2 update database configuration for LOGFILSIZE using To enhance performance of NOT (!) filters such as (!(uid=admin)) use DB2 query compiler variable DB2_ANTIJOIN with EXTEND, the optimizer searches for opportunities to transform both NOT IN and NOT EXISTS subqueries into anti-joins. $ db2set DB2_ANTIJOIN=EXTEND Its important that attribute in search filter must have an index with up to date runstats. Set proper ulimits for DB2 instance user on Linux/Unix systems: Recommended ulimit values: data: unlimited nofile: fsize: unlimited Enable Row Compression - Requires DB2 Storage Optimization License (not provided by SDS) Use perftune_compress_tables.sh script from Performance tuning scripts, to enable row compression. 25 IBM Security

26 Additional performance tuning resources

27 Additional performance tuning resources Enable Audit Logging using Web Admin Tool / Command line idsldapmodify Use ISIM Performance Tuning Guide Use ISIM Performance Tuning Scripts Useful in analyzing and tuning Directory Server / DB2 in ISIM, ISAM and other SDS environments Refer ISIM_Performance_Scripts_Documentation pdf file inside the scripts tar.gz for details on each script. Resolving slow queries using the Directory Server audit log Resolving slow queries using DB2 snapshots Directory Server Performance Tuning Document in SDS knowledge Center 27 IBM Security

28 Useful Links

29 Useful Links SDS Recommended Fixes SDS Knowledge Center SDS Support Portal SDS Download Document SDS Known Issues DB Knowledge Center DB2 Recommended Fix Packs Ask a question in either ISDS -DW Answers Forum OR Directory Suite - DW Answers Forum Passport Advantage (full product downloads) Directory Server Support Lifecycle Sign up for My Notifications Follow IBM Security support on: 29 IBM Security

30 Questions for the Panel Now is your opportunity to ask questions of our panelists. To ask a question now: Raise your hand by clicking Raise Hand. The Raise Hand icon appears next to your name in the Attendees panel on the right in the WebEx Event. The host will announce your name and unmute your line. or Type your question in the box below Ask drop-down menu in the Q&A panel. Select All Panelists from the Ask drop-down-menu. Click Send. Your message is sent and appears in the Q&A panel To ask a question after this presentation: You are encouraged to participate in our dw Answers Forums: Ask a question in either ISDS -DW Answers Forum OR Directory Suite - DW Answers Forum 30 IBM Security

31 THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com youtube/user/ibmsecuritysolutions Copyright IBM Corporation All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may change at any time at IBM s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

Securing communication between SDS VA and its remote DB2 DB

Securing communication between SDS VA and its remote DB2 DB Securing communication between SDS 8.0.1 VA and its remote DB2 DB IBM SECURITY SUPPORT OPEN MIC PRESENTATION Ramamohan T Reddy - Senior Software Engineer / L2 Team Tech Lead - Directory Support Team Brook

More information

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support. ISAM Federation STANDARDS AND MAPPINGS Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support July 19, 2017 Agenda ISAM Federation Introduction Standards and Protocols Attribute Sources

More information

ISAM Advanced Access Control

ISAM Advanced Access Control ISAM Advanced Access Control CONFIGURING TIME-BASED ONE TIME PASSWORD Nicholas J. Hasten ISAM L2 Support Tuesday, November 1, 2016 One Time Password OTP is a password that is valid for only one login session

More information

IBM Security Directory Server: Utilizing the Audit.log

IBM Security Directory Server: Utilizing the Audit.log IBM Security Directory Server Open Mic Webcast #1 November 4, 2014 IBM Security Directory Server: Utilizing the Audit.log Panelists Roy Spencer L2LDAP Technical Lead Ram Reddy L2LDAP Senior Engineer Benjamin

More information

Junction SSL Debugging With Wireshark

Junction SSL Debugging With Wireshark Junction SSL Debugging With Wireshark IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu option.

More information

BigFix Query Unleashed!

BigFix Query Unleashed! BigFix Query Unleashed! Lee Wei IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To

More information

Security Support Open Mic Build Your Own POC Setup

Security Support Open Mic Build Your Own POC Setup IBM Security Access Manager 08/25/2015 Security Support Open Mic Build Your Own POC Setup Panelists Reagan Knowles Level II Engineer Nick Lloyd Level II Support Engineer Kathy Hansen Level II Support Manager

More information

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation MSS VSOC Portal Single Sign-On Using IBM id Changes to VSOC Portal Sign In Page Users can continue to use the existing Client Sign In on the left and enter their existing Portal username and password.

More information

IBM MaaS360 Kiosk Mode Settings

IBM MaaS360 Kiosk Mode Settings IBM MaaS360 Kiosk Mode Settings Configuration Settings for Kiosk Mode Operation IBM Security September 2017 Android Kiosk Mode IBM MaaS360 provides a range of Android device management including Samsung

More information

Disk Space Management of ISAM Appliance

Disk Space Management of ISAM Appliance IBM Security Access Manager Tuesday, 5/3/16 Disk Space Management of ISAM Appliance Panelists David Shen Level 2 Support Engineer Steve Hughes Level 2 Support Engineer Nicholas Hasten Level 2 Support Engineer

More information

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts IBM Security Guardium: : Sniffer restart & High CPU correlation alerts IBM SECURITY SUPPORT OPEN MIC, presented by Lisette Contreras, Guardium Support To hear the WebEx audio, select an option in the Audio

More information

Analyzing Hardware Inventory report and hardware scan files

Analyzing Hardware Inventory report and hardware scan files Analyzing Hardware Inventory report and hardware scan files IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by

More information

How AppScan explores applications with ABE and RBE

How AppScan explores applications with ABE and RBE How AppScan explores applications with ABE and RBE IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

Security Support Open Mic Client Certificate Authentication

Security Support Open Mic Client Certificate Authentication IBM Security Access Manager, Tuesday, December 8, 2015 Security Support Open Mic Client Certificate Authentication Panelists Jack Yarborough ISAM Level II Nick Lloyd ISAM Level II Scott Stough ISAM Level

More information

IBM Security Identity Manager New Features in 6.0 and 7.0

IBM Security Identity Manager New Features in 6.0 and 7.0 IBM Security Identity Manager New Features in 6.0 and 7.0 IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

XGS: Making use of Logs and Captures

XGS: Making use of Logs and Captures IBM Security Network Protection XGS Open Mic webcast #6 June 24, 2015 XGS: Making use of Logs and Captures Panelists Bill Klauke (Presenter) Product Lead L2 Support Maxime Turlot Product Lead L2 Support

More information

Security Support Open Mic: ISNP High Availability and Bypass

Security Support Open Mic: ISNP High Availability and Bypass Panelists Ed Leisure Knowledge Engineer, Presenter Andrew Sallaway SWAT Consultant Kenji Hamahata L2 Engineer (Japan) Maxime Turlot Product Lead Arthur Testa Product Lead Jeff Dicostanzo Advanced Value

More information

Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting

Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting Using Buffer Usage Monitor Report & Sniffer must_gather for troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate

More information

IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting

IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting IBM BigFix Client Reporting: Process, Configuration, and Troubleshooting IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate

More information

IBM Security Network Protection Open Mic - Thursday, 31 March 2016

IBM Security Network Protection Open Mic - Thursday, 31 March 2016 IBM Security Network Protection Open Mic - Thursday, 31 March 2016 Application Control and IP Reputation on the XGS Demystified Panelists Tanmay Shah, Presenter IPS/Network Protection Product Lead Bill

More information

IBM Security Guardium: Troubleshooting No Traffic Issues

IBM Security Guardium: Troubleshooting No Traffic Issues IBM Security Guardium: Troubleshooting No Traffic Issues IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

HTTP Transformation Rules with IBM Security Access Manager

HTTP Transformation Rules with IBM Security Access Manager HTTP Transformation Rules with IBM Security Access Manager IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

XGS Administration - Post Deployment Tasks

XGS Administration - Post Deployment Tasks IBM Security Network Protection Support Open Mic - 18 November 2015 XGS Administration - Post Deployment Tasks Panelists Tanmay Shah XGS Product Lead, L2 Support (Presenter) Thomas Gray L2 Support Manager

More information

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions IBM Security Access Manager open mic webcast July 14, 2015 IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions Panelists Gianluca Gargaro L2 Support Engineer Darren Pond L2

More information

More on relevance checks in ILMT and BFI

More on relevance checks in ILMT and BFI More on relevance checks in ILMT and BFI IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate

More information

IBM SecureWay Version Directory Tuning Guide

IBM SecureWay Version Directory Tuning Guide IBM SecureWay Version 3.2.2 Directory Tuning Guide IBM SecureWay Version 3.2.2 Directory Tuning Guide Second Edition (April, 2002) This edition applies to version 3, release 2.2, of The IBM SecureWay

More information

GX vs XGS: An administrator s comparison of the two products

GX vs XGS: An administrator s comparison of the two products : An administrator s comparison of the two products Panelists Bill Klauke IPS Product Lead, Level 2 Support Matthew Elsner XGS Development Yuceer (Banu) Ilgen XGS Development Jeff Dicostanzo AVP Support

More information

XGS & QRadar Integration

XGS & QRadar Integration IBM Security Support Open Mic - January 28, 2015 XGS & QRadar Integration Advanced Threat Protection Integration Options Panelists Wes Davis Advanced Threat Support Group Engineer (Presenter) Thomas Gray

More information

Identity Governance Troubleshooting

Identity Governance Troubleshooting Identity Governance Troubleshooting Chris Weber Level 2 support, IBM Security May 16, 2017 Identity Governance Troubleshooting Support Files contents Accessing different logs and other files though the

More information

IBM Security Identity Governance and Intelligence Clustering and High Availability

IBM Security Identity Governance and Intelligence Clustering and High Availability IBM Security Identity Governance and Intelligence Clustering and High Availability IBM SECURITY SUPPORT Luigi Lombardi: luigi.lombardi@it.ibm.com Gianluca Gargaro: g.gargaro@it.ibm.com Raffaele Sperandeo:

More information

Performance Tuning for MDM Hub for IBM DB2

Performance Tuning for MDM Hub for IBM DB2 Performance Tuning for MDM Hub for IBM DB2 2012 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise)

More information

Security Directory Server Avoiding Common Mistakes

Security Directory Server Avoiding Common Mistakes IBM Security Directory Server Open Mic webcast #2 Wednesday, July 22, 2015 Security Directory Server Avoiding Common Mistakes Panelists Kevin Gehrlein Support Engineer Ed Childress Support Engineer Ram

More information

Upgrade from SDS 6.4 to SDS 8.01 VA to use existing remote DB2 DB Companion Document. Document version 1.0

Upgrade from SDS 6.4 to SDS 8.01 VA to use existing remote DB2 DB Companion Document. Document version 1.0 Upgrade from SDS 6.4 to SDS 8.01 VA to use existing remote DB2 DB Companion Document Document version 1.0 Document change history Changed by Doc Date Changes Version Ramamohan T. Reddy 1.0 3/28/2017 Initial

More information

Understanding scan coverage in AppScan Standard

Understanding scan coverage in AppScan Standard IBM Security AppScan Standard Open Mic Webcast January 27, 2015 Understanding scan coverage in AppScan Standard Panelists Shahar Sperling Software Architect at Application Security AppScan Tal Rabinovitch

More information

IBM Security Access Manager v8.x Kerberos Part 2

IBM Security Access Manager v8.x Kerberos Part 2 IBM Security Access Manager open mic webcast - Oct 27, 2015 IBM Security Access Manager v8.x Kerberos Part 2 Kerberos Single Sign On using Constrained Delegation Panelists Gianluca Gargaro L2 Support Engineer

More information

Ponemon Institute s 2018 Cost of a Data Breach Study

Ponemon Institute s 2018 Cost of a Data Breach Study Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell

More information

Configuring zsecure To Send Data to QRadar

Configuring zsecure To Send Data to QRadar Configuring zsecure To Send Data to QRadar CONFIGURATION, SETUP, AND EXAMPLES Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free:

More information

IBM BigFix Relays Part 2

IBM BigFix Relays Part 2 IBM BigFix Relays Part 2 IBM SECURITY SUPPORT OPEN MIC December 17, 2015 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING

More information

IBM Security Network Protection

IBM Security Network Protection IBM Security Network Protection XGS 5.3.3 firmware release Features and Enhancements IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web

More information

IBM Threat Protection System: XGS - QRadar Integration

IBM Threat Protection System: XGS - QRadar Integration IBM Security Network Protection Support Open Mic - Wednesday, 25 May 2016 IBM Threat Protection System: XGS - QRadar Integration Panelists Tanmay Shah - Presenter Level 2 Support Product Lead Danitza Villaran-Rokovich,

More information

Interpreting relevance conditions in commonly used ILMT/BFI fixlets

Interpreting relevance conditions in commonly used ILMT/BFI fixlets Interpreting relevance conditions in commonly used ILMT/BFI fixlets IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog

More information

What's new in AppScan Standard version

What's new in AppScan Standard version What's new in AppScan Standard version 9.0.3.5 IBM Audio Security Connection support dialog by Open access Mic the Slides and more information: http://www.ibm.com/support/docview.wss?uid=swg27049311 February

More information

Performance tuning and capacity planning. Version 6.4 IBM

Performance tuning and capacity planning. Version 6.4 IBM Performance tuning and capacity planning Version 6.4 IBM ii Performance tuning and capacity planning Contents Performance tuning and capacity planning.............. 1 Directory server tuning general overview.....

More information

Introduction to IBM Security Network Protection Manager

Introduction to IBM Security Network Protection Manager Introduction to IBM Security Network Protection Manager IBM SECURITY SUPPORT OPEN MIC Slides are at: https://ibm.biz/bdscvz NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM

More information

QRadar Open Mic: Custom Properties

QRadar Open Mic: Custom Properties November 29, 2017 QRadar Open Mic: Custom Properties IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

IBM Security Access Manager Single Sign-on with Federation

IBM Security Access Manager Single Sign-on with Federation IBM Security Access Manager Single Sign-on with Federation IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

Empowering DBA's with IBM Data Studio. Deb Jenson, Data Studio Product Manager,

Empowering DBA's with IBM Data Studio. Deb Jenson, Data Studio Product Manager, Empowering DBA's with IBM Data Studio Deb Jenson, Data Studio Product Manager, dejenson@us.ibm.com Disclaimer Copyright IBM Corporation [current year]. All rights reserved. U.S. Government Users Restricted

More information

BigFix 101- Server Pricing

BigFix 101- Server Pricing BigFix 101- Server Pricing Licensing in a Nutshell BigFix is included with AIX Enterprise Edition (AIX EE). If you have AIX EE on a system, all the cores on that system are covered and any LPAR running

More information

IBM Tivoli Identity Manager Performance Tuning Guide Version 4.6

IBM Tivoli Identity Manager Performance Tuning Guide Version 4.6 IBM Tivoli Identity Manager Performance Tuning Guide Version 4.6 Issue Date: 2005 June 30 First Edition Publication Number: SC23-5272-00 Copyright Notice Copyright IBM Corporation 2005. All rights reserved.

More information

How to properly deploy, configure and upgrade the NAB

How to properly deploy, configure and upgrade the NAB Panelists Jeff DiCostanzo, Presenter AVP Team Lead Bill Klauke - Level 2 Product Lead Maxime Turlot - Level 2 Product Lead Ryan Andersen - Level 2 Senior Engineer Edward A Romero - Level 3 Network Security

More information

IBM Guardium Data Encryption

IBM Guardium Data Encryption IBM Guardium Data Encryption RELEASE TAXONOMY FOR LINUX/AIX/WINDOWS 10-October-2018 GDE Taxonomy Version V.0.0.0 Major V.R.0.0 Mod V.R.M.0 SSE V.R.M.F Fixpack V.R.M.F Cadence 36-48 Months 12-15 Months

More information

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation IBM Security Endpoint Manager- BigFix Daniel Joksch Security Sales Establish security as an immune system Malware protection Incident and threat management Identity management Device management Data monitoring

More information

DB2 Performance Essentials

DB2 Performance Essentials DB2 Performance Essentials Philip K. Gunning Certified Advanced DB2 Expert Consultant, Lecturer, Author DISCLAIMER This material references numerous hardware and software products by their trade names.

More information

D09 Repeated in D15 DB2 Autonomics: Implementation and Exploitation

D09 Repeated in D15 DB2 Autonomics: Implementation and Exploitation D09 Repeated in D15 DB2 Autonomics: Implementation and Exploitation Philip K. Gunning Gunning Technology Solutions, LLC 4 Oct 2006 11:00 a.m. 12:00 p.m. Repeated 5 Oct 2006, 10:30 a.m. 11:30 a.m. Platform:

More information

Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring. Timothy Burris, Cloud Adoption & Technical Enablement

Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring. Timothy Burris, Cloud Adoption & Technical Enablement Hands-on Lab Session 9909 Introduction to Application Performance Management: Monitoring Timothy Burris, Cloud Adoption & Technical Enablement Copyright IBM Corporation 2017 IBM, the IBM logo and ibm.com

More information

IBM Security Network Protection v Enhancements

IBM Security Network Protection v Enhancements IBM Security Network Protection v5.3.3.1 Enhancements IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection

More information

Configuring your policy to prevent appliance problems

Configuring your policy to prevent appliance problems Configuring your policy to prevent appliance problems IBM Security Guardium IBM SECURITY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate

More information

Deploying BigFix Patches for Red Hat

Deploying BigFix Patches for Red Hat Deploying BigFix Patches for Red Hat IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141

More information

IBM Security Access Manager

IBM Security Access Manager IBM Security Access Manager Version 9.0 Performance Tuning Guide 1 IBM Security Access Manager Version 9.0: Performance Tuning Guide Note Before using this information and the product it supports, read

More information

Performance Tuning Guide

Performance Tuning Guide IBM Security Identity Governance and Intelligence Version 5.2.1 Performance Tuning Guide Note: Before using this information and the product it supports, read the information in Notices. 1st Edition notice

More information

IBM Security Support Open Mic

IBM Security Support Open Mic IBM Security Support Open Mic LET S TALK ABOUT QRADAR 7.2.8 FEATURES Connect to WebEx Audio by selecting an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu

More information

IBM Directory Server Version 5.1 Performance Tuning Guide

IBM Directory Server Version 5.1 Performance Tuning Guide IBM Directory Server Version 5.1 Performance Tuning Guide IBM Directory Server Version 5.1 Performance Tuning Guide First Edition (November, 2002) This edition applies to version 5, release 1, of The

More information

QRadar Feature Discussion IBM SECURITY SUPPORT OPEN MIC

QRadar Feature Discussion IBM SECURITY SUPPORT OPEN MIC QRadar 7.2.7 Feature Discussion IBM SECURITY SUPPORT OPEN MIC Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA toll-free: 866-803-2141

More information

IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC. 13 Dec 2017

IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC. 13 Dec 2017 IBM Security Access Manager What s in the box : InfoMap Authentication Mechanism IBM SECURITY SUPPORT OPEN MIC 13 Dec 2017 IBM Security Learning Academy www.securitylearningacademy.com New content published

More information

IBM DB2 LUW Performance Tuning and Monitoring for Single and Multiple Partition DBs

IBM DB2 LUW Performance Tuning and Monitoring for Single and Multiple Partition DBs IBM DB2 LUW Performance Tuning and Monitoring for Single and Multiple Partition DBs Day(s): 5 Course Code: CL442G Overview Learn how to tune for optimum the IBM DB2 9 for Linux, UNIX, and Windows relational

More information

CA Unified Infrastructure Management Snap

CA Unified Infrastructure Management Snap CA Unified Infrastructure Management Snap Configuration Guide for DB2 Database Monitoring db2 v4.0 series Copyright Notice This online help system (the "System") is for your informational purposes only

More information

Fabrizio Patriarca. Come creare valore dalla GDPR

Fabrizio Patriarca. Come creare valore dalla GDPR Fabrizio Patriarca Come creare valore dalla GDPR Disclaimer Notice: Clients are responsible for ensuring their own compliance with various laws and regulations, including the European Union General Data

More information

Remote Syslog Shipping IBM Security Guardium

Remote Syslog Shipping IBM Security Guardium Remote Syslog Shipping IBM Security Guardium IBM Security support Open Mic To hear the WebEx audio, select an option in the Audio Connection dialog or by access the Communicate > Audio Connection menu

More information

IBM InfoSphere Data Replication s Change Data Capture (CDC) Fast Apply IBM Corporation

IBM InfoSphere Data Replication s Change Data Capture (CDC) Fast Apply IBM Corporation IBM InfoSphere Data Replication s Change Data Capture (CDC) Fast Apply Agenda - Overview of Fast Apply - When to use Fast Apply - The available strategies & when to use - Common concepts - How to configure

More information

Integrated, Intelligence driven Cyber Threat Hunting

Integrated, Intelligence driven Cyber Threat Hunting Integrated, Intelligence driven Cyber Threat Hunting THREAT INVESTIGATION AND RESPONSE PLATFORM Zsolt Kocsis IBM Security Technical Executive, CEE zsolt.kocsis@hu.ibm.com 6th Nov 2018 Build an integrated

More information

SWD & SSA Updates 2018

SWD & SSA Updates 2018 SWD & SSA Updates 2018 Stephen Hull STSM, BigFix Development 04/09/2018 Latest SWD & SSA features What s shiny and new? SWD Support multiple tasks for a software pkg Install, Update, Uninstall, etc Export/Import

More information

Vendor: IBM. Exam Code: C Exam Name: IBM Security Identity Manager V6.0 Implementation. Version: Demo

Vendor: IBM. Exam Code: C Exam Name: IBM Security Identity Manager V6.0 Implementation. Version: Demo Vendor: IBM Exam Code: C2150-197 Exam Name: IBM Security Identity Manager V6.0 Implementation Version: Demo Question No : 1 Which is true for the relationship between provisioning policies, services, and

More information

Performance Tuning Guide

Performance Tuning Guide IBM Tivoli Access Manager Performance Tuning Guide Version 3.9 GC32-0846-00 IBM Tivoli Access Manager Performance Tuning Guide Version 3.9 GC32-0846-00 Note: Before using this information and the product

More information

What's new in AppScan Standard/Enterprise/Source version

What's new in AppScan Standard/Enterprise/Source version What's new in AppScan Standard/Enterprise/Source version 9.0.3.4 support Open Mic Reminder: You must dial-in to the phone conference to listen to the panelists. The web cast does not include audio. USA

More information

Exploring Memory in DB2 9.5 and Beyond

Exploring Memory in DB2 9.5 and Beyond Exploring Memory in DB2 9.5 and Beyond Michael Cornish, Senior Software Analyst Advanced Problem Diagnostics Team IBM Toronto Lab mcornish@ca.ibm.com 2009 IBM Corporation TOPICS Memory Architecture Changes

More information

How to Secure Your Cloud with...a Cloud?

How to Secure Your Cloud with...a Cloud? A New Era of Thinking How to Secure Your Cloud with...a Cloud? Eitan Worcel Offering Manager - Application Security on Cloud IBM Security 1 2016 IBM Corporation 1 A New Era of Thinking Agenda IBM Cloud

More information

Securing communication between SDS VA and its remote DB2 DB Companion Document. Document version 1.0

Securing communication between SDS VA and its remote DB2 DB Companion Document. Document version 1.0 Securing communication between SDS 8.0.1 VA and its remote DB2 DB Companion Document Document version 1.0 Document change history Changed by Doc Date Changes Version Ramamohan T. Reddy 1.0 2/15/2017 Initial

More information

IBM BigFix Relays Part 1

IBM BigFix Relays Part 1 IBM BigFix Relays Part 1 IBM SECURITY SUPPORT OPEN MIC November 19, 2015 Revised March 2, 2018 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT

More information

Configuring SDS VA Directory Server with remote DB2 database Companion Document. Document version 1.0

Configuring SDS VA Directory Server with remote DB2 database Companion Document. Document version 1.0 Configuring SDS 8.0.1 VA Directory Server with remote DB2 database Companion Document Document version 1.0 Document change history Changed by Doc Date Changes Version Ramamohan T. Reddy 1.0 1/17/2017 Initial

More information

Getting Started with Rational Team Concert

Getting Started with Rational Team Concert Getting Started with Rational Team Concert or RTC in 16 Steps Kai-Uwe Maetzel IBM Rational Software kai-uwe_maetzel@us.ibm.com SDP 20 2009 IBM Corporation This Presentation is Good for You if You know

More information

May the (IBM) X-Force Be With You

May the (IBM) X-Force Be With You Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security

More information

IBM Lotus Notes in XenApp Environments

IBM Lotus Notes in XenApp Environments IBM Lotus Notes in XenApp Environments Open Mic Webcast September 28, 2011 11:00 AM EDT 2011 IBM Corporation Open Mic Webcast: IBM Lotus Notes in XenApp environments September 28 th @ 11:00 AM EDT (15:00

More information

DB2 self-tuning memory manager log parser

DB2 self-tuning memory manager log parser Skill Level: Intermediate Askari Naqvi (askarin@ca.ibm.com) Software Development Analyst IBM Christian Garcia-Arellano (cmgarcia@ca.ibm.com) Software Developer IBM Haysam Alsayed (halsayed@ca.ibm.com)

More information

IBM Application Performance Analyzer for z/os Version IBM Corporation

IBM Application Performance Analyzer for z/os Version IBM Corporation IBM Application Performance Analyzer for z/os Version 11 IBM Application Performance Analyzer for z/os Agenda Introduction to Application Performance Analyzer for z/os A tour of Application Performance

More information

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT NOTICE Clients are responsible for ensuring their own compliance with various laws and regulations, including the

More information

Security Update PCI Compliance

Security Update PCI Compliance Security Update PCI Compliance (Payment Card Industry) Jeff Uehling IBM i Security Development uehling@us.ibm.com 2012 IBM Corporation PCI Requirements An Information only Presentation NOTE: These Slides

More information

IBM Security Guardium Tech Talk

IBM Security Guardium Tech Talk IBM Security Guardium Tech Talk Hints and tips for upgrading to V10 Vlad Langman Manager, Guardium L3 Support IBM Security Omar Raza Guardium QA Engineer IBM Security This call is being recorded. Please

More information

The New Era of Cognitive Security

The New Era of Cognitive Security The New Era of Cognitive Security IBM WATSON SUMMIT KANOKSAK RATCHAPAT Senior Technical Sales 1 Today s security challenges ACTORS TARGETS VECTORS REALITY Organized Crime Healthcare Ransomware Cloud, mobile,

More information

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES Agenda Welcome Threat Intelligence EcoSystem Cyber Resiliency

More information

InfoSphere Guardium 9.1 TechTalk Reporting 101

InfoSphere Guardium 9.1 TechTalk Reporting 101 InfoSphere Guardium 9.1 TechTalk Reporting 101 Click to add text Dario Kramer, Senior System Architect dariokramer@us.ibm.com 2013 IBM Corporation Acknowledgements and Disclaimers Availability. References

More information

Tuning DBM and DB Configuration Parameters

Tuning DBM and DB Configuration Parameters DB2 for Linux, UNIX, Windows Tuning DBM and DB Configuration Parameters Philip K. Gunning DB2 Master Practitioner Gunning Technology Solutions, LLC 21 September 2005 DB2 is a registered trademark of IBM

More information

Worrying About Your Whitelists

Worrying About Your Whitelists Worrying About Your Whitelists TIPS AND TRICKS FOR DECIDING WHAT TO TRUST IN IBM SECURITY GUARDIUM John Haldeman Enterprise Architect, IBM Champion, Information Insights LLC July 21, 2016 Upcoming Tech

More information

IBM Infrastructure Suite for z/vm and Linux: Introduction IBM Tivoli OMEGAMON XE on z/vm and Linux

IBM Infrastructure Suite for z/vm and Linux: Introduction IBM Tivoli OMEGAMON XE on z/vm and Linux IBM Infrastructure Suite for z/vm and Linux: Introduction IBM Tivoli OMEGAMON XE on z/vm and Linux August/September 2015 Please Note IBM s statements regarding its plans, directions, and intent are subject

More information

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security

More information

IBM DB2 courses, Universidad Cenfotec

IBM DB2 courses, Universidad Cenfotec IBM DB2 courses, Universidad Cenfotec Contents Summary... 2 Database Management (Information Management) course plan... 3 DB2 SQL Workshop... 4 DB2 SQL Workshop for Experienced Users... 5 DB2 9 Database

More information

Optimizing Data Transformation with Db2 for z/os and Db2 Analytics Accelerator

Optimizing Data Transformation with Db2 for z/os and Db2 Analytics Accelerator Optimizing Data Transformation with Db2 for z/os and Db2 Analytics Accelerator Maryela Weihrauch, IBM Distinguished Engineer, WW Analytics on System z March, 2017 Please note IBM s statements regarding

More information

IBM Application Security on Cloud

IBM Application Security on Cloud April, 2017 IBM Application Security on Cloud Service Overview Security has and will always be about understanding, managing, and mitigating the risk to an organization s most critical assets. - Dr. Eric

More information

Let s Talk About Threat Intelligence

Let s Talk About Threat Intelligence Let s Talk About Threat Intelligence IBM SECURITY SUPPORT OPEN MIC #20 Slides and additional dial in numbers: http://ibm.biz/openmic20 January 26, 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR

More information

Ensuring a smooth upgrade to Sametime and IFR 1

Ensuring a smooth upgrade to Sametime and IFR 1 Ensuring a smooth upgrade to Sametime 8.5.2 and 8.5.2 IFR 1 Tony Payne, Sametime L3 February 29,2012 2011 IBM Corporation Agenda Plan Prepare Execute Troubleshoot Validate Known Fixes 2011 IBM Corporation

More information

Quest Central for DB2

Quest Central for DB2 Quest Central for DB2 INTEGRATED DATABASE MANAGEMENT TOOLS Supports DB2 running on Windows, Unix, OS/2, OS/390 and z/os Integrated database management components are designed for superior functionality

More information