Ooops, data breach? Not with Always Encrypted. Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill
|
|
- Suzanna Bryant
- 5 years ago
- Views:
Transcription
1 Ooops, data breach? Not with Always Encrypted Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill
2 Technical Assistance If you require assistance during the session, type your inquiry into the question pane on the right side. Maximize your screen with the zoom button on the top of the presentation window. Please fill in the short evaluation following the session. It will appear in your web browser.
3 Thank You to Our Sponsors Empower users with new insights through familiar tools while balancing the need for IT to monitor and manage user created content. Deliver access to all data types across structured and unstructured sources. Redgate Software makes ingeniously simple software used by 650,000 IT professionals who work with SQL Server,.NET, and Oracle. More than 100,000 companies use Redgate products, including 91% of the Fortune 100. Redgate s philosophy is to design highly usable, reliable tools which elegantly solve the problems that developers and DBAs face every day.
4 Join PASS PASS is a not-for-profit organization which offers year-round learning opportunities to data professionals. Access to online training and content Join Local Groups and Virtual Groups Get advance notice of member exclusives Enjoy discounted event rates MEMBERSHIP IS FREE, JOIN TODAY
5 Daniel de Sousa Business Intelligence Dominos Currently working on data compliance project between multi countries and continents Data lover Been working with data since 1994(dBase III Plus, all SQL servers) Currently using SQL 2016 SP1 daniel-de-sousa-0b419828/ Soccer Fanatic Love my Brazilian soccer, mainly Corinthians Father of 2 going on the same path
6 Ooops, data breach? Not with Always Encrypted Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise
7 Ooops, data breach? Not with Always Encrypted Daniel de Sousa
8 Daniel de Sousa Business Intelligence Dominos Currently working on data compliance project between multi countries and continents Data lover Been working with data since 1994(dBase III Plus, all SQL servers) Currently using SQL 2016 SP1 daniel-de-sousa-0b419828/ Soccer Fanatic Love my Brazilian soccer, mainly Corinthians Father of 2 going on the same path
9 Agenda Encryption - Concepts Always Encrypted - Concepts Always Encrypted DB Permissions Parameterization Certificate Management Limitations
10 Encryption - Concepts According to Wikipedia In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it. Encryption does not of itself prevent interference, but denies the intelligible content to a would-be interceptor. In an encryption scheme, the intended information or message, referred to as plaintext, is encrypted using an encryption algorithm, generating ciphertext that can only be read if decrypted. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users.
11 Always Encrypted - Concepts According to Microsoft Docs Always Encrypted allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). As a result, Always Encrypted provides a separation between those who own the data (and can view it) and those who manage the data (but should have no access). By ensuring on-premises database administrators, cloud database operators, or other high-privileged, but unauthorized users, cannot access the encrypted data, Always Encrypted enables customers to confidently store sensitive data outside of their direct control. This allows organizations to encrypt data at rest and in use for storage in Azure, to enable delegation of on-premises database administration to third parties, or to reduce security clearance requirements for their own DBA staff.
12 Always Encrypted - Concepts
13 Always Encrypted - Concepts Column Master Key (CMK) Protects the column encryption key(s). Stored in a trusted key store like Windows Certificate Store, Azure key Vault, etc Column Encryption Key (CEK) Protects the encrypted columns. Stored in the database Column-level encryption setting Deterministic Randomized Connection string Column Encryption Setting = enabled;
14 DEMO 01
15 ALTER ANY COLUMN MASTER KEY Always Encrypted DB Permissions ALTER ANY COLUMN MASTER KEY ALTER ANY COLUMN ENCRYPTION KEY VIEW ANY COLUMN MASTER KEY DEFINITION VIEW ANY COLUMN ENCRYPTION KEY DEFINITION
16 ALTER ANY COLUMN MASTER KEY Always Encrypted DB Permissions
17 Parameterization Client Application must use When inserting data to Always Encrypted columns New feature SSMS 17 automatically converts Transact-SQL variables into query parameters works only in Query Editor windows that use database connections with Always Encrypted enabled The type of the literal used for the initialization of the variable to be parametrized, must match the type in the variable declaration. If date type or a time type, the variable must be initialized using a string using one of the following ISO 8601-compliant formats. Intellisense used and blue squiggle
18 DEMO 02
19 Certificate Management Provisioning Column Master Keys Provisioning Column Encryption Keys Rotating Column Master Keys Rotating Column Encryption Keys
20 Certificate Management Provisioning Column Master Keys Certificate Store Current User Certificate Store Local computer Azure Key Vault Key Store Provider (CNG) Cryptographic Service Provider (CAPI) deprecated Disabled by default
21 Certificate Management Provisioning Column Encryption Keys Certificate Store Local computer Azure Key Vault Key Store Provider (CNG) Cryptographic Service Provider (CAPI)
22 Certificate Management Rotating Column Master Keys Replace an existing CMK with a new CMK Required if CMK compromised May be required to comply with organization s policies Decrypt CEKs protected with the current CMK, re-encrypt them using the new CMK, and updating the key metadata
23 Certificate Management Rotating Column Encryption Keys Decrypts all the data in all encrypted columns and reencrypt with the new CEK Can be very lengthy process Requires careful planning and Outage: NO applications can write to the impacted tables
24 DEMO 03
25 Limitations Deterministic Encryption requires _BIN2 collation. A CEK can have two encrypted values (for key rotation) Queries can only perform operations on deterministic encryption Only the equals (=) operation is allowed in queries. (No >, <, <>, like, etc.) Queries must pass values as parameters, not literals. Limited data types Key columns in indexes only allow deterministic encryption NO CDC NO FOR XML or FOR JSON PATH During Encryption process, there can be no inserts or updates as it may result in data corruption And More can be checked at Microsoft Docs(reference)
26 Summary Always Encrypted basically requires a change to the connection string Data is encrypted and protected once it leaves the client Encrypted data is protected from sysadmin on the server Certificate management is crucial to protecting your data
27 QUESTIONS?
28 DEMO 05
29 References Always Encrypted (Database Engine) Always Encrypted Column Encryption Metadata
30 QUESTIONS?
31 Coming up next! Securables, Principals, and Permissions John Deardurff
32 THANK YOU FOR ATTENDING
33
Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra
Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra Technical Assistance If you require assistance during the session, type
More informationSecuring SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders
Securing SQL Server Processes with Certificates Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Technical Assistance If you require assistance during the session,
More informationSensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill
Sensitive Data Warriors: Always On Encryption and Data Masking Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type
More informationNew Paradigm for Performance Tuning in SQL Server Presented by Robert Davis
in SQL Server 2016 Presented by Robert Davis Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools while balancing the need for IT to
More informationUsing JSON with SQL Server Presented by Steve Hughes Moderated by Sarah Huang
Using JSON with SQL Server 2016 Presented by Steve Hughes Moderated by Sarah Huang Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools
More informationSwimming in the Data Lake. Presented by Warner Chaves Moderated by Sander Stad
Swimming in the Data Lake Presented by Warner Chaves Moderated by Sander Stad Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools
More informationSQL Server and Application Security For Developers. Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates
SQL Server and Application Security For Developers Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates Technical Assistance If you require assistance during the session, type your
More informationLocking, Blocking, Versions: Concurrency for Maximum Performance. Kalen Delaney, Moderated By: Daniel Janik
Locking, Blocking, Versions: Concurrency for Maximum Performance Kalen Delaney, www.sqlserverinternals.com Moderated By: Daniel Janik Thank You microsoft.com idera.com attunity.com Empower users with new
More informationOutlier Detection With SQL And R. Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty
Outlier Detection With SQL And R Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty Technical Assistance If you require assistance during the session, type your inquiry into
More informationSQL Server Security Azure Key Vault
Azure SQL database development SQL Server encryption Bmxbzt Fodszufe SQL Server Security Azure Key Vault Always Encrypted SQL Server database development www.anatec.co.uk SQL Server Specialists Caroline
More informationSQL Operations Studio - a new multi-platform tool for SQL Server database development, administration, and monitoring
SQL Operations Studio - a new multi-platform tool for SQL Server database development, administration, and monitoring Marek Masko, Principal Database Analyst, Sabre Moderated By: Philip Seamark Presenting
More informationColumnstore Technology Improvements in SQL Server Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan
Columnstore Technology Improvements in SQL Server 2016 Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with
More informationA Crash-Course in Biml. Tim Mitchell, Principal Data Architect, Tyleris Data Solutions Moderated By: Cathrine Wilhelmsen
A Crash-Course in Biml Tim Mitchell, Principal Data Architect, Tyleris Data Solutions Moderated By: Cathrine Wilhelmsen Thank You microsoft.com idera.com attunity.com Empower users with new insights through
More informationR Language for the SQL Server DBA
R Language for the SQL Server DBA Beginning with R Ing. Eduardo Castro, PhD, Principal Data Analyst Architect, LP Consulting Moderated By: Jose Rolando Guay Paz Thank You microsoft.com idera.com attunity.com
More informationMonitoring Page Splits in SQL Server
Monitoring Page Splits in SQL Server Guy Glantser, CEO, Madeira Data Solutions Moderated By: Jay O'Donnell Presenting Sponsors Technical Assistance If you require assistance during the session, type your
More informationThe Ambiguous Case of Off-Row Storage in In- Memory OLTP. Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad
The Ambiguous Case of Off-Row Storage in In- Memory OLTP Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad Technical Assistance If you require assistance during the session, type your inquiry
More informationFour New Table Level Security Features of SQL Server Karen Lopez, Data Evangelist & Architect
Four New Table Level Security Features of SQL Server 2016 Karen Lopez, Data Evangelist & Architect Karen López Data Evangelist Karen was born this way: loving data. She wants you to love your data, too,,
More informationSQL Server Internals: The Practical Angle Sneak Peek. Dmitri Korotkevitch Moderated by Roberto Fonseca
SQL Server Internals: The Practical Angle Sneak Peek Dmitri Korotkevitch Moderated by Roberto Fonseca Technical Assistance Maximize your screen with the zoom button on the top of the presentation window
More informationEncrypting Data within Sql Server
Encrypting Data within Sql Server Tom Norman Data Architect - KPA Knightdale, North Carolina Microsoft Certified Professional Leader - PASS Virtualization Virtual Chapter Past President - Denver Chapter
More informationSQL Organizational Security & Compliance. George Walters Senior Technical Evangelist for ISV Partners
Organizational Security & Compliance SQL 2012-2017 George Walters Senior Technical Evangelist for ISV Partners george.walters@microsoft.com @gwalters69 on twitter Why is security important? 4 Progress
More informationHacking SQL Server. André, Melancia, Developer/DBA, LunarCat.PT Moderated By: Jody Roberts
Hacking SQL Server André, Melancia, Developer/DBA, LunarCat.PT Moderated By: Jody Roberts Technical Assistance If you require assistance during the session, type your inquiry into the question pane on
More informationProtecting Your Data With Encryption
Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies Thank you Sponsors! o Please visit the sponsors during the vendor break from 2:45 3:15 and enter their end-of-day raffles Event
More informationPulseway Security White Paper
Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter
More informationSQL Server Security. Marek
SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel
More informationSQL Server 2016 New Security Features. Gianluca Sartori
SQL Server 2016 New Security Features Gianluca Sartori Our Sponsors Gianluca Sartori Independent SQL Server consultant SQL Server MVP, MCTS, MCITP, MCT Works with SQL Server since version 7 DBA @ Scuderia
More informationA Closer Look at Distributed Availability Groups. Allan Hirt, Managing Partner, SQLHA LLC Moderated By: George Carlisle
A Closer Look at Distributed Availability Groups Allan Hirt, Managing Partner, SQLHA LLC Moderated By: George Carlisle Thank You microsoft.com idera.com attunity.com Empower users with new insights through
More informationCAN MICROSOFT HELP MEET THE GDPR
CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com
More informationDB Fundamentals Exam.
IBM 000-610 DB2 10.1 Fundamentals Exam TYPE: DEMO http://www.examskey.com/000-610.html Examskey IBM 000-610 exam demo product is here for you to test the quality of the product. This IBM 000-610 demo also
More informationSHAREPOINT DEVELOPMENT FOR 2016/2013
SHAREPOINT DEVELOPMENT FOR 2016/2013 Course Code: AUDIENCE: FORMAT: LENGTH: SP16-310-GSA (CP GSA2016) Professional Developers Instructor-led training with hands-on labs 5 Days COURSE INCLUDES: 5-days of
More informationDatabase Administration for Azure SQL DB
Database Administration for Azure SQL DB Martin Cairney SQL Saturday #582, Melbourne 11 th February 2017 Housekeeping Mobile Phones Please set to stun during sessions Evaluations Please complete a session
More informationMicrosoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps
Microsoft 70-535 Dumps with Valid 70-535 Exam Questions PDF [2018] The Microsoft 70-535 Microsoft Architecting Microsoft Azure Solutions Exam exam is an ultimate source for professionals to retain their
More informationIntroduction to Azure DocumentDB. Jeff Renz, BI Architect RevGen Partners
Introduction to Azure DocumentDB Jeff Renz, BI Architect RevGen Partners Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing user created content
More informationAzure SQL Database Training. Complete Practical & Real-time Trainings. A Unit of SequelGate Innovative Technologies Pvt. Ltd.
Azure SQL Database Training Complete Practical & Real-time Trainings A Unit of SequelGate Innovative Technologies Pvt. Ltd. AZURE SQL / DBA Training consists of TWO Modules: Module 1: Azure SQL Database
More informationWelcome! Power BI User Group (PUG) Copenhagen
Welcome! Power BI User Group (PUG) Copenhagen Connect to Data in Power BI Desktop Just Thorning Blindbæk Consultant, Trainer and Speaker Connect to Data in Power BI Desktop Basic introduction to data connectivity
More informationSafeNet ProtectApp APPLICATION-LEVEL ENCRYPTION
SafeNet ProtectApp APPLICATION-LEVEL ENCRYPTION Encrypt application data and keep it secure across its entire lifecycle no matter where it is transferred, backed up, or copied Rich application encryption
More informationWelcome to the. Migrating SQL Server Databases to Azure
Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine
More informationWHITEPAPER. MemSQL Enterprise Feature List
WHITEPAPER MemSQL Enterprise Feature List 2017 MemSQL Enterprise Feature List DEPLOYMENT Provision and deploy MemSQL anywhere according to your desired cluster configuration. On-Premises: Maximize infrastructure
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:
More informationMaintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led
Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led Introduction This three-day instructor-led course provides students with product knowledge and skills needed to
More informationMicrosoft SQL Server 2016 Always Encrypted
THALES E-SECURITY Microsoft SQL Server 2016 Always Encrypted Integration Guide Version: 1.9 Date: 24 th November 2017 Copyright 2017 Thales UK Limited. All rights reserved. Copyright in this document is
More informationGoldilocks and The Three Linux Bears
Goldilocks and The Three Linux Bears Andrew Nakamura, SQLDBA, Keck Medical Center - USC Moderated By: Adrian Sullivan Presenting Sponsors Thank You to Our Presenting Sponsors Empower users with new insights
More informationComprehensive Database Security
Comprehensive Database Security Safeguard against internal and external threats In today s enterprises, databases house some of the most highly sensitive, tightly regulated data the very data that is sought
More informationMichael Wells Microsoft Specialist, Dell EMC. SQL DBaaS on Microsoft Azure Stack
Michael Wells Microsoft Specialist, Dell EMC SQL DBaaS on Microsoft Azure Stack About Me Name: Michael Wells Email: Michael.WellsJr@dell.com Twitter: @SqlTechMike - SQL Server DBA 7+ Years - Reformed Developer
More informationNetwork Security Technology Project
Network Security Technology Project Shanghai Jiao Tong University Presented by Wei Zhang zhang-wei@sjtu.edu.cn!1 Part I Implement the textbook RSA algorithm. The textbook RSA is essentially RSA without
More informationSQL Server 2014/2016 Enhancements for Developers. Wylie Blanchard Lead IT Consultant; SQL Server DBA
SQL Server 2014/2016 Enhancements for Developers Wylie Blanchard Lead IT Consultant; SQL Server DBA About Great Tech Pros Great Tech Pros was founded in 2012 Specialties include: IT Consulting Database
More informationCentrify Suite Enterprise Edition Self-Paced Training
CENTRIFY DATASHEET Centrify Suite Enterprise Edition Self-Paced Training Overview The process of installing, configuring, and troubleshooting the Centrify software is easy, once you understand the fundamentals.
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationThe Nasuni Security Model
White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationIBM EXAM - C DB Fundamentals. Buy Full Product.
IBM EXAM - C2090-610 DB2 10.1 Fundamentals Buy Full Product http://www.examskey.com/c2090-610.html Examskey IBM C2090-610 exam demo product is here for you to test the quality of the product. This IBM
More informationINTRODUCTION TO SQL SERVER 2000 SPRINGER
page 1 / 6 page 2 / 6 introduction to sql server pdf Introduction to SQL What is SQL? I Structured Query Language I Usually talk to a database server I Used as front end to many databases (mysql, postgresql,
More informationGrant View Database Diagram Sql Server 2008
Grant View Database Diagram Sql Server 2008 You can create views in SQL Server 2016 by using SQL Server Management Requires CREATE VIEW permission in the database and ALTER permission on the In the Diagram
More informationexam.100q. Number: Passing Score: 800 Time Limit: 120 min Provisioning SQL Databases
70-765.exam.100q Number: 70-765 Passing Score: 800 Time Limit: 120 min 70-765 Provisioning SQL Databases Sections 1. Implementing SQL in Azure 2. Manage databases and instances 3. Deploy and migrate applications
More informationProcessing Unstructured Data. Dinesh Priyankara Founder/Principal Architect dinesql Pvt Ltd.
Processing Unstructured Data Dinesh Priyankara Founder/Principal Architect dinesql Pvt Ltd. http://dinesql.com / Dinesh Priyankara @dinesh_priya Founder/Principal Architect dinesql Pvt Ltd. Microsoft Most
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationThe Windows DBA s Jump Start for SQL Server on Linux
The Windows DBA s Jump Start for SQL Server on Linux Michael Otey, President, TECA, Inc Moderated By: Peter Larsson Presenting Sponsors Thank You to Our Presenting Sponsors Empower users with new insights
More informationThe Secret to Secrets Management BSides PDX, October 27, 2018
The Secret to Secrets Management BSides PDX, October 27, 2018 MARK B. COOPER PRESIDENT & FOUNDER MARK@PKISOLUTIONS.COM @THEPKIGUY 2014-2018 The PKI Guy President and Founder, PKI Solutions Known as The
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationOracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security
Oracle Audit Vault Trust-but-Verify for Enterprise Databases Tammy Bednar Sr. Principal Product Manager Oracle Database Security Agenda Business Drivers Audit Vault Overview Audit
More informationOne Schema In Sql Server 2005 Management >>>CLICK HERE<<<
One Schema In Sql Server 2005 Management Studio 2008 Database As a database increases in size full database backups take more time to finish and require more When you specify a back up task by using SQL
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationExchange Online Technical Overview. CCAP Exchange Online Overview 10/27/ /28/2011
Exchange Online Technical Overview CCAP Exchange Online Overview 10/27/2011-10/28/2011 Exchange Online: Trusted, Familiar and Robust Co-Existence 2 Microsoft Confidential The Benefits of Exchange Online
More informationFocus mainly on the technical part of things Foundation to manage Azure resources
#techsummitch Focus mainly on the technical part of things Foundation to manage Azure resources Azure governance Resources provisioning options Azure Resource Manager (ARM) NOT Organizational management
More informationWHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES?
WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES? Timothy P. McAliley CISA, CISM, CISSP, ITIL V3, MCSA, MCSE, MCT, PMP Microsoft Account Technology Strategist Try It Yourself! Two TechNet Virtual Labs
More informationUpdate Table Schema Sql Server 2008 Add Column After
Update Table Schema Sql Server 2008 Add Column After ALTER COLUMN ENCRYPTION KEY (Transact-SQL) Applies to: SQL Server (SQL Server 2008 through current version), Azure SQL Database, the owner will remain
More informationXerox Audio Documents App
Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,
More informationSuccessfully migrate existing databases to Azure SQL Database. John Sterrett Principal Consultant
Successfully migrate existing databases to Azure SQL Database John Sterrett Principal Consultant Common Migration failures Plan Test Execute Manage Free Reference Material Videos, Reference Links, Tips,
More informationIBM Spectrum Protect Version Introduction to Data Protection Solutions IBM
IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM IBM Spectrum Protect Version 8.1.2 Introduction to Data Protection Solutions IBM Note: Before you use this information
More informationSecurity and Privacy Overview
Security and Privacy Overview Cloud Application Security, Data Security and Privacy, and Password Management 1 Overview Security is a growing concern and should not be taken lightly across an organization.
More informationMonitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In
Monitoring Active Directory: Both Azure AD and On-Premise AD and How Synchronization and Federation Play In Sponsored by 2016 Monterey Technology Group Inc. Thanks to Made possible by Preview of key points
More informationTool Create Database Diagram Sql Server 2008 R2
Tool Create Database Diagram Sql Server 2008 R2 Microsoft SQL Server 2008 R2 Database Diagrams Up Next. Microsoft SQL Server. sql 2008r2 can I copy a diagram from database to database and retain relationships
More informationMySQL for Database Administrators Ed 3.1
Oracle University Contact Us: 1.800.529.0165 MySQL for Database Administrators Ed 3.1 Duration: 5 Days What you will learn The MySQL for Database Administrators training is designed for DBAs and other
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationMicrosoft certified solutions associate
Microsoft certified solutions associate MCSA: BI Reporting This certification demonstrates your expertise in analyzing data with both Power BI and Excel. Exam 70-778/Course 20778 Analyzing and Visualizing
More informationTechnology Enhancements for SQL Server 2014/2016 Developers. Wylie Blanchard Lead IT Consultant; SQL Server DBA
Technology Enhancements for SQL Server 2014/2016 Developers Wylie Blanchard Lead IT Consultant; SQL Server DBA About Great Tech Pros Great Tech Pros was founded in 2012 Specialties include: IT Consulting
More informationSQL Server New innovations. Ivan Kosyakov. Technical Architect, Ph.D., Microsoft Technology Center, New York
2016 New innovations Ivan Kosyakov Technical Architect, Ph.D., http://biz-excellence.com Microsoft Technology Center, New York The explosion of data sources... 25B 1.3B 4.0B There s an opportunity to drive
More informationWindows Server The operating system
Windows Server 2019 The operating system that bridges onpremises and cloud By maximizing technology and infrastructure investments with Windows Server 2019, forward-facing businesses can capture direct
More informationWHAT S NEW IN SQL SERVER 2017
WHAT S NEW IN SQL SERVER 2017 Linux Support Graph Tables Intelligent Query Processing Resumable Online Index Rebuild Machine Learning Services In-Memory Tables HASAN SAVRAN 3/17/2018 SQL SATURDAY CINCINNATI
More informationSHAREPOINT 2010 OVERVIEW FOR DEVELOPERS RAI UMAIR SHAREPOINT MENTOR MAVENTOR
SHAREPOINT 2010 OVERVIEW FOR DEVELOPERS RAI UMAIR SHAREPOINT MENTOR MAVENTOR About Rai Umair SharePoint Mentor with Maventor 8+ years of experience in SharePoint Development, Training and Consulting APAC
More informationSynergetics-Standard-SQL Server 2012-DBA-7 day Contents
Workshop Name Duration Objective Participants Entry Profile Training Methodology Setup Requirements Hardware and Software Requirements Training Lab Requirements Synergetics-Standard-SQL Server 2012-DBA-7
More informationTechnical Brief Enterprise Vault Privileged Delete
1 Feature Description Enterprise Vault 12.3 and Discovery Accelerator 12.3 offer a new feature called. The feature has the following benefits: This feature will help customers to comply with regulations,
More informationUpdating Your Skills to SQL Server 2016
Updating Your Skills to SQL Server 2016 OD10986B; On-Demand, Video-based Course Description This course provides students moving from earlier releases of SQL Server with an introduction to the new features
More informationDatabase Encryption with DataSecure. Appendix: Demo. Professional Services EMEA Insert Date Sept. 2011
Database Encryption with DataSecure Appendix: Demo Insert Andreas Your Gatz Name Principal Insert Your Consultant Title Professional Services EMEA Insert Date Sept. 2011 Agenda Demo Oracle customer table
More informationAzure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk
Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate
More informationMaintain Data Control and Work Productivity
DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud
More informationEXAM - ST Symantec Enterprise Vault 11.x Technical Assessment. Buy Full Product.
Symantec EXAM - ST0-306 Symantec Enterprise Vault 11.x Technical Assessment Buy Full Product http://www.examskey.com/st0-306.html Examskey Symantec ST0-306 exam demo product is here for you to test the
More informationMS 20488: Developing Microsoft SharePoint Server 2013 Core Solutions Duration: 5 Days Method: Instructor-Led
MS 20488: Developing Microsoft SharePoint Server 2013 Core Solutions Duration: 5 Days Method: Instructor-Led Certification: Microsoft Certified Solutions Developer [MCSD]: Exam 70-488 Course Description
More informationBuilding Self-Service BI Solutions with Power Query. Written By: Devin
Building Self-Service BI Solutions with Power Query Written By: Devin Knight DKnight@PragmaticWorks.com @Knight_Devin CONTENTS PAGE 3 PAGE 4 PAGE 5 PAGE 6 PAGE 7 PAGE 8 PAGE 9 PAGE 11 PAGE 17 PAGE 20 PAGE
More informationSession 6A: Export Controls and Cloud Computing. Key Regulatory Issues
Export Controls and Cloud Computing Bureau of Industry and Security U.S. Department of Commerce Key Regulatory Issues Control system was devised before the development of highbandwidth telecommunications,
More informationExport Controls and Cloud Computing
Export Controls and Cloud Computing Bureau of Industry and Security U.S. Department of Commerce Presented by: Tracy L. Patts Foreign Policy Division BIS Guidance on Cloud Computing Three directly relevant,
More informationDDTC IT Modernization
DDTC IT Modernization Anthony Dearth Directorate Defense Trade Controls Acting Managing Director AGENDA DECCS Release 2 Features and Industry Batch Filing/Testing DECCS Cyber Security DTAG Recommendations
More informationMicrosoft. Perform Data Engineering on Microsoft Azure HDInsight Version: Demo. Web: [ Total Questions: 10]
Microsoft 70-775 Perform Data Engineering on Microsoft Azure HDInsight Web: www.marks4sure.com Email: support@marks4sure.com Version: Demo [ Total Questions: 10] IMPORTANT NOTICE Feedback We have developed
More informationPrivileged Account Security: A Balanced Approach to Securing Unix Environments
Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationManaging Metadata with Oracle Data Integrator. An Oracle Data Integrator Technical Brief Updated December 2006
Managing Metadata with Oracle Data Integrator An Oracle Data Integrator Technical Brief Updated December 2006 Managing Metadata with Oracle Data Integrator: An Oracle Data Integrator Technical Brief Metadata
More informationCopyright 2014, Oracle and/or its affiliates. All rights reserved.
1 Enterprise Manager 12c Compliance Management Part 1 Overview 2 3 Agenda Compliance Overview Understanding Compliance Results Understanding Compliance Score Calculation Compliance Related Roles and Privileges
More informationSERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING
DATASHEET SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING If you re looking for a highly professional, no-nonsense FTP server, then you can t do much better
More informationINFO-H-415 Project Overview- Security Database and SQL Server
INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way
More informationHIPAA Regulatory Compliance
Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health
More informationHow To Configure & Use Insights for ArcGIS ARAVIND SIVASAILAM MATT THOMAS
How To Configure & Use Insights for ArcGIS ARAVIND SIVASAILAM MATT THOMAS Who is this for? ArcGIS Enterprise Publishers & Administrators ArcGIS Enterprise Users (Little to No Experience with Insights)
More information