Extending Applications Securely Using Service Broker. Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra
|
|
- Joshua Davidson
- 5 years ago
- Views:
Transcription
1 Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies Moderated By: Lance Harra
2 Technical Assistance If you require assistance during the session, type your inquiry into the question pane on the right side. Maximize your screen with the zoom button on the top of the presentation window. Please fill in the short evaluation following the session. It will appear in your web browser.
3 Thank You to Our Sponsors Empower users with new insights through familiar tools while balancing the need for IT to monitor and manage user created content. Deliver access to all data types across structured and unstructured sources. Redgate Software makes ingeniously simple software used by 650,000 IT professionals who work with SQL Server,.NET, and Oracle. More than 100,000 companies use Redgate products, including 91% of the Fortune 100. Redgate s philosophy is to design highly usable, reliable tools which elegantly solve the problems that developers and DBAs face every day.
4 Join PASS PASS is a not-for-profit organization which offers year-round learning opportunities to data professionals. Access to online training and content Join Local Groups and Virtual Groups Get advance notice of member exclusives Enjoy discounted event rates MEMBERSHIP IS FREE, JOIN TODAY
5 Ed Leighton-Dick MICROSOFT MVP, DATA PLATFORM FOUNDER, KINGFISHER TECHNOLOGIES ed.leightondick eleightondick PASS CHAPTER LEADER AND REGIONAL MENTOR in/eleightondick
6 Extending Applications Securely Using Service Broker Ed Leighton-Dick, Founder, Kingfisher Technologies
7 EXTENDING APPLICATIONS SECURELY USING SERVICE BROKER ED LEIGHTON-DICK, FOUNDER, KINGFISHER TECHNOLOGIES
8 Ed Leighton-Dick MICROSOFT MVP, DATA PLATFORM FOUNDER, KINGFISHER TECHNOLOGIES ed.leightondick eleightondick PASS CHAPTER LEADER AND REGIONAL MENTOR in/eleightondick
9 Our goals SERVICE BROKER ARCHITECTURES: BASIC AND EXTENDED EXTENDING: ROUTING AND EXTERNAL ACTIVATION ADDING SECURITY
10 ARCHITECTURES
11 MESSAGE TYPE CONTRACT CONTRACT SERVICE ENDPOINT ENDPOINT SERVICE QUEUE QUEUE MESSAGE TYPE Review: Basic Service Broker architecture ACTIVATION PROCEDURE ACTIVATION PROCEDURE ROUTE
12 Traditional methods vs Service Broker TRADITIONAL PROCEDURE Analogy: Communicating by phone Synchronous Real-time One-to-one More requests -> More processes Limit to number of requests that can be handled SERVICE BROKER Analogy: Communicating by letter Asynchronous Not quite real-time One-to-many Structured way of handling increases in demand Scales out easily
13 DEMO: THE SCENARIO
14 Our scenario SQLTALK : A NEW TEXT MESSAGING APPLICATION Currently a prototype Very limited SEVERAL IMPROVEMENTS HAVE BEEN REQUESTED Scale out Add end-to-end encryption, Twitter, and SMS
15 Methodology Develop Extend Secure
16 ROUTING
17 Endpoints ALLOWS CONNECTION TO AN INSTANCE OF SQL SERVER ONE PER INSTANCE OF SQL SERVER CREATE ENDPOINT
18 Routes: Basic SPECIFIES THE ADDRESS OF THE DESTINATION ALWAYS CREATE IN PAIRS A B B A CREATE ROUTE
19 Routes: Multiple steps (Forwarding) ENABLE FORWARDING ON ENDPOINT ADD APPROPRIATE ROUTES ON ALL SERVERS A F, F B B F, F A FORWARDER DOES NOT HAVE COPY OF SERVICE
20 Multicast ADDED IN SQL 2012 ALLOWS A MESSAGE TO BE SENT TO MULTIPLE DESTINATIONS SIMULTANEOUSLY VARIATION ON SEND COMMAND One OPEN DIALOG per destination List all destinations in SEND
21 DEMO: ADDING ROUTING
22 EXTERNAL ACTIVATION
23 What is External Activation? WINDOWS SERVICE USES Invoke lengthy processes Invoke processes that wouldn t run safely or predictably within SQL Server SB External Activation Queue Event Notification External Activation Service.Net program Initiates Action Relays Action Receives Action Executes Action
24 Installation OPTION 1: DOWNLOAD EXECUTABLE Part of SQL Server Feature Pack (version-specific) OPTION 2: WRITE A CUSTOM EXTERNAL ACTIVATOR INSTALL SERVICE ON SEPARATE MACHINE FOR BEST PERFORMANCE Limited to one instance per machine
25 Configuration: Service Broker CONFIGURE SERVICE BROKER INSTANCES Initiator Target CREATE EVENT NOTIFICATION FOR QUEUE_ACTIVATION Consumes target queue Directed to external activator
26 Configuration: Application WHILE LOOP Event notification only sends one message ( There s something to do! ) Application must loop through messages until queue empty PARSE MESSAGES Structure similar to what is used in stored procedure COMMIT TRANSACTIONS Ensures messages are removed from queue
27 Configuration: External Activator <NotificationServiceList> Points to the queue that stores the event notifications <ApplicationServiceList> < ApplicationService>: Points to the queue that stores the messages to parse <ImagePath>: Defines the application to launch <LogSettings> Multiple levels of logging available
28 DEMO: EXTERNAL ACTIVATION
29 SECURITY
30 Certificates TYPES Self-signed certificates Third-party certificates ROTATE REGULARLY TO MAINTAIN SECURITY USE ENCRYPTION KEY MANAGEMENT (EKM), IF AVAILABLE Hardware Security Modules (HSM) Azure Key Vault
31 Transport security SECURES THE CONNECTION BETWEEN ENDPOINTS Enabled by default TRANSPORT SECURITY Authentication between pairs of endpoints TRANSPORT ENCRYPTION Encryption between endpoints Applies to all messages passing through connection
32 Dialog security SECURES THE MESSAGES THEMSELVES DIALOG SECURITY Authentication between initiator and target services DIALOG ENCRYPTION Encrypts message at initiator, decrypts at target Not decrypted by forwarders Relies on dialog security for certificates
33 Securing the connection SQL SERVER CONNECTIONS SHOULD BE ENCRYPTED Prevents man-in-the-middle attacks SSL/TLS Natively supported Negotiated each time connection is opened VPN (IPSEC) Persistent connection
34 Securing the endpoints CHANGE THE PORT Default: 4022 ALWAYS USE AES ENCRYPTION RC4 compromised; deprecated in SQL 2016 LIMIT USERS VIA PERMISSIONS
35 Access control ACTIVATION PROCEDURE EXECUTION EXECUTE AS PERMISSIONS FOR PRINCIPALS PERMISSIONS FOR EXTERNAL ACTIVATION
36 DEMO: ADDING SECURITY
37 WRAP-UP
38 What we covered SERVICE BROKER ARCHITECTURES: BASIC AND EXTENDED EXTENDING: ROUTING AND EXTERNAL ACTIVATION ADDING SECURITY
39 QUESTIONS?
40 Coming up next! SQL Server and Application Security For Developers Mladen Prajdić
41 THANK YOU FOR ATTENDING
42
Securing SQL Server Processes with Certificates. Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders
Securing SQL Server Processes with Certificates Robert, Davis, Database Engineer, BlueMountain Capital Management Moderated By: Ivan Sanders Technical Assistance If you require assistance during the session,
More informationOoops, data breach? Not with Always Encrypted. Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill
Ooops, data breach? Not with Always Encrypted Daniel de Sousa, BI Specialist, Dominos Pizza Enterprise Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type
More informationSensitive Data Warriors: Always On Encryption and Data Masking. Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill
Sensitive Data Warriors: Always On Encryption and Data Masking Virginia, Mushkatbat, Founder, Hush-Hush Moderated By: Shane O'Neill Technical Assistance If you require assistance during the session, type
More informationNew Paradigm for Performance Tuning in SQL Server Presented by Robert Davis
in SQL Server 2016 Presented by Robert Davis Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools while balancing the need for IT to
More informationOutlier Detection With SQL And R. Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty
Outlier Detection With SQL And R Kevin Feasel, Engineering Manager, ChannelAdvisor Moderated By: Satya Jayanty Technical Assistance If you require assistance during the session, type your inquiry into
More informationProtecting Your Data With Encryption
Protecting Your Data With Encryption Ed Leighton-Dick Kingfisher Technologies Thank you Sponsors! o Please visit the sponsors during the vendor break from 2:45 3:15 and enter their end-of-day raffles Event
More informationSQL Server and Application Security For Developers. Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates
SQL Server and Application Security For Developers Mladen, Prajdic, Developer, Mladen Prajdic s.p. Moderated By: Lee Coates Technical Assistance If you require assistance during the session, type your
More informationMonitoring Page Splits in SQL Server
Monitoring Page Splits in SQL Server Guy Glantser, CEO, Madeira Data Solutions Moderated By: Jay O'Donnell Presenting Sponsors Technical Assistance If you require assistance during the session, type your
More informationUsing JSON with SQL Server Presented by Steve Hughes Moderated by Sarah Huang
Using JSON with SQL Server 2016 Presented by Steve Hughes Moderated by Sarah Huang Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools
More informationA Closer Look at Distributed Availability Groups. Allan Hirt, Managing Partner, SQLHA LLC Moderated By: George Carlisle
A Closer Look at Distributed Availability Groups Allan Hirt, Managing Partner, SQLHA LLC Moderated By: George Carlisle Thank You microsoft.com idera.com attunity.com Empower users with new insights through
More informationSwimming in the Data Lake. Presented by Warner Chaves Moderated by Sander Stad
Swimming in the Data Lake Presented by Warner Chaves Moderated by Sander Stad Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with new insights through familiar tools
More informationColumnstore Technology Improvements in SQL Server Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan
Columnstore Technology Improvements in SQL Server 2016 Presented by Niko Neugebauer Moderated by Nagaraj Venkatesan Thank You microsoft.com hortonworks.com aws.amazon.com red-gate.com Empower users with
More informationA Crash-Course in Biml. Tim Mitchell, Principal Data Architect, Tyleris Data Solutions Moderated By: Cathrine Wilhelmsen
A Crash-Course in Biml Tim Mitchell, Principal Data Architect, Tyleris Data Solutions Moderated By: Cathrine Wilhelmsen Thank You microsoft.com idera.com attunity.com Empower users with new insights through
More informationThe Ambiguous Case of Off-Row Storage in In- Memory OLTP. Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad
The Ambiguous Case of Off-Row Storage in In- Memory OLTP Dmitri Korotkevitch, aboutsqlserver.com Moderated By: Sander Stad Technical Assistance If you require assistance during the session, type your inquiry
More informationLocking, Blocking, Versions: Concurrency for Maximum Performance. Kalen Delaney, Moderated By: Daniel Janik
Locking, Blocking, Versions: Concurrency for Maximum Performance Kalen Delaney, www.sqlserverinternals.com Moderated By: Daniel Janik Thank You microsoft.com idera.com attunity.com Empower users with new
More informationR Language for the SQL Server DBA
R Language for the SQL Server DBA Beginning with R Ing. Eduardo Castro, PhD, Principal Data Analyst Architect, LP Consulting Moderated By: Jose Rolando Guay Paz Thank You microsoft.com idera.com attunity.com
More informationHacking SQL Server. André, Melancia, Developer/DBA, LunarCat.PT Moderated By: Jody Roberts
Hacking SQL Server André, Melancia, Developer/DBA, LunarCat.PT Moderated By: Jody Roberts Technical Assistance If you require assistance during the session, type your inquiry into the question pane on
More informationSQL Operations Studio - a new multi-platform tool for SQL Server database development, administration, and monitoring
SQL Operations Studio - a new multi-platform tool for SQL Server database development, administration, and monitoring Marek Masko, Principal Database Analyst, Sabre Moderated By: Philip Seamark Presenting
More informationSQL Server Internals: The Practical Angle Sneak Peek. Dmitri Korotkevitch Moderated by Roberto Fonseca
SQL Server Internals: The Practical Angle Sneak Peek Dmitri Korotkevitch Moderated by Roberto Fonseca Technical Assistance Maximize your screen with the zoom button on the top of the presentation window
More informationMicrosoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps
Microsoft 70-535 Dumps with Valid 70-535 Exam Questions PDF [2018] The Microsoft 70-535 Microsoft Architecting Microsoft Azure Solutions Exam exam is an ultimate source for professionals to retain their
More informationSecurity context. Technology. Solution highlights
Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for
More informationTurbo-Charged Transaction Logs. David Maxwell
Turbo-Charged Transaction Logs David Maxwell Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing user created content across structured and unstructured
More informationOverlord Tracking Changes Real-Time in Your Environment
Overlord Tracking Changes Real-Time in Your Environment Be Proactive. Be Awesome. Michael Bourgon Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing
More informationService Broker. A Conceptual Approach
Service Broker A Conceptual Approach #531 Louisville 2016 Thank you to our Gold Sponsors #531 Louisville 2016 Thank you to our Silver Sponsors Thank you to our Bronze Sponsors About Me: Working in healthcare
More informationTLS 1.1 Security fixes and TLS extensions RFC4346
F5 Networks, Inc 2 SSL1 and SSL2 Created by Netscape and contained significant flaws SSL3 Created by Netscape to address SSL2 flaws TLS 1.0 Standardized SSL3 with almost no changes RFC2246 TLS 1.1 Security
More informationExtended Search Administration
IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using
More information2018 GLOBALSCAPE TRAINING OVERVIEW
2018 GLOBALSCAPE TRAINING OVERVIEW TABLE OF CONTENTS COURSE... 3 EFT ESSENTIALS COURSE...4 EFT ADMINISTRATOR COURSE... 5 EFT ADMINISTRATOR COURSE (CONT.)... 6 EFT AUTOMATION COURSE... 7 EFT SECURITY COURSE...8
More informationSecurity and Privacy Overview
Security and Privacy Overview Cloud Application Security, Data Security and Privacy, and Password Management 1 Overview Security is a growing concern and should not be taken lightly across an organization.
More informationAdvanced Scripting Using SSIS Script Tasks and Components
Advanced Scripting Using SSIS Script Tasks and Components John Welch, VP of Software Thank You Presenting Sponsors Gain insights through familiar tools while balancing monitoring and managing user created
More informationSophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 1.1 Document date: July 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
More informationBomgar Vault Server Installation Guide
Bomgar Vault 17.2.1 Server Installation Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationMOM MESSAGE ORIENTED MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS. MOM Message Oriented Middleware
MOM MESSAGE ORIENTED MOM Message Oriented Middleware MIDDLEWARE OVERVIEW OF MESSAGE ORIENTED MIDDLEWARE TECHNOLOGIES AND CONCEPTS Peter R. Egli 1/25 Contents 1. Synchronous versus asynchronous interaction
More informationValidating customer demand
Validating customer demand Why and how to test product and feature concepts without writing a single line of code Steven Cohn Founder & CEO Validately Anuraag Verma VP of Business Development Alpha UX
More informationImplementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004
Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004 Introduction This five-day instructor-led course provides students
More informationSecurity Statement Revision Date: 23 April 2009
Security Statement Revision Date: 23 April 2009 ISL Online, ISL Light, ISL AlwaysOn, ISL Pronto, and ISL Groop are registered trademarks of XLAB d.o.o. Copyright (c) 2003-2009 XLAB d.o.o. Ljubljana. All
More informationPASS SQL DBA Virtual Chapter
PASS SQL DBA Virtual Chapter Wed, 7:00 PM - 8:00 PM GMT Lecture By Ronen Ariely Implementing new Security Features in SQL Server 2016, Part 2 SQL Server 2016 provides several new data security features
More informationTransformation-free Data Pipelines by combining the Power of Apache Kafka and the Flexibility of the ESB's
Building Agile and Resilient Schema Transformations using Apache Kafka and ESB's Transformation-free Data Pipelines by combining the Power of Apache Kafka and the Flexibility of the ESB's Ricardo Ferreira
More information20532D - Version: 1. Developing Microsoft Azure Solutions
20532D - Version: 1 Developing Microsoft Azure Solutions Developing Microsoft Azure Solutions 20532D - Version: 1 5 days Course Description: This course offers students the opportunity to take an existing
More informationPulseway Security White Paper
Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter
More informationEssential Features of an Integration Solution
Essential Features of an Integration Solution September 2017 WHITE PAPER Essential Features of an Integration Solution When an enterprise uses multiple applications, it needs to connect them for a variety
More informationSingle Sign-On Showdown
Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through
More informationMaking life simpler for remote and mobile workers
: Technology GoToMyPC Technology Making life simpler for remote and mobile workers Learn why GoToMyPC is the most secure, cost-effective and easy-to-use solution for providing remote access to the desktop.
More informationMan in the middle attack on TextSecure Signal. David Wind IT SeCX 2015
Man in the middle attack on TextSecure Signal David Wind IT SeCX 2015 $ whoami David Wind Information Security Master student @ University of Applied Science St. Pölten Working for XSEC infosec GmbH since
More informationArchitecting Microsoft Azure Solutions (proposed exam 535)
Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and
More informationDeltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide
Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical
More informationSecurity in ECE Systems
Lecture 11 Information Security ECE 197SA Systems Appreciation Security in ECE Systems Information security Information can be very valuable Secure communication important to protect information Today
More informationNetwork Encryption 3 4/20/17
The Network Layer Network Encryption 3 CSC362, Information Security most of the security mechanisms we have surveyed were developed for application- specific needs electronic mail: PGP, S/MIME client/server
More informationCitrix NetScaler 10.5 Essentials for ACE Migration (CNS-208)
Citrix NetScaler 10.5 Essentials for ACE Migration (CNS-208) COURSE OVERVIEW: The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationSQL Server Security. Marek
SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel
More informationDeveloping Microsoft Azure Solutions (MS 20532)
Developing Microsoft Azure Solutions (MS 20532) COURSE OVERVIEW: This course is intended for students who have experience building ASP.NET and C# applications. Students will also have experience with the
More informationIntegrate F5 BIG-IP LTM
Publication Date: October 30, 2015 Abstract This guide provides instructions to configure F5 BIG-IP LTM to send the syslog events to EventTracker. Scope The configurations detailed in this guide are consistent
More informationCPE Webcast Encrypting PDF Files in Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by:
CPE Webcast Encrypting PDF Files in Email Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by: Administrative Items 100 120 Minutes (Education, Demo, Q&A) Participants are muted.
More information70-487: Developing Windows Azure and Web Services
70-487: Developing Windows Azure and Web Services Candidates for this certification are professional developers that use Visual Studio 2015112017 11 and the Microsoft.NET Core Framework 4.5 to design and
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationTen most common Mistakes with AD FS and Hybrid Identity. Sander Berkouwer MVP, DirTeam.com
Ten most common Mistakes with AD FS and Hybrid Identity Sander Berkouwer MVP, DirTeam.com Agenda Federation A small primer on the open protocols used today for federating identity and achieving hybrid
More informationOverview of AWS Security - Database Services
Overview of AWS Security - Database Services June 2016 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) 2016, Amazon Web Services, Inc. or its affiliates. All rights
More informationHolistic Database Security
Holistic Database Security 1 Important Terms Exploit: Take advantage of a flaw or feature Attack Surface: Any node on the network that can be attacked. That can be the UI, People, anything that touches
More informationSecurity in Bomgar Remote Support
Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationSix steps to control the uncontrollable
Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today
More informationENROLLING FOR YOUR SYKES HOME TRAINING
ENROLLING FOR YOUR SYKES HOME TRAINING Upon the completion of ALL your preemployment requirements, your employee profile will be finalized and you will be pushed into WebCenter and allowed to enroll for
More informationOWA Security & Enhancements
END-POINT SECURITY Messageware is a world leader in Microsoft Exchange and Outlook Web App security and productivity solutions. Our software is used by over 5 million users worldwide and has been recognized
More informationAdvanced Security Measures for Clients and Servers
Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network
More informationDeveloping Microsoft Azure Solutions
Developing Microsoft Azure Solutions Duration: 5 Days Course Code: M20532 Overview: This course is intended for students who have experience building web applications. Students should also have experience
More informationTracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory
Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Presenters: Sander Berkouwer Senior Consultant at SCCT 10-fold Microsoft MVP Active Directory aficionado
More informationCloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud
Cloud Access Manager 8.1.3 How to Deploy Cloud Access Manager in Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationWelcome to the. Migrating SQL Server Databases to Azure
Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine
More informationCS Final Exam
CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page
More informationVirtual Private Networks (VPNs)
CHAPTER 19 Virtual Private Networks (VPNs) Virtual private network is defined as customer connectivity deployed on a shared infrastructure with the same policies as a private network. The shared infrastructure
More informationMicrosoft PRO- Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010
http://www.ipass4sure.com Microsoft PRO- Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 http://www.ipass4sure.com/exams.asp?examcode= The practice exam is written and formatted
More informationDyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof
Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection
More informationAzure Cloud Architecture
Azure Cloud Architecture Training Schedule 2015 May 18-20 Belgium (TBD) Overview This course is a deep dive in every architecture aspect of the Azure Platform-as-a-Service components. It delivers the needed
More informationRemote Desktop Services. Deployment Guide
Deployment Guide UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies logo are registered trademarks of KEMP
More informationCYBER SECURITY MADE SIMPLE
CYBER SECURITY MADE SIMPLE Author: Christopher Gorog www.logiccentral.org www.newcyberfrontier.com Christopher Gorog, MBA, PMP, CISSP Lead Faculty for Cybersecurity at Colorado Technical University; Published
More informationArchiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention
Symantec Enterprise Vault TransVault CommonDesk ARCviewer Vault LLC Optimize the management of information by defining a lifecycle strategy for data Backup is for recovery, archiving is for discovery.
More informationPrivileged Identity App Launcher and Session Recording
Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationIPSec. Slides by Vitaly Shmatikov UT Austin. slide 1
IPSec Slides by Vitaly Shmatikov UT Austin slide 1 TCP/IP Example slide 2 IP Security Issues Eavesdropping Modification of packets in transit Identity spoofing (forged source IP addresses) Denial of service
More informationCisco Group Encrypted Transport VPN
Cisco Group Encrypted Transport VPN Q. What is Cisco Group Encrypted Transport VPN? A. Cisco Group Encrypted Transport is a next-generation WAN VPN solution that defines a new category of VPN, one that
More informationPaperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201
Paperspace Security Primer & Architecture Overview Copyright 2017 Paperspace, Co. All Rights Reserved - 1 - Business Whitepaper Paperspace www.paperspace.com Paperspace Virtual Desktops: A foundation for
More informationUnderstanding of basic networking concepts (routing, switching, VLAN, firewall functionality)
Citrix NetScaler for Apps and Desktops Day(s): 5 Course Code: CNS-222 Overview This course is designed specifically for students who have limited or no previous NetScaler experience. The content is based
More informationMigration from Metalogix Archive Manager (MAM) to Enterprise Vault (EV)
Migration from Metalogix Archive Manager (MAM) to Enterprise Vault (EV) FEBRUARY 29, 2016 TECH-ARROW a.s. KAZANSKÁ 5, 821 06 BRATISLAVA, SLOVAKIA All Rights Reserved Contents Source and target environment...
More information20532D: Developing Microsoft Azure Solutions
20532D: Developing Microsoft Azure Solutions Course Details Course Code: Duration: Notes: 20532D 5 days Elements of this syllabus are subject to change. About this course This course is intended for students
More informationIntegrate Routing and Remote Access Service (RRAS) EventTracker v8.x and above
Integrate Routing and Remote Access Service (RRAS) EventTracker v8.x and above Publication Date: April 18, 2017 Abstract This guide provides instructions to configure Routing and Remote Access Service
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationCryptography and Network Security Chapter 16. Fourth Edition by William Stallings
Cryptography and Network Security Chapter 16 Fourth Edition by William Stallings Chapter 16 IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death,
More informationCitrix EXAM - 1Y0-A20. Citrix XenApp 6.5 Administration. Buy Full Product.
Citrix EXAM - 1Y0-A20 Citrix XenApp 6.5 Administration Buy Full Product http://www.examskey.com/1y0-a20.html Examskey Citrix 1Y0-A20 exam demo product is here for you to test the quality of the product.
More informationSecurity Enhancements in Informatica 9.6.x
Security Enhancements in Informatica 9.6.x 1993-2016 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or
More informationHidden Gems in JD Edwards Orchestrator and AIS Server
Hidden Gems in JD Edwards Orchestrator and AIS Server Darryl Shakespeare Senior Director Product Development Oracle JD Edwards EnterpriseOne November 12-17, 2017 Safe Harbor Statement The following is
More informationEnterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions
Enterprise Integration Patterns: Designing, Building, and Deploying Messaging Solutions Chapter 1: Solving Integration Problems Using Patterns 2 Introduction The Need for Integration Integration Challenges
More informationNetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led
NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler, NetScaler Gateway or Unified Gateway experience, this course
More informationFour New Table Level Security Features of SQL Server Karen Lopez, Data Evangelist & Architect
Four New Table Level Security Features of SQL Server 2016 Karen Lopez, Data Evangelist & Architect Karen López Data Evangelist Karen was born this way: loving data. She wants you to love your data, too,,
More informationSSL/TLS. How to send your credit card number securely over the internet
SSL/TLS How to send your credit card number securely over the internet The security provided by SSL SSL is implemented at level 4 The transport control layer In practice, SSL uses TCP sockets The underlying
More informationRevised (10/17) Overview Transmission Toolkit
Revised (10/17) Overview Transmission Toolkit Copyright 2017 by KeyBank, N.A. Overview Transmission Toolkit All rights reserved. Reproduction of any part of this work beyond that permitted by Section 107
More informationMS-20487: Developing Windows Azure and Web Services
MS-20487: Developing Windows Azure and Web Services Description In this course, students will learn how to design and develop services that access local and remote data from various data sources. Students
More informationConfiguring a Windows Server 2008 Applications Infrastructure
Configuring a Windows Server 2008 Applications Infrastructure Course Number: 70-643 Course Length: 5 Days Course Overview The MCTS credential enables professionals to target specific technologies and distinguish
More informationCommunication. Distributed Systems IT332
Communication Distributed Systems IT332 2 Outline Fundamentals Layered network communication protocols Types of communication Remote Procedure Call Message Oriented Communication Multicast Communication
More information