DELL EMC DATA DOMAIN WITH RMAN USING ENCRYPTION FOR ORACLE DATABASES

Size: px
Start display at page:

Download "DELL EMC DATA DOMAIN WITH RMAN USING ENCRYPTION FOR ORACLE DATABASES"

Transcription

1 DELL EMC DATA DOMAIN WITH RMAN USING ENCRYPTION FOR ORACLE DATABASES A Technical Review ABSTRACT With the threat of security breaches, customers are putting in place defenses from these security breaches. One defense mechanism is to encrypt their data. This white paper describes the different ways an Oracle database is encrypted and how it affects Data Domain deduplication and backup time of Oracle databases. June 2017 WHITE PAPER

2 The information in this publication is provided as is. Dell EMC makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any Dell EMC software described in this publication requires an applicable software license. EMC 2, EMC, the EMC logo, are registered trademarks or trademarks of Dell EMC in the United States and other countries. All other trademarks used herein are the property of their respective owners. Copyright 2017 Dell EMC. All rights reserved. Published in the USA., 06/17, White Paper, H16288 Dell EMC believes the information in this document is accurate as of its publication date. The information is subject to change without notice. EMC is now part of the Dell group of companies. 2

3 TABLE OF CONTENTS EXECUTIVE SUMMARY...4 Introduction... 4 Audience... 4 DELL EMC DATA DOMAIN SYSTEMS...4 Technical overview... 4 THE ORACLE ENCRYPTION PROCESS...5 Introduction... 5 RMAN encryption... 5 Oracle TDE encryption... 5 Vormetric Transparent encryption... 6 ORACLE ENCRYPTION TEST SCENARIOS AND RESULTS...7 CPU utilization... 7 Deduplication impact HOW DATA DOMAIN ORACLE OPTIMIZED DEDUPLICATION IMPROVES TDE DEDUPLICATION...12 CONCLUSION...12 ACKNOWLEDGEMENTS

4 EXECUTIVE SUMMARY INTRODUCTION As more data breaches are reported in the news, enterprises are finding ways to defend against those breaches. One tactic is to encrypt their valuable data stored in databases. This white paper describes in detail the different approaches to encrypting Oracle data and how the different encryption approaches affect deduplication on Dell EMC Data Domain systems as well as backup times. AUDIENCE This white paper is intended for Oracle database administrators, systems engineers, Dell EMC partners and members of the Dell EMC and partner professional services community who are looking to understand the implications of encrypting an Oracle database and the impacts on backup times and deduplication with Dell EMC Data Domain systems. DELL EMC DATA DOMAIN SYSTEMS TECHNICAL OVERVIEW The Data Domain deduplication engine is designed to be data agnostic. It has the ability to ingest data of all types (file, Oracle, SQL Server, Exchange, SharePoint), segment the stream along natural breakpoints and deduplicate the segments if the identical segment was found to exist on the Data Domain system. The key is that the segments have to be exactly identical to be deduplicated. In this white paper, we will review how the Data Domain system handles deduplication with encrypted Oracle RMAN data. 4

5 THE ORACLE ENCRYPTION PROCESS INTRODUCTION When you talk about encrypting an Oracle database, there are multiple points on where encryption can take place depending on what encryption is used. Below is an illustration of where encryption can be introduced into the data stream. RMAN ENCRYPTION When Oracle RMAN backs up the database, encryption takes place after RMAN reads the Oracle block and before it sends it to the backup media. If RMAN backs up the identical database twice with absolutely no changes to the database with RMAN encryption enabled for backups, the resulting two backups will be encrypted. RMAN backup encryption is encryption in real time. The encryption algorithm is random. It applies different values every time the backup runs. So even with the same database, the backup data of one backup is totally different from the next backup after RMAN encryption is applied. Since there is no identical segment between each backup, the deduplication benefit of Data Domain systems is totally diminished. Unfortunately, the Data Domain system relies on finding identical segments in the stream to deduplicate backups to economize space used on the Data Domain system. RMAN will be able to stream the backup to the Data Domain system and the backup will be successful, but the deduplication ratio will suffer. No further discussion is needed with RMAN encryption since it clearly degrades deduplication effectiveness and provides no benefit to shortening the backup time since all segments of the backup need to be transferred to the Data Domain system. Dell EMC s best practice is to disable RMAN encryption. If there are concerns about transmitting clear text backup data across the network, DD Boost for RMAN encryption can be enabled so that RMAN backup data can be encrypted after deduplication at the Oracle server and before transmitting across the network. Since the encryption happens after deduplication and before the segment leaves the Oracle server (in other words, it is in-flight encryption), deduplication ratios will not suffer on the Data Domain system. ORACLE TDE ENCRYPTION Transparent Data Encryption (often abbreviated to TDE) is a technology employed by Oracle to encrypt database files. TDE offers encryption at file level. TDE solves the problem of protecting data-at-rest, encrypting databases both on the hard drive and consequently on backup media. Enterprises typically employ TDE to solve compliance issues such as PCI DSS which requires the protection of data-at-rest. Oracle requires the Oracle Advanced Security option for Oracle 10g and 11g to enable TDE. Oracle TDE addresses encryption requirements associated with public and private privacy and security mandates such as PCI and California SB Oracle Advanced Security TDE column encryption was introduced in Oracle Database 10g Release 2. Oracle Advanced Security TDE tablespace encryption and support for Hardware Security Modules (HSMs) were introduced with Oracle Database 11gR1. Keys for TDE can be stored in an HSM to manage keys across servers, protect keys with hardware, and introduce a separation of duties. The same key is used to encrypt columns in a table, regardless of the number of columns to be encrypted. These encryption keys are encrypted using the database server master key and are stored in a dictionary table in the database. 5

6 VORMETRIC TRANSPARENT ENCRYPTION Vormetric Transparent Encryption enables data-at-rest encryption without re-engineering applications, databases or infrastructure. Vormetric Transparent Encryption Agents are installed above the file system on servers or virtual machines to enforce data security and compliance policies. With Vormetric encryption, since data is transparent when RMAN receives it from the database, Data Domain inflight encryption can ensure end to end encryption. User Application Database Vormetric Transparent Encryption Filesystem and Volume Managers Storage No application changes are required for Vormetric Transparent Encryption software to deliver data encryption, privileged user access control and security intelligence 6

7 ORACLE ENCRYPTION TEST SCENARIOS AND RESULTS CPU UTILIZATION As a baseline, we see the CPU utilization of an unencrypted backup for both the initial and subsequent backup using Data Domain Boost. The key observation noted for this graph is that the subsequent backup CPU utilization drops to no significant load considerably earlier than the initial backup. This can be accounted for because DD Boost found more duplicate segments in the subsequent backup as compared to the initial backup. DD Boost Backup Initial Second Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 7

8 Below are test results comparing TDE CPU utilization as compared to an unencrypted database. Note that the CPU utilization for the TDE database backup is on par with the unencrypted database backup. The TDE database takes an additional minute to complete, about 14% longer than the unencrypted database Initial DD Boost Backup TDE Baseline 22:51 23:07 23:23 23:39 23:55 24:11 24:27 24:43 24:59 25:15 25:31 25:47 26:03 26:19 26:35 26:51 27:07 27:23 27:39 27:55 28:11 28:27 28:43 28:59 29:15 29:31 29:47 30:03 30:19 30:35 30:51 8

9 The second TDE database backup has the same CPU utilization as the unencrypted database while the TDE database backup is taking about 30% longer than the unencrypted database. 100 Subsequent DD Boost Backup TDE Baseline Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 9

10 The Vormetric backup CPU utilization is quite similar to the unencrypted database. However, as in the TDE database backup, the duration for the Vormetric database backup is about 16% longer than the unencrypted database backup time. This is very close to the 14% longer backup time associated with the TDE database backup time Initial DD Boost Backup Vormetric Baseline Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 10

11 With the subsequent backup of the Vormetric database, the CPU utilization is again similar to the unencrypted database and it takes about 12% longer to finish Subsequent DD Boost Backup Vormetric Baseline Time (min) 23:05 23:21 23:37 23:53 24:09 24:25 24:41 24:57 25:13 25:29 25:45 26:01 26:17 26:33 26:49 27:05 27:21 27:37 27:53 28:09 28:25 28:41 28:57 29:13 29:29 29:45 30:01 30:17 30:33 30:49 11

12 DEDUPLICATION IMPACT Considering the three encryption methods introduced at the beginning of this whitepaper, RMAN encryption is not an interesting candidate to investigate when used with a deduplication solution since the encryption process happens dynamically at backup time and the output of RMAN will always result in poor deduplication ratios. With Vormetric encryption, the data is decrypted above the filesystem layer, just before it is passed to Oracle, so the actual backup is not encrypted by Vormetric. The interesting case is with TDE databases since the data is transferred to the Data Domain system in an encrypted format. Below are results from backing up an unencrypted database and a TDE database. Based on the deduplication results between the two database backups, TDE affects the deduplication ratio by a factor of 2.1x using a 5% daily change rate. Unencrypted backups with 5% daily change rate Full Backup Pre-comp (GiB) Post-comp(GiB) Total-Comp Factor Initial Full x Day x Day x Day x Day x Day x TDE backups with 5% daily change rate Full Backup Pre-comp (GiB) Post-comp(GiB) Total-Comp Factor Initial Full x Day x Day x Day x Day x Day x HOW DATA DOMAIN ORACLE OPTIMIZED DEDUPLICATION IMPROVES TDE DEDUPLICATION There is a special feature that changes the default behavior of Data Domain systems to be more sensitive to Oracle RMAN backup streams (see whitepaper for full details: In a Proof Of Concept, a customer tested out an Oracle TDE database with 132 GB in size with no changes. The results are shown below with the Data Domain Oracle Optimized Deduplication feature enabled. 1 st Full 1.3 X 2 nd Full X 3 rd Full X CONCLUSION The CPU utilization of both TDE and Vormetric ranges from 12% to 30% more time as compared to an unencrypted database, but does not utilize the CPU more than an unencrypted database. TDE encryption does affect the deduplication ratio as compared to a database that is not encrypted as we have seen with a 5% daily change rate of the database reducing the deduplication ratio by a factor of 2.1x. With Data Domain Oracle Optimized Deduplication enabled on the Data Domain system mtree, customers will achieve significantly improved deduplication of TDE RMAN backups. 12

13 ACKNOWLEDGEMENTS The author would like to Allen Yen, Rick Rasmussen and Diana Yang for providing the test results featured in this paper. 13

WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS?

WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS? Why Data Domain Series WHY SECURE MULTI-TENANCY WITH DATA DOMAIN SYSTEMS? Why you should take the time to read this paper Provide data isolation by tenant (Secure logical data isolation for each tenant

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 31 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: + 38516306373 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, students learn how they can use Oracle Database features to meet

More information

DISK LIBRARY FOR MAINFRAME (DLM)

DISK LIBRARY FOR MAINFRAME (DLM) DISK LIBRARY FOR MAINFRAME (DLM) Cloud Storage for Data Protection and Long-Term Retention ABSTRACT Disk Library for mainframe (DLm) is Dell EMC s industry leading virtual tape library for IBM z Systems

More information

Dell EMC SAP HANA Appliance Backup and Restore Performance with Dell EMC Data Domain

Dell EMC SAP HANA Appliance Backup and Restore Performance with Dell EMC Data Domain Dell EMC SAP HANA Appliance Backup and Restore Performance with Dell EMC Data Domain Performance testing results using Dell EMC Data Domain DD6300 and Data Domain Boost for Enterprise Applications July

More information

DELL EMC DATA DOMAIN ENCRYPTION

DELL EMC DATA DOMAIN ENCRYPTION WHITEPAPER DELL EMC DATA DOMAIN ENCRYPTION A Detailed Review ABSTRACT The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers

More information

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

BraindumpsIT.  BraindumpsIT - IT Certification Company provides Braindumps pdf! BraindumpsIT http://www.braindumpsit.com BraindumpsIT - IT Certification Company provides Braindumps pdf! Exam : E20-891 Title : Backup Recovery Solutions Expert Exam for Technology Architects Vendor :

More information

DELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE

DELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE WHITEPAPER DELL EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE A Detailed Review ABSTRACT This white paper introduces Dell EMC Data Domain Extended Retention software that increases the storage scalability

More information

Vormetric Data Security

Vormetric Data Security Vormetric Data Security Simplifying Data Security for the Enterprise www.vormetric.com Agenda! Introductions! Vormetric Overview! Data Security Architecture Challenges! Product Architecture & Use Cases!

More information

Key Drivers for Data Security

Key Drivers for Data Security Security User Management Access Control Data Protection Monitoring Key Drivers for Data Security Regulatory Compliance Sarbanes-Oxley (SOX), Foreign Exchange Instruments and Exchange Law (J-SOX) EU Privacy

More information

VMAX3 AND VMAX ALL FLASH WITH CLOUDARRAY

VMAX3 AND VMAX ALL FLASH WITH CLOUDARRAY VMAX3 AND VMAX ALL FLASH WITH CLOUDARRAY HYPERMAX OS Integration with CloudArray ABSTRACT With organizations around the world facing compliance regulations, an increase in data, and a decrease in IT spending,

More information

Choosing the level that works for you!

Choosing the level that works for you! The Encryption Pyramid: Choosing the level that works for you! Eysha S. Powers eysha@us.ibm.com IBM, Enterprise Cryptography Extensive use of encryption is one of the most impactful ways to help reduce

More information

Acceleration Performance Tests for IBM Rational ClearTeam Explorer

Acceleration Performance Tests for IBM Rational ClearTeam Explorer Acceleration Performance Tests for IBM Rational ClearTeam Explorer Conducted by Array Networks for IBM Ready for Rational ClearTeam Explorer Certification Table of Contents White Paper Executive Summary

More information

BACKUP AND RECOVERY FOR ORACLE DATABASE 11g WITH EMC DEDUPLICATION A Detailed Review

BACKUP AND RECOVERY FOR ORACLE DATABASE 11g WITH EMC DEDUPLICATION A Detailed Review White Paper BACKUP AND RECOVERY FOR ORACLE DATABASE 11g WITH EMC DEDUPLICATION EMC GLOBAL SOLUTIONS Abstract This white paper provides guidelines for the use of EMC Data Domain deduplication for Oracle

More information

VIRTUALIZED BACKUP ADVANTAGES OF THE DELL POWERVAULT DL BACKUP TO DISK APPLIANCE POWERED BY SYMANTEC BACKUP EXEC 2010 R3

VIRTUALIZED BACKUP ADVANTAGES OF THE DELL POWERVAULT DL BACKUP TO DISK APPLIANCE POWERED BY SYMANTEC BACKUP EXEC 2010 R3 VIRTUALIZED BACKUP ADVANTAGES OF THE DELL POWERVAULT DL BACKUP TO DISK APPLIANCE POWERED BY SYMANTEC BACKUP EXEC Companies of all sizes are looking to move away from traditional inefficient and costly

More information

Technical factsheet Cloud Backup

Technical factsheet Cloud Backup Technical factsheet The Cloud Network - fast, reliable, automatic, offsite, secure backup and disaster recovery to make your life easier! No more worrying about on-premised backup failure, or anyone missing

More information

EMC XTREMCACHE ACCELERATES MICROSOFT SQL SERVER

EMC XTREMCACHE ACCELERATES MICROSOFT SQL SERVER White Paper EMC XTREMCACHE ACCELERATES MICROSOFT SQL SERVER EMC XtremSF, EMC XtremCache, EMC VNX, Microsoft SQL Server 2008 XtremCache dramatically improves SQL performance VNX protects data EMC Solutions

More information

VxRack System SDDC Enabling External Services

VxRack System SDDC Enabling External Services VxRack System SDDC Enabling External Services May 2018 H17144 Abstract This document describes how to enable external services for a VxRack System SDDC. Use cases included are Dell EMC Avamar-based backup

More information

EMC Disk Library Automated Tape Caching Feature

EMC Disk Library Automated Tape Caching Feature EMC Disk Library Automated Tape Caching Feature A Detailed Review Abstract This white paper details the EMC Disk Library configuration and best practices when using the EMC Disk Library Automated Tape

More information

Oracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015

Oracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015 Oracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 1 Controls for Privileged Accounts 2 Privilege User Access Controls on Application Data with Realms

More information

Acceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC)

Acceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC) Acceleration Performance Tests for IBM Rational ClearCase Remote Client (CCRC) Conducted by Certeon for IBM Ready for Rational CCRC Certification November 28 PAGE 1 Table of Contents Certeon Acceleration

More information

Netwrix Auditor for SQL Server

Netwrix Auditor for SQL Server Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

EMC DATA DOMAIN PRODUCT OvERvIEW

EMC DATA DOMAIN PRODUCT OvERvIEW EMC DATA DOMAIN PRODUCT OvERvIEW Deduplication storage for next-generation backup and archive Essentials Scalable Deduplication Fast, inline deduplication Provides up to 65 PBs of logical storage for long-term

More information

PERFORMING MICROSOFT SQL ALWAYSON AVAILABILITY GROUP BACKUPS ON AMAZON WEB SERVER AND MICROSOFT AZURE WITH DELL EMC AVAMAR

PERFORMING MICROSOFT SQL ALWAYSON AVAILABILITY GROUP BACKUPS ON AMAZON WEB SERVER AND MICROSOFT AZURE WITH DELL EMC AVAMAR PERFORMING MICROSOFT SQL ALWAYSON AVAILABILITY GROUP BACKUPS ON AMAZON WEB SERVER AND MICROSOFT AZURE WITH DELL EMC AVAMAR November 2017 ABSTRACT This white paper describes how to configure a Microsoft

More information

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005 Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...

More information

EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE

EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE White Paper EMC XTREMCACHE ACCELERATES VIRTUALIZED ORACLE EMC XtremSF, EMC XtremCache, EMC Symmetrix VMAX and Symmetrix VMAX 10K, XtremSF and XtremCache dramatically improve Oracle performance Symmetrix

More information

Oracle Database Vault

Oracle Database Vault Oracle Database Vault DBA Administrative Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 2 Database Administration Tasks Summary 3 General Database Administration Tasks 4 Managing

More information

INFO-H-415 Project Overview- Security Database and SQL Server

INFO-H-415 Project Overview- Security Database and SQL Server INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way

More information

An Oracle White Paper September Security and the Oracle Database Cloud Service

An Oracle White Paper September Security and the Oracle Database Cloud Service An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

OpenManage Essentials Managing Firmware and Driver Compliance by using Multiple Baselines

OpenManage Essentials Managing Firmware and Driver Compliance by using Multiple Baselines OpenManage Essentials Managing Firmware and Driver Compliance by using Multiple Baselines This technical white paper provides information about managing hardware revision baseline in a data center by using

More information

Video Surveillance EMC Storage with LenSec Perspective VMS

Video Surveillance EMC Storage with LenSec Perspective VMS Video Surveillance EMC Storage with LenSec Perspective VMS Version 1.0 Functional Verification Guide H14258 Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published June, 2015 EMC

More information

Exchange 2003 Archiving for Operational Efficiency

Exchange 2003 Archiving for Operational Efficiency Exchange 2003 Archiving for Operational Efficiency Enabled by EmailXtender Reference Architecture EMC Global Solutions Operations EMC Corporation Corporate Headquarters Hopkinton MA 01748-9103 1.508.435.1000

More information

CA ARCserve Backup. Benefits. Overview. The CA Advantage

CA ARCserve Backup. Benefits. Overview. The CA Advantage PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE

More information

EMC Data Domain for Archiving Are You Kidding?

EMC Data Domain for Archiving Are You Kidding? EMC Data Domain for Archiving Are You Kidding? Bill Roth / Bob Spurzem EMC EMC 1 Agenda EMC Introduction Data Domain Enterprise Vault Integration Data Domain NetBackup Integration Q & A EMC 2 EMC Introduction

More information

Network Security Protection Alternatives for the Cloud

Network Security Protection Alternatives for the Cloud A Trend Micro White Paper May 2016 Network Security Protection Alternatives for the Cloud» A technical brief summarizing the deployment options that can be used to deploy IDS/IPS protection for cloud instances

More information

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and VMware s Distributed

More information

Oracle Advanced Security Transparent Data Encryption (TDE)

Oracle Advanced Security Transparent Data Encryption (TDE) Oracle Advanced Security Transparent Data Encryption (TDE) Frequently Asked Questions (FAQ) M A R C H 2 0 1 8 Product Overview Q. What does Transparent Data Encryption (TDE) provide? A: TDE transparently

More information

DefendX Software Control-Audit

DefendX Software Control-Audit DefendX Software Control-Audit Installation Overview This guide details the components of DefendX Software Control-Audit along with their related documentation from an administrator s perspective. 1 Table

More information

Sensitive Data and Key Management for DBAs

Sensitive Data and Key Management for DBAs Sensitive Data and Key Management for DBAs Encryption Key Management Simplified Jonathan Intner 13 December, 2011 NYOUG, New Yorker Hotel Agenda Introduction Audience Sensitive Data > What makes data sensitive?

More information

Oracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero

Oracle Security Products and Their Relationship to EBS. Presented By: Christopher Carriero Oracle Security Products and Their Relationship to EBS Presented By: Christopher Carriero 1 Agenda Confidential Data in Corporate Systems Sensitive Data in the Oracle EBS What Are the Oracle Security Products

More information

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM OVERVIEW The Verizon 2016 Data Breach Investigations Report highlights that attackers are regularly outpacing the defenders.

More information

Vendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo

Vendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo Vendor: Oracle Exam Code: 1Z0-528 Exam Name: Oracle Database 11g Security Essentials Version: Demo QUESTION 1 Which of the following tasks is the first task to perform when implementing Oracle Database

More information

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption

Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption Enhance your Cloud Security with AMD EPYC Hardware Memory Encryption White Paper October, 2018 Introduction Consumers and enterprises are becoming increasingly concerned about the security of their digital

More information

Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption

Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption Bloombase Interoperability Program P1 2015 Bloombase, Inc. Interoperability of Bloombase StoreSafe and Thales payshield for Data-at-Rest Encryption December 2015 Executive Summary Thales payshield enterprise

More information

DELL EMC DATA DOMAIN SISL SCALING ARCHITECTURE

DELL EMC DATA DOMAIN SISL SCALING ARCHITECTURE WHITEPAPER DELL EMC DATA DOMAIN SISL SCALING ARCHITECTURE A Detailed Review ABSTRACT While tape has been the dominant storage medium for data protection for decades because of its low cost, it is steadily

More information

An Oracle White Paper February Optimizing Storage for Oracle PeopleSoft Applications

An Oracle White Paper February Optimizing Storage for Oracle PeopleSoft Applications An Oracle White Paper February 2011 Optimizing Storage for Oracle PeopleSoft Applications Executive Overview Enterprises are experiencing an explosion in the volume of data required to effectively run

More information

How to Protect SAP HANA Applications with the Data Protection Suite

How to Protect SAP HANA Applications with the Data Protection Suite White Paper Business Continuity How to Protect SAP HANA Applications with the Data Protection Suite As IT managers realize the benefits of in-memory database technology, they are accelerating their plans

More information

Oracle Database Vault

Oracle Database Vault An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command

More information

EMC Celerra Replicator V2 with Silver Peak WAN Optimization

EMC Celerra Replicator V2 with Silver Peak WAN Optimization EMC Celerra Replicator V2 with Silver Peak WAN Optimization Applied Technology Abstract This white paper discusses the interoperability and performance of EMC Celerra Replicator V2 with Silver Peak s WAN

More information

IBM Real-time Compression and ProtecTIER Deduplication

IBM Real-time Compression and ProtecTIER Deduplication Compression and ProtecTIER Deduplication Two technologies that work together to increase storage efficiency Highlights Reduce primary storage capacity requirements with Compression Decrease backup data

More information

DELL EMC DATA DOMAIN OPERATING SYSTEM

DELL EMC DATA DOMAIN OPERATING SYSTEM DATA SHEET DD OS Essentials High-speed, scalable deduplication Up to 68 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability Data invulnerability architecture

More information

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS

Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Maintaining End-to-End Service Levels for VMware Virtual Machines Using VMware DRS and EMC Navisphere QoS Applied Technology Abstract This white paper describes tests in which Navisphere QoS Manager and

More information

EMC XTREMCACHE ACCELERATES ORACLE

EMC XTREMCACHE ACCELERATES ORACLE White Paper EMC XTREMCACHE ACCELERATES ORACLE EMC XtremSF, EMC XtremCache, EMC VNX, EMC FAST Suite, Oracle Database 11g XtremCache extends flash to the server FAST Suite automates storage placement in

More information

An Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach

An Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach An Oracle White Paper November 2012 Primavera Unifier Integration Overview: A Web Services Integration Approach Introduction Oracle s Primavera Unifier offers an extensible interface platform based on

More information

Oracle Advanced Compression Helps Global Fortune 500 Company Meet Storage Savings Initiative O R A C L E W H I T E P A P E R F E B R U A R Y

Oracle Advanced Compression Helps Global Fortune 500 Company Meet Storage Savings Initiative O R A C L E W H I T E P A P E R F E B R U A R Y Oracle Advanced Compression Helps Global Fortune 500 Company Meet Storage Savings Initiative O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 7 Table of Contents Introduction 2 Oracle Advanced Compression

More information

E Backup Recovery Solutions Expert Exam for Technology Architects - Retirement

E Backup Recovery Solutions Expert Exam for Technology Architects - Retirement Dell EMC Education Services E20-891 Backup Recovery Solutions Expert Exam for Technology Architects - Retirement ATTENTION: The Technology Architect exam E20-891 Backup Recovery Solutions Expert Exam for

More information

The Realities of Data Security and Compliance: Compliance Security

The Realities of Data Security and Compliance: Compliance Security The Realities of Data Security and Compliance: Compliance Security Ulf Mattsson, CTO, Protegrity Ulf.mattsson @ protegrity.com Bio - A Passion for Sailing and International Travel 2 Ulf Mattsson 20 years

More information

An Oracle White Paper October Advanced Compression with Oracle Database 11g

An Oracle White Paper October Advanced Compression with Oracle Database 11g An Oracle White Paper October 2011 Advanced Compression with Oracle Database 11g Oracle White Paper Advanced Compression with Oracle Database 11g Introduction... 3 Oracle Advanced Compression... 4 Compression

More information

What's New with Data Domain in 2014? Name

What's New with Data Domain in 2014? Name 1 What's New with Data Domain in 2014? Name 2 Protection Storage Architecture Blueprint for Transformation and Investment Protection D A TA M A N A G E ME N T S E R V I C E S Policy & Storage Management,

More information

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA Design Guide Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA VMware vsphere 5.1 for up to 2000 Virtual Desktops EMC VSPEX Abstract This guide describes required components and a configuration

More information

Technical Note. Restoring Dell EMC Avamar Checkpoint Backups from a Dell EMC Data Domain System After a Single Node Avamar Failure

Technical Note. Restoring Dell EMC Avamar Checkpoint Backups from a Dell EMC Data Domain System After a Single Node Avamar Failure Restoring Dell EMC Avamar Checkpoint Backups from a Dell EMC Data Domain System After a Single Node Avamar Failure 300-015-218 REV 03 February 2018 Revision history... 2 Purpose... 2 Related documentation...2

More information

ARCSERVE UNIFIED DATA PROTECTION

ARCSERVE UNIFIED DATA PROTECTION ARCSERVE UNIFIED DATA PROTECTION Arcserve Unified Data Protection (UDP) combines industry-proven backup, disaster recovery and true global deduplication technologies within one solution, delivering enterprise-grade

More information

Transparent Solutions for Security and Compliance with Oracle Database 11g. An Oracle White Paper September 2008

Transparent Solutions for Security and Compliance with Oracle Database 11g. An Oracle White Paper September 2008 Transparent Solutions for Security and Compliance with Oracle Database 11g An Oracle White Paper September 2008 Transparent Solutions for Privacy and Compliance with Oracle Database 11g INTRODUCTION Over

More information

A Foxit Software Company White Paper

A Foxit Software Company White Paper A Foxit Software Company White Paper www.foxitsoftware.com Foxit Software Company, LLC. June 2009 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise...

More information

Connecting EMC DiskXtender for Windows to EMC Centera

Connecting EMC DiskXtender for Windows to EMC Centera Connecting EMC DiskXtender for Windows to EMC Centera Best Practices Planning Abstract This white paper provides details on building the connection string that EMC DiskXtender for Windows uses to connect

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

Database access control, activity monitoring and real time protection

Database access control, activity monitoring and real time protection Omega Core Audit Whitepaper 2.8 Whitepaper Omega Core Audit For Oracle Database July, 2016 Database access control, activity monitoring and real time protection Introduction The database is usually the

More information

Migrating a Business-Critical Application to Windows Azure

Migrating a Business-Critical Application to Windows Azure Situation Microsoft IT wanted to replace TS Licensing Manager, an application responsible for critical business processes. TS Licensing Manager was hosted entirely in Microsoft corporate data centers,

More information

Oracle Database Vault

Oracle Database Vault Oracle Database Vault Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Executive Overview 2 Installation 3 Pre-Installation Notes 3 Separation of Duty 3 Separation of Duty Matrix 4 Oracle Database

More information

Dell EMC Ready System for VDI on XC Series

Dell EMC Ready System for VDI on XC Series Dell EMC Ready System for VDI on XC Series Citrix XenDesktop for Dell EMC XC Series Hyperconverged Appliance March 2018 H16969 Deployment Guide Abstract This deployment guide provides instructions for

More information

Oracle Data Masking and Subsetting

Oracle Data Masking and Subsetting Oracle Data Masking and Subsetting Frequently Asked Questions (FAQ) S E P T E M B E R 2 0 1 6 Product Overview Q: What is Data Masking and Subsetting? A: Data Masking or Static Data Masking is the process

More information

Changing default password of root user for idrac9 by using Dell EMC License Manager

Changing default password of root user for idrac9 by using Dell EMC License Manager Changing default password of root user for idrac9 by using Dell EMC License Manager This technical white paper describes how to change the default password of root user on Dell EMC idrac9. Dell EMC Engineering

More information

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection

More information

MySQL Enterprise Security

MySQL Enterprise Security MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA. This Reference Architecture Guide describes, in summary, a solution that enables IT organizations to quickly and effectively provision and manage Oracle Database as a Service (DBaaS) on Federation Enterprise

More information

Prerequisites for Using Enterprise Manager with Your Primavera Applications

Prerequisites for Using Enterprise Manager with Your Primavera Applications Oracle Enterprise Manager For Oracle Construction and Engineering Configuration Guide for On Premises Version 18 August 2018 Contents Introduction... 5 Prerequisites for Using Enterprise Manager with

More information

Syncplicity Panorama with Isilon Storage. Technote

Syncplicity Panorama with Isilon Storage. Technote Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate

More information

EMC CLARiiON CX3-80 EMC Metropolitan Recovery for SQL Server 2005 Enabled by Replication Manager and MirrorView/S

EMC CLARiiON CX3-80 EMC Metropolitan Recovery for SQL Server 2005 Enabled by Replication Manager and MirrorView/S Enterprise Solutions for Microsoft SQL Server 2005 EMC CLARiiON CX3-80 EMC Metropolitan Recovery for SQL Server 2005 Enabled by Replication Manager and MirrorView/S Reference Architecture EMC Global Solutions

More information

Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4

Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4 Entrust Technical Integration Guide for Entrust Security Manager 7.1 SP3 and SafeNet Luna CA4 July 2008 Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Oracle Database Cloud for Oracle DBAs Ed 3

Oracle Database Cloud for Oracle DBAs Ed 3 Oracle University Contact Us: 800-260-690 Oracle Database Cloud for Oracle DBAs Ed 3 Duration: 3 Days What you will learn Note: No hands-on lab environment for the Training On Demand course format This

More information

NTP Software File Reporter

NTP Software File Reporter NTP Software File Reporter Installation Overview This guide details the components of NTP Software File Reporter along with their related documentation from an administrator s perspective. Copyright 2016-2017

More information

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM

More information

DELL EMC VMAX UNISPHERE 360

DELL EMC VMAX UNISPHERE 360 DELL EMC VMAX UNISPHERE 360 ABSTRACT Using Unisphere 360 to consolidate the management of VMAX storage system offers many benefits. This management interface offers a single interface where all enrolled

More information

Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced)

Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Administering a SQL Database Infrastructure Duration: 5 Days Course Code: M20764 Version: B Delivery Method: Elearning (Self-paced) Overview: This five-day instructor-led course provides students who administer

More information

Changing unique password of root user for idrac9 by using Dell EMC License Manager

Changing unique password of root user for idrac9 by using Dell EMC License Manager Changing unique password of root user for idrac9 by using Dell EMC License Manager This technical white paper describes how to change the default password of a root user on idrac9. Dell EMC Engineering

More information

Dell EMC Ready Solution for VMware vcloud NFV 3.0 OpenStack Edition Platform

Dell EMC Ready Solution for VMware vcloud NFV 3.0 OpenStack Edition Platform Dell EMC Ready Solution for VMware vcloud NFV 3.0 OpenStack Edition Platform Deployment Manual Document Index Guide for VMware NFV 3.0 with VMware Integrated OpenStack 5.0 with Kubernetes Dell Engineering

More information

EMC CLARiiON CX3-80. Enterprise Solutions for Microsoft SQL Server 2005

EMC CLARiiON CX3-80. Enterprise Solutions for Microsoft SQL Server 2005 Enterprise Solutions for Microsoft SQL Server 2005 EMC CLARiiON CX3-80 EMC Long Distance Recovery for SQL Server 2005 Enabled by Replication Manager and RecoverPoint CRR Reference Architecture EMC Global

More information

Optimizing Tiered Storage Workloads with Precise for Storage Tiering

Optimizing Tiered Storage Workloads with Precise for Storage Tiering Applied Technology Abstract By introducing Enterprise Flash Drives to EMC Symmetrix and CLARiiON storage systems, EMC revitalized the importance of tiered storage. Optimizing the use of these tiers provides

More information

Channel FAQ: Smartcrypt Appliances

Channel FAQ: Smartcrypt Appliances Channel FAQ: Smartcrypt Appliances Q: When were Smartcrypt appliances announced? A: announced the release of our Smartcrypt virtual and physical appliances on September 19, 2017. Smartcrypt Enterprise

More information

NTP Software File Reporter Data Collection Agent for Windows

NTP Software File Reporter Data Collection Agent for Windows NTP Software File Reporter Data Collection Agent for Windows Installation Guide Version 8.1 This guide provides quick instructions for the installation and initial configuration of NTP Software Data Collection

More information

Oracle Advanced Compression. An Oracle White Paper June 2007

Oracle Advanced Compression. An Oracle White Paper June 2007 Oracle Advanced Compression An Oracle White Paper June 2007 Note: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

DLm TM TRANSFORMS MAINFRAME TAPE! WHY DELL EMC DISK LIBRARY FOR MAINFRAME?

DLm TM TRANSFORMS MAINFRAME TAPE! WHY DELL EMC DISK LIBRARY FOR MAINFRAME? DLm TM TRANSFORMS MAINFRAME TAPE! WHY DELL EMC DISK LIBRARY FOR MAINFRAME? The Business Value of Disk Library for mainframe OVERVIEW OF THE BENEFITS DLM VERSION 5.0 DLm is designed to reduce capital and

More information

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007

EMC CLARiiON CX3-40. Reference Architecture. Enterprise Solutions for Microsoft Exchange 2007 Enterprise Solutions for Microsoft Exchange 2007 EMC CLARiiON CX3-40 Metropolitan Exchange Recovery (MER) for Exchange Server Enabled by MirrorView/S and Replication Manager Reference Architecture EMC

More information

The Evolution of Data Center Security, Risk and Compliance

The Evolution of Data Center Security, Risk and Compliance #SymVisionEmea #SymVisionEmea The Evolution of Data Center Security, Risk and Compliance Taha Karim / Patrice Payen The Adoption Curve Virtualization is being stalled due to concerns around Security and

More information

Oracle Database 11g: New Features for Administrators DBA Release 2

Oracle Database 11g: New Features for Administrators DBA Release 2 Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change

More information

November, Executive Summary

November, Executive Summary Bloombase Interoperability Program P1 2011 Bloombase Interoperability of Bloombase StoreSafe and ATTO Celerity Fibre- Channel Host Bus Adapter and ATTO FibreConnect Fibre-Channel Switch for Transparent

More information

Tape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies

Tape Sucks for Long-Term Retention Time to Move to the Cloud. How Cloud is Transforming Legacy Data Strategies Tape Sucks for Long-Term Retention Time to Move to the Cloud How Cloud is Transforming Legacy Data Strategies INTRODUCTION Tapes suck for long term retention (LTR) Unknown content Locked in proprietary

More information

Installing Acronis Backup Advanced Edition

Installing Acronis Backup Advanced Edition 2015 Installing Acronis Backup Advanced Edition BEST PRACTISE Table of Contents Acronis Backup Advanced components... 4 Management Server... 4 Acronis Storage Node... 4 Agents / Appliance... 4 Bootable

More information

SQL Server 2008 Consolidation

SQL Server 2008 Consolidation Technology Concepts and Business Considerations Abstract The white paper describes how SQL Server 2008 consolidation provides solutions to basic business problems pertaining to the usage of multiple SQL

More information