SlideShare une entreprise Scribd logo
1  sur  8
S

O

L

U

T

I O

N

P

R

O

F

I

L E

Solix Secure Test and Development Solution – A New
Frontier in Securing Sensitive Information
April 2007
Sensitive information is increasingly finding its way into the hands of malicious
individuals either through external breaches or insider thefts from employees or
contractors. Database applications like ERP and CRM house vast repositories of
sensitive and private information such as salary and pay grade information,
customer data, Social Security numbers, credit card numbers, and financial data.
This data is highly regulated both externally and internally, and the risk of exposing this
sensitive information can result in stiff penalties and legal liabilities. In fact, in a March 2007
Taneja Group research study of large enterprises, 57% of end users reported that a data
security breach would cost over $500,000 in damages to their organization and 31% stated
that a breach would cost them over $1M.
Most enterprises maintain strict controls and security over production database applications
and their data. However test development environments for these types of applications
represent an Achilles heel. End users state that creating Test and Development (Test/Dev)
environments for this critical data results in security risks, hefty manual procedures, and heavy
storage requirements.
Solix has responded with a solution that securely and cost-effectively automates data cloning in
Test/Dev environments. This solution profile will discuss the data security context within
firms operating today and will highlight the key challenges that we hear from end users about
creating, maintaining, and securing test development environments. Lastly, we spotlight
Solix’s, Secure Test and Development solution and its key benefits.

IT Facing a New Reality in Data
Security
The business context that firms must operate
within has evolved dramatically over the past
five years. Data security, data privacy, and
compliance issues have moved to the fore as
a slew of high profile breaches have
showcased the vulnerabilities of companies’
sensitive data. IT is being forced to adjust its
processes and approaches to match this new
business context. The Test/Dev environment
is one such area where IT has a strong need
87 Elm Street, Suite 900

to re-assert controls and security to meet
compliance and regulatory legislation, to
safeguard data from insider tampering, and
to prevent external breaches or leaks.
From our research, the following three
drivers are causing IT organizations to reevaluate and re-plan how they create,
manage, and maintain their Test/Dev
environments:
• Comply
with
government
and
industry regulations. The very database

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

www.tanejagroup.com

1 of 8
S

O

L

U

T

I

O

N

applications that are the most critical in
Test/Dev environments are the same
applications that are the most highly
regulated. Most enterprises must comply
with external
regulations including
Sarbanes Oxley (SOX), HIPAA, GrammLeach-Bliley Act (GLBA), and others.
Penalties for non-compliance can be
severe.
• Safeguard data from insider threats.
Corporate environments are rife with
internal
threats
to
data.
System
administrators, database administrators,
and application developers all maintain
high-level access to critical data, and may
leak or expose sensitive data either
intentionally or inadvertently. Test/Dev
environments must have data protections
and security in place that guard against
both accidental and deliberate threats to
production data.
• Prevent
external
breaches.
Outsourcing and nearsourcing are common
business practices, but they make it that
much harder to protect data and to comply
with regulations. Companies remain liable
for security breaches when outside
contractors are accessing copies of their
crucial company data. In this context,
securing Test/Dev environments is crucial
to avoiding stiff legal liabilities and
penalties for non-compliance.

Today’s Challenges of Creating,
Maintaining and Securing
Test/Dev Environments
Cloning the production systems, including
structured and unstructured data, is a
87 Elm Street, Suite 900

P

R

O

F

I

L

E

fundamental procedure in the Test/Dev
process. In order to ensure high quality
testing of applications before they go into
productions, QA and application developers
need to use realistic production quality data
so they can ensure the application will
perform to exacting specifications in
production. As a result there is a strong need
to clone and copy production stores for use in
application development, quality assurance
(QA), application testing and training, and
user acceptance testing. However, cloning
production data sets is increasingly
challenging given enterprise data growth
rates and the critical and highly regulated
and sensitive nature of this data.
Challenge #1: Labor Intensive. Manual
cloning requires a massive effort spanning a
variety of cross-functional stakeholders.
Cloning large production data sets impacts
storage, network bandwidth, host servers,
and databases; therefore involving at the
least network administrators, storage
administrators, database administrators,
system
administrators,
and
business
application owners. Time spent cloning data
is also problematic given slow file replication
technologies like File Transfer Protocol (FTP)
or Remote Copy (RCP). FTP securely
transfers files between hosts that are using
different file systems or character sets such
as EBCDIC or ASCII, and Remote Copy
(RCP) is the remote version of a copy
command. Cloning a 500 GB database using
FTP or RCP can take days of data movement
and manual management, and Test/Dev
often requires multiple clones.
Challenge #2: Inefficient
Consumption.
Since
the

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

Storage
Test/Dev

www.tanejagroup.com

2 of 8
S

O

L

U

T

I

O

N

environments must preserve relationships
between data, cloned production database
applications are usually full clones
consuming vast amounts of space of Tier 1
disk. The problem worsens as extra clones
are created for additional or parallel
Many
development and testing work.
organizations that we speak with report
maintaining seven or eight individual copies
of production data. Therefore, a single 500
GB database can easily consume over 3 TB of
Tier 1 storage capacity.
Challenge #3: Legal Liabilities &
Security Risks. Furthermore, data and user
access is usually not as secure in the
Test/Dev
environment,
as
extremely
sensitive information is suddenly divorced
from the careful security measures that
usually surround it in the production
environment. The results of careless or
malicious handling of this critical data can be
catastrophic.
For example, enterprise IT departments and
DBAs carefully restrict usage of the database
data within the network. However, if a
payroll processing development project is
outsourced, the outsourcer gains immediate
and full access to sensitive and highly
regulated employee data. Nonetheless, the
corporation that outsourced the project is
still liable for ensuring the security and
protection of that data. In another example,
take an internal development project. The
production database is carefully stored on
primary disk and is only accessible to a few
authenticated users. But the clone of the
database is unwittingly placed on common
networked storage, making it casually
available to any member of the development
87 Elm Street, Suite 900

P

R

O

F

I

L E

team – or worse, to any network user or
consultant who can access that storage.

The Business Case for a Secure
Test/Dev Solution
In spite of heavy overhead and security risks
associated
with
traditional
cloning,
companies commonly make about eight
manual copies of each production database
for Test/Dev environments. Depending on
the size of the database, manual clone
refreshes demand two to eleven days of staff
time alone. Automating the cloning process
can reduce this time to less than a day, and
with block-based replication technology no
longer than an hour. Storage resource
requirements for automated clones also
shrink, with instance subsetting or pointerbased cloning reducing required storage by
as much as 50%.
Human and storage resource savings can
easily total hundreds of thousands of dollars
a year, and with a secure cloning system the
savings grow in proportion to lowering noncompliance risk. For example, the staffing
costs of cross functional personnel involved
in a manual clone can be slashed if the
test/dev cloning process can be automated.
As a result, valuable IT resources can focus
on more strategic projects that directly add
value to the business.
Moreover,
capital
organizations
can
reduce
expenditures on storage capacity by
replicating the clones from tier 1 to tier 2
storage. Assuming a 50% reduction in the
size of a clone through instance subsetting,
this can easily result in savings of almost
$100,000 in storage costs alone for a 500 GB
database that must be replicated 8 times.

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

www.tanejagroup.com

3 of 8
S

O

L

U

T

I

O

N

From our discussions with users, they report
the following key savings and efficiencies in
their environments:
1. Automate to Reduce Errors: IT
administrators in charge of cloning a
production database application might
replicate the entire database and its
associated application files using a copy
application like FTP or RCP. However,
this consumes large amounts of storage
and network bandwidth and takes a large
amount of manual oversight.
2. Use Recent Production Data for
Better Accuracy: Cloning can be such a
painful
process
that
Test/Dev
environments end up working with
outdated copies. Using a cloning solution
that quickly and efficiently clones recent
production data results in a more
accurate data set, ultimately improving
business intelligence.
3. Secure Sensitive Data to Protect
Against Legal Liabilities: Production
databases often contain highly sensitive
and
regulated
data,
data
that
unauthorized users should not see. When
production database clones travel to
outsourcers, trainers, and QA testers,
those users should not be able to view any
sensitive information.
4. Leverage
Efficient
Block
Replication to Compress Time to
Staging: Cloning at the file level requires
very long copy windows. If the Test/Dev
solution can take advantage of block-level
replication technology, then the time to
87 Elm Street, Suite 900

P

R

O

F

I

L

E

clone an environment can be compressed
to a fraction of the time that it used to
take. A policy-driven automated process
will also allow IT to reduce its reliance on
software tools and manual scripts, which
saves money on purchases, human
resources, and error-prone procedures.
5. Cut CAPEX and OPEX Costs. A
Test/Dev cloning solution cuts cloning
time from days to minutes, slashing
human resource requirements. The
solution should also support replicating
cloned data onto less costly Tier 2 storage
such as a NetApp filer with SATA drives,
resulting in a 50% storage reduction
difference between full clones and
subsets. In addition, a Test/Dev cloning
solution can streamline clones by cloning
only the data and data relationships that
the Test/Dev environment actually needs.

Spotlight on Solix
Founded in 2001, Solix Technologies is
focused on helping end users solve their
compliance requirements and implement
Information Lifecycle Management (ILM)
policies and procedures throughout their
storage infrastructure. Its flagship product,
Solix Enterprise Data Management Suite
(EDMS), organizes and manages all
data
including
structured
enterprise
(packaged and custom applications), semistructured
(email)
and
unstructured
(documents and images) data. Solix Secure
Test and Development solution is a
standalone module built on top of EDMS. It
enables the enterprise to securely and
efficiently clone non-production databases
for Test/Dev environments.

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

www.tanejagroup.com

4 of 8
S

O

L

U T

I

O

N

Solix Secure Test and Development solution
combines data security techniques to protect
individual data elements with the ability to
streamline or shrink clones of production
databases by removing large parts of the data
sets that Test/Dev environments do not

Prod

P

R

O

F

I

L

E

need. This streamlining capability – achieved
through a process called instance subsetting - results in compact clones that replicate
quickly, use significantly less storage
resources,
Test/Dev
and
streamline
environments.

Mask the
baseline
Replication

Mirror / BCV

QA
Replication

Prod
Test

Clones of the baseline
are secure automatically

Train

Source
Target

Efficient Cloning

One of the core storage management
operations of enterprise IT is the ability to
make multiple usable copies of data sets. This
is applicable for a variety of enterprise
processes including disaster recovery,
testing,
analysis,
and
development
environments. However, copy creation
technologies are less than ideal in production
cloning where the Test/Dev environment
requires current data formatting, structure
and relationships. Traditional copy creation
can yield time gaps in the production copy,
impact the production environment with
quiescing, require code customization and
scripts, and demand manual intervention
and management.
Solix uses a technology called instance
subsetting to clone subsets for Test/Dev

87 Elm Street, Suite 900

while
preserving
relational
integrity.
Subsetting removes large data sets that are
not needed in the Test/Dev environment.
Removing the data from the clone eliminates
the risk of exposure for that data. Another
significant benefit of instance subsetting is
reduced storage because the clone is
significantly smaller than full copies of the
production database. Subsetting integrates
database and application cloning and is
policy-driven.
The compact clones retain a realistic look
and feel to the non-production data for
accurate Test/Dev purposes, while securely
shielding the actual data from the Test/Dev
environment workers. The users still have the
database structure they need, including
application business rules and database
relationships, data integrity and accuracy,

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

www.tanejagroup.com

5 of 8
S

O

L

U

T

I O

N

and proper database access and control
including allocating rights to roles.

Data Protection Techniques
Securing cloned database applications is a
fundamental piece of the Test/Dev puzzle.
Solix provides a policy engine, multiple
security techniques, and knowledge bases to
automate the secure cloning process. Since
even a single Test/Dev breach of sensitive
data can be disastrous, Solix provides a
critical piece of technology for protecting
companies from data privacy and compliance
penalties and liabilities.
Solix Secure Test and Development solution
comes with a pre-populated knowledge base
containing over twenty populated data
security algorithms, and supports the ability
to add custom algorithms as needed. IT can
define security policies at the application
module, transaction, table or column level.
The same repository also operates for related
operations such as instance subsetting.
Users do not have to be data security experts
to choose the correct set of algorithms.
Solix’s user interface lets users select the
sensitive database tables and columns they
wish to protect and their security parameters.
Solix maintains a comprehensive knowledge
base of metadata concerning an enterprise
application’s data model, which allows it to
automatically identify all places where a
column is referenced in a given application
and apply secured values generated by the
optimal data security algorithm.
Solix’s knowledge base includes metadata on
application data models from major
87 Elm Street, Suite 900

P

R

O

F

I

L

E

enterprise
applications
like
Oracle,
SAP,
and
custom-built
PeopleSoft,
applications. This allows Solix to apply data
protection techniques to application data
while preserving its referential integrity –
vital for providing a structurally correct but
completely secure clone for the Test/Dev
environment.
Secure Elements
Solix uses scrambling, masking, encryption,
nulling out, substitution, and shuffling
techniques to secure database clones. All of
the techniques employ the metadata
repository
for
applying
policy-driven
automation and a data model repository to
observe enterprise application data models.
• Data Scrambling uses an algorithm to
scramble data so that it is completely
indecipherable. Only when unscrambling
algorithms are applied can the data be read
again.
• Data Masking identifies columns of data
and replaces existing characters with
designated characters or numbers. The
method preserves formatting for testing
reports or user interfaces.
• Encryption/Decryption encrypts data
into special characters and destroys
formatting so that the database is
unreadable. Decryption keys revert data
back into its readable form. Solix uses the
DES algorithm.

• Nulling Out replaces an entire column
with null values. Nulling out is a limited
technique as key data columns cannot

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

www.tanejagroup.com

6 of 8
S

O

L

U

T I

O

N

always be made null, but is a simple and
straightforward procedure.
• Substitution randomly replaces real
production data with realistic-looking fake
data and preserves formatting. This
substituted data has the same look and feel
as the real data for accurate Test/Dev
purposes, but does not correlate with the
original data or data related to it.
• Shuffling is similar to substitution in that
it randomly replaces data with fake data.
The false values are obtained by shuffling
column values, for instance by deliberately
mismatching first names with last names.

Key Benefits of Solix Data
Security Solution
Benefit #1: Streamline non-production
databases for Test/Dev environments.
After Solix creates a masked clone of the
production database, IT can choose to create
streamlined copies of the clone by removing
large sets of data that are not necessary for a
given Test/Dev task. The remaining subset is
smaller, taking up fewer storage resources
and resulting in shorter testing times on
limited subsets.
Benefit #2: Easily clone using the most
recent production data.
Since cloning with Solix is simple and secure,
it is easy to clone updated databases for
Test/Dev environments. The compact and
secure clones can themselves be cloned
without threatening sensitive data or
overwhelming storage resources.

87 Elm Street, Suite 900

P

R

O

F

I

L

E

Benefit #3: Leverage replication
technology at the block level.
Solix supports enterprise block replication
software from major storage vendors like
NetApp and EMC, so corporations can
their
leverage
existing
replication
technologies.
Solix Deployment Scenarios
One
of
Solix’s
Data
Protection
characteristics is its flexibility when
creating clones and replicating them to
different storage tiers. For example:
1.

Tier 1 and Tier 2 storage on different
platforms with
no
SAN.
This
environment requires host-based or
file-based replication to create an
initial
clone,
such
as
Veritas
Replication Exec or Volume Replicator.
Full clones can take time to replicate,
but streamlined clones take much less.

2. Tier 1 and Tier 2 on different
platforms with a SAN. This setup
requires block-based replication. Users
should leverage
data
protection
software like NetApp’s Topio Data
Protection Suite (TDPS) or EMC
Recover Point (formerly Kashya).
3. Tier 1 and Tier 2 on the same platform
with a SAN. In this case, the
environment should leverage array
replication technology such as EMC
SAN Copy or NetApp FlexClone to
make full clones or snaps.

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

www.tanejagroup.com

7 of 8
S

O

L

U

T I

O

N

Benefit #4: Cut costs.
Smaller clones result in as much as a 50%
storage reduction difference between full
clones and subsets. Because Solix supports
block replication to secondary storage, the
enterprise can leverage existing replication
applications and replicate to less costly Tier 2
storage, such as a NetApp filer with SATA
drives.

Taneja Group Opinion
Test/Dev environments create tremendous
challenges to the enterprise in the form of
serious security risks, storage consumption,
and high manual overhead.
A single
production data breach can easily result in
millions of dollars in liability for the
company, yet today most companies have not
addressed the security of their test and
development environments. As a result, they
have left themselves open to severe legal
liabilities and stiff penalties.
Within this context, Solix offers a clear, hardcost ROI solution for securing and
automating Test/Dev environments. Solix
data security techniques are instrumental in
protecting Test/Dev database application

P

R

O

F

I

L

E

clones from unauthorized access while
retaining full database integrity. Solix can
also create streamlined clones, which
significantly reduces the overall data
footprint of a Test/Dev clone and results in
dramatic cost savings. And its automation,
knowledge bases, and policy engine
dramatically cut OPEX costs by automating
manual procedures.
We have already seen significant, high profile
data security breaches at large corporations
due to lost unencrypted tapes and stolen
laptops with sensitive information. Taneja
Group believes that it is only a matter of time
until a major storage security breach
headline will be attributed to an unprotected
test and development environment. We urge
corporations to reevaluate whether the
security policies in place today are sufficient
to protect sensitive information
in
outsourced or test and development
environments from falling into the wrong
hands.
For those with significant
outsourcing and insecure test development
environments, we urge you to consider the
strong ROI potential that Solix provides.

NOTICE: The information and product recommendations made by the TANEJA GROUP are based upon public information and sources
and may also include personal opinions both of the TANEJA GROUP and others, all of which we believe to be accurate and reliable.
However, as market conditions change and not within our control, the information and recommendations are made without warranty of
any kind. All product names used and mentioned herein are the trademarks of their respective owners. The TANEJA GROUP, Inc. assumes
no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or
reliance upon, the information and recommendationspresented herein, nor for any inadvertent errors which may appear in this document.

87 Elm Street, Suite 900

Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved
Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530

www.tanejagroup.com

8 of 8

Contenu connexe

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

En vedette

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

A New Frontier in Securing Sensitive Information - Taneja Group, April 2007

  • 1. S O L U T I O N P R O F I L E Solix Secure Test and Development Solution – A New Frontier in Securing Sensitive Information April 2007 Sensitive information is increasingly finding its way into the hands of malicious individuals either through external breaches or insider thefts from employees or contractors. Database applications like ERP and CRM house vast repositories of sensitive and private information such as salary and pay grade information, customer data, Social Security numbers, credit card numbers, and financial data. This data is highly regulated both externally and internally, and the risk of exposing this sensitive information can result in stiff penalties and legal liabilities. In fact, in a March 2007 Taneja Group research study of large enterprises, 57% of end users reported that a data security breach would cost over $500,000 in damages to their organization and 31% stated that a breach would cost them over $1M. Most enterprises maintain strict controls and security over production database applications and their data. However test development environments for these types of applications represent an Achilles heel. End users state that creating Test and Development (Test/Dev) environments for this critical data results in security risks, hefty manual procedures, and heavy storage requirements. Solix has responded with a solution that securely and cost-effectively automates data cloning in Test/Dev environments. This solution profile will discuss the data security context within firms operating today and will highlight the key challenges that we hear from end users about creating, maintaining, and securing test development environments. Lastly, we spotlight Solix’s, Secure Test and Development solution and its key benefits. IT Facing a New Reality in Data Security The business context that firms must operate within has evolved dramatically over the past five years. Data security, data privacy, and compliance issues have moved to the fore as a slew of high profile breaches have showcased the vulnerabilities of companies’ sensitive data. IT is being forced to adjust its processes and approaches to match this new business context. The Test/Dev environment is one such area where IT has a strong need 87 Elm Street, Suite 900 to re-assert controls and security to meet compliance and regulatory legislation, to safeguard data from insider tampering, and to prevent external breaches or leaks. From our research, the following three drivers are causing IT organizations to reevaluate and re-plan how they create, manage, and maintain their Test/Dev environments: • Comply with government and industry regulations. The very database Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com 1 of 8
  • 2. S O L U T I O N applications that are the most critical in Test/Dev environments are the same applications that are the most highly regulated. Most enterprises must comply with external regulations including Sarbanes Oxley (SOX), HIPAA, GrammLeach-Bliley Act (GLBA), and others. Penalties for non-compliance can be severe. • Safeguard data from insider threats. Corporate environments are rife with internal threats to data. System administrators, database administrators, and application developers all maintain high-level access to critical data, and may leak or expose sensitive data either intentionally or inadvertently. Test/Dev environments must have data protections and security in place that guard against both accidental and deliberate threats to production data. • Prevent external breaches. Outsourcing and nearsourcing are common business practices, but they make it that much harder to protect data and to comply with regulations. Companies remain liable for security breaches when outside contractors are accessing copies of their crucial company data. In this context, securing Test/Dev environments is crucial to avoiding stiff legal liabilities and penalties for non-compliance. Today’s Challenges of Creating, Maintaining and Securing Test/Dev Environments Cloning the production systems, including structured and unstructured data, is a 87 Elm Street, Suite 900 P R O F I L E fundamental procedure in the Test/Dev process. In order to ensure high quality testing of applications before they go into productions, QA and application developers need to use realistic production quality data so they can ensure the application will perform to exacting specifications in production. As a result there is a strong need to clone and copy production stores for use in application development, quality assurance (QA), application testing and training, and user acceptance testing. However, cloning production data sets is increasingly challenging given enterprise data growth rates and the critical and highly regulated and sensitive nature of this data. Challenge #1: Labor Intensive. Manual cloning requires a massive effort spanning a variety of cross-functional stakeholders. Cloning large production data sets impacts storage, network bandwidth, host servers, and databases; therefore involving at the least network administrators, storage administrators, database administrators, system administrators, and business application owners. Time spent cloning data is also problematic given slow file replication technologies like File Transfer Protocol (FTP) or Remote Copy (RCP). FTP securely transfers files between hosts that are using different file systems or character sets such as EBCDIC or ASCII, and Remote Copy (RCP) is the remote version of a copy command. Cloning a 500 GB database using FTP or RCP can take days of data movement and manual management, and Test/Dev often requires multiple clones. Challenge #2: Inefficient Consumption. Since the Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 Storage Test/Dev www.tanejagroup.com 2 of 8
  • 3. S O L U T I O N environments must preserve relationships between data, cloned production database applications are usually full clones consuming vast amounts of space of Tier 1 disk. The problem worsens as extra clones are created for additional or parallel Many development and testing work. organizations that we speak with report maintaining seven or eight individual copies of production data. Therefore, a single 500 GB database can easily consume over 3 TB of Tier 1 storage capacity. Challenge #3: Legal Liabilities & Security Risks. Furthermore, data and user access is usually not as secure in the Test/Dev environment, as extremely sensitive information is suddenly divorced from the careful security measures that usually surround it in the production environment. The results of careless or malicious handling of this critical data can be catastrophic. For example, enterprise IT departments and DBAs carefully restrict usage of the database data within the network. However, if a payroll processing development project is outsourced, the outsourcer gains immediate and full access to sensitive and highly regulated employee data. Nonetheless, the corporation that outsourced the project is still liable for ensuring the security and protection of that data. In another example, take an internal development project. The production database is carefully stored on primary disk and is only accessible to a few authenticated users. But the clone of the database is unwittingly placed on common networked storage, making it casually available to any member of the development 87 Elm Street, Suite 900 P R O F I L E team – or worse, to any network user or consultant who can access that storage. The Business Case for a Secure Test/Dev Solution In spite of heavy overhead and security risks associated with traditional cloning, companies commonly make about eight manual copies of each production database for Test/Dev environments. Depending on the size of the database, manual clone refreshes demand two to eleven days of staff time alone. Automating the cloning process can reduce this time to less than a day, and with block-based replication technology no longer than an hour. Storage resource requirements for automated clones also shrink, with instance subsetting or pointerbased cloning reducing required storage by as much as 50%. Human and storage resource savings can easily total hundreds of thousands of dollars a year, and with a secure cloning system the savings grow in proportion to lowering noncompliance risk. For example, the staffing costs of cross functional personnel involved in a manual clone can be slashed if the test/dev cloning process can be automated. As a result, valuable IT resources can focus on more strategic projects that directly add value to the business. Moreover, capital organizations can reduce expenditures on storage capacity by replicating the clones from tier 1 to tier 2 storage. Assuming a 50% reduction in the size of a clone through instance subsetting, this can easily result in savings of almost $100,000 in storage costs alone for a 500 GB database that must be replicated 8 times. Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com 3 of 8
  • 4. S O L U T I O N From our discussions with users, they report the following key savings and efficiencies in their environments: 1. Automate to Reduce Errors: IT administrators in charge of cloning a production database application might replicate the entire database and its associated application files using a copy application like FTP or RCP. However, this consumes large amounts of storage and network bandwidth and takes a large amount of manual oversight. 2. Use Recent Production Data for Better Accuracy: Cloning can be such a painful process that Test/Dev environments end up working with outdated copies. Using a cloning solution that quickly and efficiently clones recent production data results in a more accurate data set, ultimately improving business intelligence. 3. Secure Sensitive Data to Protect Against Legal Liabilities: Production databases often contain highly sensitive and regulated data, data that unauthorized users should not see. When production database clones travel to outsourcers, trainers, and QA testers, those users should not be able to view any sensitive information. 4. Leverage Efficient Block Replication to Compress Time to Staging: Cloning at the file level requires very long copy windows. If the Test/Dev solution can take advantage of block-level replication technology, then the time to 87 Elm Street, Suite 900 P R O F I L E clone an environment can be compressed to a fraction of the time that it used to take. A policy-driven automated process will also allow IT to reduce its reliance on software tools and manual scripts, which saves money on purchases, human resources, and error-prone procedures. 5. Cut CAPEX and OPEX Costs. A Test/Dev cloning solution cuts cloning time from days to minutes, slashing human resource requirements. The solution should also support replicating cloned data onto less costly Tier 2 storage such as a NetApp filer with SATA drives, resulting in a 50% storage reduction difference between full clones and subsets. In addition, a Test/Dev cloning solution can streamline clones by cloning only the data and data relationships that the Test/Dev environment actually needs. Spotlight on Solix Founded in 2001, Solix Technologies is focused on helping end users solve their compliance requirements and implement Information Lifecycle Management (ILM) policies and procedures throughout their storage infrastructure. Its flagship product, Solix Enterprise Data Management Suite (EDMS), organizes and manages all data including structured enterprise (packaged and custom applications), semistructured (email) and unstructured (documents and images) data. Solix Secure Test and Development solution is a standalone module built on top of EDMS. It enables the enterprise to securely and efficiently clone non-production databases for Test/Dev environments. Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com 4 of 8
  • 5. S O L U T I O N Solix Secure Test and Development solution combines data security techniques to protect individual data elements with the ability to streamline or shrink clones of production databases by removing large parts of the data sets that Test/Dev environments do not Prod P R O F I L E need. This streamlining capability – achieved through a process called instance subsetting - results in compact clones that replicate quickly, use significantly less storage resources, Test/Dev and streamline environments. Mask the baseline Replication Mirror / BCV QA Replication Prod Test Clones of the baseline are secure automatically Train Source Target Efficient Cloning One of the core storage management operations of enterprise IT is the ability to make multiple usable copies of data sets. This is applicable for a variety of enterprise processes including disaster recovery, testing, analysis, and development environments. However, copy creation technologies are less than ideal in production cloning where the Test/Dev environment requires current data formatting, structure and relationships. Traditional copy creation can yield time gaps in the production copy, impact the production environment with quiescing, require code customization and scripts, and demand manual intervention and management. Solix uses a technology called instance subsetting to clone subsets for Test/Dev 87 Elm Street, Suite 900 while preserving relational integrity. Subsetting removes large data sets that are not needed in the Test/Dev environment. Removing the data from the clone eliminates the risk of exposure for that data. Another significant benefit of instance subsetting is reduced storage because the clone is significantly smaller than full copies of the production database. Subsetting integrates database and application cloning and is policy-driven. The compact clones retain a realistic look and feel to the non-production data for accurate Test/Dev purposes, while securely shielding the actual data from the Test/Dev environment workers. The users still have the database structure they need, including application business rules and database relationships, data integrity and accuracy, Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com 5 of 8
  • 6. S O L U T I O N and proper database access and control including allocating rights to roles. Data Protection Techniques Securing cloned database applications is a fundamental piece of the Test/Dev puzzle. Solix provides a policy engine, multiple security techniques, and knowledge bases to automate the secure cloning process. Since even a single Test/Dev breach of sensitive data can be disastrous, Solix provides a critical piece of technology for protecting companies from data privacy and compliance penalties and liabilities. Solix Secure Test and Development solution comes with a pre-populated knowledge base containing over twenty populated data security algorithms, and supports the ability to add custom algorithms as needed. IT can define security policies at the application module, transaction, table or column level. The same repository also operates for related operations such as instance subsetting. Users do not have to be data security experts to choose the correct set of algorithms. Solix’s user interface lets users select the sensitive database tables and columns they wish to protect and their security parameters. Solix maintains a comprehensive knowledge base of metadata concerning an enterprise application’s data model, which allows it to automatically identify all places where a column is referenced in a given application and apply secured values generated by the optimal data security algorithm. Solix’s knowledge base includes metadata on application data models from major 87 Elm Street, Suite 900 P R O F I L E enterprise applications like Oracle, SAP, and custom-built PeopleSoft, applications. This allows Solix to apply data protection techniques to application data while preserving its referential integrity – vital for providing a structurally correct but completely secure clone for the Test/Dev environment. Secure Elements Solix uses scrambling, masking, encryption, nulling out, substitution, and shuffling techniques to secure database clones. All of the techniques employ the metadata repository for applying policy-driven automation and a data model repository to observe enterprise application data models. • Data Scrambling uses an algorithm to scramble data so that it is completely indecipherable. Only when unscrambling algorithms are applied can the data be read again. • Data Masking identifies columns of data and replaces existing characters with designated characters or numbers. The method preserves formatting for testing reports or user interfaces. • Encryption/Decryption encrypts data into special characters and destroys formatting so that the database is unreadable. Decryption keys revert data back into its readable form. Solix uses the DES algorithm. • Nulling Out replaces an entire column with null values. Nulling out is a limited technique as key data columns cannot Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com 6 of 8
  • 7. S O L U T I O N always be made null, but is a simple and straightforward procedure. • Substitution randomly replaces real production data with realistic-looking fake data and preserves formatting. This substituted data has the same look and feel as the real data for accurate Test/Dev purposes, but does not correlate with the original data or data related to it. • Shuffling is similar to substitution in that it randomly replaces data with fake data. The false values are obtained by shuffling column values, for instance by deliberately mismatching first names with last names. Key Benefits of Solix Data Security Solution Benefit #1: Streamline non-production databases for Test/Dev environments. After Solix creates a masked clone of the production database, IT can choose to create streamlined copies of the clone by removing large sets of data that are not necessary for a given Test/Dev task. The remaining subset is smaller, taking up fewer storage resources and resulting in shorter testing times on limited subsets. Benefit #2: Easily clone using the most recent production data. Since cloning with Solix is simple and secure, it is easy to clone updated databases for Test/Dev environments. The compact and secure clones can themselves be cloned without threatening sensitive data or overwhelming storage resources. 87 Elm Street, Suite 900 P R O F I L E Benefit #3: Leverage replication technology at the block level. Solix supports enterprise block replication software from major storage vendors like NetApp and EMC, so corporations can their leverage existing replication technologies. Solix Deployment Scenarios One of Solix’s Data Protection characteristics is its flexibility when creating clones and replicating them to different storage tiers. For example: 1. Tier 1 and Tier 2 storage on different platforms with no SAN. This environment requires host-based or file-based replication to create an initial clone, such as Veritas Replication Exec or Volume Replicator. Full clones can take time to replicate, but streamlined clones take much less. 2. Tier 1 and Tier 2 on different platforms with a SAN. This setup requires block-based replication. Users should leverage data protection software like NetApp’s Topio Data Protection Suite (TDPS) or EMC Recover Point (formerly Kashya). 3. Tier 1 and Tier 2 on the same platform with a SAN. In this case, the environment should leverage array replication technology such as EMC SAN Copy or NetApp FlexClone to make full clones or snaps. Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com 7 of 8
  • 8. S O L U T I O N Benefit #4: Cut costs. Smaller clones result in as much as a 50% storage reduction difference between full clones and subsets. Because Solix supports block replication to secondary storage, the enterprise can leverage existing replication applications and replicate to less costly Tier 2 storage, such as a NetApp filer with SATA drives. Taneja Group Opinion Test/Dev environments create tremendous challenges to the enterprise in the form of serious security risks, storage consumption, and high manual overhead. A single production data breach can easily result in millions of dollars in liability for the company, yet today most companies have not addressed the security of their test and development environments. As a result, they have left themselves open to severe legal liabilities and stiff penalties. Within this context, Solix offers a clear, hardcost ROI solution for securing and automating Test/Dev environments. Solix data security techniques are instrumental in protecting Test/Dev database application P R O F I L E clones from unauthorized access while retaining full database integrity. Solix can also create streamlined clones, which significantly reduces the overall data footprint of a Test/Dev clone and results in dramatic cost savings. And its automation, knowledge bases, and policy engine dramatically cut OPEX costs by automating manual procedures. We have already seen significant, high profile data security breaches at large corporations due to lost unencrypted tapes and stolen laptops with sensitive information. Taneja Group believes that it is only a matter of time until a major storage security breach headline will be attributed to an unprotected test and development environment. We urge corporations to reevaluate whether the security policies in place today are sufficient to protect sensitive information in outsourced or test and development environments from falling into the wrong hands. For those with significant outsourcing and insecure test development environments, we urge you to consider the strong ROI potential that Solix provides. NOTICE: The information and product recommendations made by the TANEJA GROUP are based upon public information and sources and may also include personal opinions both of the TANEJA GROUP and others, all of which we believe to be accurate and reliable. However, as market conditions change and not within our control, the information and recommendations are made without warranty of any kind. All product names used and mentioned herein are the trademarks of their respective owners. The TANEJA GROUP, Inc. assumes no responsibility or liability for any damages whatsoever (including incidental, consequential or otherwise), caused by your use of, or reliance upon, the information and recommendationspresented herein, nor for any inadvertent errors which may appear in this document. 87 Elm Street, Suite 900 Copyright© The TANEJA Group, Inc. 2003. All Rights Reserved Hopkinton, MA 01748 Tel: 508-435-5040 Fax: 508-435-1530 www.tanejagroup.com 8 of 8