Presentation is loading. Please wait.

Presentation is loading. Please wait.

Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar.

Similar presentations


Presentation on theme: "Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar."— Presentation transcript:

1 Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

2 Pervasive Security Model

3 Current Btrieve Security Model Application issues a file open request Application issues a file open request Pervasive.SQL engine verifies with the OS that the user login credentials has physical rights to the file Pervasive.SQL engine verifies with the OS that the user login credentials has physical rights to the file If User has rights – Access granted If User has rights – Access granted Else – Access denied Else – Access denied Pervasive.SQL acts as a Client/Server proxy for the user

4 Current SQL Security Model Application logs onto a database Application logs onto a database Pervasive.SQL engine verifies with the user has been defined as a valid user of the database Pervasive.SQL engine verifies with the user has been defined as a valid user of the database If User defined – Access granted If User defined – Access granted Rights are assigned based on a defined profileRights are assigned based on a defined profile Pervasive.SQL isolates the user from the database. The engine controls access The engine controls access

5 Weaknesses in the Btrieve model Btrieve has no concept of a database, simply files. Btrieve has no concept of a database, simply files. OS level rights are required for each user and file OS level rights are required for each user and file No central way to control security No central way to control security No programmatic way to control user access No programmatic way to control user access Two different security models to a common data store

6 Pervasive.SQL V8 Security Feature Pack Security Release (V8.5) Release Features: Enhanced encryption Unified security model Unified DB and OS access control Fully backwards compatible with existing applications Free upgrade for existing Pervasive.SQL V8 Users

7 New Features and Improvements New security models for Btrieve applications New security models for Btrieve applications ClassicClassic MixedMixed DatabaseDatabase DefaultDB for securing Btrieve files DefaultDB for securing Btrieve files Encrypted network communication Encrypted network communication Utilities support for new security models Utilities support for new security models Create DB wizardCreate DB wizard Maintain Named Database dialogMaintain Named Database dialog Updates to programming interfaces Updates to programming interfaces Login APILogin API URI (Uniform Resource Indicator) support for create and openURI (Uniform Resource Indicator) support for create and open Improved installation programs Improved installation programs

8 Demo

9 Pricing and Distribution No change in pricing. No change in pricing. Available as a separate CD in the box. Available as a separate CD in the box. Free for all Pervasive.SQL V8 users. Simply request an upgrade from Netcellent. Free for all Pervasive.SQL V8 users. Simply request an upgrade from Netcellent. Documentation on setting up the security features is available upon request. Documentation on setting up the security features is available upon request.

10 By Mark DeShazo April 1, 2004 - Webinar

11 Security Model

12 AuditMaster Know who did what, when, where and how to your data Key Features: Event handler records database events in log file Viewer for querying and analyzing the log file Alerts to proactively notify appropriate personnel when predefined conditions occur Works with your existing installation of Elliott running Pervasive V8.X - No modifications are required

13 Audit Master Architecture

14 Functionality Capture Capture SQL and Btrieve loggingSQL and Btrieve logging Nearly all database ops can be logged, including failed operationsNearly all database ops can be logged, including failed operations Before & after images for updates allows detailed change analysisBefore & after images for updates allows detailed change analysis Log purging and archivingLog purging and archiving Multi-version metadata and DDF managementMulti-version metadata and DDF management Query Query Predefined and customizable queriesPredefined and customizable queries Transaction rollback and point-in-time recoveryTransaction rollback and point-in-time recovery Alerts Alerts Business rulesBusiness rules Built-in email notificationBuilt-in email notification Can call user defined functionsCan call user defined functions

15 Database Security Database security models reduce threats through restricting access to data Database security models reduce threats through restricting access to data If an unauthorized user can’t access the data, he/she can’t compromise itIf an unauthorized user can’t access the data, he/she can’t compromise it However, there will always be authorized users doing unauthorized things However, there will always be authorized users doing unauthorized things In casinos, dealers cheat more than gamblersIn casinos, dealers cheat more than gamblers People make honest mistakesPeople make honest mistakes Access control will never be enoughAccess control will never be enough

16 Two primary use cases Improving customer support through detailed activity logging.Improving customer support through detailed activity logging. Reducing fraud through proactive alerts and forensic log analysis.Reducing fraud through proactive alerts and forensic log analysis.

17 Demonstration

18 Pricing and Distribution Total solution for monitoring and logging Total solution for monitoring and logging Pervasive.SQL V8 server requiredPervasive.SQL V8 server required Windows NT4/2000/2003 onlyWindows NT4/2000/2003 only PricingPricing Promotion Period, 10% Off (by May 31, 2004 ) Promotion Period, 10% Off (by May 31, 2004 ) Special OEM arrangement with PervasiveSpecial OEM arrangement with Pervasive UsersPrice 6 Users $495 10 Users $695 20 Users $1,295 50 Users $2,795 Unlimited$4,995

19 By Mark DeShazo March 19, 2004 Pervasive Backup Agent

20 Why is Backup Difficult? A successful database backup must ensure file integrity and database concurrency A successful database backup must ensure file integrity and database concurrency Individual data files must be reliable and restorableIndividual data files must be reliable and restorable The set of files must represent a valid database stateThe set of files must represent a valid database state This is difficult to accomplish This is difficult to accomplish Files may be open and changingFiles may be open and changing Long duration backups may copy inconsistent filesLong duration backups may copy inconsistent files Backup is complicated for all databases Backup is complicated for all databases Large sizes and continuous updates make database backup and restore difficultLarge sizes and continuous updates make database backup and restore difficult

21 What do Pervasive.SQL Users Do? A recent survey of Pervasive ® customers showed A recent survey of Pervasive ® customers showed 88% perform regular backups88% perform regular backups 69% perform backups while the server is running69% perform backups while the server is running 68% don’t use Continuous Operations mode68% don’t use Continuous Operations mode Continuous Operations mode ensures file protection for Pervasive.SQL files during backup Continuous Operations mode ensures file protection for Pervasive.SQL files during backup 100% value their data as a top business asset100% value their data as a top business asset This is good… This is good… Customers are trying to protect their dataCustomers are trying to protect their data …and it is bad! …and it is bad! Customers are not achieving the results they needCustomers are not achieving the results they need

22 What is Continuous Operations? A special file mode for backup A special file mode for backup A data file is opened read-onlyA data file is opened read-only Updates are made to a delta fileUpdates are made to a delta file When Continuous Operations mode ends, updates are moved from the delta file to the data fileWhen Continuous Operations mode ends, updates are moved from the delta file to the data file This process is completely transparent to the userThis process is completely transparent to the user Controlled by Pervasive.SQL Controlled by Pervasive.SQL BTRV 42 BTRV 42 Butil –startbu Butil –startbu Class.^^^Class.mkd Pervasive.SQL V8

23 Pervasive Backup Agent™ Intelligently manages continuous operations Intelligently manages continuous operations Manages continuous operations for all database filesManages continuous operations for all database files All open files are processed en mass All open files are processed en mass Newly opened files are opened in Continuous Operations mode Newly opened files are opened in Continuous Operations mode Users don’t have to know the files or interact with ‘ butil’ Users don’t have to know the files or interact with ‘ butil’ Complements all leading third-party backup packages, such as: Complements all leading third-party backup packages, such as: Veritas Backup ExecVeritas Backup Exec Computer Associates BrightStor ARCserve BackupComputer Associates BrightStor ARCserve Backup Microsoft Windows Backup (ntbackup)Microsoft Windows Backup (ntbackup) Linux tarLinux tar Others …Others …

24 Adding Backup Agent to a Backup Job

25 Database Files During Backup Backup Agent automatically turned Continuous Operations on for the open files

26 Architecture Pervasive Backup Agent Pervasive.SQL Client Application Third-Party Backup Software Tape Backup Event Handler Delta FilesData Files Captures open events during backup sessions and opens the files in Continuous Operations mode Only clean and consistent data files are copied to tape Elliott is unaware that Backup Agent is creating Delta Files Backup software is unaware of Delta Files and can only see Data Files

27 Pricing and Distribution Requires Pervasive.SQL V8 ® server Requires Pervasive.SQL V8 ® server Licensed per server engine Licensed per server engine Envelope packaging Envelope packaging CD – All license and read-me onboardCD – All license and read-me onboard Price is only $249 Price is only $249 Availability Availability Netcellent is now an OEM of this productNetcellent is now an OEM of this product Contact our sales department to order today: (888) 595-3818 or sales@netcellent.comContact our sales department to order today: (888) 595-3818 or sales@netcellent.com

28 In summary Protecting your database can be greatly improved by upgrading to PSQL Version 8.5 and adding AuditMaster.Protecting your database can be greatly improved by upgrading to PSQL Version 8.5 and adding AuditMaster. The integrity of your database can be improved by using Backup Agent.The integrity of your database can be improved by using Backup Agent. Support requests can be reduced and easier to respond to with the addition of these products.Support requests can be reduced and easier to respond to with the addition of these products.

29 Questions?


Download ppt "Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar."

Similar presentations


Ads by Google