Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading

Size: px
Start display at page:

Download "Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading"

Transcription

1 Strategic IT Architectures and The SAS System A Case Study of the Application of The SAS System within British Gas Trading Presenters: John Ingram - British Gas Trading Ty Sapsford - OCS Consulting Plc British Gas Trading embarked upon a major development project in 1996/97 in order to enter the electricity market at deregulation in April One of the systems within the programme required both OLTP and OLAP functionality to support a Trading business division initiative. Trading selected The SAS System for delivering the OLAP functionality. Business constraints, driven by external market factors, created a situation requiring a quick response concerning the OLTP functionality. The SAS System s flexibility and functional breadth made it a leading choice to respond to this situation. The SAS System enabled IT to deliver to the business division a system that satisfied the business requirements, while meeting IT strategic objectives. This paper shall describe the IT architecture and how The SAS System supported this architecture. A brief summary of the costs and benefits of the SAS System within a strategic IT architecture will conclude this paper.

2 Presenters Notes: Corporate Strategic IT Architecture defined the hardware and software configuration of the system as: Hardware: Servers Digital Clients Compaq.. Software: Servers Database Server - Digital Unix v4.0b Oracle v Open Process xxx.xx Redbox xxx.xx Application Server - Windows NT v4.0 service pack 3 SMS Server xxx.xx Clients Windows NT v4.0 service pack 3 Clients Lotus Excel v7 SMS Client xxx.xx The application scoping study deliverables identified the additional requirement for the selected solution to be located in the software configurations of both the Database and Application servers. The SAS System v6.12 ts020 was selected. The following SAS modules are located on the servers: Database Server SAS/Base SAS/Connect SAS/Access to Oracle Application Server SAS/Base SAS/Connect SAS/Access to PC File Formats SAS/Assist SAS/AF * * SAS/AF was used in the development environment to build the Graphical User Interface (GUI).

3 British Gas Trading IT architecture strategic objectives are defined in detail in many internal documents. The IT architecture objectives of interest to this application may be summarised as (SAS Meeting IT Strategic Objectives:): Data Management Data Access External Interfaces Database Management Interface Definitions Security Backup and Recovery Audit Security Data Integrity Timely Complete Correct Valid Data Consistency Corporate Definitions Business Unit Area Definitions External Definitions Application Management Delivery Unix Environment Windows NT Environment Extendibility Vendor Pedigree Custom Application Code Year 2000 Recovery Backup Disaster Security User Interfaces Data Interfaces Code

4 The following table highlights the experienced strengths and weaknesses The SAS System provided towards the IT Strategic Architecture objectives (SAS Meeting IT Strategic Objectives:): Objective: Strength Weaknesses Data Management Data Access External Interfaces Database Management Interface Definitions Security Backup and Recovery Audit Security Strong support of proprietary and non-proprietary file formats provided. Support for required file formats and proprietary access languages enable interface definitions to use optimal mechanisms. SAS datasets being proprietary are inaccessible to other products. SAS compiled code is equally inaccessible to other product access manipulation. The option exists to remove the access to the compiled code source via The SAS System tools or to apply access restrictions to the SAS datasets, though this was not persued in the actual system. SAS support of Oracle dbms system enabled leveraging Oracle s transactional recovery facilities. SAS metadata facilities enabled uncomplicated data management systems to be provided that required limited effort to build. SAS cross functional use, providing both OLAP and OLTP functionality, enable audit tracking to be more comprehensive than normally anticipated by multi-vendor solution. Operating and Oracle system security is fully supported by SAS. Customisation of standard SAS scripts necessary to tailor to each operating environment is relatively simple. Additionally, SAS provided further security layer, using Oracle as a profile storage container. Integrating Oracle into the SAS security enable British Gas Trading Oracle skills to be used in the security maintenance area. Separate SAS modules required for proprietary file formats. Multiple skills required to support SAS files, spreadsheet files, and Oracle tables manipulations. The SAS System was required for accessing the data or source code. SAS not being a transactional relational database system, meant provisioning for transactional recovery facilities was required. NOTE: This only became necessary when project restrictions decided The SAS System would provide transactional facilities. Audit functionality not inherent in SAS modules. SAS support for object orientated approach reduced much of the effort. Support for multiple security layers increased development efforts and user interface complexity.

5 Objective: Strength Weaknesses Data Management Data Integrity Timely Complete Correct Valid The SAS applications integrated well into the scheduling tool, Open Process. All processing completed within the business and IT requirements as demonstrated by the allocated batch window. Notable gains during later tuning efforts have been made. The ability to capture an extensive range of data formats within SAS enable the solution to meet its completeness criteria. Several elements of the data model required integration of the business rules to ensure that a correct values are maintained, i.e. data values treated differently due to business environment conditions. The ability to represent these element s data values was met using SAS flexible data manipulation methods and data representation formats. The ability to validate a data representation using a mixture of SAS functions and data types within a single procedure or simple program module reduced effort and increased both the range of validity checking and its robustness. Customise loading mechanism required for Oracle in Digital Unix environment. Not provided by the default SAS/Access to Oracle product This was resolved using SAS/Base and SAS/Access to Oracle solution that OCS built into the system. Program complexity was increased by completeness requirements. Perceived weaknesses during early phases was restriction of supported data types within SAS of char (max length 200) and numeric (max 8 bytes), though no formal business requirement for more than these data types was identified. Providing data correctness required the data model to integrate business rules. This included all stages of the project, i.e. documentation and diagrams, pseudocode and program modules. Integration of SAS within a CASE tool would have minimised this effort, though some additional effort may have been required to operate the CASE tool. Duplicate processing occurred to enable more than simplex read error failures. More sophisticated maintenance requirements, particularly with the database feed, i.e. Year 2000 support increased complexity of code.

6 Objective: Strength Weaknesses Data Consistency Corporate Definitions Business Unit Area Definitions External Definitions IT Strategic Architecture established the database environments, i.e. Oracle as the strategic data repository. SAS ability to actively integrate within an Oracle environment ensured that data was captured, updated and if necessary removed as defined by the corporate data strategy policies. Business requirements meant the data required metamorphosing from the corporate definition to another format was required. The application of SAS SQL views and reformatting functions to transpose and manipulate the data tables enable the project to meet both corporate and business requirements. The system interfaces with several external entities, being both internal and external to the organisation. SAS/BASE product provided all the mechanisms to meet the external organisation entity interface requirements. The internal interfaces were meet again using SAS/BASE with the addition of SAS/Access to PC File Formats. Performance was effected by the inherent overhead associated with a transactional dbms system versus a informational. This is partially offset by the advantages of a transactional dbms with recovery and to some degree with database integrity. Controls implemented within the solution assisted with ensure a consistency was maintained between the two definitions. These controls required additional effort. Using objects to perform the transformations reduced this effort, plus gains from operating on an information dbms (SAS) data table with later processes counteracted part of the effort cost. Additionally effort necessary to

7 Objective: Strength Weaknesses Application Management Delivery Unix Environment Windows NT Environment Extendibility Vendor Pedigree Custom Application Code Connectivity was easily established with SAS/CONNECT product, with minimal customisation of the connect script and using the chosen communication protocol, i.e. TCP/IP. Access to the application is controlled by an Oracle table containing users profiles. SAS catalogues minimised file management and complement security standards. SAS ability to communicate with the operating environment enable leveraging the Unix operating system to perform maintenance functions on non-sas file types and to communicate with the support message system Redbox. The trading system was to support the ability for a user to have their profile fully portable. SAS initiation process is managed by files in ASCII text format, i.e. config and autoexec files. The text format enable ready customisation to ensure the application met the profile criteria. The application profile while maintained in a SAS proprietary file, i.e. profile.sc2, was known to the system as a standard file, thus was also readily integrated into the NT environment. The stability and multi-platform support of The SAS System met British Gas Trading software vendor pedigree standards. The modular approach to configuring SAS fulfilled scalability requirements. Structured programming and object orientated approaches maximised reuseability which reduced effort, actively assisted interface consistency reducing effort by development team and by users in learning the application, and lasted have increase ease to analysis and remedy changes to the trading system. Unix connectivity and relatively poor inherent access and security controls increase exposure to unwanted access. The text format of the config and autoexec files are a strength and weakness. A skilled person can readily access and understand the files, thus additional access controls were required. The breadth of SAS led to some extra efforts being required to identify certain operational system specific behaviours. This would not be unique to SAS. Requires more analysis and design effort to be expended initially to identify modules/objects.

8 Objective: Strength Weaknesses Application Management Extendibility Year 2000 Recovery Backup Disaster Security User Interfaces Data Interfaces Combination of yearcutoff option and range of date formats and functions made meeting year 2000 compliance simple to perform. The SAS System version 6.12 year 2000 compliant certificate and SAS support of providing year 2000 setinit enable year 2000 testing to be performed. Use of SAS metadata and data processing facilities supplied the application with the capability to validate backups during operation, which was critical particularly during some of the overnight batch routines. Access to operating system enable SAS to perform backup functions on non- SAS files. Use of similar metadata and data processing facilities within the SAS System enabled the application to registered and performed disaster recovery or disaster notification where recovery not possible. Three levels of security provided by vendors, i.e. Windows NT, Unix and Oracle are integrated into the application. Additionally a further level of security is encoded into the SAS/AF interface. Use of initcmd, custom profile, custom config and autoexec files delivered via SMS enable users to be restricted access to the SAS System except where this is provisioned within the application. SAS and Oracle security are incorporated. Oracle users are defined roles which control privileges a users has within Oracle. SAS datasets and views support encryption and access controls where the functional requirements stated such requirement. All custom code and libraries are supplied to the users in readonly mode, with the users Performing full year 2000 compliance was not possible due to non-compliance of operating system, thus some assumptions of validity of year 2000 compliance were necessary. Difficult for tester to validate SAS files were correctly backed up without experience and access to the SAS System. This was the same for Oracle tables. The SAS System being an informational database is not provisioned with roll-back, journalising and other disaster functions. This was not critical due to the system as Oracle was defined as the data repository. The only risk was during Oracle updates by SAS within the application. Extra effort is required to support the levels of security, which is an on-going cost for the business. A user with the appropriate levels of skills could alter the library mode, as could a user with the appropriate Oracle user id and password edit the data tables.

9 Code having only their private libraries available in write mode. Access privileges are controlled using NT file and folder privilege controls. This is further complemented by access privileges assigned to the SAS catalogues. The option to provide the production environment with compiled code missing source is also available. Operational support can be adversely effected by too much code security. Code security is an area require content revision during the system life cycle.

10 Summary: Balance Sheet Assets Flexibility - providing transactional and informational facilities which are integral to a trading system Multi-platform support - enabled the trading system to implement the designated optimal client/server solution Open data support - ability to access and produce multiple file systems, i.e. Oracle, Lotus 1-2-3, MS Excel, etc. provided flexibility and data options not readily available to other systems 3 rd and 4 th generation language support - use of structured and object-orientated approaches code to integrated readily into the solution. Selective use of appropriate methodologies to sections of the solution code be supported by the development team Year 2000 compliance - year 2000 compliance within the SAS System and the SAS custom code was able to be tested and documented Extendibility - The SAS System being readily expanded with new modules. The custom code using structured and object-orientated programming standards coupled with coding standards enable both extensions and long-term support to be provided with minimal additional effort. Liabilities Provisioning of printing methods with the vendor software not as strong as required. Thus increasing effort in development to provide hardcopy output Proprietary nature of SAS data tables increases complexity of access to data held within SAS. Thus increasing effort to ensure data stored within Oracle tables where data to be available to other systems, or where transactional functionalities required Service Level Agreement more complex as production support provisioning not within current British Gas Trading IT skill portfolio (SAS Skills). Commitment to skill transferral and training required of both the vendor (SAS) and third party consultancy (OCS). Way Ahead Business Requirements Review User Acceptance Testing Phase 2

11 Questions?

12 OCS Consulting plc acknowledges all other copyrights and trademarks OCS Consulting plc 1

13 JOHN INGRAM - STRATEGIC CONSULTANT, BRITISH GAS TRADING TY SAPSFORD - SENIOR CONSULTANT, OCS CONSULTING plc IT STRATEGIC ARCHITECTURE MILESTONES TRADING SYSTEM MILESTONES IT STRATEGIC ARCHITECTURE TRADING SYSTEM ARCHITECTURE DATA MANAGEMENT APPLICATION MANAGEMENT OCS Consulting plc 2

14 OCS Consulting plc 3

15 OCS Consulting plc 4

16 OCS Consulting plc 5

17 SERVERS DATABASE SERVER (SAS 6.12 TS020) SAS/BASE SAS/CONNECT SAS/ACCESS TO ORACLE APPLICATION SERVER (SAS 6.12 TS020) SAS/BASE SAS/CONNECT SAS/ACCESS TO PC FILE FORMATS SAS/GRAPH SAS/ASSIST SAS/AF* CLIENTS DESKTOP NONE * SAS/AF APPLICABLE IN DEVELOPMENT ONLY OCS Consulting plc 6

18 OCS Consulting plc 7

19 EXTERNAL INTERFACES DATABASE MANAGEMENT INTERFACE DEFINITIONS SECURITY BACKUP AND RECOVERY SECURITY TIMELY COMPLETE CORRECT VALID CORPORATE DEFINITIONS BUSINESS UNIT AREA DEFINITIONS EXTERNAL DEFINITIONS OCS Consulting plc 8

20 UNIX ENVIRONMENT WINDOW NT ENVIRONMENT VENDOR PEDIGREE CUSTOM APPLICATION CODE YEAR 2000 BACKUP AND RECOVERY DISASTER USER INTERFACES DATA INTERFACES CODE OCS Consulting plc 9

21 OCS Consulting plc 10

22 OCS Consulting plc 11

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Sysgem Enterprise Manager

Sysgem Enterprise Manager Sysgem Enterprise Manager Sysgem Enterprise Manager (SEM) The Sysgem Enterprise Manager (SEM) provides companies of all sizes with a simple, powerful tool for managing IT, auditing security, administering

More information

WHITE PAPER. Title. Managed Services for SAS Technology

WHITE PAPER. Title. Managed Services for SAS Technology WHITE PAPER Hosted Title Managed Services for SAS Technology ii Contents Performance... 1 Optimal storage and sizing...1 Secure, no-hassle access...2 Dedicated computing infrastructure...2 Early and pre-emptive

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010 Data Protection. Plugging the gap Gary Comiskey 26 February 2010 Data Protection Trends in Financial Services Financial services firms are deploying data protection solutions across their enterprise at

More information

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And

ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. And ANZSCO Descriptions The following list contains example descriptions of ICT units and employment duties for each nominated occupation ANZSCO code. Content 261311 - Analyst Programmer... 2 135111 - Chief

More information

VMware vcloud Air Accelerator Service

VMware vcloud Air Accelerator Service DATASHEET AT A GLANCE The VMware vcloud Air Accelerator Service assists customers with extending their private VMware vsphere environment to a VMware vcloud Air public cloud. This Accelerator Service engagement

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

IBM s Integrated Data Management Solutions for the DBA

IBM s Integrated Data Management Solutions for the DBA Information Management IBM s Integrated Data Management Solutions for the DBA Stop Stressing and Start Automating! Agenda Daily Woes: Trials and tribulations of the DBA Business Challenges: Beyond the

More information

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services Virtustream Managed Services Drive value from technology investments through IT management solutions Tim Calahan, Manager Managed Services Virtustream Managed Services Your partner in delivering IT as

More information

Microsoft SQL Server Training Course Catalogue. Learning Solutions

Microsoft SQL Server Training Course Catalogue. Learning Solutions Training Course Catalogue Learning Solutions Querying SQL Server 2000 with Transact-SQL Course No: MS2071 Two days Instructor-led-Classroom 2000 The goal of this course is to provide students with the

More information

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief RSA Solution Brief The RSA Solution for VMware View: Managing Securing the the Lifecycle Virtual of Desktop Encryption Environment Keys with RSA Key Manager RSA Solution Brief 1 According to the Open Security

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform

Deploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform Deploy Your step-by-step guide to successfully deploy an app with FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements, and

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created>

Software Requirements Specification. <Project> for. Version 1.0 approved. Prepared by <author(s)> <Organization> <Date created> Software Requirements Specification for Version 1.0 approved Prepared by Software Requirements Specification for Page 2 Table of Contents Revision

More information

SAS Solutions for the Web: Static and Dynamic Alternatives Matthew Grover, S-Street Consulting, Inc.

SAS Solutions for the Web: Static and Dynamic Alternatives Matthew Grover, S-Street Consulting, Inc. SAS Solutions for the Web: Static and Dynamic Alternatives Matthew Grover, S-Street Consulting, Inc. Abstract This paper provides a detailed analysis of creating static and dynamic web content using the

More information

Fusion Registry 9 SDMX Data and Metadata Management System

Fusion Registry 9 SDMX Data and Metadata Management System Registry 9 Data and Management System Registry 9 is a complete and fully integrated statistical data and metadata management system using. Whether you require a metadata repository supporting a highperformance

More information

This Document is licensed to

This Document is licensed to GAMP 5 Page 291 End User Applications Including Spreadsheets 1 Introduction This appendix gives guidance on the use of end user applications such as spreadsheets or small databases in a GxP environment.

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Transition Plan. Data Center Operations Outsourcing. Implementation: Final. Ref: TR0007

Transition Plan. Data Center Operations Outsourcing. Implementation: Final. Ref: TR0007 Data Center Operations Outsourcing Transition Plan Implementation: Final Page 1 of 15 DOCUMENT CONTROL SHEET Schedule/Exhibit Amendment Control Sheet Title of Amended Document: Section 4 Transition Plan

More information

NEN The Education Network

NEN The Education Network NEN The Education Network School e-security Checklist This checklist sets out 20 e-security controls that, if implemented effectively, will help to ensure that school networks are kept secure and protected

More information

IT Attestation in the Cloud Era

IT Attestation in the Cloud Era IT Attestation in the Cloud Era The need for increased assurance over outsourced operations/ controls April 2013 Symeon Kalamatianos M.Sc., CISA, CISM Senior Manager, IT Risk Consulting Contents Introduction

More information

Creating Enterprise and WorkGroup Applications with 4D ODBC

Creating Enterprise and WorkGroup Applications with 4D ODBC Creating Enterprise and WorkGroup Applications with 4D ODBC Page 1 EXECUTIVE SUMMARY 4D ODBC is an application development tool specifically designed to address the unique requirements of the client/server

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

CAPABILITY STATEMENT

CAPABILITY STATEMENT CAPABILITY STATEMENT Trident Health Services OUR MISSION Our mission is to be the best holistic supplier of IT services, and provide quality systems and cost effective, integrated solutions to all our

More information

Standard CIP Cyber Security Critical Cyber Asset Identification

Standard CIP Cyber Security Critical Cyber Asset Identification Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed

More information

Ingram Micro Cyber Security Portfolio

Ingram Micro Cyber Security Portfolio Ingram Micro Cyber Security Portfolio Ingram Micro Inc. 1 Ingram Micro Cyber Security Portfolio Services Trainings Vendors Technical Assessment General Training Consultancy Service Certification Training

More information

CwJ Consulting Ltd Technology & Roadmap guide. Author: Christopher Cantle Date: 7 th March 2017 Version: 2.5

CwJ Consulting Ltd Technology & Roadmap guide. Author: Christopher Cantle Date: 7 th March 2017 Version: 2.5 CwJ Consulting Ltd Technology & Roadmap guide Author: Christopher Cantle Date: 7 th March 2017 Version: 2.5 Technology & Roadmap Guide Page 1 of 17 Contents 1. Introduction... 3 2. Environment Management

More information

IT Managed Services. Schedule 1 Specification 11/07/18

IT Managed Services. Schedule 1 Specification 11/07/18 ` IT Managed Services Schedule 1 Specification 11/07/18 IT Managed Service ITT Schedule 1 Specification Table of Contents 1.0 Introduction... 2 1.1 Overview... 2 2.0 Scope... 2 3.0 Vendor Response Requirements...

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

Introduction to AppDev Studio Software

Introduction to AppDev Studio Software Introduction to AppDev Studio Software Olivier Zaech SAS Switzerland Introduction This paper is an introduction to AppDev Studio software. AppDev Studio is a complete Standalone Information Delivery Java

More information

Massimo Nardone, TKK, S Security of Communication Protocols

Massimo Nardone, TKK, S Security of Communication Protocols Network Logging/Auditing of network devices Firewall (types, management, procedures) Remote Access Passive intrusion detection Services/Applications Account authorization Account termination Accounts Lockout

More information

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS >> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT

More information

AUDIT OF ICT STRATEGY IMPLEMENTATION

AUDIT OF ICT STRATEGY IMPLEMENTATION APPENDIX A 2 1. Background AUDIT OF ICT STRATEGY IMPLEMENTATION 1.1. This report summarises the findings from the audit of ICT Strategy Implementation. This was a planned audit assignment which was undertaken

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

SAS/ACCESS Interface to R/3

SAS/ACCESS Interface to R/3 9.1 SAS/ACCESS Interface to R/3 User s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS/ACCESS 9.1 Interface to R/3: User s Guide. Cary, NC: SAS Institute

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK

INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK INFORMATION TECHNOLOGY ( IT ) GOVERNANCE FRAMEWORK 1. INTRODUCTION The Board of Directors of the Bidvest Group Limited ( the Company ) acknowledges the need for an IT Governance Framework as recommended

More information

Zero impact database migration

Zero impact database migration Zero impact database migration How to avoid the most common pitfalls of migrating from Oracle to SQL Server. ABSTRACT Migrating data from one platform to another requires a lot of planning. Some traditional

More information

Enabling efficiency through Data Governance: a phased approach

Enabling efficiency through Data Governance: a phased approach Enabling efficiency through Data Governance: a phased approach Transform your process efficiency, decision-making, and customer engagement by improving data accuracy An Experian white paper Enabling efficiency

More information

New Zealand Government IbM Infrastructure as a service

New Zealand Government IbM Infrastructure as a service New Zealand Government IbM Infrastructure as a service Global leverage / local experts World-class Scalable Agile Flexible Fast Secure What are we offering? IBM New Zealand Government Infrastructure as

More information

Managed Services.

Managed Services. Global IT Infrastructure and Deployment Specialists Managed Services Delivering proactive technology support to give you complete confidence in the essentials of your business and the power of your competitive

More information

Three Key Considerations for Your Public Cloud Infrastructure Strategy

Three Key Considerations for Your Public Cloud Infrastructure Strategy GOING PUBLIC: Three Key Considerations for Your Public Cloud Infrastructure Strategy Steve Follin ISG WHITE PAPER 2018 Information Services Group, Inc. All Rights Reserved The Market Reality The race to

More information

TRACKVIA SECURITY OVERVIEW

TRACKVIA SECURITY OVERVIEW TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times

More information

Enterprise Data Architect

Enterprise Data Architect Enterprise Data Architect Position Summary Farmer Mac maintains a considerable repository of financial data that spans over two decades. Farmer Mac is looking for a hands-on technologist and data architect

More information

Vulnerability Assessments and Penetration Testing

Vulnerability Assessments and Penetration Testing CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze

More information

Nesstar Server Configuration Tool User Guide

Nesstar Server Configuration Tool User Guide Nesstar Server Configuration Tool User Guide Version 3.50 The Configuration Tool allows the server Administrator to edit most of the server configuration properties and to perform basic administrative

More information

ISO27001:2013 The New Standard Revised Edition

ISO27001:2013 The New Standard Revised Edition ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information

More information

SMR Deployment Enablers

SMR Deployment Enablers SMR Deployment Enablers Kris MacCrory Decision Analysis Services 2017 Energy Technologies Institute LLP - Subject to notes on page 1 Small Modular Reactor (SMR) Deployment Enablers Project Kris MacCrory

More information

JOB TITLE: Senior Database Administrator PRIMARY JOB DUTIES Application Database Development

JOB TITLE: Senior Database Administrator PRIMARY JOB DUTIES Application Database Development JOB TITLE: Senior Database Administrator The Senior Database Administrator is responsible for managing multiple production and nonproduction Oracle, MSSQL, and PostgreSQL databases: 4 production Oracle

More information

Administration and Data Retention. Best Practices for Systems Management

Administration and Data Retention. Best Practices for Systems Management Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security

Data Warehouse. T rusted Application. P roject. Trusted System. T echnology. System. Trusted Network. Physical Security T rusted Application Trusted System Trusted Network Physical Security System T echnology Data Warehouse P roject Filetransfer Access right just on the data transfer directories Mailbox L oadprocess Data

More information

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES

ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES ORACLE SERVICES FOR APPLICATION MIGRATIONS TO ORACLE HARDWARE INFRASTRUCTURES SERVICE, SUPPORT AND EXPERT GUIDANCE FOR THE MIGRATION AND IMPLEMENTATION OF YOUR ORACLE APPLICATIONS ON ORACLE INFRASTRUCTURE

More information

Version 1.4 Paribus Discovery for Microsoft Dynamics CRM User Guide

Version 1.4 Paribus Discovery for Microsoft Dynamics CRM User Guide Version 1.4 Paribus Discovery for Microsoft Dynamics CRM User Guide Document Version 1.3 Release Date: September 2011 QGate Software Limited D2 Fareham Heights, Standard Way, Fareham Hampshire, PO16 8XT

More information

Microsoft Developing SQL Databases

Microsoft Developing SQL Databases 1800 ULEARN (853 276) www.ddls.com.au Length 5 days Microsoft 20762 - Developing SQL Databases Price $4290.00 (inc GST) Version C Overview This five-day instructor-led course provides students with the

More information

Achieving effective risk management and continuous compliance with Deloitte and SAP

Achieving effective risk management and continuous compliance with Deloitte and SAP Achieving effective risk management and continuous compliance with Deloitte and SAP 2 Deloitte and SAP: collaborating to make GRC work for you Meeting Governance, Risk and Compliance (GRC) requirements

More information

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045 Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that

More information

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives

NORTH CAROLINA NC MRITE. Nominating Category: Enterprise IT Management Initiatives NORTH CAROLINA MANAGING RISK IN THE INFORMATION TECHNOLOGY ENTERPRISE NC MRITE Nominating Category: Nominator: Ann V. Garrett Chief Security and Risk Officer State of North Carolina Office of Information

More information

IT or Application or Test Environments Management and Terminologies.

IT or Application or Test Environments Management and Terminologies. IT or Application or Test Environments Management and Terminologies. IT or Software Application Environments Management is probably one of the most misunderstood concepts in terms of the part it plays

More information

Choosing a Secure Cloud Service Provider

Choosing a Secure Cloud Service Provider Choosing a Secure Cloud Service Provider Dr. Ricci IEONG, CISSP, CISA, CISM, CCSK, CCSP, CEH,GPEN, GIAC Advisory Board, ISSAP, ISSMP, F.ISFS Vice President Professional Development Cloud Security Alliance

More information

Data Center Operations Guide

Data Center Operations Guide Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards

More information

Enterprise Services for NFuse (ESN) February 12, 2002

Enterprise Services for NFuse (ESN) February 12, 2002 Enterprise Services for NFuse (ESN) February 12, 2002 What is Enterprise Services for NFuse?... 1 What solution does ESN enable?... 2 What s the difference between NFuse and Enterprise Services for NFuse?...

More information

Implementing Problem Resolution Models in Remedy

Implementing Problem Resolution Models in Remedy CERN-IT-2000-001 15 February 2000 Implementing Problem Resolution Models in Remedy Miguel Marquina, Raúl Ramos, José Padilla CERN, IT Division, User Support Group This paper defines the concept of Problem

More information

HPE Proactive 24 Service

HPE Proactive 24 Service Data sheet HPE Proactive 24 Service Support Services HPE Proactive 24 Service is an integrated hardware and software support solution that combines technical assistance with proactive account services

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV Location: https://www.pdsimplified.com/ndcbf_pdframework/nist_csf_prc/documents/identify/ndcbf _ITSecPlan_IDGV2017.pdf

More information

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform

Deploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,

More information

TRIREME Commander: Managing Simulink Simulations And Large Datasets In Java

TRIREME Commander: Managing Simulink Simulations And Large Datasets In Java TRIREME Commander: Managing Simulink Simulations And Large Datasets In Java Andrew Newell Electronic Warfare & Radar Division, Defence Science and Technology Organisation andrew.newell@dsto.defence.gov.au

More information

Migrating a Business-Critical Application to Windows Azure

Migrating a Business-Critical Application to Windows Azure Situation Microsoft IT wanted to replace TS Licensing Manager, an application responsible for critical business processes. TS Licensing Manager was hosted entirely in Microsoft corporate data centers,

More information

Database Environment. Pearson Education 2009

Database Environment. Pearson Education 2009 Chapter 2 Database Environment 1 Chapter 2 - Objectives Purpose of three-level database architecture. Contents of external, conceptual, and internal levels. Purpose of external/conceptual and conceptual/internal

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515 1 2 1 Selecting the Best Alternative Major Activities in the Analysis Phase Gather information Define system requirements Prototype for feasibility

More information

Controlling Costs and Driving Agility in the Datacenter

Controlling Costs and Driving Agility in the Datacenter Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,

More information

IT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao

IT Service Delivery and Support Week Three. IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao IT Service Delivery and Support Week Three IT Auditing and Cyber Security Fall 2016 Instructor: Liang Yao 1 Infrastructure Essentials Computer Hardware Operating Systems (OS) & System Software Applications

More information

Siebel Brightware. Implementation Readiness Guide. Version 8.1.6

Siebel Brightware. Implementation Readiness Guide. Version 8.1.6 Siebel Brightware Implementation Readiness Guide Version 8.1.6 Copyright 2005, 2006, Oracle. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information;

More information

ITIL: The Key Differences Between Versions 2 and 3

ITIL: The Key Differences Between Versions 2 and 3 ITIL: The Key Differences Between Versions 2 and 3 A brief History of ITIL First published in the late 1980s, ITIL started as a project to document best practices in IT. Since that time it has become known

More information

Introduction to ISO/IEC 27001:2005

Introduction to ISO/IEC 27001:2005 Introduction to ISO/IEC 27001:2005 For ISACA Melbourne Chapter Technical Session 18 th of July 2006 AD Prepared by Endre P. Bihari JP of Performance Resources What is ISO/IEC 17799? 2/20 Aim: Creating

More information

Wipro s Endur Test Automation Framework (W-ETAF) Reduces time and effort for the implementation and maintenance of an automated test solution.

Wipro s Endur Test Automation Framework (W-ETAF) Reduces time and effort for the implementation and maintenance of an automated test solution. Wipro s Endur Test Automation Framework (W-ETAF) Reduces time and effort for the implementation and maintenance of an automated test solution. Introduction: Commodity trading, transaction and risk a changing

More information

Green Star Volume Certification. Process Guide

Green Star Volume Certification. Process Guide Green Star Volume Certification Process Guide Contents Executive Summary... 3 Volume Certification... 3 The Volume Certification Process Guide... 3 Questions?... 4 Volume Certification Summary... 5 Stage

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

Copyright

Copyright Manually Upgrading the P6 Professional Database for Microsoft SQL Server Release 8.2 December 2011 Copyright Oracle Primavera Manually Upgrading the P6 Professional Database for Microsoft SQL Server Copyright

More information

AUTOMATED RESOURCE MANAGEMENT SYSTEM (ARMS)

AUTOMATED RESOURCE MANAGEMENT SYSTEM (ARMS) AUTOMATED RESOURCE MANAGEMENT SYSTEM (ARMS) SYSTEM REQUIREMENTS DOCUMENT (SRD) December 19, 2003 Version 1.2 Delivered On: December 19, 2003 Delivered To: Federal Emergency Management Agency Contact No.:

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

ISO/ IEC (ITSM) Certification Roadmap

ISO/ IEC (ITSM) Certification Roadmap ISO/ IEC 20000 (ITSM) Certification Roadmap Rasheed Adegoke June 2013 Outline About First Bank Motivations Definitions ITIL, ISO/IEC 20000 & DIFFERENCES ISO/ IEC 20000 Certification Roadmap First Bank

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

M&A Cyber Security Due Diligence

M&A Cyber Security Due Diligence M&A Cyber Security Due Diligence Prepared by: Robert Horton, Ollie Whitehouse & Sherief Hammad Contents Page 1 Introduction 3 2 Technical due diligence goals 3 3 Enabling the business through cyber security

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Unifia Environment (UE) Application & Security Overview

Unifia Environment (UE) Application & Security Overview Unifia Environment (UE) Application & Security Overview 2017 OLYMPUS CORPORATION OF THE AMERICAS PAGE 1 OF 14 SP3217V03 Unifia Environment UE Application & Security Overview The Olympus Unifia Environment

More information

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp.

Contents. Microsoft is a registered trademark of Microsoft Corporation. TRAVERSE is a registered trademark of Open Systems Holdings Corp. TPLWPT Contents Summary... 1 General Information... 1 Technology... 2 Server Technology... 2 Business Layer... 4 Client Technology... 4 Structure... 4 Ultra-Thin Client Considerations... 7 Internet and

More information

An Oracle White Paper May Oracle VM 3: Overview of Disaster Recovery Solutions

An Oracle White Paper May Oracle VM 3: Overview of Disaster Recovery Solutions An Oracle White Paper May 2014 Oracle VM 3: Overview of Disaster Recovery Solutions Contents Introduction... 1 Overview of DR Solutions with Oracle VM... 2 Choose your DR solution path... 2 Continuous

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

July 20, 2006 Oracle Application Express Helps Build Web Applications Quickly by Noel Yuhanna with Megan Daniels

July 20, 2006 Oracle Application Express Helps Build Web Applications Quickly by Noel Yuhanna with Megan Daniels QUICK TAKE Oracle Application Express Helps Build Web Applications Quickly by Noel Yuhanna with Megan Daniels EXECUTIVE SUMMARY A lesser-known but powerful application development tool that comes freely

More information

Seamless Dynamic Web (and Smart Device!) Reporting with SAS D.J. Penix, Pinnacle Solutions, Indianapolis, IN

Seamless Dynamic Web (and Smart Device!) Reporting with SAS D.J. Penix, Pinnacle Solutions, Indianapolis, IN Paper RIV05 Seamless Dynamic Web (and Smart Device!) Reporting with SAS D.J. Penix, Pinnacle Solutions, Indianapolis, IN ABSTRACT The SAS Business Intelligence platform provides a wide variety of reporting

More information

August Oracle - GoldenGate Statement of Direction

August Oracle - GoldenGate Statement of Direction August 2015 Oracle - GoldenGate Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your

More information