* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Slide 1
Survey
Document related concepts
Oracle Database wikipedia , lookup
Concurrency control wikipedia , lookup
Microsoft Access wikipedia , lookup
Ingres (database) wikipedia , lookup
Extensible Storage Engine wikipedia , lookup
Functional Database Model wikipedia , lookup
Open Database Connectivity wikipedia , lookup
Microsoft SQL Server wikipedia , lookup
Relational model wikipedia , lookup
Microsoft Jet Database Engine wikipedia , lookup
Transcript
Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar Pervasive Security Model Current Btrieve Security Model Application issues a file open request Pervasive.SQL engine verifies with the OS that the user login credentials has physical rights to the file If User has rights – Access granted Else – Access denied Pervasive.SQL acts as a Client/Server proxy for the user Current SQL Security Model Application logs onto a database Pervasive.SQL engine verifies with the user has been defined as a valid user of the database If User defined – Access granted • Rights are assigned based on a defined profile Pervasive.SQL isolates the user from the database. The engine controls access Weaknesses in the Btrieve model Btrieve has no concept of a database, simply files. OS level rights are required for each user and file No central way to control security No programmatic way to control user access Two different security models to a common data store Pervasive.SQL V8 Security Feature Pack Security Release (V8.5) Release Features: Enhanced encryption Unified security model Unified DB and OS access control Fully backwards compatible with existing applications Free upgrade for existing Pervasive.SQL V8 Users New Features and Improvements New security models for Btrieve applications • Classic • Mixed • Database DefaultDB for securing Btrieve files Encrypted network communication Utilities support for new security models • Create DB wizard • Maintain Named Database dialog Updates to programming interfaces • Login API • URI (Uniform Resource Indicator) support for create and open Improved installation programs Demo Pricing and Distribution No change in pricing. Available as a separate CD in the box. Free for all Pervasive.SQL V8 users. Simply request an upgrade from Netcellent. Documentation on setting up the security features is available upon request. By Mark DeShazo April 1, 2004 - Webinar Security Model AuditMaster Know who did what, when, where and how to your data Key Features: •Event handler records database events in log file •Viewer for querying and analyzing the log file •Alerts to proactively notify appropriate personnel when predefined conditions occur •Works with your existing installation of Elliott running Pervasive V8.X - No modifications are required Audit Master Architecture Functionality Capture • SQL and Btrieve logging • Nearly all database ops can be logged, including failed operations • Before & after images for updates allows detailed change analysis • Log purging and archiving • Multi-version metadata and DDF management Query • Predefined and customizable queries • Transaction rollback and point-in-time recovery Alerts • Business rules • Built-in email notification • Can call user defined functions Database Security Database security models reduce threats through restricting access to data • If an unauthorized user can’t access the data, he/she can’t compromise it However, there will always be authorized users doing unauthorized things • In casinos, dealers cheat more than gamblers • People make honest mistakes • Access control will never be enough Two primary use cases • Improving customer support through detailed activity logging. • Reducing fraud through proactive alerts and forensic log analysis. Demonstration Pricing and Distribution Total solution for monitoring and logging • Pervasive.SQL V8 server required • Windows NT4/2000/2003 only • Pricing Promotion Period, 10% Off (by May 31, 2004) • Special OEM arrangement with Pervasive Users Price 6 Users $495 10 Users $695 20 Users $1,295 50 Users $2,795 Unlimited $4,995 Pervasive Backup Agent By Mark DeShazo March 19, 2004 Why is Backup Difficult? A successful database backup must ensure file integrity and database concurrency • Individual data files must be reliable and restorable • The set of files must represent a valid database state This is difficult to accomplish • Files may be open and changing • Long duration backups may copy inconsistent files Backup is complicated for all databases • Large sizes and continuous updates make database backup and restore difficult What do Pervasive.SQL Users Do? A recent survey of Pervasive® customers showed • 88% perform regular backups • 69% perform backups while the server is running • 68% don’t use Continuous Operations mode Continuous Operations mode ensures file protection for Pervasive.SQL files during backup • 100% value their data as a top business asset This is good… • Customers are trying to protect their data …and it is bad! • Customers are not achieving the results they need What is Continuous Operations? A special file mode for backup • A data file is opened read-only • Updates are made to a delta file • When Continuous Operations mode ends, updates are moved from the delta file to the data file • This process is completely transparent to the user Pervasive.SQL V8 Controlled by Pervasive.SQL • BTRV 42 <file> • Butil –startbu <file> Class.mkd Class.^^^ Pervasive Backup Agent™ Intelligently manages continuous operations • Manages continuous operations for all database files All open files are processed en mass Newly opened files are opened in Continuous Operations mode Users don’t have to know the files or interact with ‘butil’ Complements all leading third-party backup packages, such as: • • • • • Veritas Backup Exec Computer Associates BrightStor ARCserve Backup Microsoft Windows Backup (ntbackup) Linux tar Others … Adding Backup Agent to a Backup Job Database Files During Backup Backup Agent automatically turned Continuous Operations on for the open files Architecture Elliott is unaware that Backup Agent is creating Delta Files Backup software is unaware of Delta Files and can only see Data Files Client Application Pervasive.SQL Captures open events during backup sessions and opens the files in Continuous Operations mode Pervasive Backup Agent Event Handler Delta Files Third-Party Backup Software Tape Backup Data Files Only clean and consistent data files are copied to tape Pricing and Distribution Requires Pervasive.SQL V8® server Licensed per server engine Envelope packaging • CD – All license and read-me onboard Price is only $249 Availability • Netcellent is now an OEM of this product • Contact our sales department to order today: (888) 595-3818 or [email protected] In summary • Protecting your database can be greatly improved by upgrading to PSQL Version 8.5 and adding AuditMaster. • The integrity of your database can be improved by using Backup Agent. • Support requests can be reduced and easier to respond to with the addition of these products. Questions?