Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra

Size: px
Start display at page:

Download "Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra"

Transcription

1 Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra

2 Technical Assistance If you require assistance during the session, type your inquiry into the question pane on the right side. Maximize your screen with the zoom button on the top of the presentation window. Please fill in the short evaluation following the session. It will appear in your web browser.

3 Thank You to Our Sponsors Empower users with new insights through familiar tools while balancing the need for IT to monitor and manage user created content. Deliver access to all data types across structured and unstructured sources. Redgate Software makes ingeniously simple software used by 650,000 IT professionals who work with SQL Server,.NET, and Oracle. More than 100,000 companies use Redgate products, including 91% of the Fortune 100. Redgate s philosophy is to design highly usable, reliable tools which elegantly solve the problems that developers and DBAs face every day.

4 Join PASS PASS is a not-for-profit organization which offers year-round learning opportunities to data professionals. Access to online training and content Join Local Groups and Virtual Groups Get advance notice of member exclusives Enjoy discounted event rates MEMBERSHIP IS FREE, JOIN TODAY

5 Ed Leighton-Dick MICROSOFT MVP, DATA PLATFORM FOUNDER, KINGFISHER TECHNOLOGIES ed.leightondick eleightondick PASS CHAPTER LEADER AND REGIONAL MENTOR in/eleightondick

6 Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies

7 EXTENDING APPLICATIONS SECURELY USING SERVICE BROKER ED LEIGHTON-DICK, FOUNDER, KINGFISHER TECHNOLOGIES

8 Ed Leighton-Dick MICROSOFT MVP, DATA PLATFORM FOUNDER, KINGFISHER TECHNOLOGIES ed.leightondick eleightondick PASS CHAPTER LEADER AND REGIONAL MENTOR in/eleightondick

9 Our goals SERVICE BROKER ARCHITECTURES: BASIC AND EXTENDED EXTENDING: ROUTING AND EXTERNAL ACTIVATION ADDING SECURITY

10 ARCHITECTURES

11 MESSAGE TYPE CONTRACT CONTRACT SERVICE ENDPOINT ENDPOINT SERVICE QUEUE QUEUE MESSAGE TYPE Review: Basic Service Broker architecture ACTIVATION PROCEDURE ACTIVATION PROCEDURE ROUTE

12 Traditional methods vs Service Broker TRADITIONAL PROCEDURE Analogy: Communicating by phone Synchronous Real-time One-to-one More requests -> More processes Limit to number of requests that can be handled SERVICE BROKER Analogy: Communicating by letter Asynchronous Not quite real-time One-to-many Structured way of handling increases in demand Scales out easily

13 DEMO: THE SCENARIO

14 Our scenario SQLTALK : A NEW TEXT MESSAGING APPLICATION Currently a prototype Very limited SEVERAL IMPROVEMENTS HAVE BEEN REQUESTED Scale out Add end-to-end encryption, Twitter, and SMS

15 Methodology Develop Extend Secure

16 ROUTING

17 Endpoints ALLOWS CONNECTION TO AN INSTANCE OF SQL SERVER ONE PER INSTANCE OF SQL SERVER CREATE ENDPOINT

18 Routes: Basic SPECIFIES THE ADDRESS OF THE DESTINATION ALWAYS CREATE IN PAIRS A B B A CREATE ROUTE

19 Routes: Multiple steps (Forwarding) ENABLE FORWARDING ON ENDPOINT ADD APPROPRIATE ROUTES ON ALL SERVERS A F, F B B F, F A FORWARDER DOES NOT HAVE COPY OF SERVICE

20 Multicast ADDED IN SQL 2012 ALLOWS A MESSAGE TO BE SENT TO MULTIPLE DESTINATIONS SIMULTANEOUSLY VARIATION ON SEND COMMAND One OPEN DIALOG per destination List all destinations in SEND

21 DEMO: ADDING ROUTING

22 EXTERNAL ACTIVATION

23 What is External Activation? WINDOWS SERVICE USES Invoke lengthy processes Invoke processes that wouldn t run safely or predictably within SQL Server SB External Activation Queue Event Notification External Activation Service.Net program Initiates Action Relays Action Receives Action Executes Action

24 Installation OPTION 1: DOWNLOAD EXECUTABLE Part of SQL Server Feature Pack (version-specific) OPTION 2: WRITE A CUSTOM EXTERNAL ACTIVATOR INSTALL SERVICE ON SEPARATE MACHINE FOR BEST PERFORMANCE Limited to one instance per machine

25 Configuration: Service Broker CONFIGURE SERVICE BROKER INSTANCES Initiator Target CREATE EVENT NOTIFICATION FOR QUEUE_ACTIVATION Consumes target queue Directed to external activator

26 Configuration: Application WHILE LOOP Event notification only sends one message ( There s something to do! ) Application must loop through messages until queue empty PARSE MESSAGES Structure similar to what is used in stored procedure COMMIT TRANSACTIONS Ensures messages are removed from queue

27 Configuration: External Activator <NotificationServiceList> Points to the queue that stores the event notifications <ApplicationServiceList> < ApplicationService>: Points to the queue that stores the messages to parse <ImagePath>: Defines the application to launch <LogSettings> Multiple levels of logging available

28 DEMO: EXTERNAL ACTIVATION

29 SECURITY

30 Certificates TYPES Self-signed certificates Third-party certificates ROTATE REGULARLY TO MAINTAIN SECURITY USE ENCRYPTION KEY MANAGEMENT (EKM), IF AVAILABLE Hardware Security Modules (HSM) Azure Key Vault

31 Transport security SECURES THE CONNECTION BETWEEN ENDPOINTS Enabled by default TRANSPORT SECURITY Authentication between pairs of endpoints TRANSPORT ENCRYPTION Encryption between endpoints Applies to all messages passing through connection

32 Dialog security SECURES THE MESSAGES THEMSELVES DIALOG SECURITY Authentication between initiator and target services DIALOG ENCRYPTION Encrypts message at initiator, decrypts at target Not decrypted by forwarders Relies on dialog security for certificates

33 Securing the connection SQL SERVER CONNECTIONS SHOULD BE ENCRYPTED Prevents man-in-the-middle attacks SSL/TLS Natively supported Negotiated each time connection is opened VPN (IPSEC) Persistent connection

34 Securing the endpoints CHANGE THE PORT Default: 4022 ALWAYS USE AES ENCRYPTION RC4 compromised; deprecated in SQL 2016 LIMIT USERS VIA PERMISSIONS

35 Access control ACTIVATION PROCEDURE EXECUTION EXECUTE AS PERMISSIONS FOR PRINCIPALS PERMISSIONS FOR EXTERNAL ACTIVATION

36 DEMO: ADDING SECURITY

37 WRAP-UP

38 What we covered SERVICE BROKER ARCHITECTURES: BASIC AND EXTENDED EXTENDING: ROUTING AND EXTERNAL ACTIVATION ADDING SECURITY

39 QUESTIONS?

40 Coming up next! SQL Server and Application Security For Developers Mladen Prajdić

41 THANK YOU FOR ATTENDING

42

Securing SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders

Securing SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Securing SQL Server Processes with Certificates Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Technical Assistance If you require assistance during the session,

More information

Ooops, data breach? Not with Always Encrypted. Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill

Ooops, data breach? Not with Always Encrypted. Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill Ooops, data breach? Not with Always Encrypted Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type

More information

Sensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill

Sensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Sensitive Data Warriors: Always On Encryption and Data Masking Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type

More information

New Paradigm for Performance Tuning in SQL Server Presented by Robert Davis

New Paradigm for Performance Tuning in SQL Server Presented by Robert Davis in SQL Server 2016 Presented by Robert Davis Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools while balancing the need for IT to

More information

Outlier Detection With SQL And R. Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty

Outlier Detection With SQL And R. Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty Outlier Detection With SQL And R Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty Technical Assistance If you require assistance during the session, type your inquiry into

More information

Protecting Your Data With Encryption

Protecting Your Data With Encryption Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies Thank you Sponsors! o Please visit the sponsors during the vendor break from 2:45 3:15 and enter their end-of-day raffles Event

More information

SQL Server and Application Security For Developers. Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates

SQL Server and Application Security For Developers. Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates SQL Server and Application Security For Developers Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates Technical Assistance If you require assistance during the session, type your

More information

Monitoring Page Splits in SQL Server

Monitoring Page Splits in SQL Server Monitoring Page Splits in SQL Server Guy Glantser, CEO, Madeira Data Solutions Moderated By: Jay O'Donnell Presenting Sponsors Technical Assistance If you require assistance during the session, type your

More information

Using JSON with SQL Server Presented by Steve Hughes Moderated by Sarah Huang

Using JSON with SQL Server Presented by Steve Hughes Moderated by Sarah Huang Using JSON with SQL Server 2016 Presented by Steve Hughes Moderated by Sarah Huang Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools

More information

A Closer Look at Distributed Availability Groups. Allan Hirt, Managing Partner, SQLHA LLC Moderated By: George Carlisle

A Closer Look at Distributed Availability Groups. Allan Hirt, Managing Partner, SQLHA LLC Moderated By: George Carlisle A Closer Look at Distributed Availability Groups Allan Hirt, Managing Partner, SQLHA LLC Moderated By: George Carlisle Thank You microsoft.com idera.com attunity.com Empower users with new insights through

More information

Swimming in the Data Lake. Presented by Warner Chaves Moderated by Sander Stad

Swimming in the Data Lake. Presented by Warner Chaves Moderated by Sander Stad Swimming in the Data Lake Presented by Warner Chaves Moderated by Sander Stad Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools

More information

Columnstore Technology Improvements in SQL Server Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan

Columnstore Technology Improvements in SQL Server Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan Columnstore Technology Improvements in SQL Server 2016 Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with

More information

A Crash-Course in Biml. Tim Mitchell, Principal Data Architect, Tyleris Data Solutions Moderated By: Cathrine Wilhelmsen

A Crash-Course in Biml. Tim Mitchell, Principal Data Architect, Tyleris Data Solutions Moderated By: Cathrine Wilhelmsen A Crash-Course in Biml Tim Mitchell, Principal Data Architect, Tyleris Data Solutions Moderated By: Cathrine Wilhelmsen Thank You microsoft.com idera.com attunity.com Empower users with new insights through

More information

The Ambiguous Case of Off-Row Storage in In- Memory OLTP. Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad

The Ambiguous Case of Off-Row Storage in In- Memory OLTP. Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad The Ambiguous Case of Off-Row Storage in In- Memory OLTP Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad Technical Assistance If you require assistance during the session, type your inquiry

More information

Locking, Blocking, Versions: Concurrency for Maximum Performance. Kalen Delaney, Moderated By: Daniel Janik

Locking, Blocking, Versions: Concurrency for Maximum Performance. Kalen Delaney,   Moderated By: Daniel Janik Locking, Blocking, Versions: Concurrency for Maximum Performance Kalen Delaney, www.sqlserverinternals.com Moderated By: Daniel Janik Thank You microsoft.com idera.com attunity.com Empower users with new

More information

R Language for the SQL Server DBA

R Language for the SQL Server DBA R Language for the SQL Server DBA Beginning with R Ing. Eduardo Castro, PhD, Principal Data Analyst Architect, LP Consulting Moderated By: Jose Rolando Guay Paz Thank You microsoft.com idera.com attunity.com

More information

Hacking SQL Server. André, Melancia, Developer/DBA, LunarCat.PT Moderated By: Jody Roberts

Hacking SQL Server. André, Melancia, Developer/DBA, LunarCat.PT Moderated By: Jody Roberts Hacking SQL Server André, Melancia, Developer/DBA, LunarCat.PT Moderated By: Jody Roberts Technical Assistance If you require assistance during the session, type your inquiry into the question pane on

More information

SQL Operations Studio - a new multi-platform tool for SQL Server database development, administration, and monitoring

SQL Operations Studio - a new multi-platform tool for SQL Server database development, administration, and monitoring SQL Operations Studio - a new multi-platform tool for SQL Server database development, administration, and monitoring Marek Masko, Principal Database Analyst, Sabre Moderated By: Philip Seamark Presenting

More information

SQL Server Internals: The Practical Angle Sneak Peek. Dmitri Korotkevitch Moderated by Roberto Fonseca

SQL Server Internals: The Practical Angle Sneak Peek. Dmitri Korotkevitch Moderated by Roberto Fonseca SQL Server Internals: The Practical Angle Sneak Peek Dmitri Korotkevitch Moderated by Roberto Fonseca Technical Assistance Maximize your screen with the zoom button on the top of the presentation window

More information

Microsoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps

Microsoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps Microsoft 70-535 Dumps with Valid 70-535 Exam Questions PDF [2018] The Microsoft 70-535 Microsoft Architecting Microsoft Azure Solutions Exam exam is an ultimate source for professionals to retain their

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

Turbo-Charged Transaction Logs. David Maxwell

Turbo-Charged Transaction Logs. David Maxwell Turbo-Charged Transaction Logs David Maxwell Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing user created content across structured and unstructured

More information

Overlord Tracking Changes Real-Time in Your Environment

Overlord Tracking Changes Real-Time in Your Environment Overlord Tracking Changes Real-Time in Your Environment Be Proactive. Be Awesome. Michael Bourgon Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing

More information

Service Broker. A Conceptual Approach

Service Broker. A Conceptual Approach Service Broker A Conceptual Approach #531 Louisville 2016 Thank you to our Gold Sponsors #531 Louisville 2016 Thank you to our Silver Sponsors Thank you to our Bronze Sponsors About Me: Working in healthcare

More information

TLS 1.1 Security fixes and TLS extensions RFC4346

TLS 1.1 Security fixes and TLS extensions RFC4346 F5 Networks, Inc 2 SSL1 and SSL2 Created by Netscape and contained significant flaws SSL3 Created by Netscape to address SSL2 flaws TLS 1.0 Standardized SSL3 with almost no changes RFC2246 TLS 1.1 Security

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

2018 GLOBALSCAPE TRAINING OVERVIEW

2018 GLOBALSCAPE TRAINING OVERVIEW 2018 GLOBALSCAPE TRAINING OVERVIEW TABLE OF CONTENTS COURSE... 3 EFT ESSENTIALS COURSE...4 EFT ADMINISTRATOR COURSE... 5 EFT ADMINISTRATOR COURSE (CONT.)... 6 EFT AUTOMATION COURSE... 7 EFT SECURITY COURSE...8

More information

Security and Privacy Overview

Security and Privacy Overview Security and Privacy Overview Cloud Application Security, Data Security and Privacy, and Password Management 1 Overview Security is a growing concern and should not be taken lightly across an organization.

More information

Advanced Scripting Using SSIS Script Tasks and Components

Advanced Scripting Using SSIS Script Tasks and Components Advanced Scripting Using SSIS Script Tasks and Components John Welch, VP of Software Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing user created

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Bomgar Vault Server Installation Guide

Bomgar Vault Server Installation Guide Bomgar Vault 17.2.1 Server Installation Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware

MOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction

More information

Validating customer demand

Validating customer demand Validating customer demand Why and how to test product and feature concepts without writing a single line of code Steven Cohn Founder & CEO Validately Anuraag Verma VP of Business Development Alpha UX

More information

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students

More information

Security Statement Revision Date: 23 April 2009

Security Statement Revision Date: 23 April 2009 Security Statement Revision Date: 23 April 2009 ISL Online, ISL Light, ISL AlwaysOn, ISL Pronto, and ISL Groop are registered trademarks of XLAB d.o.o. Copyright (c) 2003-2009 XLAB d.o.o. Ljubljana. All

More information

PASS SQL DBA Virtual Chapter

PASS SQL DBA Virtual Chapter PASS SQL DBA Virtual Chapter Wed, 7:00 PM - 8:00 PM GMT Lecture By Ronen Ariely Implementing new Security Features in SQL Server 2016, Part 2 SQL Server 2016 provides several new data security features

More information

Transformation-free Data Pipelines by combining the Power of Apache Kafka and the Flexibility of the ESB's

Transformation-free Data Pipelines by combining the Power of Apache Kafka and the Flexibility of the ESB's Building Agile and Resilient Schema Transformations using Apache Kafka and ESB's Transformation-free Data Pipelines by combining the Power of Apache Kafka and the Flexibility of the ESB's Ricardo Ferreira

More information

20532D - Version: 1. Developing Microsoft Azure Solutions

20532D - Version: 1. Developing Microsoft Azure Solutions 20532D - Version: 1 Developing Microsoft Azure Solutions Developing Microsoft Azure Solutions 20532D - Version: 1 5 days Course Description: This course offers students the opportunity to take an existing

More information

Pulseway Security White Paper

Pulseway Security White Paper Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter

More information

Essential Features of an Integration Solution

Essential Features of an Integration Solution Essential Features of an Integration Solution September 2017 WHITE PAPER Essential Features of an Integration Solution When an enterprise uses multiple applications, it needs to connect them for a variety

More information

Single Sign-On Showdown

Single Sign-On Showdown Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013

More information

Partner Center: Secure application model

Partner Center: Secure application model Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

Making life simpler for remote and mobile workers

Making life simpler for remote and mobile workers : Technology GoToMyPC Technology Making life simpler for remote and mobile workers Learn why GoToMyPC is the most secure, cost-effective and easy-to-use solution for providing remote access to the desktop.

More information

Man in the middle attack on TextSecure Signal. David Wind IT SeCX 2015

Man in the middle attack on TextSecure Signal. David Wind IT SeCX 2015 Man in the middle attack on TextSecure Signal David Wind IT SeCX 2015 $ whoami David Wind Information Security Master student @ University of Applied Science St. Pölten Working for XSEC infosec GmbH since

More information

Architecting Microsoft Azure Solutions (proposed exam 535)

Architecting Microsoft Azure Solutions (proposed exam 535) Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and

More information

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide

Deltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical

More information

Security in ECE Systems

Security in ECE Systems Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today

More information

Network Encryption 3 4/20/17

Network Encryption 3 4/20/17 The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server

More information

Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208)

Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208) Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208) COURSE OVERVIEW: The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and

More information

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA

SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO

More information

SQL Server Security. Marek

SQL Server Security. Marek SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel

More information

Developing Microsoft Azure Solutions (MS 20532)

Developing Microsoft Azure Solutions (MS 20532) Developing Microsoft Azure Solutions (MS 20532) COURSE OVERVIEW: This course is intended for students who have experience building ASP.NET and C# applications. Students will also have experience with the

More information

Integrate F5 BIG-IP LTM

Integrate F5 BIG-IP LTM Publication Date: October 30, 2015 Abstract This guide provides instructions to configure F5 BIG-IP LTM to send the syslog events to EventTracker. Scope The configurations detailed in this guide are consistent

More information

CPE Webcast Encrypting PDF Files in Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by:

CPE Webcast Encrypting PDF Files in  Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by: CPE Webcast Encrypting PDF Files in Email Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by: Administrative Items 100 120 Minutes (Education, Demo, Q&A) Participants are muted.

More information

70-487: Developing Windows Azure and Web Services

70-487: Developing Windows Azure and Web Services 70-487: Developing Windows Azure and Web Services Candidates for this certification are professional developers that use Visual Studio 2015112017 11 and the Microsoft.NET Core Framework 4.5 to design and

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Ten most common Mistakes with AD FS and Hybrid Identity. Sander Berkouwer MVP, DirTeam.com

Ten most common Mistakes with AD FS and Hybrid Identity. Sander Berkouwer MVP, DirTeam.com Ten most common Mistakes with AD FS and Hybrid Identity Sander Berkouwer MVP, DirTeam.com Agenda Federation A small primer on the open protocols used today for federating identity and achieving hybrid

More information

Overview of AWS Security - Database Services

Overview of AWS Security - Database Services Overview of AWS Security - Database Services June 2016 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) 2016, Amazon Web Services, Inc. or its affiliates. All rights

More information

Holistic Database Security

Holistic Database Security Holistic Database Security 1 Important Terms Exploit: Take advantage of a flaw or feature Attack Surface: Any node on the network that can be attacked. That can be the UI, People, anything that touches

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

Six steps to control the uncontrollable

Six steps to control the uncontrollable Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today

More information

ENROLLING FOR YOUR SYKES HOME TRAINING

ENROLLING FOR YOUR SYKES HOME TRAINING ENROLLING FOR YOUR SYKES HOME TRAINING Upon the completion of ALL your preemployment requirements, your employee profile will be finalized and you will be pushed into WebCenter and allowed to enroll for

More information

OWA Security & Enhancements

OWA Security & Enhancements END-POINT SECURITY Messageware is a world leader in Microsoft Exchange and Outlook Web App security and productivity solutions. Our software is used by over 5 million users worldwide and has been recognized

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Developing Microsoft Azure Solutions

Developing Microsoft Azure Solutions Developing Microsoft Azure Solutions Duration: 5 Days Course Code: M20532 Overview: This course is intended for students who have experience building web applications. Students should also have experience

More information

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Presenters: Sander Berkouwer Senior Consultant at SCCT 10-fold Microsoft MVP Active Directory aficionado

More information

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud Cloud Access Manager 8.1.3 How to Deploy Cloud Access Manager in Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Welcome to the. Migrating SQL Server Databases to Azure

Welcome to the. Migrating SQL Server Databases to Azure Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine

More information

CS Final Exam

CS Final Exam CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page

More information

Virtual Private Networks (VPNs)

Virtual Private Networks (VPNs) CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure

More information

Microsoft PRO- Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010

Microsoft PRO- Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 http://www.ipass4sure.com Microsoft PRO- Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 http://www.ipass4sure.com/exams.asp?examcode= The practice exam is written and formatted

More information

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection

More information

Azure Cloud Architecture

Azure Cloud Architecture Azure Cloud Architecture Training Schedule 2015 May 18-20 Belgium (TBD) Overview This course is a deep dive in every architecture aspect of the Azure Platform-as-a-Service components. It delivers the needed

More information

Remote Desktop Services. Deployment Guide

Remote Desktop Services. Deployment Guide Deployment Guide UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP

More information

CYBER SECURITY MADE SIMPLE

CYBER SECURITY MADE SIMPLE CYBER SECURITY MADE SIMPLE Author: Christopher Gorog www.logiccentral.org www.newcyberfrontier.com Christopher Gorog, MBA, PMP, CISSP Lead Faculty for Cybersecurity at Colorado Technical University; Published

More information

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.

More information

Privileged Identity App Launcher and Session Recording

Privileged Identity App Launcher and Session Recording Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1

IPSec. Slides by Vitaly Shmatikov UT Austin. slide 1 IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service

More information

Cisco Group Encrypted Transport VPN

Cisco Group Encrypted Transport VPN Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that

More information

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201 Paperspace Security Primer & Architecture Overview Copyright 2017 Paperspace, Co. All Rights Reserved - 1 - Business Whitepaper Paperspace www.paperspace.com Paperspace Virtual Desktops: A foundation for

More information

Understanding of basic networking concepts (routing, switching, VLAN, firewall functionality)

Understanding of basic networking concepts (routing, switching, VLAN, firewall functionality) Citrix NetScaler for Apps and Desktops Day(s): 5 Course Code: CNS-222 Overview This course is designed specifically for students who have limited or no previous NetScaler experience. The content is based

More information

Migration from Metalogix Archive Manager (MAM) to Enterprise Vault (EV)

Migration from Metalogix Archive Manager (MAM) to Enterprise Vault (EV) Migration from Metalogix Archive Manager (MAM) to Enterprise Vault (EV) FEBRUARY 29, 2016 TECH-ARROW a.s. KAZANSKÁ 5, 821 06 BRATISLAVA, SLOVAKIA All Rights Reserved Contents Source and target environment...

More information

20532D: Developing Microsoft Azure Solutions

20532D: Developing Microsoft Azure Solutions 20532D: Developing Microsoft Azure Solutions Course Details Course Code: Duration: Notes: 20532D 5 days Elements of this syllabus are subject to change. About this course This course is intended for students

More information

Integrate Routing and Remote Access Service (RRAS) EventTracker v8.x and above

Integrate Routing and Remote Access Service (RRAS) EventTracker v8.x and above Integrate Routing and Remote Access Service (RRAS) EventTracker v8.x and above Publication Date: April 18, 2017 Abstract This guide provides instructions to configure Routing and Remote Access Service

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings

Cryptography and Network Security Chapter 16. Fourth Edition by William Stallings Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,

More information

Citrix EXAM - 1Y0-A20. Citrix XenApp 6.5 Administration. Buy Full Product.

Citrix EXAM - 1Y0-A20. Citrix XenApp 6.5 Administration. Buy Full Product. Citrix EXAM - 1Y0-A20 Citrix XenApp 6.5 Administration Buy Full Product http://www.examskey.com/1y0-a20.html Examskey Citrix 1Y0-A20 exam demo product is here for you to test the quality of the product.

More information

Security Enhancements in Informatica 9.6.x

Security Enhancements in Informatica 9.6.x Security Enhancements in Informatica 9.6.x 1993-2016 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or

More information

Hidden Gems in JD Edwards Orchestrator and AIS Server

Hidden Gems in JD Edwards Orchestrator and AIS Server Hidden Gems in JD Edwards Orchestrator and AIS Server Darryl Shakespeare Senior Director Product Development Oracle JD Edwards EnterpriseOne November 12-17, 2017 Safe Harbor Statement The following is

More information

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions

Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges

More information

NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led

NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler, NetScaler Gateway or Unified Gateway experience, this course

More information

Four New Table Level Security Features of SQL Server Karen Lopez, Data Evangelist & Architect

Four New Table Level Security Features of SQL Server Karen Lopez, Data Evangelist & Architect Four New Table Level Security Features of SQL Server 2016 Karen Lopez, Data Evangelist & Architect Karen López Data Evangelist Karen was born this way: loving data. She wants you to love your data, too,,

More information

SSL/TLS. How to send your credit card number securely over the internet

SSL/TLS. How to send your credit card number securely over the internet SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying

More information

Revised (10/17) Overview Transmission Toolkit

Revised (10/17) Overview Transmission Toolkit Revised (10/17) Overview Transmission Toolkit Copyright 2017 by KeyBank, N.A. Overview Transmission Toolkit All rights reserved. Reproduction of any part of this work beyond that permitted by Section 107

More information

MS-20487: Developing Windows Azure and Web Services

MS-20487: Developing Windows Azure and Web Services MS-20487: Developing Windows Azure and Web Services Description In this course, students will learn how to design and develop services that access local and remote data from various data sources. Students

More information

Configuring a Windows Server 2008 Applications Infrastructure

Configuring a Windows Server 2008 Applications Infrastructure Configuring a Windows Server 2008 Applications Infrastructure Course Number: 70-643 Course Length: 5 Days Course Overview The MCTS credential enables professionals to target specific technologies and distinguish

More information

Communication. Distributed Systems IT332

Communication. Distributed Systems IT332 Communication Distributed Systems IT332 2 Outline Fundamentals Layered network communication protocols Types of communication Remote Procedure Call Message Oriented Communication Multicast Communication

More information