Transcript Slide 1
Pervasive PSQL 8.5 & New Products
By Mark DeShazo
April 1, 2004 - Webinar
Pervasive Security Model
Current Btrieve Security Model
Application issues a file open request
Pervasive.SQL engine verifies with
the OS that the user login credentials
has physical rights to the file
If User has rights – Access granted
Else – Access denied
Pervasive.SQL acts as a Client/Server proxy for the user
Current SQL Security Model
Application logs onto a database
Pervasive.SQL engine verifies with
the user has been defined as a valid
user of the database
If User defined – Access granted
• Rights are assigned based on a defined
profile
Pervasive.SQL isolates the user from the database.
The engine controls access
Weaknesses in the Btrieve model
Btrieve has no concept of a
database, simply files.
OS level rights are required for each
user and file
No central way to control security
No programmatic way to control user
access
Two different security models to a common data store
Pervasive.SQL V8 Security Feature Pack
Security Release (V8.5)
Release Features:
Enhanced encryption
Unified security model
Unified DB and OS access
control
Fully backwards compatible
with existing applications
Free upgrade for existing
Pervasive.SQL V8 Users
New Features and Improvements
New security models for Btrieve applications
• Classic
• Mixed
• Database
DefaultDB for securing Btrieve files
Encrypted network communication
Utilities support for new security models
• Create DB wizard
• Maintain Named Database dialog
Updates to programming interfaces
• Login API
• URI (Uniform Resource Indicator) support for create and open
Improved installation programs
Demo
Pricing and Distribution
No change in pricing.
Available as a separate CD in the box.
Free for all Pervasive.SQL V8 users.
Simply request an upgrade from
Netcellent.
Documentation on setting up the security
features is available upon request.
By Mark DeShazo
April 1, 2004 - Webinar
Security Model
AuditMaster
Know who did what, when, where and how to your data
Key Features:
•Event handler records database events in log file
•Viewer for querying and analyzing the log file
•Alerts to proactively notify appropriate personnel when
predefined conditions occur
•Works with your existing installation of Elliott running
Pervasive V8.X - No modifications are required
Audit Master Architecture
Functionality
Capture
• SQL and Btrieve logging
• Nearly all database ops
can be logged, including
failed operations
• Before & after images
for updates allows
detailed change analysis
• Log purging and
archiving
• Multi-version metadata
and DDF management
Query
• Predefined and
customizable queries
• Transaction rollback
and point-in-time
recovery
Alerts
• Business rules
• Built-in email
notification
• Can call user defined
functions
Database Security
Database security models reduce threats
through restricting access to data
• If an unauthorized user can’t access the data,
he/she can’t compromise it
However, there will always be authorized
users doing unauthorized things
• In casinos, dealers cheat more than gamblers
• People make honest mistakes
• Access control will never be enough
Two primary use cases
• Improving customer support through
detailed activity logging.
• Reducing fraud through proactive alerts
and forensic log analysis.
Demonstration
Pricing and Distribution
Total solution for monitoring
and logging
• Pervasive.SQL V8 server
required
• Windows NT4/2000/2003 only
• Pricing
Promotion Period, 10% Off (by May
31, 2004)
• Special OEM arrangement with
Pervasive
Users
Price
6 Users
$495
10 Users
$695
20 Users
$1,295
50 Users
$2,795
Unlimited $4,995
Pervasive Backup Agent
By Mark DeShazo
March 19, 2004
Why is Backup Difficult?
A successful database backup must ensure file
integrity and database concurrency
• Individual data files must be reliable and restorable
• The set of files must represent a valid database state
This is difficult to accomplish
• Files may be open and changing
• Long duration backups may copy inconsistent files
Backup is complicated for all databases
• Large sizes and continuous updates make database
backup and restore difficult
What do Pervasive.SQL Users Do?
A recent survey of Pervasive® customers showed
• 88% perform regular backups
• 69% perform backups while the server is running
• 68% don’t use Continuous Operations mode
Continuous Operations mode ensures file protection for
Pervasive.SQL files during backup
• 100% value their data as a top business asset
This is good…
• Customers are trying to protect their data
…and it is bad!
• Customers are not achieving the results they need
What is Continuous Operations?
A special file mode for backup
• A data file is opened read-only
• Updates are made to a delta file
• When Continuous Operations
mode ends, updates are moved
from the delta file to the data file
• This process is completely
transparent to the user
Pervasive.SQL V8
Controlled by Pervasive.SQL
• BTRV 42 <file>
• Butil –startbu <file>
Class.mkd
Class.^^^
Pervasive Backup Agent™
Intelligently manages continuous operations
• Manages continuous operations for all database files
All open files are processed en mass
Newly opened files are opened in Continuous Operations
mode
Users don’t have to know the files or interact with ‘butil’
Complements all leading third-party backup
packages, such as:
•
•
•
•
•
Veritas Backup Exec
Computer Associates BrightStor ARCserve Backup
Microsoft Windows Backup (ntbackup)
Linux tar
Others …
Adding Backup Agent to a Backup Job
Database Files During Backup
Backup Agent
automatically turned
Continuous Operations on
for the open files
Architecture
Elliott is unaware that
Backup Agent is
creating Delta Files
Backup software is
unaware of Delta
Files and can only
see Data Files
Client Application
Pervasive.SQL
Captures open
events during
backup sessions
and opens the
files in
Continuous
Operations mode
Pervasive
Backup Agent
Event
Handler
Delta Files
Third-Party
Backup Software
Tape
Backup
Data Files
Only clean and consistent data
files are copied to tape
Pricing and Distribution
Requires Pervasive.SQL V8® server
Licensed per server engine
Envelope packaging
• CD – All license and read-me onboard
Price is only $249
Availability
• Netcellent is now an OEM of this product
• Contact our sales department to order today:
(888) 595-3818 or [email protected]
In summary
• Protecting your database can be greatly
improved by upgrading to PSQL Version
8.5 and adding AuditMaster.
• The integrity of your database can be
improved by using Backup Agent.
• Support requests can be reduced and
easier to respond to with the addition of
these products.
Questions?