PASS SQL DBA Virtual Chapter

Size: px
Start display at page:

Download "PASS SQL DBA Virtual Chapter"

Transcription

1 PASS SQL DBA Virtual Chapter Wed, 7:00 PM - 8:00 PM GMT Lecture By Ronen Ariely Implementing new Security Features in SQL Server 2016, Part 2 SQL Server 2016 provides several new data security features like Always Encrypted, Dynamic Data Masking and Row-Level Security. These new features are a 'game changer' for developers, DBAs, and above all to architects that need to design applications and data platforms. These features increase the security and reduce the development time significantly. Features that usually implemented in the application side, now can be implemented in the server side, while encryption keys, which are usually stored in the server side, can be stored in the client side. The lecture will be held in two parts. In this second part, we will explore the implementation of Row-Level Security and Always Encrypted, using the new built-in features in SQL Server 2016 and in older versions. We will discuss the benefits, limitations, and how actually our data secured using the new features. 1 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT,

2 About Ronen Ariely (Blog, website, Facebook, LinkedIn) Senior consultant and architect, in the fields of applications developing and databases. More than 15 years of experience in variety of programming languages and technologies, leading and managing development teams, and SQL & BI enterprise level solutions. Specialized on Geophysics and seismic data analysis, during Master's degree studies, at the Tel-Aviv University, Israel. Active in communities in the field of Programming, SQL Server, T-SQL Serve several years as Moderator at MSDN Israel communities, and at the MSDN Global communities (aka pituach). Writing technical blogs, TechNet WIKI articles, founder of the TechNet WIKI Ninjas Groups on Facebook, and serve as one of the leaders. Has been awarded as Microsoft Most Valuable Professional (MVP) RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 2

3 About Ronen Ariely (Blog, website, Facebook, LinkedIn) Senior consultant and architect, in the fields of applications developing and databases. More than 15 years of experience in variety of programming languages and technologies, leading and managing development teams, and SQL & BI enterprise level solutions. Specialized on Geophysics and seismic data analysis, during Master's degree studies, at the Tel-Aviv University, Israel. Active in communities in the field of Programming, SQL Server, T-SQL Serve several years as Moderator at MSDN Israel communities, and at the MSDN Global communities (aka pituach). Writing technical blogs, TechNet WIKI articles, founder of the TechNet WIKI Ninjas Groups on Facebook, and serve as one of the leaders. Has been awarded as Microsoft Most Valuable Professional (MVP) RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 3

4 Agenda SQL Server 2016 Security Features 1. Who are you authentication * Active Directory - central access management * Contained database authentication 2. What can you see - access control * Dynamic Data Masking * Row-level security * Auditing tracks access and changes 3. Securing secrets encryption options * Transparent Data Encryption * Encryption in the database level by certificate, key, or password * Backup encryption * Always Encrypted Id Credit Card # ******1234 ******5678 ******9012 Id 2 Credit Card # RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 4

5 Security - history Database Security a brief overview SQL Server 2000 and before - No native tools for encryption Data at rest encryption could be done with 3rd party tools, or by encrypting the entire drive (TrueCrypt,etc) Column Level Encryption (wrong name!) - Introduced with SQL Server Should be named Value Level Encryption. Transparent Data Encryption (TDE) Introduced with SQL Server Files lavel encryption. Certificate based transport encryption Dynamic Data Masking NEW! introduced with SQL Server 2016 Row Level Security - NEW! introduced with SQL Server 2016 Always Encrypted NEW! introduced with SQL Server Real Column Level Encryption.... RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 5

6 Dynamic Data Masking Implementing (and cracking) new Security Features in SQL Server 2016, Part 1 Event at Page: me.aspx?eventid=6479 Recording link: m/watch?v=6yjsl9_sbhg Download demos code & presentation: rosoft.com/implementing- Dynamic-Data-25903b12 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 6

7 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 7

8 Row Level Security APPLY FINE-GRAINED ACCESS CONTROL TO TABLE ROWS BASED ON USERS RIGHTS RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 8

9 Row Level Security RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 9

10 Filter data At Application Level Row Level Security Ronen.Ariely.info App Ariely.info RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 10

11 Filter data At Application Level Row Level Security Ronen.Ariely.info App Ariely.info RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 11

12 Filter data At Application Level Filter data At Server Level Row Level Security Ronen.Ariely.info SQL Server 2016, Dynamic Data Masking App Ariely.info Less development resources And Much Better Security RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 12

13 Security Policy Row Level Security Row Level Security (RLS) allows us to control access to rows in a database table, based on SECURITY POLICY, which enforced by inline table valued function. RLS enables you to store data for many users in a single table, while at the same time it restricts the rows based on a user's identity, role, or execution context. DEMO usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 13

14 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 14

15 Always Encrypted HELP PROTECT DATA AT REST AND IN MOTION WITH THE MASTER KEY RESIDING WITH THE APPLICATION & NO APPLICATION CHANGES REQUIRED RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 15

16 Protecting your house against break-ins can be achieved with proper security. 04/07/2016 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 16

17 But maybe your goal is to protect against break out from a prison?!? Location: Springfield season 16 of The Simpsons 04/07/2016 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 17

18 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 18

19 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 19

20 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 20

21 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 21

22 Security Layer Always Encrypted App Service Driver App Client SSN SSN 0x4a70f56 0x4352d07.. 0x432a7f0 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 22

23 Always Encrypted Dot.Net 4.6 and above! Always Encrypted is a feature designed to protect sensitive data, stored in SQL Server databases. Always Encrypted allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to SQL Server. As a result, Always Encrypted provides a separation between those who own the data (and can view it) and those who manage the data (but should have no access). Always Encrypted makes encryption transparent to applications. An Always Encrypted-enabled driver installed on the client computer achieves this by automatically encrypting and decrypting sensitive data in the SQL Server client application. The driver encrypts the data in sensitive columns before passing the data to SQL Server, and automatically rewrites queries so that the semantics to the application are preserved. Similarly, the driver transparently decrypts data, stored in encrypted database columns, contained in query results. * The above text is from MSDN RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 23

24 Always Encrypted How it Works A Column Master Key certificate is stored on in application side at the Key Store. It is used to protect the Column Encryption key. The Column Master Key Definition is stored on the Server. This element includes information about the location of the Column Master Key. The Column Encryption Key, is stored on Server, but it is encrypted. This Column Encryption Key is used to encrypt/decrypt the data. * But since SQL Server does not have the Column Master Key, it cannot use the Column Encryption Key, in order to decrypt the data! RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 24

25 Always Encrypted How it Works The location of the key store is stored in the Column Master Key Definition on the server. Using the location information, the driver contacts the key store, containing the Column Master Key, in order to decrypt the encrypted Column Encryption Key value, which is stored on the server, and then, it uses the plaintext column encryption key to encrypt the parameter. DEMO RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 25

26 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 26

27 Row Level Security Conclusions This is a very powerful feature, which gives pretty good security in the database level. We can expose data that violate the predicates rules. This feature is very flexible. It behaves similar to CROSS APPLY in terms of performance, and we should use indexes according the security function. It can be used behind application, where the user cannot execute free queries It s basically transparent to the application. It can save development time significantly RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 27

28 Always Encrypted Conclusions This is my favorite feature between the three security features, which we mentioned. This is a very powerful feature, which gives perfect security against the DBA, which make it very useful. It has very good performance in compare to other options, which include encrypting the data in the application side RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 28

29 Dynamic Data Masking Security Policy Wrapping Up Before SQL 2016 usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g Cracker Hacker Always >> You can Encrypted watch part 1 recording in this link: Client hg SSN SSN >> The demos code and the presentation file for 1234 part 1 available to download 0x4a70f56 from this link: x4352d nting-dynamic-data-25903b12 0x432a7f RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 29

30 Dynamic Data Masking Security Policy Wrapping Up Before SQL 2016 Demos code and the presentation file: Hacker Cracker ft.com/implementing-new- Security-7362f178 usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g Always Encrypted Client SSN SSN 0x4a70f56 0x4352d07.. 0x432a7f RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 30

31 Dynamic Data Masking Security Policy Demos code and the presentation file: Wrapping Up Security-7362f178 Before SQL 2016 usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g Cracker Hacker Always Encrypted Client SSN SSN 0x4a70f56 0x4352d07.. 0x432a7f RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 31

32 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 32

SQL Server Security. Marek

SQL Server Security. Marek SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel

More information

SQL Server 2016 New Security Features. Gianluca Sartori

SQL Server 2016 New Security Features. Gianluca Sartori SQL Server 2016 New Security Features Gianluca Sartori Our Sponsors Gianluca Sartori Independent SQL Server consultant SQL Server MVP, MCTS, MCITP, MCT Works with SQL Server since version 7 DBA @ Scuderia

More information

SQL Server Security Azure Key Vault

SQL Server Security Azure Key Vault Azure SQL database development SQL Server encryption Bmxbzt Fodszufe SQL Server Security Azure Key Vault Always Encrypted SQL Server database development www.anatec.co.uk SQL Server Specialists Caroline

More information

Security in Confirmit Software - Additional Options

Security in Confirmit Software - Additional Options Security in Confirmit Software - Additional Options Unclassified. Copyright 2017 Confirmit. All Rights Reserved Page 1 of 5 1 Encryption of data exports If you are concerned about the safety of your data

More information

WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES?

WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES? WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES? Timothy P. McAliley CISA, CISM, CISSP, ITIL V3, MCSA, MCSE, MCT, PMP Microsoft Account Technology Strategist Try It Yourself! Two TechNet Virtual Labs

More information

ENCRYPTION AS.. ALTER VIEW

ENCRYPTION AS.. ALTER VIEW 10/11/2007 11:15 PM Data Encryption in SQL 2005 M. Choirul Amri Amri,, MCT, MCITP, MVP Senior Consultant Trainer Avantus Training j choirul@avantustraining.com http://choirulamri.or.id Credit to Lara Rubbelke

More information

Protecting Your Data With Encryption

Protecting Your Data With Encryption Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies Thank you Sponsors! o Please visit the sponsors during the vendor break from 2:45 3:15 and enter their end-of-day raffles Event

More information

To Receive CPE Credit

To Receive CPE Credit Using Microsoft Access with Dynamics GP August 28, 2014 Charles Allen Senior Managing Consultant BKD Technologies callen@bkd.com To Receive CPE Credit Participate in entire webinar Answer polls when they

More information

Oracle Database Cloud for Oracle DBAs Ed 3

Oracle Database Cloud for Oracle DBAs Ed 3 Oracle University Contact Us: 800-260-690 Oracle Database Cloud for Oracle DBAs Ed 3 Duration: 3 Days What you will learn Note: No hands-on lab environment for the Training On Demand course format This

More information

The safer, easier way to help you pass any IT exams. Exam : Designing Database Solutions for Microsoft SQL Server 2012.

The safer, easier way to help you pass any IT exams. Exam : Designing Database Solutions for Microsoft SQL Server 2012. http://www.51- pass.com Exam : 70-465 Title : Designing Database Solutions for Microsoft SQL Server 2012 Version : DEMO 1 / 4 1.Topic 1, Litware, Inc Overview You are a database administrator for a company

More information

Report Exec Dispatch System Specifications

Report Exec Dispatch System Specifications Report Exec Dispatch System Specifications Contents Overview... 2 Technical Support... 2 At a Glance... 2 Report Exec Systems Diagram... 3 Server Specifications... 4 Server OS... 4 Microsoft SQL Server...

More information

SQL Organizational Security & Compliance. George Walters Senior Technical Evangelist for ISV Partners

SQL Organizational Security & Compliance. George Walters Senior Technical Evangelist for ISV Partners Organizational Security & Compliance SQL 2012-2017 George Walters Senior Technical Evangelist for ISV Partners george.walters@microsoft.com @gwalters69 on twitter Why is security important? 4 Progress

More information

SQL Server New innovations. Ivan Kosyakov. Technical Architect, Ph.D., Microsoft Technology Center, New York

SQL Server New innovations. Ivan Kosyakov. Technical Architect, Ph.D.,  Microsoft Technology Center, New York 2016 New innovations Ivan Kosyakov Technical Architect, Ph.D., http://biz-excellence.com Microsoft Technology Center, New York The explosion of data sources... 25B 1.3B 4.0B There s an opportunity to drive

More information

<Insert Picture Here> Oracle Database Security

<Insert Picture Here> Oracle Database Security Oracle Database Security Ursula Koski Senior Principal Architect ursula.koski@oracle.com Ursula Koski Senior Principal Architect Senior Principal Architect Oracle User Group Liaison

More information

INFO-H-415 Project Overview- Security Database and SQL Server

INFO-H-415 Project Overview- Security Database and SQL Server INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way

More information

To Receive CPE Credit

To Receive CPE Credit Excel Refreshable Reports in Dynamics GP Charles Allen Senior Managing Consultant BKD Technologies callen@bkd.com June 22, 2017 To Receive CPE Credit Participate in entire webinar Answer attendance checks

More information

Encrypting Critical Data In Databases. An Overview of the Database Integration Process

Encrypting Critical Data In Databases. An Overview of the Database Integration Process Encrypting Critical Data In Databases An Overview of the Database Integration Process Overview As the incidence and severity of security breaches continues to grow, it is increasingly incumbent upon organizations

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

SQL Server 2016 Row-level security & Dynamic Data Masking. Goran Milanov MVP, MCP, MCSA, MCT, PSM-I

SQL Server 2016 Row-level security & Dynamic Data Masking. Goran Milanov MVP, MCP, MCSA, MCT, PSM-I SQL Server 2016 Row-level security & Dynamic Data Masking Goran Milanov MVP, MCP, MCSA, MCT, PSM-I gmilanov@live.com www.goranmilanov.rs SQL Server UG http://sqlserverugbg.azurewebsites.net/ unesite u

More information

L5: Basic Grammar Based Probabilistic Password Cracking

L5: Basic Grammar Based Probabilistic Password Cracking L5: Basic Grammar Based Probabilistic Password Cracking Sudhir Aggarwal and Shiva Houshmand and Matt Weir Florida State University Department of Computer Science E-Crime Investigative Technologies Lab

More information

SQLSaturday #620 Dublin 17 June, 2017 Reports on the Run: Mobile Reporting with SQL Server Peter Myers Bitwise Solutions

SQLSaturday #620 Dublin 17 June, 2017 Reports on the Run: Mobile Reporting with SQL Server Peter Myers Bitwise Solutions SQLSaturday #620 Dublin 17 June, 2017 Reports on the Run: Mobile Reporting with SQL Server 2016 Peter Myers Bitwise Solutions Thanks for the sponsors Platinum Sponsors Gold Sponsors Silver Sponsors Presenter

More information

Four New Table Level Security Features of SQL Server Karen Lopez, Data Evangelist & Architect

Four New Table Level Security Features of SQL Server Karen Lopez, Data Evangelist & Architect Four New Table Level Security Features of SQL Server 2016 Karen Lopez, Data Evangelist & Architect Karen López Data Evangelist Karen was born this way: loving data. She wants you to love your data, too,,

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features

More information

Technology Enhancements for SQL Server 2014/2016 Developers. Wylie Blanchard Lead IT Consultant; SQL Server DBA

Technology Enhancements for SQL Server 2014/2016 Developers. Wylie Blanchard Lead IT Consultant; SQL Server DBA Technology Enhancements for SQL Server 2014/2016 Developers Wylie Blanchard Lead IT Consultant; SQL Server DBA About Great Tech Pros Great Tech Pros was founded in 2012 Specialties include: IT Consulting

More information

Lesson 14 Transcript: Triggers

Lesson 14 Transcript: Triggers Lesson 14 Transcript: Triggers Slide 1: Cover Welcome to Lesson 14 of DB2 on Campus Lecture Series. Today, we are going to talk about Triggers. My name is Raul Chong, and I'm the DB2 on Campus Program

More information

Seven Awesome SQL Server Features

Seven Awesome SQL Server Features Seven Awesome SQL Server Features That You Can Use for Free Allison Benneth @SQLTran www.sqltran.org SQL Server Editions SQL2005 SQL2008 SQL2008R2 SQL2012 SQL2014 SQL2016 * Free starting with SQL Server

More information

To Receive CPE Credit

To Receive CPE Credit Integration Options for Dynamics GP September 17, 2015 Charles Allen Senior Managing Consultant BKD Technologies callen@bkd.com To Receive CPE Credit Participate in entire webinar Answer attendance checks

More information

Securing SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders

Securing SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Securing SQL Server Processes with Certificates Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Technical Assistance If you require assistance during the session,

More information

Course Outline. Upgrading Your Skills to SQL Server 2016 Course 10986A: 3 days Instructor Led

Course Outline. Upgrading Your Skills to SQL Server 2016 Course 10986A: 3 days Instructor Led Upgrading Your Skills to SQL Server 2016 Course 10986A: 3 days Instructor Led About this course This three-day instructor-led course provides students moving from earlier releases of SQL Server with an

More information

SQL Server Evolution. SQL 2016 new innovations. Trond Brande

SQL Server Evolution. SQL 2016 new innovations. Trond Brande SQL Server Evolution SQL 2016 new innovations Trond Brande SQL Server 2016 Editions Enterprise Express SMALL-SCALE DATABASES Development and management tools Easy backup and restore to Microsoft Azure

More information

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

Transform your data estate with cloud, data and AI

Transform your data estate with cloud, data and AI Transform your data estate with cloud, data and AI The world is changing Data will grow to 44 ZB in 2020 Today, 80% of organizations adopt cloud-first strategies AI investment increased by 300% in 2017

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: + 38516306373 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, students learn how they can use Oracle Database features to meet

More information

STEP BY STEP INSTALL SQL SERVER 2016 STANDALONE

STEP BY STEP INSTALL SQL SERVER 2016 STANDALONE STEP BY STEP INSTALL SQL SERVER 2016 STANDALONE ON WINDOWS 2016 Waleed Mostafa MVP - Cloud and Datacenter Management Senior Consultant table of contents 1 Introduction... 2 2 Step by Step install database

More information

Security Readiness Assessment

Security Readiness Assessment Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS

More information

The Realities of Data Security and Compliance: Compliance Security

The Realities of Data Security and Compliance: Compliance Security The Realities of Data Security and Compliance: Compliance Security Ulf Mattsson, CTO, Protegrity Ulf.mattsson @ protegrity.com Bio - A Passion for Sailing and International Travel 2 Ulf Mattsson 20 years

More information

Vendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo

Vendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo Vendor: Oracle Exam Code: 1Z0-528 Exam Name: Oracle Database 11g Security Essentials Version: Demo QUESTION 1 Which of the following tasks is the first task to perform when implementing Oracle Database

More information

Data encryption & security. An overview

Data encryption & security. An overview Data encryption & security An overview Agenda Make sure the data cannot be accessed without permission Physical security Network security Data security Give (some) people (some) access for some time Authentication

More information

SAP HANA Leading Marketplace for IT and Certification Courses

SAP HANA Leading Marketplace for IT and Certification Courses SAP HANA Overview SAP HANA or High Performance Analytic Appliance is an In-Memory computing combines with a revolutionary platform to perform real time analytics and deploying and developing real time

More information

SharePoint 2010 Mythbusters. IT112 Spencer Harbar Enterprise Architect harbar.net

SharePoint 2010 Mythbusters. IT112 Spencer Harbar Enterprise Architect harbar.net SharePoint 2010 Mythbusters IT112 Spencer Harbar Enterprise Architect harbar.net About Spencer www.harbar.net spence@harbar.net @harbars General SharePoint Dogsbody Microsoft Certified Master SharePoint

More information

Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra

Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra Technical Assistance If you require assistance during the session, type

More information

A: Advanced Technologies of SharePoint 2016

A: Advanced Technologies of SharePoint 2016 Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com

More information

Security in ECE Systems

Security in ECE Systems Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today

More information

CONNX SECURITY OVERVIEW

CONNX SECURITY OVERVIEW CONNX SECURITY OVERVIEW ConnX is a web-based application which can be installed in a variety of technical environments. This purpose of this document is to advise you on the security aspects that are provided

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Securing Privileged Accounts with an Integrated IDM Solution Olaf.Stullich@oracle.com Product Manager, Oracle Mike Laramie Oracle Cloud for Industry Architecture Team Buddhika Kottahachchi OPAM Architect

More information

Data Partitioning. For DB Architects and Mere Mortals. Dmitri Korotkevitch

Data Partitioning. For DB Architects and Mere Mortals. Dmitri Korotkevitch Data Partitioning For DB Architects and Mere Mortals Dmitri Korotkevitch http://aboutsqlserver.com Please silence cell phones Explore Everything PASS Has to Offer FREE ONLINE WEBINAR EVENTS FREE 1-DAY

More information

Course Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.

Course Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification. Course Content Course Description: This five-day course will teach you how to plan, configure, and manage the advanced features in a environment. The special areas of focus for this course include implementing

More information

Biometrics & Secure Storage in ios Jason Shapiro, Intertech

Biometrics & Secure Storage in ios Jason Shapiro, Intertech Biometrics & Secure Storage in ios Jason Shapiro, Intertech A Training Division Presentation 2012 - All Rights Reserved Welcome Jason S. Shapiro jshapiro@intertech.com Intertech Blog: http://www.intertech.com/blog

More information

Randy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED

Randy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED Randy Pagels Sr. Developer Technology Specialist DX US Team rpagels@microsoft.com AZURE PRIMED 2016.04.11 Interactive Data Analytics Discover the root cause of any app performance behavior almost instantaneously

More information

Perform scalable data exchange using InfoSphere DataStage DB2 Connector

Perform scalable data exchange using InfoSphere DataStage DB2 Connector Perform scalable data exchange using InfoSphere DataStage Angelia Song (azsong@us.ibm.com) Technical Consultant IBM 13 August 2015 Brian Caufield (bcaufiel@us.ibm.com) Software Architect IBM Fan Ding (fding@us.ibm.com)

More information

Leveraging Azure Services for a Scalable Windows Remote Desktop Deployment

Leveraging Azure Services for a Scalable Windows Remote Desktop Deployment WEBINAR Leveraging Azure Services for a Scalable Windows Remote Desktop Deployment May 16 2018 About Me 18+ years in IT Blog at www.ciraltos.com, Twitter @ciraltos Work at Bowman and Brooke LLP as IT Infrastructure

More information

mission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact

mission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact mission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director

More information

Protecting Data and Transactions with Encryption and Tokenization. Rich Mogull Securosis

Protecting Data and Transactions with Encryption and Tokenization. Rich Mogull Securosis Protecting Data and Transactions with Encryption and Tokenization Rich Mogull Securosis What We ll Cover Encryption and Tokenization for the financial services data center. How the technologies work. How

More information

XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT DOWNLOAD EBOOK : XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT PDF

XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT DOWNLOAD EBOOK : XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT PDF Read Online and Download Ebook XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT DOWNLOAD EBOOK : XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN Click link bellow and free register to download ebook:

More information

Microsoft certified solutions associate

Microsoft certified solutions associate Microsoft certified solutions associate MCSA: BI Reporting This certification demonstrates your expertise in analyzing data with both Power BI and Excel. Exam 70-778/Course 20778 Analyzing and Visualizing

More information

Genesys Security Deployment Guide. Encrypted Data in Databases

Genesys Security Deployment Guide. Encrypted Data in Databases Genesys Security Deployment Guide Encrypted Data in Databases 1/20/2018 Contents 1 Encrypted Data in Databases 1.1 Security Benefits 1.2 Supporting Components 1.3 Feature Description 1.4 Feature Configuration

More information

DB2 9.7 DBA for Linux UNIX and Windows Exam.

DB2 9.7 DBA for Linux UNIX and Windows Exam. IBM 000-541 DB2 9.7 DBA for Linux UNIX and Windows Exam TYPE: DEMO http://www.examskey.com/000-541.html Examskey IBM 000-541 exam demo product is here for you to test the quality of the product. This IBM

More information

Wiki Database Schema Diagram Generate Sql Server 2005

Wiki Database Schema Diagram Generate Sql Server 2005 Wiki Database Schema Diagram Generate Sql Server 2005 1 Create a Database Schema, 2 Object Privilege page/tab, 3 Definition page/tab SQL Server 2005-2014, The Database Schema Wizard and Database. Issue

More information

Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1

Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1 Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1 Duration 5 Days What you will learn Throughout the lessons of the Oracle Database 12c R2: New Features for Administrators Part 2 course

More information

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD The Payment Card Industry Data Security Standard (PCI DSS), currently at version 3.2,

More information

The Right Method To Secure An Oracle Database

The Right Method To Secure An Oracle Database Sentrigo Webinar Series, March 9 th and 11 th 2010 The Right Method To Secure An Oracle Database By Pete Finnigan Updated Monday, 19th January 2010 1 Why Am I Qualified To Speak PeteFinnigan.com Ltd, Est

More information

Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1 -

Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1 - Oracle University Contact Us: Local: 0845 777 7 711 Intl: +44 845 777 7 711 Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1 - Duration: 5 Days What you will learn Throughout the lessons

More information

Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1

Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 Oracle University Contact Us: Local: 0180 2000 526 Intl: +49 8914301200 Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 Duration: 5 Days What you will learn The Oracle Database 12c

More information

Advanced Technologies of SharePoint 2016

Advanced Technologies of SharePoint 2016 Advanced Technologies of SharePoint 2016 Course 20339-2A 5 Days Instructor-led, Hands on Course Information This five-day course will teach you how to plan, configure, and manage the advanced features

More information

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 2016+

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 2016+ Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ Updated 03/13/2017 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ With the release of ER/Studio

More information

See What You Want to See in Revit 2016

See What You Want to See in Revit 2016 See What You Want to See in Revit 2016 Michael Massey Senior AEC Application Consultant @mgmassey01 Join the conversation #AU2015 Presenting Today.. Mike Massey Senior AEC Application Specialist 25+ Years

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

SQL Azure. Abhay Parekh Microsoft Corporation

SQL Azure. Abhay Parekh Microsoft Corporation SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure

More information

Indira Bandari. Predictive Analytics using R in SQL Server

Indira Bandari. Predictive Analytics using R in SQL Server Indira Bandari Predictive Analytics using R in SQL Server Agenda What is Predictive Analytics? Analytics vs. Predictive Analytics Benefits of using R Predictive Analytics Life Cycle Demo Indira Bandari

More information

Distributed PostgreSQL with YugaByte DB

Distributed PostgreSQL with YugaByte DB Distributed PostgreSQL with YugaByte DB Karthik Ranganathan PostgresConf Silicon Valley Oct 16, 2018 1 CHECKOUT THIS REPO: github.com/yugabyte/yb-sql-workshop 2 About Us Founders Kannan Muthukkaruppan,

More information

Kentico - Upgrade to Kentico 9. Virgil Carroll Founder / Principal Architect

Kentico - Upgrade to Kentico 9. Virgil Carroll Founder / Principal Architect Kentico - Upgrade to Kentico 9 Virgil Carroll Founder / Principal Architect about me From the great State of Alaska User Experience Aficionado Been building websites since 1998 Been working with Kentico

More information

Data Breach Preparedness & Response

Data Breach Preparedness & Response Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication

More information

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication

More information

Extending JON 2.3 Use cases

Extending JON 2.3 Use cases Extending JON 2.3 Use cases Presenter JBoss Senior Solution Architect, Red Hat May 2010 04/30/10 1 Agenda How does JON help you JON in different scenarios 2 New JBoss project Migration project JON at different

More information

Advanced Technologies of SharePoint 2016 ( )

Advanced Technologies of SharePoint 2016 ( ) Advanced Technologies of SharePoint 2016 (20339-2) Formato do curso: Presencial e Live Training Com certificação: MCSE: Productivity Preço: 1740 Nível: Intermédio Duração: 35 horas This five-day course

More information

Top 10 Database Security Threats and How to Stop Them. Rob Rachwald Director of Security Strategy

Top 10 Database Security Threats and How to Stop Them. Rob Rachwald Director of Security Strategy Top 10 Database Security Threats and How to Stop Them Rob Rachwald Director of Security Strategy Data Has Value Data Has Value Top 7 Attacks Discussed in Hacker Forums 11% 9% 12% 12% 15% 21% 20% dos/ddos

More information

Azure Certification BootCamp for Exam (Infrastructure)

Azure Certification BootCamp for Exam (Infrastructure) Azure Certification BootCamp for Exam 70-533 (Infrastructure) Course Duration: 2 Days Course Authored by CloudThat Description Microsoft Azure is a cloud computing platform and infrastructure created for

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

Extract API: Build sophisticated data models with the Extract API

Extract API: Build sophisticated data models with the Extract API Welcome # T C 1 8 Extract API: Build sophisticated data models with the Extract API Justin Craycraft Senior Sales Consultant Tableau / Customer Consulting My Office Photo Used with permission Agenda 1)

More information

MySQL for Database Administrators Ed 4

MySQL for Database Administrators Ed 4 Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals

More information

Selecting and Protecting the Right SharePoint Backup Targets. Sean McDonough Product Manager, SharePoint Products Idera

Selecting and Protecting the Right SharePoint Backup Targets. Sean McDonough Product Manager, SharePoint Products Idera Selecting and Protecting the Right SharePoint Backup Targets Sean McDonough Product Manager, SharePoint Products Idera What we ll cover Understand backup targets Define the SharePoint targets Examine common

More information

Database Attacks, How to protect the corporate assets. Presented by: James Bleecker

Database Attacks, How to protect the corporate assets. Presented by: James Bleecker Database Attacks, How to protect the corporate assets Presented by: James Bleecker Agenda Introduction Network/Application Landscape Database Vulnerabilities Are The New Front-Lines Attacking Where the

More information

TECHNOLOGY: Security Encrypting Tablespaces

TECHNOLOGY: Security Encrypting Tablespaces TECHNOLOGY: Security Encrypting Tablespaces By Arup Nanda Encrypt tablespaces transparently without affecting performance. In an era when data security is critical in almost every type of business, databases

More information

Curriculum Guide. ThingWorx

Curriculum Guide. ThingWorx Curriculum Guide ThingWorx Live Classroom Curriculum Guide Introduction to ThingWorx 8 ThingWorx 8 User Interface Development ThingWorx 8 Platform Administration ThingWorx 7.3 Fundamentals Applying Machine

More information

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith

ArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration

More information

Becoming a Certified Facilitator

Becoming a Certified Facilitator Becoming a Certified Facilitator Is Certification Right for You? Remember to complete the brief survey at the end of the session and you ll receive: A free copy of the The Seven Separators of Facilitation

More information

Securing Data at Rest Using Empress Database - the Ultimate Line of Defense. Empress Software Inc.

Securing Data at Rest Using Empress Database - the Ultimate Line of Defense. Empress Software Inc. Securing Data at Rest Using Empress Database - the Ultimate Line of Defense Empress Software Inc. Agenda About Data Encryption Empress Database Encryption Solution Live Example Summary Securing Data At

More information

Encryption on IBM i. Mark Flora Ciber MRMUG 2/2014

Encryption on IBM i. Mark Flora Ciber MRMUG 2/2014 Mark Flora Ciber MRMUG 2/2014 Threats Credit card information Inside and outside your organization Personnel data like SSN or phone number Inside and outside your organization Key business information

More information

MANAGE YOUR SHOP WITH POLICY BASED MANAGEMENT & CENTRAL MANAGEMENT SERVER

MANAGE YOUR SHOP WITH POLICY BASED MANAGEMENT & CENTRAL MANAGEMENT SERVER MANAGE YOUR SHOP WITH POLICY BASED MANAGEMENT & CENTRAL MANAGEMENT SERVER Ryan Adams Blog - http://ryanjadams.com Twitter - @ryanjadams Email ryan@ryanjadams.com Objectives CMS Configuration CMS Import

More information

Softchoice Microsoft SQL Server 2017 Migration Guide

Softchoice Microsoft SQL Server 2017 Migration Guide SPRING 2018 Softchoice Microsoft SQL Server 2017 Migration Guide 1 Contents ABOUT THE AUTHORS 3 STEVE THOMPSON 3 PATRICK O LEARY 3 SQL SERVER 2017 MIGRATION GUIDE 4 BUSINESS VALUE OF SQL SERVER 2017 ENHANCEMENTS

More information

Microsoft Exam Designing Database Solutions for Microsoft SQL Server Version: 12.0 [ Total Questions: 111 ]

Microsoft Exam Designing Database Solutions for Microsoft SQL Server Version: 12.0 [ Total Questions: 111 ] s@lm@n Microsoft Exam 70-465 Designing Database Solutions for Microsoft SQL Server Version: 12.0 [ Total Questions: 111 ] Topic break down Topic No. of Questions Topic 1: Litware, Inc 10 Topic 2: Contoso

More information

Updating Your Skills to SQL Server 2016

Updating Your Skills to SQL Server 2016 Updating Your Skills to SQL Server 2016 OD10986B; On-Demand, Video-based Course Description This course provides students moving from earlier releases of SQL Server with an introduction to the new features

More information

Javier Villegas. Azure SQL Server Managed Instance

Javier Villegas. Azure SQL Server Managed Instance Javier Villegas Azure SQL Server Managed Instance Javier Villegas DBA Manager at Mediterranean Shipping Company Involved with the Microsoft SQL Server since SQL Server 6.5 Specialization in SQL Server

More information

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO

More information

Overview of AWS Security - Database Services

Overview of AWS Security - Database Services Overview of AWS Security - Database Services June 2016 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) 2016, Amazon Web Services, Inc. or its affiliates. All rights

More information

Percona Software & Services Update

Percona Software & Services Update Percona Software & Services Update Q4 2016 Peter Zaitsev,CEO Percona Technical Webinars January 12, 2017 Why? Talking to Many Users and Customers Getting What have you been up to? Question This is a way

More information

Sensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill

Sensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Sensitive Data Warriors: Always On Encryption and Data Masking Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type

More information

Karthik Bharathy Program Manager, SQL Server Microsoft

Karthik Bharathy Program Manager, SQL Server Microsoft Karthik Bharathy Program Manager, SQL Server Microsoft Key Session takeaways Understand the many views of SQL Server Look at hardening SQL Server At the network level At the access level At the data level

More information