Title: Pervasive PSQL 8.5
1- Pervasive PSQL 8.5 New Products
- By Mark DeShazo
- April 1, 2004 - Webinar
2Pervasive Security Model
3Current Btrieve Security Model
- Application issues a file open request
- Pervasive.SQL engine verifies with the OS that
the user login credentials has physical rights to
the file - If User has rights Access granted
- Else Access denied
Pervasive.SQL acts as a Client/Server proxy for
the user
4Current SQL Security Model
- Application logs onto a database
- Pervasive.SQL engine verifies with the user has
been defined as a valid user of the database - If User defined Access granted
- Rights are assigned based on a defined profile
Pervasive.SQL isolates the user from the
database. The engine controls
access
5Weaknesses in the Btrieve model
- Btrieve has no concept of a database, simply
files. - OS level rights are required for each user and
file - No central way to control security
- No programmatic way to control user access
Two different security models to a common data
store
6Pervasive.SQL V8 Security Feature PackSecurity
Release (V8.5)
- Release Features
- Enhanced encryption
- Unified security model
- Unified DB and OS access control
- Fully backwards compatible with existing
applications - Free upgrade for existing Pervasive.SQL V8 Users
7New Features and Improvements
- New security models for Btrieve applications
- Classic
- Mixed
- Database
- DefaultDB for securing Btrieve files
- Encrypted network communication
- Utilities support for new security models
- Create DB wizard
- Maintain Named Database dialog
- Updates to programming interfaces
- Login API
- URI (Uniform Resource Indicator) support for
create and open - Improved installation programs
8Demo
9Pricing and Distribution
- No change in pricing.
- Available as a separate CD in the box.
- Free for all Pervasive.SQL V8 users. Simply
request an upgrade from Netcellent. - Documentation on setting up the security features
is available upon request.
10- By Mark DeShazo
- April 1, 2004 - Webinar
11Security Model
12AuditMaster
- Know who did what, when, where and how to your
data
- Key Features
- Event handler records database events in log file
- Viewer for querying and analyzing the log file
- Alerts to proactively notify appropriate
personnel when predefined conditions occur - Works with your existing installation of Elliott
running Pervasive V8.X - No modifications are
required
13Audit Master Architecture
14Functionality
- Query
- Predefined and customizable queries
- Transaction rollback and point-in-time recovery
- Alerts
- Business rules
- Built-in email notification
- Can call user defined functions
- Capture
- SQL and Btrieve logging
- Nearly all database ops can be logged, including
failed operations - Before after images for updates allows detailed
change analysis - Log purging and archiving
- Multi-version metadata and DDF management
15Database Security
- Database security models reduce threats through
restricting access to data - If an unauthorized user cant access the data,
he/she cant compromise it - However, there will always be authorized users
doing unauthorized things - In casinos, dealers cheat more than gamblers
- People make honest mistakes
- Access control will never be enough
16Two primary use cases
- Improving customer support through detailed
activity logging. - Reducing fraud through proactive alerts and
forensic log analysis.
17Demonstration
18Pricing and Distribution
- Total solution for monitoring and logging
- Pervasive.SQL V8 server required
- Windows NT4/2000/2003 only
- Pricing
- Promotion Period, 10 Off (by May 31, 2004)
- Special OEM arrangement with Pervasive
Users Price
6 Users 495
10 Users 695
20 Users 1,295
50 Users 2,795
Unlimited 4,995
19Pervasive Backup Agent
- By Mark DeShazo
- March 19, 2004
20Why is Backup Difficult?
- A successful database backup must ensure file
integrity and database concurrency - Individual data files must be reliable and
restorable - The set of files must represent a valid database
state - This is difficult to accomplish
- Files may be open and changing
- Long duration backups may copy inconsistent files
- Backup is complicated for all databases
- Large sizes and continuous updates make database
backup and restore difficult
21What do Pervasive.SQL Users Do?
- A recent survey of Pervasive customers showed
- 88 perform regular backups
- 69 perform backups while the server is running
- 68 dont use Continuous Operations mode
- Continuous Operations mode ensures file
protection for Pervasive.SQL files during backup - 100 value their data as a top business asset
- This is good
- Customers are trying to protect their data
- and it is bad!
- Customers are not achieving the results they need
22What is Continuous Operations?
- A special file mode for backup
- A data file is opened read-only
- Updates are made to a delta file
- When Continuous Operations mode ends, updates are
moved from the delta file to the data file - This process is completely transparent to the
user - Controlled by Pervasive.SQL
- BTRV 42 ltfilegt
- Butil startbu ltfilegt
Pervasive.SQL V8
Class.
Class.mkd
23Pervasive Backup Agent
- Intelligently manages continuous operations
- Manages continuous operations for all database
files - All open files are processed en mass
- Newly opened files are opened in Continuous
Operations mode - Users dont have to know the files or interact
with butil - Complements all leading third-party backup
packages, such as - Veritas Backup Exec
- Computer Associates BrightStor ARCserve Backup
- Microsoft Windows Backup (ntbackup)
- Linux tar
- Others
24Adding Backup Agent to a Backup Job
25Database Files During Backup
Backup Agent automatically turned Continuous
Operations on for the open files
26Architecture
Elliott is unaware that Backup Agent is creating
Delta Files
Backup software is unaware of Delta Files and can
only see Data Files
Captures open events during backup sessions and
opens the files in Continuous Operations mode
Only clean and consistent data files are copied
to tape
27Pricing and Distribution
- Requires Pervasive.SQL V8 server
- Licensed per server engine
- Envelope packaging
- CD All license and read-me onboard
- Price is only 249
- Availability
- Netcellent is now an OEM of this product
- Contact our sales department to order today
(888) 595-3818 or sales_at_netcellent.com
28In summary
- Protecting your database can be greatly improved
by upgrading to PSQL Version 8.5 and adding
AuditMaster. - The integrity of your database can be improved by
using Backup Agent. - Support requests can be reduced and easier to
respond to with the addition of these products.
29Questions?