PASS SQL DBA Virtual Chapter
|
|
- Damian Hawkins
- 5 years ago
- Views:
Transcription
1 PASS SQL DBA Virtual Chapter Wed, 7:00 PM - 8:00 PM GMT Lecture By Ronen Ariely Implementing new Security Features in SQL Server 2016, Part 2 SQL Server 2016 provides several new data security features like Always Encrypted, Dynamic Data Masking and Row-Level Security. These new features are a 'game changer' for developers, DBAs, and above all to architects that need to design applications and data platforms. These features increase the security and reduce the development time significantly. Features that usually implemented in the application side, now can be implemented in the server side, while encryption keys, which are usually stored in the server side, can be stored in the client side. The lecture will be held in two parts. In this second part, we will explore the implementation of Row-Level Security and Always Encrypted, using the new built-in features in SQL Server 2016 and in older versions. We will discuss the benefits, limitations, and how actually our data secured using the new features. 1 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT,
2 About Ronen Ariely (Blog, website, Facebook, LinkedIn) Senior consultant and architect, in the fields of applications developing and databases. More than 15 years of experience in variety of programming languages and technologies, leading and managing development teams, and SQL & BI enterprise level solutions. Specialized on Geophysics and seismic data analysis, during Master's degree studies, at the Tel-Aviv University, Israel. Active in communities in the field of Programming, SQL Server, T-SQL Serve several years as Moderator at MSDN Israel communities, and at the MSDN Global communities (aka pituach). Writing technical blogs, TechNet WIKI articles, founder of the TechNet WIKI Ninjas Groups on Facebook, and serve as one of the leaders. Has been awarded as Microsoft Most Valuable Professional (MVP) RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 2
3 About Ronen Ariely (Blog, website, Facebook, LinkedIn) Senior consultant and architect, in the fields of applications developing and databases. More than 15 years of experience in variety of programming languages and technologies, leading and managing development teams, and SQL & BI enterprise level solutions. Specialized on Geophysics and seismic data analysis, during Master's degree studies, at the Tel-Aviv University, Israel. Active in communities in the field of Programming, SQL Server, T-SQL Serve several years as Moderator at MSDN Israel communities, and at the MSDN Global communities (aka pituach). Writing technical blogs, TechNet WIKI articles, founder of the TechNet WIKI Ninjas Groups on Facebook, and serve as one of the leaders. Has been awarded as Microsoft Most Valuable Professional (MVP) RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 3
4 Agenda SQL Server 2016 Security Features 1. Who are you authentication * Active Directory - central access management * Contained database authentication 2. What can you see - access control * Dynamic Data Masking * Row-level security * Auditing tracks access and changes 3. Securing secrets encryption options * Transparent Data Encryption * Encryption in the database level by certificate, key, or password * Backup encryption * Always Encrypted Id Credit Card # ******1234 ******5678 ******9012 Id 2 Credit Card # RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 4
5 Security - history Database Security a brief overview SQL Server 2000 and before - No native tools for encryption Data at rest encryption could be done with 3rd party tools, or by encrypting the entire drive (TrueCrypt,etc) Column Level Encryption (wrong name!) - Introduced with SQL Server Should be named Value Level Encryption. Transparent Data Encryption (TDE) Introduced with SQL Server Files lavel encryption. Certificate based transport encryption Dynamic Data Masking NEW! introduced with SQL Server 2016 Row Level Security - NEW! introduced with SQL Server 2016 Always Encrypted NEW! introduced with SQL Server Real Column Level Encryption.... RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 5
6 Dynamic Data Masking Implementing (and cracking) new Security Features in SQL Server 2016, Part 1 Event at Page: me.aspx?eventid=6479 Recording link: m/watch?v=6yjsl9_sbhg Download demos code & presentation: rosoft.com/implementing- Dynamic-Data-25903b12 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 6
7 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 7
8 Row Level Security APPLY FINE-GRAINED ACCESS CONTROL TO TABLE ROWS BASED ON USERS RIGHTS RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 8
9 Row Level Security RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 9
10 Filter data At Application Level Row Level Security Ronen.Ariely.info App Ariely.info RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 10
11 Filter data At Application Level Row Level Security Ronen.Ariely.info App Ariely.info RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 11
12 Filter data At Application Level Filter data At Server Level Row Level Security Ronen.Ariely.info SQL Server 2016, Dynamic Data Masking App Ariely.info Less development resources And Much Better Security RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 12
13 Security Policy Row Level Security Row Level Security (RLS) allows us to control access to rows in a database table, based on SECURITY POLICY, which enforced by inline table valued function. RLS enables you to store data for many users in a single table, while at the same time it restricts the rows based on a user's identity, role, or execution context. DEMO usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 13
14 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 14
15 Always Encrypted HELP PROTECT DATA AT REST AND IN MOTION WITH THE MASTER KEY RESIDING WITH THE APPLICATION & NO APPLICATION CHANGES REQUIRED RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 15
16 Protecting your house against break-ins can be achieved with proper security. 04/07/2016 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 16
17 But maybe your goal is to protect against break out from a prison?!? Location: Springfield season 16 of The Simpsons 04/07/2016 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 17
18 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 18
19 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 19
20 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 20
21 Always Encrypted Protect against whom? RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 21
22 Security Layer Always Encrypted App Service Driver App Client SSN SSN 0x4a70f56 0x4352d07.. 0x432a7f0 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 22
23 Always Encrypted Dot.Net 4.6 and above! Always Encrypted is a feature designed to protect sensitive data, stored in SQL Server databases. Always Encrypted allows clients to encrypt sensitive data inside client applications and never reveal the encryption keys to SQL Server. As a result, Always Encrypted provides a separation between those who own the data (and can view it) and those who manage the data (but should have no access). Always Encrypted makes encryption transparent to applications. An Always Encrypted-enabled driver installed on the client computer achieves this by automatically encrypting and decrypting sensitive data in the SQL Server client application. The driver encrypts the data in sensitive columns before passing the data to SQL Server, and automatically rewrites queries so that the semantics to the application are preserved. Similarly, the driver transparently decrypts data, stored in encrypted database columns, contained in query results. * The above text is from MSDN RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 23
24 Always Encrypted How it Works A Column Master Key certificate is stored on in application side at the Key Store. It is used to protect the Column Encryption key. The Column Master Key Definition is stored on the Server. This element includes information about the location of the Column Master Key. The Column Encryption Key, is stored on Server, but it is encrypted. This Column Encryption Key is used to encrypt/decrypt the data. * But since SQL Server does not have the Column Master Key, it cannot use the Column Encryption Key, in order to decrypt the data! RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 24
25 Always Encrypted How it Works The location of the key store is stored in the Column Master Key Definition on the server. Using the location information, the driver contacts the key store, containing the Column Master Key, in order to decrypt the encrypted Column Encryption Key value, which is stored on the server, and then, it uses the plaintext column encryption key to encrypt the parameter. DEMO RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 25
26 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 26
27 Row Level Security Conclusions This is a very powerful feature, which gives pretty good security in the database level. We can expose data that violate the predicates rules. This feature is very flexible. It behaves similar to CROSS APPLY in terms of performance, and we should use indexes according the security function. It can be used behind application, where the user cannot execute free queries It s basically transparent to the application. It can save development time significantly RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 27
28 Always Encrypted Conclusions This is my favorite feature between the three security features, which we mentioned. This is a very powerful feature, which gives perfect security against the DBA, which make it very useful. It has very good performance in compare to other options, which include encrypting the data in the application side RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 28
29 Dynamic Data Masking Security Policy Wrapping Up Before SQL 2016 usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g Cracker Hacker Always >> You can Encrypted watch part 1 recording in this link: Client hg SSN SSN >> The demos code and the presentation file for 1234 part 1 available to download 0x4a70f56 from this link: x4352d nting-dynamic-data-25903b12 0x432a7f RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 29
30 Dynamic Data Masking Security Policy Wrapping Up Before SQL 2016 Demos code and the presentation file: Hacker Cracker ft.com/implementing-new- Security-7362f178 usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g Always Encrypted Client SSN SSN 0x4a70f56 0x4352d07.. 0x432a7f RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 30
31 Dynamic Data Masking Security Policy Demos code and the presentation file: Wrapping Up Security-7362f178 Before SQL 2016 usercode Salary pass Ronen 1111 a Ronen 2222 b Ariely 3333 d IDNDUG 2222 e Ariely 1111 g Cracker Hacker Always Encrypted Client SSN SSN 0x4a70f56 0x4352d07.. 0x432a7f RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 31
32 RONEN ARIELY, SENIOR CONSULTANT & ARCHITECT, 32
SQL Server Security. Marek
SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel
More informationSQL Server 2016 New Security Features. Gianluca Sartori
SQL Server 2016 New Security Features Gianluca Sartori Our Sponsors Gianluca Sartori Independent SQL Server consultant SQL Server MVP, MCTS, MCITP, MCT Works with SQL Server since version 7 DBA @ Scuderia
More informationSQL Server Security Azure Key Vault
Azure SQL database development SQL Server encryption Bmxbzt Fodszufe SQL Server Security Azure Key Vault Always Encrypted SQL Server database development www.anatec.co.uk SQL Server Specialists Caroline
More informationSecurity in Confirmit Software - Additional Options
Security in Confirmit Software - Additional Options Unclassified. Copyright 2017 Confirmit. All Rights Reserved Page 1 of 5 1 Encryption of data exports If you are concerned about the safety of your data
More informationWHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES?
WHAT S NEW IN SQL SERVER 2016 REPORTING SERVICES? Timothy P. McAliley CISA, CISM, CISSP, ITIL V3, MCSA, MCSE, MCT, PMP Microsoft Account Technology Strategist Try It Yourself! Two TechNet Virtual Labs
More informationENCRYPTION AS.. ALTER VIEW
10/11/2007 11:15 PM Data Encryption in SQL 2005 M. Choirul Amri Amri,, MCT, MCITP, MVP Senior Consultant Trainer Avantus Training j choirul@avantustraining.com http://choirulamri.or.id Credit to Lara Rubbelke
More informationProtecting Your Data With Encryption
Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies Thank you Sponsors! o Please visit the sponsors during the vendor break from 2:45 3:15 and enter their end-of-day raffles Event
More informationTo Receive CPE Credit
Using Microsoft Access with Dynamics GP August 28, 2014 Charles Allen Senior Managing Consultant BKD Technologies callen@bkd.com To Receive CPE Credit Participate in entire webinar Answer polls when they
More informationOracle Database Cloud for Oracle DBAs Ed 3
Oracle University Contact Us: 800-260-690 Oracle Database Cloud for Oracle DBAs Ed 3 Duration: 3 Days What you will learn Note: No hands-on lab environment for the Training On Demand course format This
More informationThe safer, easier way to help you pass any IT exams. Exam : Designing Database Solutions for Microsoft SQL Server 2012.
http://www.51- pass.com Exam : 70-465 Title : Designing Database Solutions for Microsoft SQL Server 2012 Version : DEMO 1 / 4 1.Topic 1, Litware, Inc Overview You are a database administrator for a company
More informationReport Exec Dispatch System Specifications
Report Exec Dispatch System Specifications Contents Overview... 2 Technical Support... 2 At a Glance... 2 Report Exec Systems Diagram... 3 Server Specifications... 4 Server OS... 4 Microsoft SQL Server...
More informationSQL Organizational Security & Compliance. George Walters Senior Technical Evangelist for ISV Partners
Organizational Security & Compliance SQL 2012-2017 George Walters Senior Technical Evangelist for ISV Partners george.walters@microsoft.com @gwalters69 on twitter Why is security important? 4 Progress
More informationSQL Server New innovations. Ivan Kosyakov. Technical Architect, Ph.D., Microsoft Technology Center, New York
2016 New innovations Ivan Kosyakov Technical Architect, Ph.D., http://biz-excellence.com Microsoft Technology Center, New York The explosion of data sources... 25B 1.3B 4.0B There s an opportunity to drive
More information<Insert Picture Here> Oracle Database Security
Oracle Database Security Ursula Koski Senior Principal Architect ursula.koski@oracle.com Ursula Koski Senior Principal Architect Senior Principal Architect Oracle User Group Liaison
More informationINFO-H-415 Project Overview- Security Database and SQL Server
INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way
More informationTo Receive CPE Credit
Excel Refreshable Reports in Dynamics GP Charles Allen Senior Managing Consultant BKD Technologies callen@bkd.com June 22, 2017 To Receive CPE Credit Participate in entire webinar Answer attendance checks
More informationEncrypting Critical Data In Databases. An Overview of the Database Integration Process
Encrypting Critical Data In Databases An Overview of the Database Integration Process Overview As the incidence and severity of security breaches continues to grow, it is increasingly incumbent upon organizations
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationSQL Server 2016 Row-level security & Dynamic Data Masking. Goran Milanov MVP, MCP, MCSA, MCT, PSM-I
SQL Server 2016 Row-level security & Dynamic Data Masking Goran Milanov MVP, MCP, MCSA, MCT, PSM-I gmilanov@live.com www.goranmilanov.rs SQL Server UG http://sqlserverugbg.azurewebsites.net/ unesite u
More informationL5: Basic Grammar Based Probabilistic Password Cracking
L5: Basic Grammar Based Probabilistic Password Cracking Sudhir Aggarwal and Shiva Houshmand and Matt Weir Florida State University Department of Computer Science E-Crime Investigative Technologies Lab
More informationSQLSaturday #620 Dublin 17 June, 2017 Reports on the Run: Mobile Reporting with SQL Server Peter Myers Bitwise Solutions
SQLSaturday #620 Dublin 17 June, 2017 Reports on the Run: Mobile Reporting with SQL Server 2016 Peter Myers Bitwise Solutions Thanks for the sponsors Platinum Sponsors Gold Sponsors Silver Sponsors Presenter
More informationFour New Table Level Security Features of SQL Server Karen Lopez, Data Evangelist & Architect
Four New Table Level Security Features of SQL Server 2016 Karen Lopez, Data Evangelist & Architect Karen López Data Evangelist Karen was born this way: loving data. She wants you to love your data, too,,
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features
More informationTechnology Enhancements for SQL Server 2014/2016 Developers. Wylie Blanchard Lead IT Consultant; SQL Server DBA
Technology Enhancements for SQL Server 2014/2016 Developers Wylie Blanchard Lead IT Consultant; SQL Server DBA About Great Tech Pros Great Tech Pros was founded in 2012 Specialties include: IT Consulting
More informationLesson 14 Transcript: Triggers
Lesson 14 Transcript: Triggers Slide 1: Cover Welcome to Lesson 14 of DB2 on Campus Lecture Series. Today, we are going to talk about Triggers. My name is Raul Chong, and I'm the DB2 on Campus Program
More informationSeven Awesome SQL Server Features
Seven Awesome SQL Server Features That You Can Use for Free Allison Benneth @SQLTran www.sqltran.org SQL Server Editions SQL2005 SQL2008 SQL2008R2 SQL2012 SQL2014 SQL2016 * Free starting with SQL Server
More informationTo Receive CPE Credit
Integration Options for Dynamics GP September 17, 2015 Charles Allen Senior Managing Consultant BKD Technologies callen@bkd.com To Receive CPE Credit Participate in entire webinar Answer attendance checks
More informationSecuring SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders
Securing SQL Server Processes with Certificates Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Technical Assistance If you require assistance during the session,
More informationCourse Outline. Upgrading Your Skills to SQL Server 2016 Course 10986A: 3 days Instructor Led
Upgrading Your Skills to SQL Server 2016 Course 10986A: 3 days Instructor Led About this course This three-day instructor-led course provides students moving from earlier releases of SQL Server with an
More informationSQL Server Evolution. SQL 2016 new innovations. Trond Brande
SQL Server Evolution SQL 2016 new innovations Trond Brande SQL Server 2016 Editions Enterprise Express SMALL-SCALE DATABASES Development and management tools Easy backup and restore to Microsoft Azure
More informationIBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture
IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationTransform your data estate with cloud, data and AI
Transform your data estate with cloud, data and AI The world is changing Data will grow to 44 ZB in 2020 Today, 80% of organizations adopt cloud-first strategies AI investment increased by 300% in 2017
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: + 38516306373 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, students learn how they can use Oracle Database features to meet
More informationSTEP BY STEP INSTALL SQL SERVER 2016 STANDALONE
STEP BY STEP INSTALL SQL SERVER 2016 STANDALONE ON WINDOWS 2016 Waleed Mostafa MVP - Cloud and Datacenter Management Senior Consultant table of contents 1 Introduction... 2 2 Step by Step install database
More informationSecurity Readiness Assessment
Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS
More informationThe Realities of Data Security and Compliance: Compliance Security
The Realities of Data Security and Compliance: Compliance Security Ulf Mattsson, CTO, Protegrity Ulf.mattsson @ protegrity.com Bio - A Passion for Sailing and International Travel 2 Ulf Mattsson 20 years
More informationVendor: Oracle. Exam Code: 1Z Exam Name: Oracle Database 11g Security Essentials. Version: Demo
Vendor: Oracle Exam Code: 1Z0-528 Exam Name: Oracle Database 11g Security Essentials Version: Demo QUESTION 1 Which of the following tasks is the first task to perform when implementing Oracle Database
More informationData encryption & security. An overview
Data encryption & security An overview Agenda Make sure the data cannot be accessed without permission Physical security Network security Data security Give (some) people (some) access for some time Authentication
More informationSAP HANA Leading Marketplace for IT and Certification Courses
SAP HANA Overview SAP HANA or High Performance Analytic Appliance is an In-Memory computing combines with a revolutionary platform to perform real time analytics and deploying and developing real time
More informationSharePoint 2010 Mythbusters. IT112 Spencer Harbar Enterprise Architect harbar.net
SharePoint 2010 Mythbusters IT112 Spencer Harbar Enterprise Architect harbar.net About Spencer www.harbar.net spence@harbar.net @harbars General SharePoint Dogsbody Microsoft Certified Master SharePoint
More informationExtending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra
Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra Technical Assistance If you require assistance during the session, type
More informationA: Advanced Technologies of SharePoint 2016
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationSecurity in ECE Systems
Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today
More informationCONNX SECURITY OVERVIEW
CONNX SECURITY OVERVIEW ConnX is a web-based application which can be installed in a variety of technical environments. This purpose of this document is to advise you on the security aspects that are provided
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Securing Privileged Accounts with an Integrated IDM Solution Olaf.Stullich@oracle.com Product Manager, Oracle Mike Laramie Oracle Cloud for Industry Architecture Team Buddhika Kottahachchi OPAM Architect
More informationData Partitioning. For DB Architects and Mere Mortals. Dmitri Korotkevitch
Data Partitioning For DB Architects and Mere Mortals Dmitri Korotkevitch http://aboutsqlserver.com Please silence cell phones Explore Everything PASS Has to Offer FREE ONLINE WEBINAR EVENTS FREE 1-DAY
More informationCourse Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.
Course Content Course Description: This five-day course will teach you how to plan, configure, and manage the advanced features in a environment. The special areas of focus for this course include implementing
More informationBiometrics & Secure Storage in ios Jason Shapiro, Intertech
Biometrics & Secure Storage in ios Jason Shapiro, Intertech A Training Division Presentation 2012 - All Rights Reserved Welcome Jason S. Shapiro jshapiro@intertech.com Intertech Blog: http://www.intertech.com/blog
More informationRandy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED
Randy Pagels Sr. Developer Technology Specialist DX US Team rpagels@microsoft.com AZURE PRIMED 2016.04.11 Interactive Data Analytics Discover the root cause of any app performance behavior almost instantaneously
More informationPerform scalable data exchange using InfoSphere DataStage DB2 Connector
Perform scalable data exchange using InfoSphere DataStage Angelia Song (azsong@us.ibm.com) Technical Consultant IBM 13 August 2015 Brian Caufield (bcaufiel@us.ibm.com) Software Architect IBM Fan Ding (fding@us.ibm.com)
More informationLeveraging Azure Services for a Scalable Windows Remote Desktop Deployment
WEBINAR Leveraging Azure Services for a Scalable Windows Remote Desktop Deployment May 16 2018 About Me 18+ years in IT Blog at www.ciraltos.com, Twitter @ciraltos Work at Bowman and Brooke LLP as IT Infrastructure
More informationmission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact
mission critical applications mission critical security Oracle Critical Patch Update October 2011 Oracle Database Impact Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director
More informationProtecting Data and Transactions with Encryption and Tokenization. Rich Mogull Securosis
Protecting Data and Transactions with Encryption and Tokenization Rich Mogull Securosis What We ll Cover Encryption and Tokenization for the financial services data center. How the technologies work. How
More informationXAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT DOWNLOAD EBOOK : XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT PDF
Read Online and Download Ebook XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN POLAT DOWNLOAD EBOOK : XAMARIN 4 BY EXAMPLE BY MATTEO BORTOLU, ENGIN Click link bellow and free register to download ebook:
More informationMicrosoft certified solutions associate
Microsoft certified solutions associate MCSA: BI Reporting This certification demonstrates your expertise in analyzing data with both Power BI and Excel. Exam 70-778/Course 20778 Analyzing and Visualizing
More informationGenesys Security Deployment Guide. Encrypted Data in Databases
Genesys Security Deployment Guide Encrypted Data in Databases 1/20/2018 Contents 1 Encrypted Data in Databases 1.1 Security Benefits 1.2 Supporting Components 1.3 Feature Description 1.4 Feature Configuration
More informationDB2 9.7 DBA for Linux UNIX and Windows Exam.
IBM 000-541 DB2 9.7 DBA for Linux UNIX and Windows Exam TYPE: DEMO http://www.examskey.com/000-541.html Examskey IBM 000-541 exam demo product is here for you to test the quality of the product. This IBM
More informationWiki Database Schema Diagram Generate Sql Server 2005
Wiki Database Schema Diagram Generate Sql Server 2005 1 Create a Database Schema, 2 Object Privilege page/tab, 3 Definition page/tab SQL Server 2005-2014, The Database Schema Wizard and Database. Issue
More informationOracle Database 12c R2: New Features for Administrators Part 2 Ed 1
Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1 Duration 5 Days What you will learn Throughout the lessons of the Oracle Database 12c R2: New Features for Administrators Part 2 course
More informationSQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD
SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD The Payment Card Industry Data Security Standard (PCI DSS), currently at version 3.2,
More informationThe Right Method To Secure An Oracle Database
Sentrigo Webinar Series, March 9 th and 11 th 2010 The Right Method To Secure An Oracle Database By Pete Finnigan Updated Monday, 19th January 2010 1 Why Am I Qualified To Speak PeteFinnigan.com Ltd, Est
More informationOracle Database 12c R2: New Features for Administrators Part 2 Ed 1 -
Oracle University Contact Us: Local: 0845 777 7 711 Intl: +44 845 777 7 711 Oracle Database 12c R2: New Features for Administrators Part 2 Ed 1 - Duration: 5 Days What you will learn Throughout the lessons
More informationOracle Database 12c R2: New Features for 12c R1 Administrators Ed 1
Oracle University Contact Us: Local: 0180 2000 526 Intl: +49 8914301200 Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 Duration: 5 Days What you will learn The Oracle Database 12c
More informationAdvanced Technologies of SharePoint 2016
Advanced Technologies of SharePoint 2016 Course 20339-2A 5 Days Instructor-led, Hands on Course Information This five-day course will teach you how to plan, configure, and manage the advanced features
More informationTechnology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 2016+
Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ Updated 03/13/2017 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 2016+ With the release of ER/Studio
More informationSee What You Want to See in Revit 2016
See What You Want to See in Revit 2016 Michael Massey Senior AEC Application Consultant @mgmassey01 Join the conversation #AU2015 Presenting Today.. Mike Massey Senior AEC Application Specialist 25+ Years
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationSQL Azure. Abhay Parekh Microsoft Corporation
SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure
More informationIndira Bandari. Predictive Analytics using R in SQL Server
Indira Bandari Predictive Analytics using R in SQL Server Agenda What is Predictive Analytics? Analytics vs. Predictive Analytics Benefits of using R Predictive Analytics Life Cycle Demo Indira Bandari
More informationDistributed PostgreSQL with YugaByte DB
Distributed PostgreSQL with YugaByte DB Karthik Ranganathan PostgresConf Silicon Valley Oct 16, 2018 1 CHECKOUT THIS REPO: github.com/yugabyte/yb-sql-workshop 2 About Us Founders Kannan Muthukkaruppan,
More informationKentico - Upgrade to Kentico 9. Virgil Carroll Founder / Principal Architect
Kentico - Upgrade to Kentico 9 Virgil Carroll Founder / Principal Architect about me From the great State of Alaska User Experience Aficionado Been building websites since 1998 Been working with Kentico
More informationData Breach Preparedness & Response
Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication
More informationData Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH
Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication
More informationExtending JON 2.3 Use cases
Extending JON 2.3 Use cases Presenter JBoss Senior Solution Architect, Red Hat May 2010 04/30/10 1 Agenda How does JON help you JON in different scenarios 2 New JBoss project Migration project JON at different
More informationAdvanced Technologies of SharePoint 2016 ( )
Advanced Technologies of SharePoint 2016 (20339-2) Formato do curso: Presencial e Live Training Com certificação: MCSE: Productivity Preço: 1740 Nível: Intermédio Duração: 35 horas This five-day course
More informationTop 10 Database Security Threats and How to Stop Them. Rob Rachwald Director of Security Strategy
Top 10 Database Security Threats and How to Stop Them Rob Rachwald Director of Security Strategy Data Has Value Data Has Value Top 7 Attacks Discussed in Hacker Forums 11% 9% 12% 12% 15% 21% 20% dos/ddos
More informationAzure Certification BootCamp for Exam (Infrastructure)
Azure Certification BootCamp for Exam 70-533 (Infrastructure) Course Duration: 2 Days Course Authored by CloudThat Description Microsoft Azure is a cloud computing platform and infrastructure created for
More informationMOC 6232A: Implementing a Microsoft SQL Server 2008 Database
MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft
More informationExtract API: Build sophisticated data models with the Extract API
Welcome # T C 1 8 Extract API: Build sophisticated data models with the Extract API Justin Craycraft Senior Sales Consultant Tableau / Customer Consulting My Office Photo Used with permission Agenda 1)
More informationMySQL for Database Administrators Ed 4
Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals
More informationSelecting and Protecting the Right SharePoint Backup Targets. Sean McDonough Product Manager, SharePoint Products Idera
Selecting and Protecting the Right SharePoint Backup Targets Sean McDonough Product Manager, SharePoint Products Idera What we ll cover Understand backup targets Define the SharePoint targets Examine common
More informationDatabase Attacks, How to protect the corporate assets. Presented by: James Bleecker
Database Attacks, How to protect the corporate assets Presented by: James Bleecker Agenda Introduction Network/Application Landscape Database Vulnerabilities Are The New Front-Lines Attacking Where the
More informationTECHNOLOGY: Security Encrypting Tablespaces
TECHNOLOGY: Security Encrypting Tablespaces By Arup Nanda Encrypt tablespaces transparently without affecting performance. In an era when data security is critical in almost every type of business, databases
More informationCurriculum Guide. ThingWorx
Curriculum Guide ThingWorx Live Classroom Curriculum Guide Introduction to ThingWorx 8 ThingWorx 8 User Interface Development ThingWorx 8 Platform Administration ThingWorx 7.3 Fundamentals Applying Machine
More informationArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith
ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration
More informationBecoming a Certified Facilitator
Becoming a Certified Facilitator Is Certification Right for You? Remember to complete the brief survey at the end of the session and you ll receive: A free copy of the The Seven Separators of Facilitation
More informationSecuring Data at Rest Using Empress Database - the Ultimate Line of Defense. Empress Software Inc.
Securing Data at Rest Using Empress Database - the Ultimate Line of Defense Empress Software Inc. Agenda About Data Encryption Empress Database Encryption Solution Live Example Summary Securing Data At
More informationEncryption on IBM i. Mark Flora Ciber MRMUG 2/2014
Mark Flora Ciber MRMUG 2/2014 Threats Credit card information Inside and outside your organization Personnel data like SSN or phone number Inside and outside your organization Key business information
More informationMANAGE YOUR SHOP WITH POLICY BASED MANAGEMENT & CENTRAL MANAGEMENT SERVER
MANAGE YOUR SHOP WITH POLICY BASED MANAGEMENT & CENTRAL MANAGEMENT SERVER Ryan Adams Blog - http://ryanjadams.com Twitter - @ryanjadams Email ryan@ryanjadams.com Objectives CMS Configuration CMS Import
More informationSoftchoice Microsoft SQL Server 2017 Migration Guide
SPRING 2018 Softchoice Microsoft SQL Server 2017 Migration Guide 1 Contents ABOUT THE AUTHORS 3 STEVE THOMPSON 3 PATRICK O LEARY 3 SQL SERVER 2017 MIGRATION GUIDE 4 BUSINESS VALUE OF SQL SERVER 2017 ENHANCEMENTS
More informationMicrosoft Exam Designing Database Solutions for Microsoft SQL Server Version: 12.0 [ Total Questions: 111 ]
s@lm@n Microsoft Exam 70-465 Designing Database Solutions for Microsoft SQL Server Version: 12.0 [ Total Questions: 111 ] Topic break down Topic No. of Questions Topic 1: Litware, Inc 10 Topic 2: Contoso
More informationUpdating Your Skills to SQL Server 2016
Updating Your Skills to SQL Server 2016 OD10986B; On-Demand, Video-based Course Description This course provides students moving from earlier releases of SQL Server with an introduction to the new features
More informationJavier Villegas. Azure SQL Server Managed Instance
Javier Villegas Azure SQL Server Managed Instance Javier Villegas DBA Manager at Mediterranean Shipping Company Involved with the Microsoft SQL Server since SQL Server 6.5 Specialization in SQL Server
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationOverview of AWS Security - Database Services
Overview of AWS Security - Database Services June 2016 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) 2016, Amazon Web Services, Inc. or its affiliates. All rights
More informationPercona Software & Services Update
Percona Software & Services Update Q4 2016 Peter Zaitsev,CEO Percona Technical Webinars January 12, 2017 Why? Talking to Many Users and Customers Getting What have you been up to? Question This is a way
More informationSensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill
Sensitive Data Warriors: Always On Encryption and Data Masking Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type
More informationKarthik Bharathy Program Manager, SQL Server Microsoft
Karthik Bharathy Program Manager, SQL Server Microsoft Key Session takeaways Understand the many views of SQL Server Look at hardening SQL Server At the network level At the access level At the data level
More information