Continuous Data Protection

Size: px
Start display at page:

Download "Continuous Data Protection"

Transcription

1 Continuous Data Protection

2 Comprehensive protection of data is a critical responsibility of a data warehouse. This includes both protection against unauthorized access and protection against data loss or corruption. Traditional data warehouses provide only a baseline level of protection. For example, data warehouses often provide basic access control mechanisms to restrict data access and an internal data replication factor to maintain additional copies of data within the cluster. However, additional protection beyond this baseline level is left to the user the user needs to evaluate, select, implement, and monitor firewalls, database backup, external data replication, network security, datacenter security, and more. The cost and complexity of these additional measures adds a significant burden to already-stretched IT organizations. Continuous data protection is built into the Snowflake data warehousing service so that every customer can realize enterprise-class data protection by default. DATA SECURITY Snowflake uses a broad set of security features and operational practices to provide end-to-end protection against unauthorized access to customer data, whether by users within a customer account or attackers outside a customer account. Our multilayered approach ensures comprehensive protection that is based on industryrecognized frameworks and validated by third-party SOC 2 certification. Robust authentication. Snowflake supports twofactor authentication for access to the Snowflake service as well as robust password requirements and lockouts after multiple failed login attempts. End-to-end encryption. Snowflake encrypts all communication over the Internet as well as all customer data stored in Snowflake. Encryption in Snowflake is always enabled for all customer data. Role-based access control. Snowflake provides sophisticated role-based access control to ensure that customer data can only be accessed by authorized users in the customer account. SNOWFLAKE S TOTAL DATA PROTECTION: Encryption: data always encrypted, automatically Data protection: data replication to provide 11 9 s of durability Instant recovery: self-service data recovery via SQL Monitoring and alerting. Snowflake uses security applications such as file integrity monitoring tools (FIM) to ensure that critical system files (e.g. system and application executable files, libraries, and configuration files) have not been tampered with. In the event of data modification or deletion by a malicious user, the data protection and recovery capabilities discussed in the next section of this paper provide an easy way to recover data. For more information about security in Snowflake, refer to our Security whitepaper. 3

3 DATA PROTECTION AND RECOVERY Snowflake was designed from the ground up to be a continously available cloud service that is resilient to failures without customer disruption or data loss. Our Continuous Data Protection capabilities protect against and provide easy self-service recovery from accidental errors, system failures, or malicious acts. Recovery from Accidental Errors The most common cause of data loss or corruption in a database is accidental errors made by a system administrator, privileged user, or an automated process. Snowflake provides a feature called Time Travel that provides easy recovery from such errors. Time Travel is a unique Snowflake feature that makes it possible to instantly restore or query any previous version of a table or database from an arbitrary past point in time within a retention period. ACCESS PAST VERSIONS OF DATA How Time Travel Works Time Travel is made possible by Snowflake s implementation of data modification (DML) operations. Snowflake is a fully updatable relational database with a complete set of SQL DML operators that support updates or deletion of rows of data. When any data is modified, Snowflake internally writes those changes to a new storage object and automatically retains the previous storage object for a period of time (the retention period) so that both versions are preserved. When data is deleted or database objects are dropped, Snowflake updates its metadata to reflect that change but keeps the data for the retention period. During the retention period, all data and data objects are fully recoverable by customers. Users granted administrative privileges can undo a DROP of a database, table or schema with a simple SQL command. Past versions of a data object from any point in time within the retention period can also be accessed via SQL, both for direct access by a SELECT statement as well as for cloning in order to create a copy of a past version of the data object. After the retention period has passed, Snowflake waits an additional seven days (the failsafe period) to provide a sufficient length of time during which Snowflake can, at a customer s request, recover any data which was maliciously or inadvertently deleted by human or software error. At the end of that period, an automated process physically deletes the data. Because of this design, it is impossible for the Snowflake service, any Snowflake personnel, or malicious intruders to physically delete data. Continuous Data Protection and Time Travel are standard features built into the Snowflake service. The length of the default retention period is determined by the customer s service agreement. Customers can specify extended retention periods at the time that a new database, table or schema is created via SQL DDL commands. Extended retention periods incur additional storage costs for the time that Snowflake retains the data during the retention and failsafe periods. Time Travel Examples These features provide customers with unprecedented ability to recover from accidental errors during the retention period. For example, if an errant data loading script corrupted a database it is possible to create a logical duplicate of the database (a clone) from the point-in-time just prior to the execution of a specific statement. To illustrate, here are some examples of statements using the Time Travel feature: Recovering dropped objects: The UNDROP command can be used to recover any dropped object: UNDROP TABLE T; UNDROP DATABASE DB; F s 4

4 Recovering previous versions: Cloning a past version of a table at a specific point in time: CREATE TABLE orders_clone CLONE orders AT(TIMESTAMP => TO_TIMESTAMP_TZ( 04/05/ :02:03, mm/dd/yyyy hh24:mi:ss )); Cloning a past version of a database just before a query (identified here by a query ID) was processed: CREATE DATABASE db_clone CLONE marketing_db BEFORE(STATEMENT => 8e5d0ca9-005e-44e6- b858-a8f5b37c5726 ); Selecting data from past versions: Selecting data AT or BEFORE an arbitrary time during the retention period: without data loss, in the face of such failures. Snowflake, which runs on Amazon Web Services (AWS) infrastructure, uses a fully distributed and resilient architecture combined with the resiliency capabilities available in AWS to protect against a wide array of possible failures. As illustrated below, the Snowflake architecture consists of three layers, each of which is resilient to failures. Data storage layer. Stores all customer data in cloud storage services. Compute layer. Consists of one or more virtual warehouses, each of which is a multi-node compute cluster that processes queries. Virtual warehouses cache data from the data storage layer in encrypted form, but do not store persistent data. SERVICES AND METADATA SELECT max(t1.c1), max(t2.c2) FROM t1 AT(TIMESTAMP => :34:56 ::TIMESTAMP), t2 WHERE t1.c1 = t2.c1; COMPUTE Combining the current state of table t2 with a historical state of table t1 as it existed before a previous query (identified by the query ID): DATA SELECT OLD.ID FROM T BEFORE(STATEMENT => ea33c3a1-4ca0-41ed-b31e-c8f19d ) AS OLD LEFT OUTER JOIN T AS CUR ON OLD.ID = CUR.ID WHERE CUR.ID IS NULL; SNOWFLAKE S ARCHITECTURE PROTECTS BOTH DATA AND THE ABILITY TO ACCESS THAT DATA. Further details about Time Travel and commands are described in the Snowflake documentation. Protection Against System Failures The second most common type of data loss is caused by some form of system failure both software failures and infrastructure failures such as the loss of a disk, a disk array, a server, or most significantly, a data center. The Snowflake architecture is designed for resilience, Cloud services layer. The brain of the system, this layer manages infrastructure, queries, security, and metadata. The services running in this layer are implemented as a set of stateless processes. Each layer in the Snowflake architecture is distributed across at least three AWS availability zones. Because availability zones are geographically separated datacenters with independent access to power and networking, operations continue even if one or two AWS datacenters become unavailable. 5

5 zone by a customer. Protection of Data The database storage layer stores all customer data in encrypted form. It uses Amazon s S3 storage service to provide highly-durable, cost effective storage. When a transaction is committed in Snowflake, the data is securely stored in S3. S3 provides the base level of data protection for Snowflake highly durable data storage that allows data survival in the event of the loss of one or more disks, servers, or even datacenters. S3 synchronously and redundantly stores data across multiple devices in multiple facilities. It is designed for 11 9 s ( %) of data durability. Protection of Access to Data The compute and cloud services layers in the Snowflake architecture are also resilient to failures. Virtual warehouses are built to transparently recover from individual node failures without user intervention. In the case of an availability zone outage, virtual warehouses can be provisioned in another availability The cloud services layer is similarly resilient the stateless processes in this layer are redundant and are supported by a metadata store that is synchronously replicated to multiple nodes across all three availability zones. This ensures continuous operation even in the event of one or more metadata node failures or the loss of up to two datacenters. Additionally, the metadata store is regularly backed up to minimize the amount of data loss in the event of some form of catastrophic failure. For further protection, those backups are encrypted and are stored in a different region as well as sent to an offline storage vault. The web user interface in Snowflake is fully stateless and supported by the services in the cloud services layer such that it does not require backup and remains available even in the case of infrastructure and system failures. For more information about Snowflake s approach to CONCLUSION Data protection is a requirement for any data warehouse. The Snowflake data warehouse service is designed to provide robust data protection against a wide array of scenarios. All Snowflake customers benefit from enterprise-class data protection out of the box with no added complexity or overhead. GET STARTED To find out how Snowflake can help you get more value from your data, go to and try Snowflake for free today. 6

6 Snowflake Computing, the cloud data warehousing company, has reinvented the data warehouse for the cloud and today s data. The Snowflake Elastic Data Warehouse is built from the cloud up with a patent-pending new architecture that delivers the power of data warehousing, the flexibility of big data platforms and the elasticity of the cloud at a fraction of the cost of traditional solutions. Snowflake is headquartered in Silicon Valley and can be found online at snowflake.net.

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER Cloud Data Warehouse Security HOW SNOWFLAKE SETS THE STANDARD The threat of a data security breach, someone gaining unauthorized access to an organization s data, is what keeps CEOs and CIOs awake at night.

More information

Oracle Database 18c and Autonomous Database

Oracle Database 18c and Autonomous Database Oracle Database 18c and Autonomous Database Maria Colgan Oracle Database Product Management March 2018 @SQLMaria Safe Harbor Statement The following is intended to outline our general product direction.

More information

Overview of AWS Security - Database Services

Overview of AWS Security - Database Services Overview of AWS Security - Database Services June 2016 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) 2016, Amazon Web Services, Inc. or its affiliates. All rights

More information

Datacenter replication solution with quasardb

Datacenter replication solution with quasardb Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION

More information

WHITEPAPER. MemSQL Enterprise Feature List

WHITEPAPER. MemSQL Enterprise Feature List WHITEPAPER MemSQL Enterprise Feature List 2017 MemSQL Enterprise Feature List DEPLOYMENT Provision and deploy MemSQL anywhere according to your desired cluster configuration. On-Premises: Maximize infrastructure

More information

CogniFit Technical Security Details

CogniFit Technical Security Details Security Details CogniFit Technical Security Details CogniFit 2018 Table of Contents 1. Security 1.1 Servers........................ 3 1.2 Databases............................3 1.3 Network configuration......................

More information

UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)

UNIVERSITY AUTHORISED EDUCATION PARTNER (WDP) Audience Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Related Training Required Prerequisites Knowledge of Oracle Database 12c Knowledge

More information

Exam 1Z0-061 Oracle Database 12c: SQL Fundamentals

Exam 1Z0-061 Oracle Database 12c: SQL Fundamentals Exam 1Z0-061 Oracle Database 12c: SQL Fundamentals Description The SQL Fundamentals exam is intended to verify that certification candidates have a basic understanding of the SQL language. It covers the

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc. Table of Contents Section I: The Need for Warm Standby...2 The Business Problem...2 Section II:

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data

From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data Workloads in the cloud need a backup solution in the cloud. For companies with traditional

More information

Oracle WebLogic Server 12c on AWS. December 2018

Oracle WebLogic Server 12c on AWS. December 2018 Oracle WebLogic Server 12c on AWS December 2018 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About

More information

ORACLE 11gR2 DBA. by Mr. Akal Singh ( Oracle Certified Master ) COURSE CONTENT. INTRODUCTION to ORACLE

ORACLE 11gR2 DBA. by Mr. Akal Singh ( Oracle Certified Master ) COURSE CONTENT. INTRODUCTION to ORACLE ORACLE 11gR2 DBA by Mr. Akal Singh ( Oracle Certified Master ) INTRODUCTION to ORACLE COURSE CONTENT Exploring the Oracle Database Architecture List the major architectural components of Oracle Database

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Oracle Database 12c: Backup and Recovery Workshop Ed 2 NEW

Oracle Database 12c: Backup and Recovery Workshop Ed 2 NEW Oracle University Contact Us: 0845 777 7711 Oracle Database 12c: Backup and Recovery Workshop Ed 2 NEW Duration: 5 Days What you will learn This Oracle Database 12c: Backup and Recovery Workshop will teach

More information

Oracle Database 11g: New Features for Administrators Release 2

Oracle Database 11g: New Features for Administrators Release 2 Oracle University Contact Us: 0845 777 7711 Oracle Database 11g: New Features for Administrators Release 2 Duration: 5 Days What you will learn This course gives you the opportunity to learn about and

More information

MigrationWiz Security Overview

MigrationWiz Security Overview MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft Azure Webinar Resilient Solutions March 2017 Sander van den Hoven Principal Technical Evangelist Microsoft DX @svandenhoven 1 What is resilience? Client Client API FrontEnd Client Client Client Loadbalancer

More information

Oracle Database 11g: New Features for Administrators DBA Release 2

Oracle Database 11g: New Features for Administrators DBA Release 2 Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change

More information

How CloudEndure Disaster Recovery Works

How CloudEndure Disaster Recovery Works How CloudEndure Disaster Recovery Works Technical White Paper How CloudEndure Disaster Recovery Works THE TECHNOLOGY BEHIND CLOUDENDURE S ENTERPRISE-GRADE DISASTER RECOVERY SOLUTION Introduction CloudEndure

More information

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

VERITAS Volume Replicator. Successful Replication and Disaster Recovery VERITAS Volume Replicator Successful Replication and Disaster Recovery V E R I T A S W H I T E P A P E R Table of Contents Introduction.................................................................................1

More information

Number: Passing Score: 800 Time Limit: 120 min File Version:

Number: Passing Score: 800 Time Limit: 120 min File Version: 70-465 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 You need to recommend a backup process for an Online Transaction Processing

More information

Amazon AWS-Solution-Architect-Associate Exam

Amazon AWS-Solution-Architect-Associate Exam Volume: 858 Questions Question: 1 You are trying to launch an EC2 instance, however the instance seems to go into a terminated status immediately. What would probably not be a reason that this is happening?

More information

Modernize Your Backup and DR Using Actifio in AWS

Modernize Your Backup and DR Using Actifio in AWS FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.

More information

VMware Mirage Getting Started Guide

VMware Mirage Getting Started Guide Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Rio-2 Hybrid Backup Server

Rio-2 Hybrid Backup Server A Revolution in Data Storage for Today s Enterprise March 2018 Notices This white paper provides information about the as of the date of issue of the white paper. Processes and general practices are subject

More information

Data Storage, Recovery and Backup Checklists for Public Health Laboratories

Data Storage, Recovery and Backup Checklists for Public Health Laboratories Data Storage, Recovery and Backup Checklists for Public Health Laboratories DECEMBER 2018 Introduction Data play a critical role in the operation of a laboratory information management system (LIMS) and

More information

The Technology Behind Datrium Cloud DVX

The Technology Behind Datrium Cloud DVX The Technology Behind Datrium Cloud DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Public cloud as a new backup target Dedicated tape or disk based backup and

More information

The Nasuni Security Model

The Nasuni Security Model White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance

More information

UNITRENDS CLOUD BACKUP FOR OFFICE 365

UNITRENDS CLOUD BACKUP FOR OFFICE 365 UNITRENDS CLOUD BACKUP FOR OFFICE 365 FREQUENTLY ASKED QUESTIONS Unitrends Cloud Backup for Office 365 provides full, automatic protection that is purpose-built for Microsoft SaaS applications, eliminating

More information

Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led

Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led Introduction This three-day instructor-led course provides students with product knowledge and skills needed to

More information

Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC)

Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Veritas InfoScale Enterprise for Oracle Real Application Clusters (RAC) Manageability and availability for Oracle RAC databases Overview Veritas InfoScale Enterprise for Oracle Real Application Clusters

More information

Oracle Database 11g: Administration Workshop II

Oracle Database 11g: Administration Workshop II Oracle Database 11g: Administration Workshop II Duration: 5 Days What you will learn In this course, the concepts and architecture that support backup and recovery, along with the steps of how to carry

More information

Oracle DBA workshop I

Oracle DBA workshop I Complete DBA(Oracle 11G DBA +MySQL DBA+Amazon AWS) Oracle DBA workshop I Exploring the Oracle Database Architecture Oracle Database Architecture Overview Oracle ASM Architecture Overview Process Architecture

More information

Cisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures

Cisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures Cisco Meraki Privacy and Security Practices List of Technical and Organizational Measures Introduction Meraki takes a systematic approach to data protection, privacy, and security. We believe a robust

More information

Awareness Technologies Systems Security. PHONE: (888)

Awareness Technologies Systems Security.   PHONE: (888) Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web

More information

Data Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases

Data Sheet: Storage Management Veritas Storage Foundation for Oracle RAC from Symantec Manageability and availability for Oracle RAC databases Manageability and availability for Oracle RAC databases Overview Veritas Storage Foundation for Oracle RAC from Symantec offers a proven solution to help customers implement and manage highly available

More information

AudBase Security Document Page 0. Maintaining Data Security and Integrity

AudBase Security Document Page 0. Maintaining Data Security and Integrity AudBase Security Document Page 0 1 1 Maintaining Data Security and Integrity 1 1 AudBase Security Document Page 1 There are many aspects relating to data security and patient confidentiality. There is

More information

Autonomous Database Level 100

Autonomous Database Level 100 Autonomous Database Level 100 Sanjay Narvekar December 2018 1 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

How CloudEndure Disaster Recovery Works

How CloudEndure Disaster Recovery Works How Disaster Recovery Works Technical White Paper How Disaster Recovery Works THE TECHNOLOGY BEHIND CLOUDENDURE S ENTERPRISE-GRADE DISASTER RECOVERY SOLUTION Introduction Disaster Recovery is a Software-as-a-Service

More information

Data Analytics at Logitech Snowflake + Tableau = #Winning

Data Analytics at Logitech Snowflake + Tableau = #Winning Welcome # T C 1 8 Data Analytics at Logitech Snowflake + Tableau = #Winning Avinash Deshpande I am a futurist, scientist, engineer, designer, data evangelist at heart Find me at Avinash Deshpande Chief

More information

Active Directory Services with Windows Server

Active Directory Services with Windows Server Active Directory Services with Windows Server 10969B; 5 days, Instructor-led Course Description Get hands on instruction and practice administering Active Directory technologies in Windows Server 2012

More information

The following security and privacy-related audits and certifications are applicable to the Lime Services:

The following security and privacy-related audits and certifications are applicable to the Lime Services: LIME SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: September 26, 2016 FinAccel s Corporate Trust Commitment FinAccel (FinAccel Pte Ltd) is committed to achieving and maintaining the trust of our customers.

More information

MySQL for Database Administrators Ed 4

MySQL for Database Administrators Ed 4 Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals

More information

How CloudEndure Works

How CloudEndure Works How Works How Works THE TECHNOLOGY BEHIND CLOUDENDURE S DISASTER RECOVERY AND LIVE MIGRATION SOLUTIONS offers cloud-based Disaster Recovery and Live Migration Software-as-a-Service (SaaS) solutions. Both

More information

SOLUTION BRIEF Fulfill the promise of the cloud

SOLUTION BRIEF Fulfill the promise of the cloud SOLUTION BRIEF Fulfill the promise of the cloud NetApp Solutions for Amazon Web Services Fulfill the promise of the cloud NetApp Cloud Volumes Service for AWS: Move and manage more workloads faster Many

More information

Database Management. Understanding Failure Resiliency. Database Files CHAPTER

Database Management. Understanding Failure Resiliency. Database Files CHAPTER CHAPTER 7 This chapter contains information on RDU database management and maintenance. The RDU database is the Broadband Access Center for Cable (BACC) central database. As with any database, it is essential

More information

Oracle - Oracle Database 12c: Backup and Recovery Workshop Ed 2

Oracle - Oracle Database 12c: Backup and Recovery Workshop Ed 2 Oracle - Oracle Database 12c: Backup and Recovery Workshop Ed 2 Code: Lengt h: URL: 12cDB-BR 5 days View Online This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your

More information

InterCall Virtual Environments and Webcasting

InterCall Virtual Environments and Webcasting InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT

More information

MINION ENTERPRISE FEATURES LIST

MINION ENTERPRISE FEATURES LIST MINION ENTERPRISE FEATURES LIST Minion Enterprise is an automation and management tool for SQL Server. It provides you with the 10,000- foot view, detailed view, and fine-grained alerting and controls

More information

1Z Upgrade Oracle9i/10g to Oracle Database 11g OCP Exam Summary Syllabus Questions

1Z Upgrade Oracle9i/10g to Oracle Database 11g OCP Exam Summary Syllabus Questions 1Z0-034 Upgrade Oracle9i/10g to Oracle Database 11g OCP Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-034 Exam on Upgrade Oracle9i/10g to Oracle Database 11g OCP... 2 Oracle 1Z0-034

More information

An Insider s Guide to Oracle Autonomous Transaction Processing

An Insider s Guide to Oracle Autonomous Transaction Processing An Insider s Guide to Oracle Autonomous Transaction Processing Maria Colgan Master Product Manager Troy Anthony Senior Director, Product Management #thinkautonomous Autonomous Database Traditionally each

More information

Building a Modular and Scalable Virtual Network Architecture with Amazon VPC

Building a Modular and Scalable Virtual Network Architecture with Amazon VPC Building a Modular and Scalable Virtual Network Architecture with Amazon VPC Quick Start Reference Deployment Santiago Cardenas Solutions Architect, AWS Quick Start Reference Team August 2016 (revisions)

More information

GRIDSCALE DATABASE VIRTUALIZATION SOFTWARE FOR IBM DB2

GRIDSCALE DATABASE VIRTUALIZATION SOFTWARE FOR IBM DB2 TECHNICAL WHITE PAPER GRIDSCALE DATABASE VIRTUALIZATION SOFTWARE FOR IBM DB2 Typical enterprise applications are heavily reliant on the availability of data. Standard architectures of enterprise applications

More information

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS

MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS INTRODUCTION The ability to create and manage snapshots is an essential feature expected from enterprise-grade storage systems. This capability

More information

VIEVU Solution Whitepaper

VIEVU Solution Whitepaper VIEVU Solution Whitepaper Introduction VIEVU Solution is the next generation, fully-hosted, cloud evidence management system. This whitepaper describes details about the system, settings, and functionality.

More information

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY

SERVICE DESCRIPTION MANAGED BACKUP & RECOVERY Contents Service Overview.... 3 Key Features... 3 Implementation... 4 Validation... 4 Implementation Process.... 4 Internal Kick-Off... 4 Customer Kick-Off... 5 Provisioning & Testing.... 5 Billing....

More information

BUSINESS CONTINUITY: THE PROFIT SCENARIO

BUSINESS CONTINUITY: THE PROFIT SCENARIO WHITE PAPER BUSINESS CONTINUITY: THE PROFIT SCENARIO THE BENEFITS OF A COMPREHENSIVE BUSINESS CONTINUITY STRATEGY FOR INCREASED OPPORTUNITY Organizational data is the DNA of a business it makes your operation

More information

CA ARCserve Backup. Benefits. Overview. The CA Advantage

CA ARCserve Backup. Benefits. Overview. The CA Advantage PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE

More information

EBOOK. FROM DISASTER RECOVERY TO ACTIVE-ACTIVE: NuoDB AND MULTI-DATA CENTER DEPLOYMENTS

EBOOK. FROM DISASTER RECOVERY TO ACTIVE-ACTIVE: NuoDB AND MULTI-DATA CENTER DEPLOYMENTS FROM DISASTER RECOVERY TO ACTIVE-ACTIVE: NuoDB AND MULTI-DATA CENTER DEPLOYMENTS INTRODUCTION Traditionally, multi-data center strategies were deployed primarily to address disaster recovery scenarios.

More information

Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Disaster Recovery and Business A Rackspace White Paper Spring 2010 Summary The purpose of this guide is to cut through the jargon around Business and Disaster Recovery, explain the differences and help

More information

Synergetics-Standard-SQL Server 2012-DBA-7 day Contents

Synergetics-Standard-SQL Server 2012-DBA-7 day Contents Workshop Name Duration Objective Participants Entry Profile Training Methodology Setup Requirements Hardware and Software Requirements Training Lab Requirements Synergetics-Standard-SQL Server 2012-DBA-7

More information

Oracle Privileged Account Manager

Oracle Privileged Account Manager Oracle Privileged Account Manager Disaster Recovery Deployment Considerations O R A C L E W H I T E P A P E R A U G U S T 2 0 1 5 Disclaimer The following is intended to outline our general product direction.

More information

Demystifying Data Warehouse as a Service (DWaaS)

Demystifying Data Warehouse as a Service (DWaaS) YOUR DATA, NO LIMITS Demystifying Data Warehouse as a Service (DWaaS) Kent Graziano, Senior Technical Evangelist Snowflake Computing @KentGraziano 1 My Bio Senior Technical Evangelist, Snowflake Computing

More information

Oracle Database 12C: Advanced Administration - 1Z0-063

Oracle Database 12C: Advanced Administration - 1Z0-063 Oracle Database 12C: Advanced Administration - 1Z0-063 Backup and Recovery Explain Oracle backup and recovery solutions o Describe types of database failures o Describe the tools available for backup and

More information

Carbonite Availability. Technical overview

Carbonite Availability. Technical overview Carbonite Availability Technical overview Table of contents Executive summary The availability imperative...3 True real-time replication More efficient and better protection... 4 Robust protection Reliably

More information

How CloudEndure Works

How CloudEndure Works How Works How Works THE TECHNOLOGY BEHIND CLOUDENDURE S DISASTER RECOVERY AND LIVE MIGRATION SOLUTIONS offers Disaster Recovery and Live Migration Software-as-a-Service (SaaS) solutions. Both solutions

More information

Veritas Storage Foundation for Windows by Symantec

Veritas Storage Foundation for Windows by Symantec Veritas Storage Foundation for Windows by Symantec Advanced online storage management Data Sheet: Storage Management Overview Veritas Storage Foundation 6.0 for Windows brings advanced online storage management

More information

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 18.1 E

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 18.1 E Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 18.1 E68585-02 May 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and related

More information

Hedvig as backup target for Veeam

Hedvig as backup target for Veeam Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...

More information

70-532: Developing Microsoft Azure Solutions

70-532: Developing Microsoft Azure Solutions 70-532: Developing Microsoft Azure Solutions Exam Design Target Audience Candidates of this exam are experienced in designing, programming, implementing, automating, and monitoring Microsoft Azure solutions.

More information

Microsoft SQL Server HA and DR with DVX

Microsoft SQL Server HA and DR with DVX Microsoft SQL Server HA and DR with DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction A Datrium DVX solution allows you to start small and scale out.

More information

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014 Karthik Krishnan Page 1 of 20 Table of Contents Table of Contents... 2 Abstract... 3 What

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E96343-01 May 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1

Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 Oracle University Contact Us: Local: 0180 2000 526 Intl: +49 8914301200 Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 Duration: 5 Days What you will learn The Oracle Database 12c

More information

Mimecast Datasheet. Mimecast. Achieving best practice enterprise management with next generation Mimecast technology

Mimecast Datasheet. Mimecast. Achieving best practice enterprise  management with next generation Mimecast technology Datasheet Achieving best practice enterprise email management with next generation technology DS-MCO-16/04/2008 Datasheet Achieving best practice enterprise email management with next generation technology.

More information

SnowAlert Documentation. Snowflake Security

SnowAlert Documentation. Snowflake Security Snowflake Security Nov 02, 2018 Contents 1 About SnowAlert 3 1.1 Overview................................................. 3 1.2 How It Works............................................... 3 2 Getting

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Oracle Database 12c: Administration Workshop Ed 2

Oracle Database 12c: Administration Workshop Ed 2 Oracle University Contact Us: +40 21 3678820 Oracle Database 12c: Administration Workshop Ed 2 Duration: 5 Days What you will learn The Oracle Database 12c: Administration Workshop will teach you about

More information

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017)

Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) Epicor ERP Cloud Services Specification Multi-Tenant and Dedicated Tenant Cloud Services (Updated July 31, 2017) GENERAL TERMS & INFORMATION A. GENERAL TERMS & DEFINITIONS 1. This Services Specification

More information

Demystifying Cloud Data Warehousing

Demystifying Cloud Data Warehousing YOUR DATA, NO LIMITS Demystifying Cloud Data Warehousing Nicolas Baret Director of Pre-Sales EMEA @Snowflake TDWI Helsinki, October 2017 1 What is a Cloud Data Warehouse and what should we expect? 2 What

More information

VERITAS Volume Replicator Successful Replication and Disaster Recovery

VERITAS Volume Replicator Successful Replication and Disaster Recovery VERITAS Replicator Successful Replication and Disaster Recovery Introduction Companies today rely to an unprecedented extent on online, frequently accessed, constantly changing data to run their businesses.

More information

ZENworks Mobile Workspace High Availability Environments. September 2017

ZENworks Mobile Workspace High Availability Environments. September 2017 ZENworks Mobile Workspace High Availability Environments September 2017 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

MCSA SQL SERVER 2012

MCSA SQL SERVER 2012 MCSA SQL SERVER 2012 1. Course 10774A: Querying Microsoft SQL Server 2012 Course Outline Module 1: Introduction to Microsoft SQL Server 2012 Introducing Microsoft SQL Server 2012 Getting Started with SQL

More information

Veritas Storage Foundation for Oracle RAC from Symantec

Veritas Storage Foundation for Oracle RAC from Symantec Veritas Storage Foundation for Oracle RAC from Symantec Manageability, performance and availability for Oracle RAC databases Data Sheet: Storage Management Overviewview offers a proven solution to help

More information

Dooblo SurveyToGo: Security Overview

Dooblo SurveyToGo: Security Overview Dooblo SurveyToGo: Security Overview November, 2013 Written by: Dooblo Page 1 of 11 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...

More information

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01 CloudLink SecureVM Version 4.0 Administration Guide P/N 302-002-056 REV 01 Copyright 2015 EMC Corporation. All rights reserved. Published June 2015 EMC believes the information in this publication is accurate

More information

Introduction: Is Amazon Web Service (AWS) cloud supports best cost effective & high performance modern disaster recovery.

Introduction: Is Amazon Web Service (AWS) cloud supports best cost effective & high performance modern disaster recovery. Is Amazon Web Service (AWS) cloud supports best cost effective & high performance modern disaster recovery. Name: Rajib Das Employee ID- tcs 231462 ISU-CSP Email-rajib2.d@tcs.com Introduction: Disaster

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

Where s Your Third Copy?

Where s Your Third Copy? Where s Your Third Copy? Protecting Unstructured Data 1 Protecting Unstructured Data Introduction As more organizations put their critical data on NAS systems, a complete, well thought out data protection

More information

RA-GRS, 130 replication support, ZRS, 130

RA-GRS, 130 replication support, ZRS, 130 Index A, B Agile approach advantages, 168 continuous software delivery, 167 definition, 167 disadvantages, 169 sprints, 167 168 Amazon Web Services (AWS) failure, 88 CloudTrail Service, 21 CloudWatch Service,

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z1-063 Title : Oracle Database 12c: Advanced Administration Vendor : Oracle Version : DEMO Get Latest

More information

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information

More information