DELL EMC DATA DOMAIN WITH RMAN USING ENCRYPTION FOR ORACLE DATABASES
|
|
- Isaac Freeman
- 6 years ago
- Views:
Transcription
1 DELL EMC DATA DOMAIN WITH RMAN USING ENCRYPTION FOR ORACLE DATABASES A Technical Review ABSTRACT With the threat of security breaches, customers are putting in place defenses from these security breaches. One defense mechanism is to encrypt their data. This white paper describes the different ways an Oracle database is encrypted and how it affects Data Domain deduplication and backup time of Oracle databases. June 2017 WHITE PAPER
2 The information in this publication is provided as is. Dell EMC makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any Dell EMC software described in this publication requires an applicable software license. EMC 2, EMC, the EMC logo, are registered trademarks or trademarks of Dell EMC in the United States and other countries. All other trademarks used herein are the property of their respective owners. Copyright 2017 Dell EMC. All rights reserved. Published in the USA., 06/17, White Paper, H16288 Dell EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice. EMC is now part of the Dell group of companies. 2
3 TABLE OF CONTENTS EXECUTIVE SUMMARY...4 Introduction... 4 Audience... 4 DELL EMC DATA DOMAIN SYSTEMS...4 Technical overview... 4 THE ORACLE ENCRYPTION PROCESS...5 Introduction... 5 RMAN encryption... 5 Oracle TDE encryption... 5 Vormetric Transparent encryption... 6 ORACLE ENCRYPTION TEST SCENARIOS AND RESULTS...7 CPU utilization... 7 Deduplication impact HOW DATA DOMAIN ORACLE OPTIMIZED DEDUPLICATION IMPROVES TDE DEDUPLICATION...12 CONCLUSION...12 ACKNOWLEDGEMENTS
4 EXECUTIVE SUMMARY INTRODUCTION As more data breaches are reported in the news, enterprises are finding ways to defend against those breaches. One tactic is to encrypt their valuable data stored in databases. This white paper describes in detail the different approaches to encrypting Oracle data and how the different encryption approaches affect deduplication on Dell EMC Data Domain systems as well as backup times. AUDIENCE This white paper is intended for Oracle database administrators, systems engineers, Dell EMC partners and members of the Dell EMC and partner professional services community who are looking to understand the implications of encrypting an Oracle database and the impacts on backup times and deduplication with Dell EMC Data Domain systems. DELL EMC DATA DOMAIN SYSTEMS TECHNICAL OVERVIEW The Data Domain deduplication engine is designed to be data agnostic. It has the ability to ingest data of all types (file, Oracle, SQL Server, Exchange, SharePoint), segment the stream along natural breakpoints and deduplicate the segments if the identical segment was found to exist on the Data Domain system. The key is that the segments have to be exactly identical to be deduplicated. In this white paper, we will review how the Data Domain system handles deduplication with encrypted Oracle RMAN data. 4
5 THE ORACLE ENCRYPTION PROCESS INTRODUCTION When you talk about encrypting an Oracle database, there are multiple points on where encryption can take place depending on what encryption is used. Below is an illustration of where encryption can be introduced into the data stream. RMAN ENCRYPTION When Oracle RMAN backs up the database, encryption takes place after RMAN reads the Oracle block and before it sends it to the backup media. If RMAN backs up the identical database twice with absolutely no changes to the database with RMAN encryption enabled for backups, the resulting two backups will be encrypted. RMAN backup encryption is encryption in real time. The encryption algorithm is random. It applies different values every time the backup runs. So even with the same database, the backup data of one backup is totally different from the next backup after RMAN encryption is applied. Since there is no identical segment between each backup, the deduplication benefit of Data Domain systems is totally diminished. Unfortunately, the Data Domain system relies on finding identical segments in the stream to deduplicate backups to economize space used on the Data Domain system. RMAN will be able to stream the backup to the Data Domain system and the backup will be successful, but the deduplication ratio will suffer. No further discussion is needed with RMAN encryption since it clearly degrades deduplication effectiveness and provides no benefit to shortening the backup time since all segments of the backup need to be transferred to the Data Domain system. Dell EMC s best practice is to disable RMAN encryption. If there are concerns about transmitting clear text backup data across the network, DD Boost for RMAN encryption can be enabled so that RMAN backup data can be encrypted after deduplication at the Oracle server and before transmitting across the network. Since the encryption happens after deduplication and before the segment leaves the Oracle server (in other words, it is in-flight encryption), deduplication ratios will not suffer on the Data Domain system. ORACLE TDE ENCRYPTION Transparent Data Encryption (often abbreviated to TDE) is a technology employed by Oracle to encrypt database files. TDE offers encryption at file level. TDE solves the problem of protecting data-at-rest, encrypting databases both on the hard drive and consequently on backup media. Enterprises typically employ TDE to solve compliance issues such as PCI DSS which requires the protection of data-at-rest. Oracle requires the Oracle Advanced Security option for Oracle 10g and 11g to enable TDE. Oracle TDE addresses encryption requirements associated with public and private privacy and security mandates such as PCI and California SB Oracle Advanced Security TDE column encryption was introduced in Oracle Database 10g Release 2. Oracle Advanced Security TDE tablespace encryption and support for Hardware Security Modules (HSMs) were introduced with Oracle Database 11gR1. Keys for TDE can be stored in an HSM to manage keys across servers, protect keys with hardware, and introduce a separation of duties. The same key is used to encrypt columns in a table, regardless of the number of columns to be encrypted. These encryption keys are encrypted using the database server master key and are stored in a dictionary table in the database. 5
6 VORMETRIC TRANSPARENT ENCRYPTION Vormetric Transparent Encryption enables data-at-rest encryption without re-engineering applications, databases or infrastructure. Vormetric Transparent Encryption Agents are installed above the file system on servers or virtual machines to enforce data security and compliance policies. With Vormetric encryption, since data is transparent when RMAN receives it from the database, Data Domain inflight encryption can ensure end to end encryption. User Application Database Vormetric Transparent Encryption Filesystem and Volume Managers Storage No application changes are required for Vormetric Transparent Encryption software to deliver data encryption, privileged user access control and security intelligence 6
7 ORACLE ENCRYPTION TEST SCENARIOS AND RESULTS CPU UTILIZATION As a baseline, we see the CPU utilization of an unencrypted backup for both the initial and subsequent backup using Data Domain Boost. The key observation noted for this graph is that the subsequent backup CPU utilization drops to no significant load considerably earlier than the initial backup. This can be accounted for because DD Boost found more duplicate segments in the subsequent backup as compared to the initial backup. DD Boost Backup Initial Second Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 7
8 Below are test results comparing TDE CPU utilization as compared to an unencrypted database. Note that the CPU utilization for the TDE database backup is on par with the unencrypted database backup. The TDE database takes an additional minute to complete, about 14% longer than the unencrypted database Initial DD Boost Backup TDE Baseline 22:51 23:07 23:23 23:39 23:55 24:11 24:27 24:43 24:59 25:15 25:31 25:47 26:03 26:19 26:35 26:51 27:07 27:23 27:39 27:55 28:11 28:27 28:43 28:59 29:15 29:31 29:47 30:03 30:19 30:35 30:51 8
9 The second TDE database backup has the same CPU utilization as the unencrypted database while the TDE database backup is taking about 30% longer than the unencrypted database. 100 Subsequent DD Boost Backup TDE Baseline Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 9
10 The Vormetric backup CPU utilization is quite similar to the unencrypted database. However, as in the TDE database backup, the duration for the Vormetric database backup is about 16% longer than the unencrypted database backup time. This is very close to the 14% longer backup time associated with the TDE database backup time Initial DD Boost Backup Vormetric Baseline Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 10
11 With the subsequent backup of the Vormetric database, the CPU utilization is again similar to the unencrypted database and it takes about 12% longer to finish Subsequent DD Boost Backup Vormetric Baseline Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 11
12 DEDUPLICATION IMPACT Considering the three encryption methods introduced at the beginning of this whitepaper, RMAN encryption is not an interesting candidate to investigate when used with a deduplication solution since the encryption process happens dynamically at backup time and the output of RMAN will always result in poor deduplication ratios. With Vormetric encryption, the data is decrypted above the filesystem layer, just before it is passed to Oracle, so the actual backup is not encrypted by Vormetric. The interesting case is with TDE databases since the data is transferred to the Data Domain system in an encrypted format. Below are results from backing up an unencrypted database and a TDE database. Based on the deduplication results between the two database backups, TDE affects the deduplication ratio by a factor of 2.1x using a 5% daily change rate. Unencrypted backups with 5% daily change rate Full Backup Pre-comp (GiB) Post-comp(GiB) Total-Comp Factor Initial Full x Day x Day x Day x Day x Day x TDE backups with 5% daily change rate Full Backup Pre-comp (GiB) Post-comp(GiB) Total-Comp Factor Initial Full x Day x Day x Day x Day x Day x HOW DATA DOMAIN ORACLE OPTIMIZED DEDUPLICATION IMPROVES TDE DEDUPLICATION There is a special feature that changes the default behavior of Data Domain systems to be more sensitive to Oracle RMAN backup streams (see whitepaper for full details: In a Proof Of Concept, a customer tested out an Oracle TDE database with 132 GB in size with no changes. The results are shown below with the Data Domain Oracle Optimized Deduplication feature enabled. 1 st Full 1.3 X 2 nd Full X 3 rd Full X CONCLUSION The CPU utilization of both TDE and Vormetric ranges from 12% to 30% more time as compared to an unencrypted database, but does not utilize the CPU more than an unencrypted database. TDE encryption does affect the deduplication ratio as compared to a database that is not encrypted as we have seen with a 5% daily change rate of the database reducing the deduplication ratio by a factor of 2.1x. With Data Domain Oracle Optimized Deduplication enabled on the Data Domain system mtree, customers will achieve significantly improved deduplication of TDE RMAN backups. 12
13 ACKNOWLEDGEMENTS The author would like to Allen Yen, Rick Rasmussen and Diana Yang for providing the test results featured in this paper. 13
WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS?
Why Data Domain Series WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS? Why you should take the time to read this paper Provide data isolation by tenant (Secure logical data isolation for each tenant
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 31 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: + 38516306373 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, students learn how they can use Oracle Database features to meet
More informationDISK LIBRARY FOR MAINFRAME (DLM)
DISK LIBRARY FOR MAINFRAME (DLM) Cloud Storage for Data Protection and Long-Term Retention ABSTRACT Disk Library for mainframe (DLm) is Dell EMC s industry leading virtual tape library for IBM z Systems
More informationDell EMC SAP HANA Appliance Backup and Restore Performance with Dell EMC Data Domain
Dell EMC SAP HANA Appliance Backup and Restore Performance with Dell EMC Data Domain Performance testing results using Dell EMC Data Domain DD6300 and Data Domain Boost for Enterprise Applications July
More informationDELL EMC DATA DOMAIN ENCRYPTION
WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers
More informationBraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!
BraindumpsIT http://www.braindumpsit.com BraindumpsIT - IT Certification Company provides Braindumps pdf! Exam : E20-891 Title : Backup Recovery Solutions Expert Exam for Technology Architects Vendor :
More informationDELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE
WHITEPAPER DELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE A Detailed Review ABSTRACT This white paper introduces Dell EMC Data Domain Extended Retention software that increases the storage scalability
More informationVormetric Data Security
Vormetric Data Security Simplifying Data Security for the Enterprise www.vormetric.com Agenda! Introductions! Vormetric Overview! Data Security Architecture Challenges! Product Architecture & Use Cases!
More informationKey Drivers for Data Security
Security User Management Access Control Data Protection Monitoring Key Drivers for Data Security Regulatory Compliance Sarbanes-Oxley (SOX), Foreign Exchange Instruments and Exchange Law (J-SOX) EU Privacy
More informationVMAX3 AND VMAX ALL FLASH WITH CLOUDARRAY
VMAX3 AND VMAX ALL FLASH WITH CLOUDARRAY HYPERMAX OS Integration with CloudArray ABSTRACT With organizations around the world facing compliance regulations, an increase in data, and a decrease in IT spending,
More informationChoosing the level that works for you!
The Encryption Pyramid: Choosing the level that works for you! Eysha S. Powers eysha@us.ibm.com IBM, Enterprise Cryptography Extensive use of encryption is one of the most impactful ways to help reduce
More informationAcceleration Performance Tests for IBM Rational ClearTeam Explorer
Acceleration Performance Tests for IBM Rational ClearTeam Explorer Conducted by Array Networks for IBM Ready for Rational ClearTeam Explorer Certification Table of Contents White Paper Executive Summary
More informationBACKUP AND RECOVERY FOR ORACLE DATABASE 11g WITH EMC DEDUPLICATION A Detailed Review
White Paper BACKUP AND RECOVERY FOR ORACLE DATABASE 11g WITH EMC DEDUPLICATION EMC GLOBAL SOLUTIONS Abstract This white paper provides guidelines for the use of EMC Data Domain deduplication for Oracle
More informationVIRTUALIZED BACKUP ADVANTAGES OF THE DELL POWERVAULT DL BACKUP TO DISK APPLIANCE POWERED BY SYMANTEC BACKUP EXEC 2010 R3
VIRTUALIZED BACKUP ADVANTAGES OF THE DELL POWERVAULT DL BACKUP TO DISK APPLIANCE POWERED BY SYMANTEC BACKUP EXEC Companies of all sizes are looking to move away from traditional inefficient and costly
More informationTechnical factsheet Cloud Backup
Technical factsheet The Cloud Network - fast, reliable, automatic, offsite, secure backup and disaster recovery to make your life easier! No more worrying about on-premised backup failure, or anyone missing
More informationEMC XTREMCACHE ACCELERATES MICROSOFT SQL SERVER
White Paper EMC XTREMCACHE ACCELERATES MICROSOFT SQL SERVER EMC XtremSF, EMC XtremCache, EMC VNX, Microsoft SQL Server 2008 XtremCache dramatically improves SQL performance VNX protects data EMC Solutions
More informationVxRack System SDDC Enabling External Services
VxRack System SDDC Enabling External Services May 2018 H17144 Abstract This document describes how to enable external services for a VxRack System SDDC. Use cases included are Dell EMC Avamar-based backup
More informationEMC Disk Library Automated Tape Caching Feature
EMC Disk Library Automated Tape Caching Feature A Detailed Review Abstract This white paper details the EMC Disk Library configuration and best practices when using the EMC Disk Library Automated Tape
More informationOracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015
Oracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 1 Controls for Privileged Accounts 2 Privilege User Access Controls on Application Data with Realms
More informationAcceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC)
Acceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC) Conducted by Certeon for IBM Ready for Rational CCRC Certification November 28 PAGE 1 Table of Contents Certeon Acceleration
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationEMC DATA DOMAIN PRODUCT OvERvIEW
EMC DATA DOMAIN PRODUCT OvERvIEW Deduplication storage for next-generation backup and archive Essentials Scalable Deduplication Fast, inline deduplication Provides up to 65 PBs of logical storage for long-term
More informationPERFORMING MICROSOFT SQL ALWAYSON AVAILABILITY GROUP BACKUPS ON AMAZON WEB SERVER AND MICROSOFT AZURE WITH DELL EMC AVAMAR
PERFORMING MICROSOFT SQL ALWAYSON AVAILABILITY GROUP BACKUPS ON AMAZON WEB SERVER AND MICROSOFT AZURE WITH DELL EMC AVAMAR November 2017 ABSTRACT This white paper describes how to configure a Microsoft
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationEMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE
White Paper EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE EMC XtremSF, EMC XtremCache, EMC Symmetrix VMAX and Symmetrix VMAX 10K, XtremSF and XtremCache dramatically improve Oracle performance Symmetrix
More informationOracle Database Vault
Oracle Database Vault DBA Administrative Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 2 Database Administration Tasks Summary 3 General Database Administration Tasks 4 Managing
More informationINFO-H-415 Project Overview- Security Database and SQL Server
INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way
More informationAn Oracle White Paper September Security and the Oracle Database Cloud Service
An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
More informationOpenManage Essentials Managing Firmware and Driver Compliance by using Multiple Baselines
OpenManage Essentials Managing Firmware and Driver Compliance by using Multiple Baselines This technical white paper provides information about managing hardware revision baseline in a data center by using
More informationVideo Surveillance EMC Storage with LenSec Perspective VMS
Video Surveillance EMC Storage with LenSec Perspective VMS Version 1.0 Functional Verification Guide H14258 Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC
More informationExchange 2003 Archiving for Operational Efficiency
Exchange 2003 Archiving for Operational Efficiency Enabled by EmailXtender Reference Architecture EMC Global Solutions Operations EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationEMC Data Domain for Archiving Are You Kidding?
EMC Data Domain for Archiving Are You Kidding? Bill Roth / Bob Spurzem EMC EMC 1 Agenda EMC Introduction Data Domain Enterprise Vault Integration Data Domain NetBackup Integration Q & A EMC 2 EMC Introduction
More informationNetwork Security Protection Alternatives for the Cloud
A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances
More informationMaintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS
Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and VMware s Distributed
More informationOracle Advanced Security Transparent Data Encryption (TDE)
Oracle Advanced Security Transparent Data Encryption (TDE) Frequently Asked Questions (FAQ) M A R C H 2 0 1 8 Product Overview Q. What does Transparent Data Encryption (TDE) provide? A: TDE transparently
More informationDefendX Software Control-Audit
DefendX Software Control-Audit Installation Overview This guide details the components of DefendX Software Control-Audit along with their related documentation from an administrator s perspective. 1 Table
More informationSensitive Data and Key Management for DBAs
Sensitive Data and Key Management for DBAs Encryption Key Management Simplified Jonathan Intner 13 December, 2011 NYOUG, New Yorker Hotel Agenda Introduction Audience Sensitive Data > What makes data sensitive?
More informationOracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero
Oracle Security Products and Their Relationship to EBS Presented By: Christopher Carriero 1 Agenda Confidential Data in Corporate Systems Sensitive Data in the Oracle EBS What Are the Oracle Security Products
More informationSOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM
SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.
More informationVendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo
Vendor: Oracle Exam Code: 1Z0-528 Exam Name: Oracle Database 11g Security Essentials Version: Demo QUESTION 1 Which of the following tasks is the first task to perform when implementing Oracle Database
More informationEnhance your Cloud Security with AMD EPYC Hardware Memory Encryption
Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption White Paper October, 2018 Introduction Consumers and enterprises are becoming increasingly concerned about the security of their digital
More informationInteroperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption
Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption December 2015 Executive Summary Thales payshield enterprise
More informationDELL EMC DATA DOMAIN SISL SCALING ARCHITECTURE
WHITEPAPER DELL EMC DATA DOMAIN SISL SCALING ARCHITECTURE A Detailed Review ABSTRACT While tape has been the dominant storage medium for data protection for decades because of its low cost, it is steadily
More informationAn Oracle White Paper February Optimizing Storage for Oracle PeopleSoft Applications
An Oracle White Paper February 2011 Optimizing Storage for Oracle PeopleSoft Applications Executive Overview Enterprises are experiencing an explosion in the volume of data required to effectively run
More informationHow to Protect SAP HANA Applications with the Data Protection Suite
White Paper Business Continuity How to Protect SAP HANA Applications with the Data Protection Suite As IT managers realize the benefits of in-memory database technology, they are accelerating their plans
More informationOracle Database Vault
An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command
More informationEMC Celerra Replicator V2 with Silver Peak WAN Optimization
EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN
More informationIBM Real-time Compression and ProtecTIER Deduplication
Compression and ProtecTIER Deduplication Two technologies that work together to increase storage efficiency Highlights Reduce primary storage capacity requirements with Compression Decrease backup data
More informationDELL EMC DATA DOMAIN OPERATING SYSTEM
DATA SHEET DD OS Essentials High-speed, scalable deduplication Up to 68 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability Data invulnerability architecture
More informationMaintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS
Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and
More informationEMC XTREMCACHE ACCELERATES ORACLE
White Paper EMC XTREMCACHE ACCELERATES ORACLE EMC XtremSF, EMC XtremCache, EMC VNX, EMC FAST Suite, Oracle Database 11g XtremCache extends flash to the server FAST Suite automates storage placement in
More informationAn Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach
An Oracle White Paper November 2012 Primavera Unifier Integration Overview: A Web Services Integration Approach Introduction Oracle s Primavera Unifier offers an extensible interface platform based on
More informationOracle Advanced Compression Helps Global Fortune 500 Company Meet Storage Savings Initiative O R A C L E W H I T E P A P E R F E B R U A R Y
Oracle Advanced Compression Helps Global Fortune 500 Company Meet Storage Savings Initiative O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 7 Table of Contents Introduction 2 Oracle Advanced Compression
More informationE Backup Recovery Solutions Expert Exam for Technology Architects - Retirement
Dell EMC Education Services E20-891 Backup Recovery Solutions Expert Exam for Technology Architects - Retirement ATTENTION: The Technology Architect exam E20-891 Backup Recovery Solutions Expert Exam for
More informationThe Realities of Data Security and Compliance: Compliance Security
The Realities of Data Security and Compliance: Compliance Security Ulf Mattsson, CTO, Protegrity Ulf.mattsson @ protegrity.com Bio - A Passion for Sailing and International Travel 2 Ulf Mattsson 20 years
More informationAn Oracle White Paper October Advanced Compression with Oracle Database 11g
An Oracle White Paper October 2011 Advanced Compression with Oracle Database 11g Oracle White Paper Advanced Compression with Oracle Database 11g Introduction... 3 Oracle Advanced Compression... 4 Compression
More informationWhat's New with Data Domain in 2014? Name
1 What's New with Data Domain in 2014? Name 2 Protection Storage Architecture Blueprint for Transformation and Investment Protection D A TA M A N A G E ME N T S E R V I C E S Policy & Storage Management,
More informationSecuring VSPEX VMware View 5.1 End- User Computing Solutions with RSA
Design Guide Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA VMware vsphere 5.1 for up to 2000 Virtual Desktops EMC VSPEX Abstract This guide describes required components and a configuration
More informationTechnical Note. Restoring Dell EMC Avamar Checkpoint Backups from a Dell EMC Data Domain System After a Single Node Avamar Failure
Restoring Dell EMC Avamar Checkpoint Backups from a Dell EMC Data Domain System After a Single Node Avamar Failure 300-015-218 REV 03 February 2018 Revision history... 2 Purpose... 2 Related documentation...2
More informationARCSERVE UNIFIED DATA PROTECTION
ARCSERVE UNIFIED DATA PROTECTION Arcserve Unified Data Protection (UDP) combines industry-proven backup, disaster recovery and true global deduplication technologies within one solution, delivering enterprise-grade
More informationTransparent Solutions for Security and Compliance with Oracle Database 11g. An Oracle White Paper September 2008
Transparent Solutions for Security and Compliance with Oracle Database 11g An Oracle White Paper September 2008 Transparent Solutions for Privacy and Compliance with Oracle Database 11g INTRODUCTION Over
More informationA Foxit Software Company White Paper
A Foxit Software Company White Paper www.foxitsoftware.com Foxit Software Company, LLC. June 2009 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise...
More informationConnecting EMC DiskXtender for Windows to EMC Centera
Connecting EMC DiskXtender for Windows to EMC Centera Best Practices Planning Abstract This white paper provides details on building the connection string that EMC DiskXtender for Windows uses to connect
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationDatabase access control, activity monitoring and real time protection
Omega Core Audit Whitepaper 2.8 Whitepaper Omega Core Audit For Oracle Database July, 2016 Database access control, activity monitoring and real time protection Introduction The database is usually the
More informationMigrating a Business-Critical Application to Windows Azure
Situation Microsoft IT wanted to replace TS Licensing Manager, an application responsible for critical business processes. TS Licensing Manager was hosted entirely in Microsoft corporate data centers,
More informationOracle Database Vault
Oracle Database Vault Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Executive Overview 2 Installation 3 Pre-Installation Notes 3 Separation of Duty 3 Separation of Duty Matrix 4 Oracle Database
More informationDell EMC Ready System for VDI on XC Series
Dell EMC Ready System for VDI on XC Series Citrix XenDesktop for Dell EMC XC Series Hyperconverged Appliance March 2018 H16969 Deployment Guide Abstract This deployment guide provides instructions for
More informationOracle Data Masking and Subsetting
Oracle Data Masking and Subsetting Frequently Asked Questions (FAQ) S E P T E M B E R 2 0 1 6 Product Overview Q: What is Data Masking and Subsetting? A: Data Masking or Static Data Masking is the process
More informationChanging default password of root user for idrac9 by using Dell EMC License Manager
Changing default password of root user for idrac9 by using Dell EMC License Manager This technical white paper describes how to change the default password of root user on Dell EMC idrac9. Dell EMC Engineering
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationMySQL Enterprise Security
MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationCopyright 2015 EMC Corporation. All rights reserved. Published in the USA.
This Reference Architecture Guide describes, in summary, a solution that enables IT organizations to quickly and effectively provision and manage Oracle Database as a Service (DBaaS) on Federation Enterprise
More informationPrerequisites for Using Enterprise Manager with Your Primavera Applications
Oracle Enterprise Manager For Oracle Construction and Engineering Configuration Guide for On Premises Version 18 August 2018 Contents Introduction... 5 Prerequisites for Using Enterprise Manager with
More informationSyncplicity Panorama with Isilon Storage. Technote
Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate
More informationEMC CLARiiON CX3-80 EMC Metropolitan Recovery for SQL Server 2005 Enabled by Replication Manager and MirrorView/S
Enterprise Solutions for Microsoft SQL Server 2005 EMC CLARiiON CX3-80 EMC Metropolitan Recovery for SQL Server 2005 Enabled by Replication Manager and MirrorView/S Reference Architecture EMC Global Solutions
More informationEntrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4
Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4 July 2008 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationOracle Database Cloud for Oracle DBAs Ed 3
Oracle University Contact Us: 800-260-690 Oracle Database Cloud for Oracle DBAs Ed 3 Duration: 3 Days What you will learn Note: No hands-on lab environment for the Training On Demand course format This
More informationNTP Software File Reporter
NTP Software File Reporter Installation Overview This guide details the components of NTP Software File Reporter along with their related documentation from an administrator s perspective. Copyright 2016-2017
More informationIBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture
IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM
More informationDELL EMC VMAX UNISPHERE 360
DELL EMC VMAX UNISPHERE 360 ABSTRACT Using Unisphere 360 to consolidate the management of VMAX storage system offers many benefits. This management interface offers a single interface where all enrolled
More informationDuration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced)
Administering a SQL Database Infrastructure Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Overview: This five-day instructor-led course provides students who administer
More informationChanging unique password of root user for idrac9 by using Dell EMC License Manager
Changing unique password of root user for idrac9 by using Dell EMC License Manager This technical white paper describes how to change the default password of a root user on idrac9. Dell EMC Engineering
More informationDell EMC Ready Solution for VMware vcloud NFV 3.0 OpenStack Edition Platform
Dell EMC Ready Solution for VMware vcloud NFV 3.0 OpenStack Edition Platform Deployment Manual Document Index Guide for VMware NFV 3.0 with VMware Integrated OpenStack 5.0 with Kubernetes Dell Engineering
More informationEMC CLARiiON CX3-80. Enterprise Solutions for Microsoft SQL Server 2005
Enterprise Solutions for Microsoft SQL Server 2005 EMC CLARiiON CX3-80 EMC Long Distance Recovery for SQL Server 2005 Enabled by Replication Manager and RecoverPoint CRR Reference Architecture EMC Global
More informationOptimizing Tiered Storage Workloads with Precise for Storage Tiering
Applied Technology Abstract By introducing Enterprise Flash Drives to EMC Symmetrix and CLARiiON storage systems, EMC revitalized the importance of tiered storage. Optimizing the use of these tiers provides
More informationChannel FAQ: Smartcrypt Appliances
Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise
More informationNTP Software File Reporter Data Collection Agent for Windows
NTP Software File Reporter Data Collection Agent for Windows Installation Guide Version 8.1 This guide provides quick instructions for the installation and initial configuration of NTP Software Data Collection
More informationOracle Advanced Compression. An Oracle White Paper June 2007
Oracle Advanced Compression An Oracle White Paper June 2007 Note: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationDLm TM TRANSFORMS MAINFRAME TAPE! WHY DELL EMC DISK LIBRARY FOR MAINFRAME?
DLm TM TRANSFORMS MAINFRAME TAPE! WHY DELL EMC DISK LIBRARY FOR MAINFRAME? The Business Value of Disk Library for mainframe OVERVIEW OF THE BENEFITS DLM VERSION 5.0 DLm is designed to reduce capital and
More informationEMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007
Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC
More informationThe Evolution of Data Center Security, Risk and Compliance
#SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and
More informationOracle Database 11g: New Features for Administrators DBA Release 2
Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change
More informationNovember, Executive Summary
Bloombase Interoperability Program P1 2011 Bloombase Interoperability of Bloombase StoreSafe and ATTO Celerity Fibre- Channel Host Bus Adapter and ATTO FibreConnect Fibre-Channel Switch for Transparent
More informationTape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies
Tape Sucks for Long-Term Retention Time to Move to the Cloud How Cloud is Transforming Legacy Data Strategies INTRODUCTION Tapes suck for long term retention (LTR) Unknown content Locked in proprietary
More informationInstalling Acronis Backup Advanced Edition
2015 Installing Acronis Backup Advanced Edition BEST PRACTISE Table of Contents Acronis Backup Advanced components... 4 Management Server... 4 Acronis Storage Node... 4 Agents / Appliance... 4 Bootable
More informationSQL Server 2008 Consolidation
Technology Concepts and Business Considerations Abstract The white paper describes how SQL Server 2008 consolidation provides solutions to basic business problems pertaining to the usage of multiple SQL
More information