pervasive psql 8.5 & new products by mark deshazo april 1, 2004 - webinar
TRANSCRIPT
Pervasive PSQL 8.5 & New ProductsPervasive PSQL 8.5 & New ProductsBy Mark DeShazoBy Mark DeShazo
April 1, 2004 - WebinarApril 1, 2004 - Webinar
Pervasive Security ModelPervasive Security Model
Current Btrieve Security ModelCurrent Btrieve Security Model
Application issues a file Application issues a file openopen request request Pervasive.SQL engine verifies with Pervasive.SQL engine verifies with
the OS that the user login credentials the OS that the user login credentials has physical rights to the filehas physical rights to the file
If User has rights – Access grantedIf User has rights – Access granted Else – Access deniedElse – Access denied
Pervasive.SQL acts as a Client/Server proxy for the userPervasive.SQL acts as a Client/Server proxy for the user
Current SQL Security ModelCurrent SQL Security Model
Application logs onto a databaseApplication logs onto a database Pervasive.SQL engine verifies with Pervasive.SQL engine verifies with
the user has been defined as a valid the user has been defined as a valid user of the databaseuser of the database
If User defined – Access grantedIf User defined – Access granted• Rights are assigned based on a defined Rights are assigned based on a defined
profileprofile
Pervasive.SQL isolates the user from the database.Pervasive.SQL isolates the user from the database.
The engine controls accessThe engine controls access
Weaknesses in the Btrieve modelWeaknesses in the Btrieve model
Btrieve has no concept of a Btrieve has no concept of a databasedatabase, simply files., simply files.
OS level rights are required for each OS level rights are required for each user and fileuser and file
No central way to control securityNo central way to control security No programmatic way to control user No programmatic way to control user
accessaccess
Two different security models to a common data storeTwo different security models to a common data store
Pervasive.SQL Pervasive.SQL V8 Security Feature PackV8 Security Feature PackSecurity Release (V8.5)Security Release (V8.5)
Release Features: Enhanced encryption Unified security model Unified DB and OS access
control Fully backwards compatible
with existing applications Free upgrade for existing
Pervasive.SQL V8 Users
New Features and ImprovementsNew Features and Improvements
New security models for Btrieve applicationsNew security models for Btrieve applications• ClassicClassic• MixedMixed• DatabaseDatabase
DefaultDB for securing Btrieve filesDefaultDB for securing Btrieve files Encrypted network communicationEncrypted network communication Utilities support for new security modelsUtilities support for new security models
• Create DB wizardCreate DB wizard• Maintain Named Database dialogMaintain Named Database dialog
Updates to programming interfacesUpdates to programming interfaces• Login APILogin API• URI (Uniform Resource Indicator) support for create and openURI (Uniform Resource Indicator) support for create and open
Improved installation programsImproved installation programs
DemoDemo
Pricing and DistributionPricing and Distribution
No change in pricing.No change in pricing. Available as a separate CD in the box.Available as a separate CD in the box. Free for all Pervasive.SQL V8 users. Free for all Pervasive.SQL V8 users.
Simply request an upgrade from Simply request an upgrade from Netcellent.Netcellent.
Documentation on setting up the security Documentation on setting up the security features is available upon request.features is available upon request.
By Mark DeShazoBy Mark DeShazoApril 1, 2004 - WebinarApril 1, 2004 - Webinar
Security ModelSecurity Model
AuditMasterAuditMasterKnow who did what, when, where and how to your data
Key Features:
•Event handler records database events in log file
•Viewer for querying and analyzing the log file
•Alerts to proactively notify appropriate personnel when predefined conditions occur
•Works with your existing installation of Elliott running Pervasive V8.X - No modifications are required
Audit Master Architecture
FunctionalityFunctionality CaptureCapture
• SQL and Btrieve loggingSQL and Btrieve logging• Nearly all database ops Nearly all database ops
can be logged, including can be logged, including failed operationsfailed operations
• Before & after images Before & after images for updates allows for updates allows detailed change analysisdetailed change analysis
• Log purging and Log purging and archivingarchiving
• Multi-version metadata Multi-version metadata and DDF managementand DDF management
QueryQuery• Predefined and Predefined and
customizable queriescustomizable queries• Transaction rollback Transaction rollback
and point-in-time and point-in-time recoveryrecovery
AlertsAlerts• Business rulesBusiness rules• Built-in email Built-in email
notificationnotification• Can call user defined Can call user defined
functionsfunctions
Database SecurityDatabase Security
Database security models reduce threats Database security models reduce threats through restricting access to datathrough restricting access to data• If an unauthorized user can’t access the data, If an unauthorized user can’t access the data,
he/she can’t compromise ithe/she can’t compromise it However, there will always be However, there will always be authorized authorized
users doing unauthorized thingsusers doing unauthorized things• In casinos, dealers cheat more than gamblersIn casinos, dealers cheat more than gamblers• People make honest mistakesPeople make honest mistakes• Access control will never be enoughAccess control will never be enough
Two primary use casesTwo primary use cases
• Improving customer support through Improving customer support through detailed activity logging.detailed activity logging.
• Reducing fraud through proactive alerts Reducing fraud through proactive alerts and forensic log analysis.and forensic log analysis.
DemonstrationDemonstration
Pricing and DistributionPricing and Distribution
Total solution for monitoring Total solution for monitoring and loggingand logging• Pervasive.SQL V8 server Pervasive.SQL V8 server
requiredrequired• Windows NT4/2000/2003 onlyWindows NT4/2000/2003 only• PricingPricing
Promotion Period, 10% Off (by May Promotion Period, 10% Off (by May 31, 200431, 2004))
• Special OEM arrangement with Special OEM arrangement with PervasivePervasive
UsersUsers PricePrice
6 Users6 Users $495$495
10 Users10 Users $695$695
20 Users20 Users $1,295$1,295
50 Users50 Users $2,795$2,795
UnlimitedUnlimited $4,995$4,995
By Mark DeShazoBy Mark DeShazo
March 19, 2004March 19, 2004
Pervasive Backup AgentPervasive Backup Agent
Why is Backup Difficult?Why is Backup Difficult? A successful database backup must ensure file A successful database backup must ensure file
integrity and database concurrencyintegrity and database concurrency• Individual data files must be reliable and restorableIndividual data files must be reliable and restorable• The set of files must represent a valid database stateThe set of files must represent a valid database state
This is difficult to accomplishThis is difficult to accomplish• Files may be open and changingFiles may be open and changing• Long duration backups may copy inconsistent filesLong duration backups may copy inconsistent files
Backup is complicated for Backup is complicated for allall databases databases • Large sizes and continuous updates make database Large sizes and continuous updates make database
backup and restore difficultbackup and restore difficult
What do Pervasive.SQL Users Do?What do Pervasive.SQL Users Do?
A recent survey of PervasiveA recent survey of Pervasive®® customers showed customers showed• 88% perform regular backups88% perform regular backups• 69% perform backups while the server is running69% perform backups while the server is running• 68% don’t use Continuous Operations mode68% don’t use Continuous Operations mode
Continuous Operations mode ensures file protection for Continuous Operations mode ensures file protection for Pervasive.SQL files during backupPervasive.SQL files during backup
• 100% value their data as a top business asset100% value their data as a top business asset
This is good…This is good…• Customers are trying to protect their dataCustomers are trying to protect their data
……and it is bad!and it is bad!• Customers are not achieving the results they needCustomers are not achieving the results they need
What is Continuous Operations?What is Continuous Operations?
A special file mode for backupA special file mode for backup• A data file is opened read-onlyA data file is opened read-only• Updates are made to a delta fileUpdates are made to a delta file• When Continuous Operations When Continuous Operations
mode ends, updates are moved mode ends, updates are moved from the delta file to the data filefrom the delta file to the data file
• This process is completely This process is completely transparent to the usertransparent to the user
Controlled by Pervasive.SQLControlled by Pervasive.SQL• BTRV 42 <file>BTRV 42 <file>• Butil –startbu <file>Butil –startbu <file> Class.^^^Class.mkd
Pervasive.SQL V8
Pervasive Backup Agent™Pervasive Backup Agent™
Intelligently manages continuous operationsIntelligently manages continuous operations• Manages continuous operations for all database filesManages continuous operations for all database files
All open files are processed en massAll open files are processed en mass Newly opened files are opened in Continuous Operations Newly opened files are opened in Continuous Operations
modemode Users don’t have to know the files or interact with ‘Users don’t have to know the files or interact with ‘butil’butil’
Complements all leading third-party backup Complements all leading third-party backup packages, such as:packages, such as:• Veritas Backup ExecVeritas Backup Exec• Computer Associates BrightStor ARCserve BackupComputer Associates BrightStor ARCserve Backup• Microsoft Windows Backup (ntbackup)Microsoft Windows Backup (ntbackup)• Linux tarLinux tar• Others …Others …
Adding Backup Agent to a Backup JobAdding Backup Agent to a Backup Job
Database Files During BackupDatabase Files During Backup
Backup Agent automatically turned
Continuous Operations on for the open files
ArchitectureArchitecture
Pervasive Backup Agent
Pervasive.SQL
Client Application
Third-Party Backup Software
Tape Backup
Event Handler
Delta Files Data Files
Captures open events during
backup sessions and opens the files
in Continuous Operations mode
Only clean and consistent data files are copied to tape
Elliott is unaware that Backup Agent is
creating Delta Files
Backup software is unaware of Delta Files and can only
see Data Files
Pricing and DistributionPricing and Distribution
Requires Pervasive.SQL V8Requires Pervasive.SQL V8®® server server Licensed per server engineLicensed per server engine Envelope packagingEnvelope packaging
• CD – All license and read-me onboardCD – All license and read-me onboard Price is only $249Price is only $249 AvailabilityAvailability
• Netcellent is now an OEM of this productNetcellent is now an OEM of this product• Contact our sales department to order today: Contact our sales department to order today:
(888) 595-3818 or [email protected](888) 595-3818 or [email protected]
In summaryIn summary
• Protecting your database can be greatly Protecting your database can be greatly improved by upgrading to PSQL Version improved by upgrading to PSQL Version 8.5 and adding AuditMaster.8.5 and adding AuditMaster.
• The integrity of your database can be The integrity of your database can be improved by using Backup Agent.improved by using Backup Agent.
• Support requests can be reduced and Support requests can be reduced and easier to respond to with the addition of easier to respond to with the addition of these products.these products.
Questions?Questions?