pervasive psql 8.5 & new products by mark deshazo april 1, 2004 - webinar

29
Pervasive PSQL 8.5 & New Pervasive PSQL 8.5 & New Products Products By Mark DeShazo By Mark DeShazo April 1, 2004 - Webinar April 1, 2004 - Webinar

Upload: roger-randall

Post on 01-Jan-2016

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Pervasive PSQL 8.5 & New ProductsPervasive PSQL 8.5 & New ProductsBy Mark DeShazoBy Mark DeShazo

April 1, 2004 - WebinarApril 1, 2004 - Webinar

Page 2: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Pervasive Security ModelPervasive Security Model

Page 3: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Current Btrieve Security ModelCurrent Btrieve Security Model

Application issues a file Application issues a file openopen request request Pervasive.SQL engine verifies with Pervasive.SQL engine verifies with

the OS that the user login credentials the OS that the user login credentials has physical rights to the filehas physical rights to the file

If User has rights – Access grantedIf User has rights – Access granted Else – Access deniedElse – Access denied

Pervasive.SQL acts as a Client/Server proxy for the userPervasive.SQL acts as a Client/Server proxy for the user

Page 4: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Current SQL Security ModelCurrent SQL Security Model

Application logs onto a databaseApplication logs onto a database Pervasive.SQL engine verifies with Pervasive.SQL engine verifies with

the user has been defined as a valid the user has been defined as a valid user of the databaseuser of the database

If User defined – Access grantedIf User defined – Access granted• Rights are assigned based on a defined Rights are assigned based on a defined

profileprofile

Pervasive.SQL isolates the user from the database.Pervasive.SQL isolates the user from the database.

The engine controls accessThe engine controls access

Page 5: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Weaknesses in the Btrieve modelWeaknesses in the Btrieve model

Btrieve has no concept of a Btrieve has no concept of a databasedatabase, simply files., simply files.

OS level rights are required for each OS level rights are required for each user and fileuser and file

No central way to control securityNo central way to control security No programmatic way to control user No programmatic way to control user

accessaccess

Two different security models to a common data storeTwo different security models to a common data store

Page 6: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Pervasive.SQL Pervasive.SQL V8 Security Feature PackV8 Security Feature PackSecurity Release (V8.5)Security Release (V8.5)

Release Features: Enhanced encryption Unified security model Unified DB and OS access

control Fully backwards compatible

with existing applications Free upgrade for existing

Pervasive.SQL V8 Users

Page 7: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

New Features and ImprovementsNew Features and Improvements

New security models for Btrieve applicationsNew security models for Btrieve applications• ClassicClassic• MixedMixed• DatabaseDatabase

DefaultDB for securing Btrieve filesDefaultDB for securing Btrieve files Encrypted network communicationEncrypted network communication Utilities support for new security modelsUtilities support for new security models

• Create DB wizardCreate DB wizard• Maintain Named Database dialogMaintain Named Database dialog

Updates to programming interfacesUpdates to programming interfaces• Login APILogin API• URI (Uniform Resource Indicator) support for create and openURI (Uniform Resource Indicator) support for create and open

Improved installation programsImproved installation programs

Page 8: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

DemoDemo

Page 9: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Pricing and DistributionPricing and Distribution

No change in pricing.No change in pricing. Available as a separate CD in the box.Available as a separate CD in the box. Free for all Pervasive.SQL V8 users. Free for all Pervasive.SQL V8 users.

Simply request an upgrade from Simply request an upgrade from Netcellent.Netcellent.

Documentation on setting up the security Documentation on setting up the security features is available upon request.features is available upon request.

Page 10: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

By Mark DeShazoBy Mark DeShazoApril 1, 2004 - WebinarApril 1, 2004 - Webinar

Page 11: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Security ModelSecurity Model

Page 12: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

AuditMasterAuditMasterKnow who did what, when, where and how to your data

Key Features:

•Event handler records database events in log file

•Viewer for querying and analyzing the log file

•Alerts to proactively notify appropriate personnel when predefined conditions occur

•Works with your existing installation of Elliott running Pervasive V8.X - No modifications are required

Page 13: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Audit Master Architecture

Page 14: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

FunctionalityFunctionality CaptureCapture

• SQL and Btrieve loggingSQL and Btrieve logging• Nearly all database ops Nearly all database ops

can be logged, including can be logged, including failed operationsfailed operations

• Before & after images Before & after images for updates allows for updates allows detailed change analysisdetailed change analysis

• Log purging and Log purging and archivingarchiving

• Multi-version metadata Multi-version metadata and DDF managementand DDF management

QueryQuery• Predefined and Predefined and

customizable queriescustomizable queries• Transaction rollback Transaction rollback

and point-in-time and point-in-time recoveryrecovery

AlertsAlerts• Business rulesBusiness rules• Built-in email Built-in email

notificationnotification• Can call user defined Can call user defined

functionsfunctions

Page 15: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Database SecurityDatabase Security

Database security models reduce threats Database security models reduce threats through restricting access to datathrough restricting access to data• If an unauthorized user can’t access the data, If an unauthorized user can’t access the data,

he/she can’t compromise ithe/she can’t compromise it However, there will always be However, there will always be authorized authorized

users doing unauthorized thingsusers doing unauthorized things• In casinos, dealers cheat more than gamblersIn casinos, dealers cheat more than gamblers• People make honest mistakesPeople make honest mistakes• Access control will never be enoughAccess control will never be enough

Page 16: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Two primary use casesTwo primary use cases

• Improving customer support through Improving customer support through detailed activity logging.detailed activity logging.

• Reducing fraud through proactive alerts Reducing fraud through proactive alerts and forensic log analysis.and forensic log analysis.

Page 17: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

DemonstrationDemonstration

Page 18: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Pricing and DistributionPricing and Distribution

Total solution for monitoring Total solution for monitoring and loggingand logging• Pervasive.SQL V8 server Pervasive.SQL V8 server

requiredrequired• Windows NT4/2000/2003 onlyWindows NT4/2000/2003 only• PricingPricing

Promotion Period, 10% Off (by May Promotion Period, 10% Off (by May 31, 200431, 2004))

• Special OEM arrangement with Special OEM arrangement with PervasivePervasive

UsersUsers PricePrice

6 Users6 Users $495$495

10 Users10 Users $695$695

20 Users20 Users $1,295$1,295

50 Users50 Users $2,795$2,795

UnlimitedUnlimited $4,995$4,995

Page 19: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

By Mark DeShazoBy Mark DeShazo

March 19, 2004March 19, 2004

Pervasive Backup AgentPervasive Backup Agent

Page 20: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Why is Backup Difficult?Why is Backup Difficult? A successful database backup must ensure file A successful database backup must ensure file

integrity and database concurrencyintegrity and database concurrency• Individual data files must be reliable and restorableIndividual data files must be reliable and restorable• The set of files must represent a valid database stateThe set of files must represent a valid database state

This is difficult to accomplishThis is difficult to accomplish• Files may be open and changingFiles may be open and changing• Long duration backups may copy inconsistent filesLong duration backups may copy inconsistent files

Backup is complicated for Backup is complicated for allall databases databases • Large sizes and continuous updates make database Large sizes and continuous updates make database

backup and restore difficultbackup and restore difficult

Page 21: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

What do Pervasive.SQL Users Do?What do Pervasive.SQL Users Do?

A recent survey of PervasiveA recent survey of Pervasive®® customers showed customers showed• 88% perform regular backups88% perform regular backups• 69% perform backups while the server is running69% perform backups while the server is running• 68% don’t use Continuous Operations mode68% don’t use Continuous Operations mode

Continuous Operations mode ensures file protection for Continuous Operations mode ensures file protection for Pervasive.SQL files during backupPervasive.SQL files during backup

• 100% value their data as a top business asset100% value their data as a top business asset

This is good…This is good…• Customers are trying to protect their dataCustomers are trying to protect their data

……and it is bad!and it is bad!• Customers are not achieving the results they needCustomers are not achieving the results they need

Page 22: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

What is Continuous Operations?What is Continuous Operations?

A special file mode for backupA special file mode for backup• A data file is opened read-onlyA data file is opened read-only• Updates are made to a delta fileUpdates are made to a delta file• When Continuous Operations When Continuous Operations

mode ends, updates are moved mode ends, updates are moved from the delta file to the data filefrom the delta file to the data file

• This process is completely This process is completely transparent to the usertransparent to the user

Controlled by Pervasive.SQLControlled by Pervasive.SQL• BTRV 42 <file>BTRV 42 <file>• Butil –startbu <file>Butil –startbu <file> Class.^^^Class.mkd

Pervasive.SQL V8

Page 23: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Pervasive Backup Agent™Pervasive Backup Agent™

Intelligently manages continuous operationsIntelligently manages continuous operations• Manages continuous operations for all database filesManages continuous operations for all database files

All open files are processed en massAll open files are processed en mass Newly opened files are opened in Continuous Operations Newly opened files are opened in Continuous Operations

modemode Users don’t have to know the files or interact with ‘Users don’t have to know the files or interact with ‘butil’butil’

Complements all leading third-party backup Complements all leading third-party backup packages, such as:packages, such as:• Veritas Backup ExecVeritas Backup Exec• Computer Associates BrightStor ARCserve BackupComputer Associates BrightStor ARCserve Backup• Microsoft Windows Backup (ntbackup)Microsoft Windows Backup (ntbackup)• Linux tarLinux tar• Others …Others …

Page 24: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Adding Backup Agent to a Backup JobAdding Backup Agent to a Backup Job

Page 25: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Database Files During BackupDatabase Files During Backup

Backup Agent automatically turned

Continuous Operations on for the open files

Page 26: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

ArchitectureArchitecture

Pervasive Backup Agent

Pervasive.SQL

Client Application

Third-Party Backup Software

Tape Backup

Event Handler

Delta Files Data Files

Captures open events during

backup sessions and opens the files

in Continuous Operations mode

Only clean and consistent data files are copied to tape

Elliott is unaware that Backup Agent is

creating Delta Files

Backup software is unaware of Delta Files and can only

see Data Files

Page 27: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Pricing and DistributionPricing and Distribution

Requires Pervasive.SQL V8Requires Pervasive.SQL V8®® server server Licensed per server engineLicensed per server engine Envelope packagingEnvelope packaging

• CD – All license and read-me onboardCD – All license and read-me onboard Price is only $249Price is only $249 AvailabilityAvailability

• Netcellent is now an OEM of this productNetcellent is now an OEM of this product• Contact our sales department to order today: Contact our sales department to order today:

(888) 595-3818 or [email protected](888) 595-3818 or [email protected]

Page 28: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

In summaryIn summary

• Protecting your database can be greatly Protecting your database can be greatly improved by upgrading to PSQL Version improved by upgrading to PSQL Version 8.5 and adding AuditMaster.8.5 and adding AuditMaster.

• The integrity of your database can be The integrity of your database can be improved by using Backup Agent.improved by using Backup Agent.

• Support requests can be reduced and Support requests can be reduced and easier to respond to with the addition of easier to respond to with the addition of these products.these products.

Page 29: Pervasive PSQL 8.5 & New Products By Mark DeShazo April 1, 2004 - Webinar

Questions?Questions?