This might be a strange topic given that the release of SharePoint 2010 is just around the corner, but I wanted to respond to a couple of questions and debates I have been involved with in my temporary role in the partner team.
I would like to start by going back to the early days of Microsoft BI, analysis services (and OLAP services before it) were just getting established but there was no analysis services client from Microsoft to give users full access to the cubes in analysis services. There were two third party contenders out there Panorama NovaView and ProClarity. These were both web clients and as they evolved they both developed portals form which reports and content could be accessed and changed. They also had security baked into them on top of what was in analysis services itself. ProClarity was acquired by Microsoft and the descendants visualisations in that tool (such as the decomposition tree) are now in SharePoint 2010 enterprise.
Panorama continues to be a Microsoft partner and is a good choice for business who just want a web client to get at their analysis services cubes, or even to get more functionality out of PowerPivot. They also continue to have their own portal or can integrate with SharePoint as desired. There also another 40+ products form partners out there which also provide web access to cubes, and here is a good a list as I’ve found of them
The other key Microsoft BI offering is reporting services which either has its own portal complete with security (Report Manager) or can be integrated into SharePoint.
So you don’t have to use SharePoint to provide Microsoft based BI to your users, but I would submit you are going to need some sort of portal, even if this is just a set of web pages where users can see content they are allowed to see and add more content to it (again subject to security).
However if you want to provide access to reporting and analytics to your users then SharePoint or a similar dedicated portal would be a better option as you can then provide a single point of entry and a single security mechanism to control access to BI.
On the question of cost you could just use SharePoint Foundation (the successor to Windows SharePoint Services), and SQL Server Standard edition, this would give you reporting services integration, and the other key parts of the Microsoft BI stack (analysis services and integration services). However you won’t get the performance point monitoring and analytics (which is in SharePoint enterprise) so the money you save by doing this must be off set against the need to buy a third party tool (like those I have listed above) to replace this functionality. You might not actually save any money and the solution could be more complex, but it might be exactly what your users need. This is a good thing, both for business and for Microsoft:
What I would suggest is to at least have a look at SharePoint 2010 as it’s scarily easy to set up and use even for this old DBA.
I thought it would be good to write up my talk at the IT Manager TechDays last week, as I get a fair number of questions and the information is not always easy to find. First let me explain what I mean by Governance: It is the policies, best practices, enforcement and training needed to address the compliance requirements of a business as part of its risk management strategy.
This then leads down to a set of things you decide you need to do to be compliant. You then have a list of features in products like SQL Server which might be useful in assisting in these processes. My top features of interest in SQL Server 2008 would be:
Of course securing and auditing SQL Server itself is only part of the story:
However how does that all that fit into the regulations and compliance requirements that exist such as European Data Protection, ISO 27001, Payment Card Industry? A key point is that Microsoft itself has to be compliant with all these standards – it holds customer data, it has mechanisms like XBOX live and BT Vision that have to process credit card payments. Moreover this all runs on SQL Server, so where possible Microsoft IT can simply share its approach to compliance, where this might be difficult for the Microsoft consultants working on clients’ projects to do.
Your first port of call should be the whitepaper reaching compliance. This includes sections on addressing vulnerability, defining risk management models, and managing security configurations. There are also links to hands on labs to put help you with the features I have described above.
There is also Microsoft’s Data Governance Portal, which includes a number of solution accelerators such as one specifically for Payment Card Industry compliance, which I mention because I get asked about it so often!
Hopefully this will give you all the resources you need to meet your compliance needs, and give you the ammunition to debunk a few myths that may exist in your organisation leaving you to get on with the relatively painless task of configuring SQL Server for your compliance needs. If you have questions about compliance please feel free to contact me – I will try my best to get you the answer you need.
My parting shot is that compliance is a process and not a product.
The latest Security Intelligence Report SIRv8 has just landed with a thud in my in box, (you can get yours here). I am not going to regurgitate it wholesale but I wanted to draw your attention to a couple of things..
Windows x64 RTM is the most secure OS in this list closely followed by Windows Server 2008 R2. This isn’t surprising as they share the same kernel and remember this version of Windows Server is only x64 so all the threat management that goes into the server OS bubbles up in Windows 7. You may remember forma previous post of mine that Windows 7 x64 is rapidly becoming the gamers platform of choice, so it isn’t a niche offering and should become more popular now that Office 2010 is also available in x64.
Another point in this report is that “breach incidents are twice as likely to occur because of human negligence. Sometimes security policy makes things worse, like the government department where my best friend works which has an arcane encryption system that generates a random password which has to be used at every reboot. The only way to remember this is to write it done so #fail on that one. Things like BitLocker in windows 7 mean that if you do leave pen drive or a whole laptop on a train at least the data won’t be compromised, but of course civil servants love paper and that is far more easily compromised e.g. Bob Quick’s counter terrorism error which is why I think the printer is the major security risk in any IT organisation!
Allied to this is the growing sophistication of malware particularly those actually masquerading as ant-malware solutions like these..
Hopefully in your role as the neighbourhood IT Pro you are already aware of these and how to deal with them, but if you need a starter for ten then there is the Protect consumer orientated security site from Microsoft..
My final point is that threats are now coming from a mix organised crime and state sponsored attacks which means big investments and smart people are behind these attacks, so we all have to be even more vigilant just to keep up.
So have a read of the report even if’s just the overview and be safe out there!
a guest post by Greg Charman, Technical Solutions Professional, Microsoft UK
In December 2009 Microsoft acquired Opalis, a specialist provider of IT Process Automation (ITPA) software. The Opalis product is currently in the process of being fully integrated into the System Center family of datacenter management products.
IT Process Automation (ITPA), also known as Run Book Automation (RBA) software, provides a platform to design and run IT processes. Standardising the IT processes that underpin IT services means best practices can be deployed across the environment, regardless of the underlying management infrastructure. This is achieved by orchestrating and integrating the existing IT tools.
Traditional IT tools support the functions of one particular IT silo, sometimes offering automation of tasks within that silo function. In reality, IT business processes cross multiple IT silos. Currently the bridge between process silos is provided by human intervention and this increases the propensity for delays, errors and incorrect rekeying of data. Opalis enables the integration and orchestration of different IT process automation tools in each of the silos to support an entire end-to-end IT business process.
Most organisations operate heterogeneous datacentres. As a part of the System Center portfolio, Opalis workflow processes orchestrate System Center products and integrates them with non-Microsoft systems to enable interoperability across an entire datacentre. Opalis provides solutions that address the systems management needs of complex heterogeneous datacentre environments and has developed integration packs to management software from Microsoft, IBM, BMC, CA, HP, VMware, EMC, and Symantec. This enables users to automate best practices such as incident triage and remediation, service provisioning and change management process, and achieve interoperability across tools.
The combined offering of Opalis and System Center provides the ability to orchestrate and integrate IT management through workflow and simplifies routine systems management tasks in complex heterogeneous environments by:
The combination of the new capabilities from System Center in 2010, such as Service Manager and Dynamic Infrastructure Toolkit for System Center (DIT-SC), with Opalis and the rest of System Center suite enables Microsoft to deliver a comprehensive suite of system management tools for “Infrastructure on Demand” requirements in heterogeneous environments.
There is more information on Opalis + System Center at the links below and a technology roadmap fully integrating Opalis as part of the Microsoft System Center portfolio will be available shortly to clarify how System Center is becoming an increasingly powerful systems management platform for heterogeneous datacentre environments
More information on Opalis and System Center:
Opalis + System Center IT Process Automation example procedure
Imagine a user has a requirement for a new virtual server which will host a business application: