SlideShare ist ein Scribd-Unternehmen logo
1 von 26
InfoSphere Optim Test Data Management Solution– IMS Focus Peter Costigan – Product Line Manager, Optim Solutions 9/28/2011
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mastering information across the Information Supply Chain Transactional & Collaborative  Applications Business Analytics  Applications External Information Sources Trusted    Relevant     Governed Analyze Integrate Manage Cubes   Streams  Big Data  Master Data Content Data Streaming Information Information  Governance Data  Warehouses Content Analytics   Govern Quality Security &  Privacy Lifecycle Standards Integrate  & Cleanse
Requirements to manage data across its lifecycle Validate test results Define policies Report & retrieve archived data Enable compliance with retention &  e-discovery Move only the needed information Integrate into single data source Create & refresh test data Manage data growth Classify & define data and relationships Develop database structures & code Enhance performance Discover where  data resides Develop & Test Discover & Define Optimize, Archive  & Access Consolidate & Retire Information Governance Core Disciplines Lifecycle Management
How test data creation is often accomplished ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Negatives Positives Clone Production Database Test Database Development
Test Data Management Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Benefits :  Improving application quality & customer satisfaction
Optim Captures Complete Business Objects Business data is related across a wide variety of  data sources
InfoSphere Optim Test Data Management Solution 100 GB 25 GB 50 GB ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Production or Production Clone 25 GB 2TB Development Unit Test Training Integration Test Mask / Remap Insert / Update / Load Compare Extract Related subsets
Business benefits of Test Data Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TDM Business Value Assessment: Detailed Financial Analysis
Sensitive Production Data: What’s the risk? Hundreds of thousands of secret reports regarding US wars in Iraq and Afghanistan published on WikiLeaks. December 2010:  A private in the US military, downloaded top secret military documents and passed them to journalist for publication.  This puts US national security at risk as well as the lives of those named in reports.   Unprotected test data sent to and used by test/development teams as well as third-party consultants. February 2009:  An FAA server used for application development & testing was breached, exposing the personally identifiable information of 45,000+ employees. SQL injection is fast becoming one of the biggest and most high profile web security threats. April 2011 : A mass SQL injection attack that initially compromised 28,000 websites shows no sign of slowing down. Known as LizaMoon, this malicious code is after anything stored in a database. Hackers obtained personal information on 70 million subscribers.  April 2011:  Malicious outsiders stole name, address (city, state, zip), country, email address, birth date, PlayStation Network/Qriocity password and login, and handle/PSN online ID, and possibly credit card numbers from 70 million Sony PlayStation users.
What is data masking? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
InfoSphere Optim Data Masking Solution / Option Example 2 Example 1 Referential integrity is maintained with key propagation Data is masked with contextually correct data to preserve integrity of test data PersNbr FstNEvtOwn LstNEvtOwn 27645 Elliot Flynn 27645 Elliot Flynn Event Table PersNbr FstNEvtOwn LstNEvtOwn 10002 Pablo Picasso 10002 Pablo Picasso Event Table Personal Info Table PersNbr FirstName LastName 08054 Alice  Bennett 19101 Carl  Davis 27645 Elliot  Flynn Personal Info Table PersNbr FirstName LastName 10000 Jeanne  Renoir 10001 Claude  Monet 10002 Pablo  Picasso ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Data masking techniques include: Patient Information Patient No. SSN Name Address City   State Zip 112233 123-45-6789 Amanda Winters 40 Bayberry Drive Elgin IL 60123 123456 333-22-4444 Erica Schafer 12 Murray Court Austin TX 78704 ,[object Object],[object Object],[object Object]
What is IMS Data to InfoSphere Optim? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],--  ----  ----  ----  -------  ---- EMPLOYEE --  ----  ----  ----  -------  ---- DEPARTMENT --  ----  ----  ----  -------  ---- --  ----  ----  ----  -------  ---- JOB
InfoSphere Optim z/OS IMS Definitions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IMS  DB  Optim Directory EMPLOYEE VENDITEM OPT.PROD. PSTDEPDB VSAM File OPT.PROD. VENDITEM copybooks Legacy Table Definition(s) Legacy Table Definition(s) Legacy Table Definition(s) IMS  Definitions Maps Legacy Tables Relationships Definitions
InfoSphere Optim z/OS Platform Access to Data Sources DB2 IMS VSAM / Seq ,[object Object],InfoSphere Optim & DB2 for z/OS ,[object Object],[object Object],[object Object],[object Object],[object Object]
InfoSphere Optim Distributed Platform Access to Data Sources Data sources / tables exposed as Nicknames Classic Federation ODBC Client Client Client ,[object Object],[object Object]
InfoSphere Optim z/OS Requirements for IMS / VSAM / Sequential ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Requirements to manage data across its lifecycle Validate test results Define policies Report & retrieve archived data Enable compliance with retention &  e-discovery Move only the needed information Integrate into single data source Create & refresh test data Manage data growth Classify & define data and relationships Develop database structures & code Enhance performance Discover where  data resides Develop & Test Discover & Define Optimize, Archive  & Access Consolidate & Retire Information Governance Core Disciplines Lifecycle Management
Discovery: You can’t manage what you don’t understand ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
InfoSphere Discovery Speeds Understanding Data Table 1 Table 25 The Discovery Engine analyzes  data values  to  automatically   discover  the columns that  relate rows  across data sources, and the   columns which contain  sensitive data . IBM InfoSphere  Discovery Hit Rate:  98% X  - Row  Member SS # Age Phone Sex 1 595846226 123-45-6789 15 (123) 456-7890 M 2 567472596 138-27-1604 8 (138) 271-6037 F 3 540450092 154-86-4196 22 (154) 864-1961 M 4 514714372 173-44-7900 55 (173) 447-8996 F 5 490204164 194-26-1648 4 (194) 261-6476 F 6 466861109 217-57-3046 66 (217) 573-0453 M 987,623 444629628 243-68-1812 25 (243) 681-8107 F 987,624 423456789 272-92-3629 87 (272) 923-6280 M ID Demo1 595846226 0 567472596 1 540450091 2 514714372 3 490204164 1 466861109 0 444629628 3 423456789 2
InfoSphere Optim Data Growth Solution Compressed  Archives 2 - 4 Years Active/Historical Online InfoSphere Optim ,[object Object],[object Object],[object Object],[object Object],[object Object],Archive Restore Non DBMS  Retention Platform ATA File Server EMC Centera™, DR550, Etc. 4 - 6 Years On/Near-Line Archive Native access Additional Options ODBC / JDBC XML SQL Excel Access   Off-line Retention Platform CD,Tape,Optical, WORM, IBM TSM, NetApp NearStore® SnapLock™, IBM Total Storage® solutions (including the DR550)  EMC Centera™.  6+ Years Off-Line Archive U N I V E R S A L A C C E S S Production Data 1 - 2 Years Current Data
InfoSphere Optim Application Retirement ,[object Object],[object Object],[object Object],Infrastructure before Retirement Archived Data after Consolidation ` User Archive Data Archive Engine ` User ` User ` User Database Application Data ` User Database Application Data ` User Database Application Data
Conclusion ,[object Object],[object Object],[object Object],[object Object]
Learn more ,[object Object],[object Object],[object Object],[object Object]
 

Weitere ähnliche Inhalte

Andere mochten auch

Test Data Management a Managed Service for Software Quality Assurance
Test Data Management a Managed Service for Software Quality AssuranceTest Data Management a Managed Service for Software Quality Assurance
Test Data Management a Managed Service for Software Quality AssuranceSoftware Testing Solution
 
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...CA Technologies
 
How Can Test Data Management Overcome Mainframe Testing Challenges?
How Can Test Data Management Overcome Mainframe Testing Challenges?How Can Test Data Management Overcome Mainframe Testing Challenges?
How Can Test Data Management Overcome Mainframe Testing Challenges?CA Technologies
 
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...CA Technologies
 
Test data management a case study Presented at SiGIST
Test data management a case study Presented at SiGISTTest data management a case study Presented at SiGIST
Test data management a case study Presented at SiGISTrenardv74
 
GM Financial's Test Data Management and Automated Testing Journey
GM Financial's Test Data Management and Automated Testing JourneyGM Financial's Test Data Management and Automated Testing Journey
GM Financial's Test Data Management and Automated Testing JourneyCA Technologies
 

Andere mochten auch (8)

Test Data Management a Managed Service for Software Quality Assurance
Test Data Management a Managed Service for Software Quality AssuranceTest Data Management a Managed Service for Software Quality Assurance
Test Data Management a Managed Service for Software Quality Assurance
 
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
Pre-Con Ed: Test Data Management and Compliance: Is your Test Data Ready for ...
 
How Can Test Data Management Overcome Mainframe Testing Challenges?
How Can Test Data Management Overcome Mainframe Testing Challenges?How Can Test Data Management Overcome Mainframe Testing Challenges?
How Can Test Data Management Overcome Mainframe Testing Challenges?
 
Fidelity Test Data Management
Fidelity Test Data ManagementFidelity Test Data Management
Fidelity Test Data Management
 
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
 
Test data management a case study Presented at SiGIST
Test data management a case study Presented at SiGISTTest data management a case study Presented at SiGIST
Test data management a case study Presented at SiGIST
 
Test Data Management - Keytorc Approach
Test Data Management - Keytorc ApproachTest Data Management - Keytorc Approach
Test Data Management - Keytorc Approach
 
GM Financial's Test Data Management and Automated Testing Journey
GM Financial's Test Data Management and Automated Testing JourneyGM Financial's Test Data Management and Automated Testing Journey
GM Financial's Test Data Management and Automated Testing Journey
 

Ähnlich wie Optim test data management for IMS 2011

Ibm Optim Techical Overview 01282009
Ibm Optim Techical Overview 01282009Ibm Optim Techical Overview 01282009
Ibm Optim Techical Overview 01282009lucascibm
 
Keeping Private Data Private
Keeping Private Data PrivateKeeping Private Data Private
Keeping Private Data PrivateDobler Consulting
 
Optim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentationOptim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentationInSync Conference
 
Qiagram
QiagramQiagram
Qiagramjwppz
 
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Cambridge Semantics
 
Organizational compliance and security SQL 2012-2019 by George Walters
Organizational compliance and security SQL 2012-2019 by George WaltersOrganizational compliance and security SQL 2012-2019 by George Walters
Organizational compliance and security SQL 2012-2019 by George WaltersGeorge Walters
 
Modern management of data pipelines made easier
Modern management of data pipelines made easierModern management of data pipelines made easier
Modern management of data pipelines made easierCloverDX
 
Enterprise Data and Analytics Architecture Overview for Electric Utility
Enterprise Data and Analytics Architecture Overview for Electric UtilityEnterprise Data and Analytics Architecture Overview for Electric Utility
Enterprise Data and Analytics Architecture Overview for Electric UtilityPrajesh Bhattacharya
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalQuek Lilian
 
Big Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataBig Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataHitachi Vantara
 
Data Mining with SQL Server 2008
Data Mining with SQL Server 2008Data Mining with SQL Server 2008
Data Mining with SQL Server 2008Peter Gfader
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionUlf Mattsson
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfshyedshahriar
 
Data science training in hyderabad
Data science training in hyderabadData science training in hyderabad
Data science training in hyderabadGeohedrick
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007brzaaap
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016George Walters
 
Standardization of “Safety Drug” Reporting Applications
Standardization of “Safety Drug” Reporting ApplicationsStandardization of “Safety Drug” Reporting Applications
Standardization of “Safety Drug” Reporting Applicationshalleyzand
 

Ähnlich wie Optim test data management for IMS 2011 (20)

Ibm Optim Techical Overview 01282009
Ibm Optim Techical Overview 01282009Ibm Optim Techical Overview 01282009
Ibm Optim Techical Overview 01282009
 
Keeping Private Data Private
Keeping Private Data PrivateKeeping Private Data Private
Keeping Private Data Private
 
Optim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentationOptim Insync10 Paul Griffin presentation
Optim Insync10 Paul Griffin presentation
 
Qiagram
QiagramQiagram
Qiagram
 
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
Anzo Smart Data Lake 4.0 - a Data Lake Platform for the Enterprise Informatio...
 
Organizational compliance and security SQL 2012-2019 by George Walters
Organizational compliance and security SQL 2012-2019 by George WaltersOrganizational compliance and security SQL 2012-2019 by George Walters
Organizational compliance and security SQL 2012-2019 by George Walters
 
Modern management of data pipelines made easier
Modern management of data pipelines made easierModern management of data pipelines made easier
Modern management of data pipelines made easier
 
ITReady DW Day2
ITReady DW Day2ITReady DW Day2
ITReady DW Day2
 
Enterprise Data and Analytics Architecture Overview for Electric Utility
Enterprise Data and Analytics Architecture Overview for Electric UtilityEnterprise Data and Analytics Architecture Overview for Electric Utility
Enterprise Data and Analytics Architecture Overview for Electric Utility
 
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra RizalWave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
Wave 14 - Winodws 7 Security Story Core by MVP Azra Rizal
 
Big Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataBig Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark Data
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Data Mining with SQL Server 2008
Data Mining with SQL Server 2008Data Mining with SQL Server 2008
Data Mining with SQL Server 2008
 
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data ProtectionISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
ISSA Boston - PCI and Beyond: A Cost Effective Approach to Data Protection
 
CISSP Cheatsheet.pdf
CISSP Cheatsheet.pdfCISSP Cheatsheet.pdf
CISSP Cheatsheet.pdf
 
Data science training in hyderabad
Data science training in hyderabadData science training in hyderabad
Data science training in hyderabad
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016
 
Standardization of “Safety Drug” Reporting Applications
Standardization of “Safety Drug” Reporting ApplicationsStandardization of “Safety Drug” Reporting Applications
Standardization of “Safety Drug” Reporting Applications
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 

Kürzlich hochgeladen

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Kürzlich hochgeladen (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Optim test data management for IMS 2011

  • 1. InfoSphere Optim Test Data Management Solution– IMS Focus Peter Costigan – Product Line Manager, Optim Solutions 9/28/2011
  • 2.
  • 3. Mastering information across the Information Supply Chain Transactional & Collaborative Applications Business Analytics Applications External Information Sources Trusted  Relevant  Governed Analyze Integrate Manage Cubes Streams Big Data Master Data Content Data Streaming Information Information Governance Data Warehouses Content Analytics Govern Quality Security & Privacy Lifecycle Standards Integrate & Cleanse
  • 4. Requirements to manage data across its lifecycle Validate test results Define policies Report & retrieve archived data Enable compliance with retention & e-discovery Move only the needed information Integrate into single data source Create & refresh test data Manage data growth Classify & define data and relationships Develop database structures & code Enhance performance Discover where data resides Develop & Test Discover & Define Optimize, Archive & Access Consolidate & Retire Information Governance Core Disciplines Lifecycle Management
  • 5.
  • 6.
  • 7. Optim Captures Complete Business Objects Business data is related across a wide variety of data sources
  • 8.
  • 9.
  • 10. TDM Business Value Assessment: Detailed Financial Analysis
  • 11. Sensitive Production Data: What’s the risk? Hundreds of thousands of secret reports regarding US wars in Iraq and Afghanistan published on WikiLeaks. December 2010: A private in the US military, downloaded top secret military documents and passed them to journalist for publication. This puts US national security at risk as well as the lives of those named in reports. Unprotected test data sent to and used by test/development teams as well as third-party consultants. February 2009: An FAA server used for application development & testing was breached, exposing the personally identifiable information of 45,000+ employees. SQL injection is fast becoming one of the biggest and most high profile web security threats. April 2011 : A mass SQL injection attack that initially compromised 28,000 websites shows no sign of slowing down. Known as LizaMoon, this malicious code is after anything stored in a database. Hackers obtained personal information on 70 million subscribers. April 2011: Malicious outsiders stole name, address (city, state, zip), country, email address, birth date, PlayStation Network/Qriocity password and login, and handle/PSN online ID, and possibly credit card numbers from 70 million Sony PlayStation users.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Requirements to manage data across its lifecycle Validate test results Define policies Report & retrieve archived data Enable compliance with retention & e-discovery Move only the needed information Integrate into single data source Create & refresh test data Manage data growth Classify & define data and relationships Develop database structures & code Enhance performance Discover where data resides Develop & Test Discover & Define Optimize, Archive & Access Consolidate & Retire Information Governance Core Disciplines Lifecycle Management
  • 20.
  • 21. InfoSphere Discovery Speeds Understanding Data Table 1 Table 25 The Discovery Engine analyzes data values to automatically discover the columns that relate rows across data sources, and the columns which contain sensitive data . IBM InfoSphere Discovery Hit Rate: 98% X - Row Member SS # Age Phone Sex 1 595846226 123-45-6789 15 (123) 456-7890 M 2 567472596 138-27-1604 8 (138) 271-6037 F 3 540450092 154-86-4196 22 (154) 864-1961 M 4 514714372 173-44-7900 55 (173) 447-8996 F 5 490204164 194-26-1648 4 (194) 261-6476 F 6 466861109 217-57-3046 66 (217) 573-0453 M 987,623 444629628 243-68-1812 25 (243) 681-8107 F 987,624 423456789 272-92-3629 87 (272) 923-6280 M ID Demo1 595846226 0 567472596 1 540450091 2 514714372 3 490204164 1 466861109 0 444629628 3 423456789 2
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.  

Hinweis der Redaktion

  1. This presentation is the Essentials of Test Data Management part of the InfoSphere Information Lifecycle Management Solutions
  2. We are going to cover the following: -Information Governance: Review -What is Test Data Management -Role of Test Data Management in the Testing Discipline -Risks and Challenges of Poor Test Data Management -Best Practices in Test Data Management -Data Privacy Concerns with Test Data -IBM InfoSphere Optim Test Data Management Solution -Conclusion
  3. This slide you have seen in the Information Lifecycle Management presentation. There are typically hundreds or even thousands of different systems throughout an organization. Information can come in from many places (transaction systems, operational systems, document repositories, external information sources), and in many formats (data, content, streaming). Wherever it comes from, there are often meaningful relationships between various sources of data. We manage all this information in our systems, integrate to build warehouses and master the data to get single views and analyze it to make business decisions. This is a supply chain of information, flowing throughout the organization. Integration information, ensuring its quality and interpreting it correctly is crucial to using the information to make better decisions. Information must be turned into a trusted asset, and governed to maintain the quality over its lifecycle.
  4. We went through the requirements for Information lifecycle management. We are focusing on Develop and Test. Specifically efficiently creating the test & development environments (and protecting sensitive data within), effectively validating test results and quickly & securely deploying the application
  5. How our enterprises creating test data today…manually or just cloning their entire production to obtain their test database. The downside of cloning your entire production is that you now have a data growth problem and uses significant storage. In addition, you have a privacy issues because you have exposed sensitive data to developers and testers using production data for testing.
  6. The business benefits of test data management: More time for testing In many organizations, 30-40% of test script execution is spent on manufacturing new test data…and much of this is done manually today. Automating Test Data Management will reduce the amount of time spent creating new data thereby allowing for the execution of more tests Reduce cost Maximize allocated disk space Catch errors earlier in the testing cycle because now you have realistic test data to test with. Shift errors from production to test Increase data quality Enforce data ownership Test Data Management offers role driven security to support level segmentation of the development and testing teams Reduce data dependencies across test sets Multiple test sets often use the same data, but different tests can negatively impact other tests using the same data. Test Data Management allows for the creation of an unlimited number of test data sets and can create unique IDs each time to ensue clean data is used when testing
  7. Why is it important to mask sensitive information….some examples: -Hackers obtained personal information on 70 million subscribers to Sony PlayStation . See article: http://online.wsj.com/article/SB10001424052748704587004576245131531712342.html 'LizaMoon' Mass SQL Injection Attack Escalates Out of Control. See article: http://www.eweek.com/c/a/Security/LizaMoon-Mass-SQL-Injection-Attack-Escalates-Out-of-Control-378108/ -Federal Aviation Administration: Exposes unprotected test data to a third party http://fcw.com/articles/2009/02/10/faa-data-breach.aspx Release of thousands of classified documents by WikiLeaks founder Julian Assange jeopardizes U.S. national security. US Army launches investigation. http://www.mcclatchydc.com/2010/12/23/105763/army-wikileaks-probe-could-lead.html
  8. Ever since the inception of Information Technology (aka Electronic Data Processing) it has become commonly accepted to allow a certain percentage of IT staff to have access to the production environment. These "trusted employees" were carefully screened and usually in close proximity to executive management due to the confidentiality of critical sensitive corporate data. Originally, this was a practical matter and was voluntarily implemented by the enterprise. Over the years, the onslaught of international Data Privacy Legislation has made this a compliance matter as well. Today's large, multi-national enterprise is faced with numerous cross-border data privacy exposures. Additionally with the deployment of third-party contractors, there is further separation from the traditional "trusted employee". Data Masking provides development teams with meaningful test data, without exposing sensitive private information. Static data masking is the most common and most tradition approach. Static data masking extracts rows from production databases, conceal data values that ultimately get stored in the columns in the test databases. The concealed values are physically stored in the target databases. Dynamic data masking (a term coined by Gartner), is an emerging technology that performs data obfuscation at the presentation layer in real time. Implemented at the SQL protocol layer, operating as a database listener, in-bound SQL from any application is inspected and then dynamically re-written to include the appropriate masking function. The result is data masking at the presentation layer without having to change the underlying database or the application source code.
  9. We went through the requirements for Information lifecycle management. We are focusing on Develop and Test. Specifically efficiently creating the test & development environments (and protecting sensitive data within), effectively validating test results and quickly & securely deploying the application
  10. Most companies are still struggling with the first step of understanding their complex heterogeneous data landscapes for test data management. – with the resulting impact on the overall quality of applications. Some of the challenges are knowing what data is needed for test cases, lack of understanding of where data is located and how the data is related, limited understanding of the confidential data elements. It’s cost prohibitive to conduct manual analysis and hand coding.
  11. -Test Data Management allows development teams to accelerate testing activities on a project -Test Data Management exploits production data while ensuring security of confidential data -Providing testers and developers with access to test data can improve operational efficiency and optimize resources on a project -A comprehensive Test Data Management solution is needed to minimize cost and shorten development cycles
  12. You want to point customers to the InfoSphere Optim ibm.com page, solution sheet, whitepaper and case study on test data management.
  13. Thank you!