Pervasive PSQL 8.5 - PowerPoint PPT Presentation

About This Presentation
Title:

Pervasive PSQL 8.5

Description:

Application logs onto a database ... Create DB wizard. Maintain Named Database dialog. Updates to programming interfaces ... Nearly all database ops can be ... – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 30
Provided by: markde59
Category:

less

Transcript and Presenter's Notes

Title: Pervasive PSQL 8.5


1
  • Pervasive PSQL 8.5 New Products
  • By Mark DeShazo
  • April 1, 2004 - Webinar

2
Pervasive Security Model
3
Current Btrieve Security Model
  • Application issues a file open request
  • Pervasive.SQL engine verifies with the OS that
    the user login credentials has physical rights to
    the file
  • If User has rights Access granted
  • Else Access denied

Pervasive.SQL acts as a Client/Server proxy for
the user
4
Current SQL Security Model
  • Application logs onto a database
  • Pervasive.SQL engine verifies with the user has
    been defined as a valid user of the database
  • If User defined Access granted
  • Rights are assigned based on a defined profile

Pervasive.SQL isolates the user from the
database. The engine controls
access
5
Weaknesses in the Btrieve model
  • Btrieve has no concept of a database, simply
    files.
  • OS level rights are required for each user and
    file
  • No central way to control security
  • No programmatic way to control user access

Two different security models to a common data
store
6
Pervasive.SQL V8 Security Feature PackSecurity
Release (V8.5)
  • Release Features
  • Enhanced encryption
  • Unified security model
  • Unified DB and OS access control
  • Fully backwards compatible with existing
    applications
  • Free upgrade for existing Pervasive.SQL V8 Users

7
New Features and Improvements
  • New security models for Btrieve applications
  • Classic
  • Mixed
  • Database
  • DefaultDB for securing Btrieve files
  • Encrypted network communication
  • Utilities support for new security models
  • Create DB wizard
  • Maintain Named Database dialog
  • Updates to programming interfaces
  • Login API
  • URI (Uniform Resource Indicator) support for
    create and open
  • Improved installation programs

8
Demo
9
Pricing and Distribution
  • No change in pricing.
  • Available as a separate CD in the box.
  • Free for all Pervasive.SQL V8 users. Simply
    request an upgrade from Netcellent.
  • Documentation on setting up the security features
    is available upon request.

10
  • By Mark DeShazo
  • April 1, 2004 - Webinar

11
Security Model
12
AuditMaster
  • Know who did what, when, where and how to your
    data
  • Key Features
  • Event handler records database events in log file
  • Viewer for querying and analyzing the log file
  • Alerts to proactively notify appropriate
    personnel when predefined conditions occur
  • Works with your existing installation of Elliott
    running Pervasive V8.X - No modifications are
    required

13
Audit Master Architecture
14
Functionality
  • Query
  • Predefined and customizable queries
  • Transaction rollback and point-in-time recovery
  • Alerts
  • Business rules
  • Built-in email notification
  • Can call user defined functions
  • Capture
  • SQL and Btrieve logging
  • Nearly all database ops can be logged, including
    failed operations
  • Before after images for updates allows detailed
    change analysis
  • Log purging and archiving
  • Multi-version metadata and DDF management

15
Database Security
  • Database security models reduce threats through
    restricting access to data
  • If an unauthorized user cant access the data,
    he/she cant compromise it
  • However, there will always be authorized users
    doing unauthorized things
  • In casinos, dealers cheat more than gamblers
  • People make honest mistakes
  • Access control will never be enough

16
Two primary use cases
  • Improving customer support through detailed
    activity logging.
  • Reducing fraud through proactive alerts and
    forensic log analysis.

17
Demonstration
18
Pricing and Distribution
  • Total solution for monitoring and logging
  • Pervasive.SQL V8 server required
  • Windows NT4/2000/2003 only
  • Pricing
  • Promotion Period, 10 Off (by May 31, 2004)
  • Special OEM arrangement with Pervasive

Users Price
6 Users 495
10 Users 695
20 Users 1,295
50 Users 2,795
Unlimited 4,995
19
Pervasive Backup Agent
  • By Mark DeShazo
  • March 19, 2004

20
Why is Backup Difficult?
  • A successful database backup must ensure file
    integrity and database concurrency
  • Individual data files must be reliable and
    restorable
  • The set of files must represent a valid database
    state
  • This is difficult to accomplish
  • Files may be open and changing
  • Long duration backups may copy inconsistent files
  • Backup is complicated for all databases
  • Large sizes and continuous updates make database
    backup and restore difficult

21
What do Pervasive.SQL Users Do?
  • A recent survey of Pervasive customers showed
  • 88 perform regular backups
  • 69 perform backups while the server is running
  • 68 dont use Continuous Operations mode
  • Continuous Operations mode ensures file
    protection for Pervasive.SQL files during backup
  • 100 value their data as a top business asset
  • This is good
  • Customers are trying to protect their data
  • and it is bad!
  • Customers are not achieving the results they need

22
What is Continuous Operations?
  • A special file mode for backup
  • A data file is opened read-only
  • Updates are made to a delta file
  • When Continuous Operations mode ends, updates are
    moved from the delta file to the data file
  • This process is completely transparent to the
    user
  • Controlled by Pervasive.SQL
  • BTRV 42 ltfilegt
  • Butil startbu ltfilegt

Pervasive.SQL V8
Class.
Class.mkd
23
Pervasive Backup Agent
  • Intelligently manages continuous operations
  • Manages continuous operations for all database
    files
  • All open files are processed en mass
  • Newly opened files are opened in Continuous
    Operations mode
  • Users dont have to know the files or interact
    with butil
  • Complements all leading third-party backup
    packages, such as
  • Veritas Backup Exec
  • Computer Associates BrightStor ARCserve Backup
  • Microsoft Windows Backup (ntbackup)
  • Linux tar
  • Others

24
Adding Backup Agent to a Backup Job
25
Database Files During Backup
Backup Agent automatically turned Continuous
Operations on for the open files
26
Architecture
Elliott is unaware that Backup Agent is creating
Delta Files
Backup software is unaware of Delta Files and can
only see Data Files
Captures open events during backup sessions and
opens the files in Continuous Operations mode
Only clean and consistent data files are copied
to tape
27
Pricing and Distribution
  • Requires Pervasive.SQL V8 server
  • Licensed per server engine
  • Envelope packaging
  • CD All license and read-me onboard
  • Price is only 249
  • Availability
  • Netcellent is now an OEM of this product
  • Contact our sales department to order today
    (888) 595-3818 or sales_at_netcellent.com

28
In summary
  • Protecting your database can be greatly improved
    by upgrading to PSQL Version 8.5 and adding
    AuditMaster.
  • The integrity of your database can be improved by
    using Backup Agent.
  • Support requests can be reduced and easier to
    respond to with the addition of these products.

29
Questions?
Write a Comment
User Comments (0)
About PowerShow.com