SQL Server Security Azure Key Vault
|
|
- Joseph Golden
- 6 years ago
- Views:
Transcription
1 Azure SQL database development SQL Server encryption Bmxbzt Fodszufe SQL Server Security Azure Key Vault Always Encrypted SQL Server database development SQL Server Specialists
2 Caroline Eveleigh SQL Server business analyst Director, Anatec Software Author of Microsoft Official Curriculum (MOC) courses, including: Upgrade your Skills to SQL Server 2016 Always Encrypted Row-Level Security Dynamic Data Masking Anatec software Ltd Microsoft SQL Server & Azure specialists
3 PREMIER SPONSOR GOLD SPONSORS SILVER SPONSORS BRONZE SPONSORS SUPPORTERS
4 SQL Server Security & Azure Key Vault Data protection matters Azure Key Vault What it is Role Based Access Control Creating and configuring Azure Key Vault Using Azure Key Vault SQL Server encryption keys Encryption in SQL Server Encrypting columns with Always Encrypted Rotating Keys Anatec software Ltd Microsoft SQL Server & Azure specialists
5 Data Protection Matters Crime has moved to cyberspace Layered security helps, but it s no guarantee New security vulnerabilities appear all the time Cannot fix and forget If hackers get through outer security layers Data is unprotected Planning for business as usual is only good for business as usual
6 QinetiQ Data breach from 2007 to 2012 Classified documents stolen Similarities to Hatten Garden Safe Deposit Co Layered security breached Data was unprotected Alarm was raised, but insufficient action taken
7 Azure Key Vault Stores cryptographic keys, certificates, and other secrets Primarily for cloud applications Keep access to Azure Key Vault limited and secure Manage with PowerShell or the Azure portal Standard or Premium Use with Azure Active Directory Audit log
8 Azure Key Vault Pricing Standard or Premium 0.022/10,000 operations (Get, Set, etc) 0.112/10,000 advanced operations 2.24/certificate renewal Stored encrypted on HSM Standard Software keys Operations performed in Azure Use for test and development Premium HSM protected Keys never leave HSM 0.75p/month Operations performed on HSM Use for production systems Only actively used HSM protected keys (used in prior 30-day period) are charged; each version of an HSM protected key is counted as a separate key.
9 Cryptographic Keys and Secrets Secret Typically connection strings, certificates, etc. 10 kb max Versioned Cryptographic keys RSA 2048 bit key Create or import Encrypted with system key stored on HSM No access to keys Versioned
10 Azure Active Directory Cloud identity management system Azure subscription 1:1 Azure Active Directory Silently created with the Azure subscription or Office365 and Dynamics Online Resource group belongs to one Azure subscription Each resource belongs to one resource group Users can belong to more than one Azure Active Directory Editions - free, basic, and premium Multi-tenanted Azure Active Directory
11 Role Based Access Control (RBAC) Best practice in large or small orgs Reduces the attack area Use in combination with time limited privileges Three built in roles Owner: full access + give access to others Contributor: create and manage only Reader: view resources Fine-grained control assign at: Subscription level Resource Group level Resource level Users Apps Azure Active Directory User group Azure Subscription Resource group Resource group
12 The Cats App One of the UK s most respected catteries Prize winning cats from all over the world Project to encrypt personal kitty data Pressure from the cats owners More Kitty data than ever before Cattery owners concerned about GDPR Kitty data protection is finally being taken seriously
13 The Cats App Architecture
14 Demo 1: Create an Azure Key Vault Already created Azure Active Directory Resource group Storage account for audit logs Sign in as subscription administrator Create key vault Enable audit logging on the key vault Management plane permissions For the security team For the auditors Data plane permissions For the security team To the key vault
15 Key lifecycle Key Generation Key Establishment Key Backup Key Storage Key Archival Key Usage Key Change Key Destruction
16 Key Lifecycle with Azure Key Vault Key Generation Create or import Set Not Before property Key Establishment Key Storage Create or import Key Change HSM Key Backup Key Usage Backup and download key Set Expires and Enabled = No properties Key Archival Set Enabled = Yes property Delete key Key Destruction
17 Azure Key Vault: Logging Enable logging Azure storage account insights-logs-auditevent container Can be used for multiple key vaults Logs Operations on the key vault - key operations and policies Failed operations and unauthenticated requests Azure Key Vault Analytics
18 Demo 2: Create keys and inspect logs Sara create keys in AKV Generates the keys Alok examines the keys Can list keys Cannot get keys Cannot delete keys Alok examines the key vault logs & backups Text formatted as a JSON blob Backup keys as blobs
19 Azure Key Vault Delete key Key creation Backup key Key activation Key expiration Key usage Enabled = Yes
20 SQL Server Encryption Always Encrypted From SQL Server 2016 Enterprise to Express Use with TDE Transparent Data Encryption (TDE) SQL Server 2008 Enterprise only Column-level encryption SQL Server 2008 AKA cell-level encryption Encrypting backups SQL Server 2014
21 Always Encrypted and TDE Always Encrypted At rest and in motion Encrypts specific columns containing sensitive data Encrypted and decrypted on the client side Keys not on the server Protects against DBAs and mitigates risks with regulations Transparent Data Encryption (TDE) At rest Encrypts the whole database Encrypted and decrypted server side Keys held on the server Protects against hard disk theft
22 SQL Server Always Encrypted with AKV CMK01 Asymmetric for security Key encrypting key AKV Symmetric key for efficiency Data encrypting key Metadata for CMK Data Access Driver ADO.NET or ODBC Column Encryption Key Encrypted Column Encryption Key (CEK) Metadata for CMK Client Server
23 Always Encrypted Key Hierarchy Column Master Key Used to encrypt Column Encryption Key Used to encrypt Encrypted Data With AKV, keys are not stored on the client making it more secure
24 Demo 3: Create encrypted columns Create Column Master Key Create Column Encryption Key Create the cats schema Create the cats.owner table No encrypted columns Create the cats.cat table ParticularName deterministic CreditCard randomized Colour - deterministic
25 Always Encrypted: CMK Key Rotation Column Master Key (CMK) Encrypts Column Encryption Key (CEK) You can only have two CMKs at any one time Create a new CMK CMK2 Decrypt the CEK with CMK1 (current) Encrypt CEK with CMK2 The CEK value does not change Just the CMK encryption key Data is not decrypted and re-encrypted
26 Demo 4: Cats App & key rotation Cat table - sensitive fields are encrypted Deterministic fields the same (ParticularName and colour) The Cats App Key rotation Create a new column master key Create a view to display CEK values Make a new encrypted value for the CEK Alter the CEK and drop the old encrypted value Drop the old column master key CMK01
27 Encrypting Data Data is protected, but Key discovery Lost keys = lost data Disaster recovery riskier Vulnerable if keys not rotated Increased cost of data ownership Performance may be impacted Data management overhead Human factors
28 Key Management Secrecy Vulnerable when moved Keys are encrypted with other keys Key length Longer is better Cryptoperiod The longer the cryptoperiod, the greater the vulnerability Storage Store keys safely
29 AKV: Strengths and Weaknesses Strengths Keys in one place Accessible from anywhere Manage keys through their lifecycle Auditing No direct access to keys or plaintext passwords in configuration files Replaces costly HSMs Soft delete option Weaknesses Internet only Vulnerable to social engineering Monthly cost
30 More Information Azure documentation NIST
31 Tell us what you think SQLRelay.co.uk/feedback Live Now Win a Lego BB8!
32 Connect with me Caroline Eveleigh
33 Azure SQL database development SQL Server security Rvftujpot? Questions? Caroline SQL Server Specialists
Ooops, data breach? Not with Always Encrypted. Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill
Ooops, data breach? Not with Always Encrypted Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type
More informationManaging Microsoft 365 Identity and Access
Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential
More informationProtecting Your Data With Encryption
Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies Thank you Sponsors! o Please visit the sponsors during the vendor break from 2:45 3:15 and enter their end-of-day raffles Event
More informationIndex. Pranab Mazumdar, Sourabh Agarwal, Amit Banerjee 2016 P. Mazumdar et al., Pro SQL Server on Microsoft Azure, DOI /
Index A Azure Active Directory (AAD), 17 Azure architecture compute, 20 fault domain, 31 IaaS, 19 models classic deployment model, 32 deployment automation, 34 RBAC, 33 Resource Manager deployment model,
More informationMichael Wells Microsoft Specialist, Dell EMC. SQL DBaaS on Microsoft Azure Stack
Michael Wells Microsoft Specialist, Dell EMC SQL DBaaS on Microsoft Azure Stack About Me Name: Michael Wells Email: Michael.WellsJr@dell.com Twitter: @SqlTechMike - SQL Server DBA 7+ Years - Reformed Developer
More informationPASS SQL DBA Virtual Chapter
PASS SQL DBA Virtual Chapter Wed, 7:00 PM - 8:00 PM GMT Lecture By Ronen Ariely Implementing new Security Features in SQL Server 2016, Part 2 SQL Server 2016 provides several new data security features
More informationΟ ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος
Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος Providing clarity and consistency for the protection of personal data The General
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.
More informationSQL Server Security. Marek
SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel
More informationVMware, SQL Server and Encrypting Private Data Townsend Security
VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! What s new from Microsoft?! Compliance, standards, and
More informationMySQL Enterprise Security
MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationHOW SNOWFLAKE SETS THE STANDARD WHITEPAPER
Cloud Data Warehouse Security HOW SNOWFLAKE SETS THE STANDARD The threat of a data security breach, someone gaining unauthorized access to an organization s data, is what keeps CEOs and CIOs awake at night.
More informationSQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD
SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD The Payment Card Industry Data Security Standard (PCI DSS), currently at version 3.2,
More informationSQL Organizational Security & Compliance. George Walters Senior Technical Evangelist for ISV Partners
Organizational Security & Compliance SQL 2012-2017 George Walters Senior Technical Evangelist for ISV Partners george.walters@microsoft.com @gwalters69 on twitter Why is security important? 4 Progress
More informationOracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero
Oracle Security Products and Their Relationship to EBS Presented By: Christopher Carriero 1 Agenda Confidential Data in Corporate Systems Sensitive Data in the Oracle EBS What Are the Oracle Security Products
More informationCourse AZ-100T01-A: Manage Subscriptions and Resources
Course AZ-100T01-A: Manage Subscriptions and Resources Module 1: Managing Azure Subscriptions In this module, you ll learn about the components that make up an Azure subscription and how management groups
More informationIT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,
IT Security Training MS-500: Microsoft 365 Security Administration $2,595.00 4 Days Upcoming Dates Course Description Day 1: Managing Microsoft 365 Identity and Access (MS-500T01-A) Help protect against
More information70-532: Developing Microsoft Azure Solutions
70-532: Developing Microsoft Azure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Create and Manage Azure Resource Manager Virtual Machines
More informationActual4Dumps. Provide you with the latest actual exam dumps, and help you succeed
Actual4Dumps http://www.actual4dumps.com Provide you with the latest actual exam dumps, and help you succeed Exam : 70-533 Title : Implementing Microsoft Azure Infrastructure Solutions Vendor : Microsoft
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationOracle Database Security Assessment Tool
Oracle Database Security Assessment Tool With data breaches growing every day along with the evolving set of data protection and privacy regulations, protecting business sensitive and regulated data is
More informationNEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?
NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:
More informationAzure Development Course
Azure Development Course About This Course This section provides a brief description of the course, audience, suggested prerequisites, and course objectives. COURSE DESCRIPTION This course is intended
More informationDyadic Security Enterprise Key Management
Dyadic Security Enterprise Key Management The Secure-as-Hardware Software with a Mathematical Proof Dyadic Enterprise Key Management (EKM) is the first software-only key management and key protection system
More informationAt Course Completion After completing this course, students will be able to:
Course Details Course Code: Duration: Notes: 20398B 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and technical
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationVMware, SQL Server and Encrypting Private Data Townsend Security
VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! Compliance, standards, and best practices! Encryption and
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationHARDWARE SECURITY MODULES (HSMs)
HARDWARE SECURITY MODULES (HSMs) Cryptography: The basics Protection of data by using keys based on complex, randomly-generated, unique numbers Data is processed by using standard algorithms (mathematical
More informationFocus mainly on the technical part of things Foundation to manage Azure resources
#techsummitch Focus mainly on the technical part of things Foundation to manage Azure resources Azure governance Resources provisioning options Azure Resource Manager (ARM) NOT Organizational management
More informationAzure Security and Compliance Practical Exercises
Azure Security and Compliance Practical Exercises Overview This course includes optional practical exercises where you can try out the technologies described in the course for yourself. This guide lists
More informationAzure SQL Database Training. Complete Practical & Real-time Trainings. A Unit of Sequel Gate Innovative Technologies Pvt. Ltd.
Azure SQL Database Training Complete Practical & Real-time Trainings A Unit of Sequel Gate Innovative Technologies Pvt. Ltd. AZURE SQL / DBA Training consists of TWO Modules: Module 1: Azure SQL Database
More informationDyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof
Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection
More information20532D: Developing Microsoft Azure Solutions
20532D: Developing Microsoft Azure Solutions Course Details Course Code: Duration: Notes: 20532D 5 days Elements of this syllabus are subject to change. About this course This course is intended for students
More informationSecurity Specification
Security Specification Security Specification Table of contents 1. Overview 2. Zero-knowledge cryptosystem a. The master password b. Secure user authentication c. Host-proof hosting d. Two-factor authentication
More informationRandy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED
Randy Pagels Sr. Developer Technology Specialist DX US Team rpagels@microsoft.com AZURE PRIMED 2016.04.11 Interactive Data Analytics Discover the root cause of any app performance behavior almost instantaneously
More informationData Lakes & Leaks Erno Doorenspleet. IBM Security
Data Lakes & Leaks Erno Doorenspleet 1 Data Lakes Leaks 2 A Data Lake versus A Data Reservoir Data flows in naturally and just sits there Built to extract value from the data Data without Analytics is
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationImplementing Microsoft Azure Infrastructure Solutions
Implementing Microsoft Azure Infrastructure Solutions OD20533C; On-Demand, Video-based Course Description This course is intended for IT professionals who are familiar with managing on-premises IT deployments
More informationVormetric Data Security
Vormetric Data Security Simplifying Data Security for the Enterprise www.vormetric.com Agenda! Introductions! Vormetric Overview! Data Security Architecture Challenges! Product Architecture & Use Cases!
More informationMaintMaster Technical White Paper
MaintMaster Technical White Paper Welcome to MaintMaster! MaintMaster is a leading tool for return on operational reliability for discrete manufacturing. This White Paper covers most of the technical aspects
More informationAzure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk
Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate
More informationWHITEPAPER. Compliance with ITAR and Export Controls in Collaboration Systems
WHITEPAPER Compliance with ITAR and Export Executive Summary IT executives for organizations that are subject to export controls and regulations, including ITAR, EAR, as well as German BAFA regulations,
More informationArchitecting Microsoft Azure Solutions (proposed exam 535)
Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and
More informationNetBackup Self Service Release Notes
NetBackup Self Service Release Notes 7.7.3 Document version: 1 Veritas NetBackup Self Service Release Notes Document version: 7.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC. All rights reserved.
More informationSQL Server 2017 Power your entire data estate from on-premises to cloud
SQL Server 2017 Power your entire data estate from on-premises to cloud PREMIER SPONSOR GOLD SPONSORS SILVER SPONSORS BRONZE SPONSORS SUPPORTERS Vulnerabilities (2010-2016) Power your entire data estate
More informationDeveloping Microsoft Azure Solutions
1 Developing Microsoft Azure Solutions Course Prerequisites A general understanding of ASP.NET and C# concepts Upon Completion of this Course, you will accomplish following: Compare the services available
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On-Premises Tools OD20398B; On-Demand, Video-based Course Description This course teaches IT professionals how to
More information3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS)
3 CERTIFICATION AUTHORITY KEY PROTECTION (HSMS) 3.1 Introduction In any public key infrastructure deployment, the protection of private key material (application keys) associated with the public/private
More informationSMARTCRYPT CONTENTS POLICY MANAGEMENT DISCOVERY CLASSIFICATION DATA PROTECTION REPORTING COMPANIES USE SMARTCRYPT TO. Where does Smartcrypt Work?
SMARTCRYPT PKWARE s Smartcrypt is a data-centric audit and protection platform that automates data discovery, classification, and protection in a single workflow, managed from a single dashboard. With
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationDeveloping Microsoft Azure Solutions
Developing Microsoft Azure Solutions Duration: 5 Days Course Code: M20532 Overview: This course is intended for students who have experience building web applications. Students should also have experience
More informationSQL Server 2016 New Security Features. Gianluca Sartori
SQL Server 2016 New Security Features Gianluca Sartori Our Sponsors Gianluca Sartori Independent SQL Server consultant SQL Server MVP, MCTS, MCITP, MCT Works with SQL Server since version 7 DBA @ Scuderia
More informationMINION ENTERPRISE FEATURES LIST
MINION ENTERPRISE FEATURES LIST Minion Enterprise is an automation and management tool for SQL Server. It provides you with the 10,000- foot view, detailed view, and fine-grained alerting and controls
More informationSecurity context. Technology. Solution highlights
Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for
More informationHosted Exchange 2013
Our Cloud Services Hosted Exchange 2013 As a business professional you re under pressure to cut costs, streamline your business and become more productive and efficient, whilst making yourself more available
More information20398: Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) and On- Premises Tools
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationOffice 365 Business The Microsoft Office you know, powered by the cloud.
Office 365 Business The Microsoft Office you know, powered by the cloud. Power your business with the best-in-class productivity tools from Microsoft the applications you know, always up-to-date and accessible
More informationAcademic Price Sheet Respondent:
Sheet Respondent: INSTRUCTIONS Product and Service List Worksheet Instructions Respondents MUST complete the entire row for either Government, or both. Any software listed for which there is not a corresponding
More informationCode42 Security. Tech Specs Data Protection & Recovery
Tech Specs Data Protection & Recovery Code42 Security Code42 provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the
More informationEvolved Backup and Recovery for the Enterprise
Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationSensitive Data and Key Management for DBAs
Sensitive Data and Key Management for DBAs Encryption Key Management Simplified Jonathan Intner 13 December, 2011 NYOUG, New Yorker Hotel Agenda Introduction Audience Sensitive Data > What makes data sensitive?
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools
Enterprise Management Suite (EMS) & On-Premises Tools Page 1 of 7 Planning for and Managing Devices in the Enterprise: Enterprise Management Suite (EMS) & On-Premises Tools Course 20398A: 4 days; Instructor-Led
More informationSECURE DATA EXCHANGE
POLICY-DRIVEN SOLUTIONS FOR SECURE DATA EXCHANGE Sending and receiving data is a fundamental part of daily business for nearly every organization. Companies need to share financial transaction details,
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationMicrosoft Azure Course Content
Cloud Computing Trainings @ STUCORNER & SHARPENCLOUD Microsoft Azure Course Content Lesson 1: Introduction to Azure 1. Overview of On-premise infrastructure 2. Transition from On-premise to datacenter
More information20533B: Implementing Microsoft Azure Infrastructure Solutions
20533B: Implementing Microsoft Azure Infrastructure Solutions Course Details Course Code: Duration: Notes: 20533B 5 days This course syllabus should be used to determine whether the course is appropriate
More informationFile System NTFS. Section Seven. NTFS, EFS, Partitioning, and Navigating Folders
13 August 2002 File System Section Seven NTFS, EFS, Partitioning, and Navigating Folders NTFS DEFINITION New Technologies File System or NTFS was first applied in Windows NT 3.0 back in 1992. This technology
More informationAdministering a SQL Database Infrastructure Microsoft Official Curriculum (MOC 20764)
Administering a SQL Database Infrastructure Microsoft Official Curriculum (MOC 20764) Course Length: 5 days Course Delivery: Traditional Classroom Online Live Course Overview This 5-day instructor-led
More informationPlanning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools
Planning for and Managing Devices in the Enterprise: Enterprise Mobility Suite (EMS) & On- Premises Tools 20398BA - 5 Days - Instructor-led, Hands-on Introduction This five-day course teaches IT professionals
More informationSecurity Readiness Assessment
Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS
More informationTowards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things
Towards Trustworthy Internet of Things for Mission-Critical Applications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is a game changer Organizations are benefiting from
More informationOracle Database Security Assessment Tool (DBSAT) Overview
Oracle Database Security Assessment Tool (DBSAT) Overview Pedro Lopes Product Manager Oracle Database Security High-level Trends in Security Data breaches becoming bigger and bolder New targets: Data aggregators,
More informationTechno Expert Solutions
Course Content of Microsoft Windows Azzure Developer: Course Outline Module 1: Overview of the Microsoft Azure Platform Microsoft Azure provides a collection of services that you can use as building blocks
More informationIdentity & Access Management
Identity & Access Management THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY WITHOUT COMPROMISING SECURITY? S E C U R I T Y OR P R O D U C T I V I T Y On-premises THE PROBLEM: HOW DO WE ENABLE PRODUCTIVITY
More informationIdentity as the core of enterprise mobility
The current reality Identity as the core of enterprise mobility Azure Active Directory as the control plane Windows Server Active Directory Customers Partners Other directories Self-service Single sign-on
More informationAn Introduction to Key Management for Secure Storage. Walt Hubis, LSI Corporation
An Introduction to Key Management for Secure Storage Walt Hubis, LSI Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may
More informationDatabase Administration for Azure SQL DB
Database Administration for Azure SQL DB Martin Cairney SQL Saturday #582, Melbourne 11 th February 2017 Housekeeping Mobile Phones Please set to stun during sessions Evaluations Please complete a session
More informationClosing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies. Ronit Reger, Senior Program Manager at Microsoft
Closing Keynote: Addressing Data Privacy and GDPR on Microsoft Data Platform Technologies Ronit Reger, Senior Program Manager at Microsoft Session goals 1. Data Privacy and the GDPR - Data privacy as a
More informationMicrosoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps
Microsoft 70-535 Dumps with Valid 70-535 Exam Questions PDF [2018] The Microsoft 70-535 Microsoft Architecting Microsoft Azure Solutions Exam exam is an ultimate source for professionals to retain their
More informationCAN MICROSOFT HELP MEET THE GDPR
CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com
More informationINFO-H-415 Project Overview- Security Database and SQL Server
INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way
More informationThe Pathway to the Cloud Using Azure SQL Managed Instance
1 Sales Order Management Product Manuals 2 Agility Assurance (Security) Efficiency Experience (Apps) Business Growth 3 Catalog Existing application Define criteria for moving to or starting applications
More informationNetwrix Auditor. Administration Guide. Version: /31/2017
Netwrix Auditor Administration Guide Version: 9.5 10/31/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
More informationSoftware Vulnerability Assessment & Secure Storage
Software Vulnerability Assessment & Secure Storage 1 Software Vulnerability Assessment Vulnerability assessment is the process of identifying flaws that reside in an OS, application software or devices
More informationExpert Reference Series of White Papers. BitLocker: Is It Really Secure? COURSES.
Expert Reference Series of White Papers BitLocker: Is It Really Secure? 1-800-COURSES www.globalknowledge.com BitLocker: Is It Really Secure? Mark Mizrahi, Global Knowledge Instructor, MCSE, MCT, CEH Introduction:
More informationPlanning and Operating Azure Stack. How to handle a unicorn?
Planning and Operating Azure Stack How to handle a unicorn? Jakob Gottlieb Svendsen @JakobGSvendsen 10 years in Automation Consultancy Principal Consultant & Chief Developer 15+ years in IT Co-Founder
More informationAzure SQL Database Training. Complete Practical & Real-time Trainings. A Unit of SequelGate Innovative Technologies Pvt. Ltd.
Azure SQL Database Training Complete Practical & Real-time Trainings A Unit of SequelGate Innovative Technologies Pvt. Ltd. AZURE SQL / DBA Training consists of TWO Modules: Module 1: Azure SQL Database
More informationBomgar Discovery Report
BOMGAR DISCOVERY REPORT Bomgar Discovery Report This report is designed to give you important information about the privileged credentials regularly being used to access endpoints and systems on your network,
More informationMicrosoft SQL Server 2016 Always Encrypted
THALES E-SECURITY Microsoft SQL Server 2016 Always Encrypted Integration Guide Version: 1.9 Date: 24 th November 2017 Copyright 2017 Thales UK Limited. All rights reserved. Copyright in this document is
More information70-742: Identity in Windows Server Course Overview
70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure
More informationOracle Database Vault
Oracle Database Vault DBA Administrative Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 2 Database Administration Tasks Summary 3 General Database Administration Tasks 4 Managing
More informationFix Three Common Accounting Firm Data Vulnerabilities
Fix Three Common Accounting Firm Data Vulnerabilities Fix Three Common Accounting Firm Data Vulnerabilities Use these step-by-step guides to protect your business from data thieves Brought to you by: Encyro
More informationEncryption In The Enterprise
Encryption In The Enterprise Twin Cities Oracle User s Group Chris Olive, Sales Engineer Vormetric, Inc. www.vormetric.com Agenda Modern Encryption & Cryptography What Should Be Encrypted and Why Encryption
More informationSecurity Fundamentals for your Privileged Account Security Deployment
Security Fundamentals for your Privileged Account Security Deployment February 2016 Copyright 1999-2016 CyberArk Software Ltd. All rights reserved. CAVSEC-PASSF-0216 Compromising privileged accounts is
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features
More information