Escolar Documentos
Profissional Documentos
Cultura Documentos
Webinar Presenter:
Vishwanathan Vaidyanathan
Senior Technical Lead, smartShift Technologies
www.smartShiftTech.com
Agenda
2. Migration
3. Database Security
6. Q & A
Introduction
1 smartShift Technologies
www.smartShiftTech.com
About smartShift Technologies
Founded in 1992
www.smartShiftTech.com
WHAT IS MIGRATION (UPGRADATION)
Upgradation
Migration
Bug Fixtures,
Handle more
OEM Vendor
Load & User
Support
base
Database
Migration
Enhanced Data
Handle Bigger Security
DB size &
Storage Data Encryption,
Capacity Database Vault and
Audit Vault
DB
Reorganization,
Easier
Management
Application
Compatibility
Backup &
Contingency
plans prior to
Migration
The selected new features in 11g / 12c that you can benefit after up-gradation:
Database Replay
o Database Replay is the new tool that captures SQL statements and lets you
replay them.
Partitioning
o Referential, Internal, and Virtual Column partitioning; new sub-partitioning
options; and more.
Schema Management
o Add columns with a default value easily and explore invisible indexes, virtual
columns, and read only tables.
Patching and Upgrades, RAC One Node, and Clusterware
o Enables a single name (SCAN) for the cluster, enable HA for a single-instance
database, place OCR and voting disks on ASM, and more (in Release 2 only).
PL/SQL Performance
o Explore in-lining of code, "real" native compilation, PLS timer, use of simple
integer, and more.
Security
o Tablespace Encryption, case-sensitive passwords, data masking, and other
features.
Caching and Pooling
o SQL Result Cache, PL/SQL Function Cache, and Database Resident
Connection Pooling.
SecureFiles
o Next-generation LOBs: LOB encryption, compression, de-duplication, and
asynchronicity.
Compression
o Support for data compression, 11g takes the concept to a new level with
Advanced and Hybrid Columnar Compression.
Backup and Recovery
o Explore Data Recovery Advisor, do parallel backup of the same file, create and
manage virtual catalogs, and undrop tablespaces.
Transaction Management
o Flashback Data Archive and explore Enterprise Manager's LogMiner interface.
DataGuard (Active)
o The Oracle 11g Active DataGuard allows a physical standby database to be
open for read only access. Instead of having an idle physical standby database
for only disaster recovery (DR) it can be used for reporting and backups while
continuously applying the redologs from Primary database.
RAC (Real Application Cluster)
o Dramatic improvements in the manageability of RAC. This feature enables
users to deploy a database or databases across a cluster of servers, which act
as a single logical environment, with the servers transparently sharing storage.
If one node fails, the others carry on and the workload of the failed node is
distributed across the others nodes.
End-to-End Compression
The Advanced Compression option enables the data to be transparently
compressed on disk, "in motion, and in memory. This compression feature not
only saves space on disk and in memory but also make the database run
faster.
It can reduces disk and memory space usage as much as 75%. OLTP Table
Compression, reduces the associated compression overhead of write
operations, making it suitable for transactional or OLTP environments as well.
Destination
Source Database Upgrade Path
Database
Faster Performance
New & Enhanced Features
OEM Vendor Support
High Availability / Maximum Availability
Enhanced Security
Reduced Cost in terms of -
o Hardware
o Storage
o Software
o Man Power (DBA Resources)
www.smartShiftTech.com
ESSENTIALS OF DATABASE SECURITY
What to Secure
The Confidential and Sensitive Information (data) is always needs
to be secured. The information, ranging from trade secrets to
financial and privacy data has become the target of sophisticated
inside / outside attacks.
Why to Secure
The safe-guard of critical & confidential information is always
challenging due to the following threats-
Eavesdropping and Data Theft
Data Tampering
Falsifying critical information
Password related Threats
Data corruption due to Hardware Failures / Human mistakes
Data Loss due to Natural Calamities like Fire, Building collapse,
Earthquake
How to Secure
Authentication
Application Level Application Level Roles & Privileges
Connection & Data Access Control
Network Authentication
Network / Internet Firewall
Level Internet Policies
Network,
Hardware &
Operating
System Level
Security
Application Data
Level Redaction /
Authentication Masking
Secured Data
Step 3:
Prepare your
response to the
inevitable: a
sophisticated
attack
Step 2:
Protect your
Organization
with a
proactive
security plan
Step 1.
Prioritize your
business
objectives and
set your risk
tolerance
Oracle is providing various features on Securing the valuable Data. While creating a
database, Database Configuration Assistant (DBCA) is automatically create a more
secured Oracle Database.
The following are the few Oracle Database Security Features:
Oracle Database Vault
o Oracle Database Vault proactively protects application data from being
accessed by privileged database users (Access Control and Analysis).
o Restrict adhoc access to application data by preventing application bypass
o Certified default policies for Oracle E-Business Suite; Oracles PeopleSoft and
Siebel CRM; and SAP applications
Database auditing
o Database monitors and records activity that occurs in the database.
o Auditing has been enhanced and provides highly customizable auditing that can
be fine tuned to specific security requirements.
o Oracle introduced the Fine Grained Auditing (FGA) feature, The Secure
Sockets Layer (SSL) and Kerberos strong authentication methods to
authenticate users who have the SYSDBA and SYSOPER Privileges.
Encryption
o Disguise data on the network to prevent unauthorized access to that data.
Encryption Enhancements
o Intelligent LOB Compression, Deduplication, and Encryption with SecureFiles
o Compressed and Encrypted Dump File Sets
o Transparent Data Encryption with Hardware Security Module Integration
o Transparent Tablespace Encryption
User accounts.
o When you create user accounts, you can secure them in a variety of ways. And
also create password profiles to better secure password policies for your site.
Authentication methods
o Oracle Database provides several ways to configure authentication for users
and database administrators. For example, authenticate users on the database
level, from the operating system, and on the network.
www.smartShiftTech.com
ESSENTIALS OF HA & DR
How to achieve HA
DataGuard
(Standby
Database)
RAC
GoldenGate ( Real Application
Cluster )
Oracle
Database
HA & DR
Solutions
Storage
Level Streams /
Replication Replications
/ Mirroring
Fail-over
Cluster
DataGuard (DG)
GoldenGate
GoldenGate Features
www.smartShiftTech.com
ORACLE 12c NEW FEATURES
www.smartShiftTech.com
Questions & Answers
Pounraj Karthikeyan
Senior Account Manager - Sales
+91-99-4002-5836
pkarthikeyan@smartshifttech.com
www.smartShiftTech.com
www.smartShiftTech.com