ApexSQL Search 2013 R2 – Product update alert

ApexSQL Search 2013 R2 has been released

Type: Maintenance release

About ApexSQL Search: ApexSQL Search is a FREE SQL Server Management Studio and Visual Studio add-in, which finds text in SQL database objects and data in SQL database tables and views. It allows changing tables, views, stored procedures, functions, columns, parameter names and schema without breaking dependencies, while visualizing all objects’ interdependencies.

July 7, 2013

SQL Solution center round-up – June 21st, 2013

In the past two weeks we had some interesting SQL Solution Center articles describing SQL Server topics – each described as a problem (or a challenge) users may encounter with data recovery. Here is the aggregated summary:

July 5, 2013

ApexSQL Audit 2013 Beta – Product update alert

ApexSQL Audit 2013 Beta has been released

Type: Beta release

About ApexSQL Audit: ApexSQL Audit is a SQL Server auditing tool with a wide range of possibilities for auditing access, changes, and security on SQL Server instances, databases, and objects. It audits queries, execute and security (authentication changes, permissions changes, attempted logins) operations on tables, stored procedures, functions and views, saves captured information in a centralized auditing repository, and provides comprehensive reports

June 24, 2013

ApexSQL Build: Using custom database post-deployment scripts

When a SQL database is created or upgraded, data may need to be added, changed, or deleted. Additionally, certain actions may have to occur in the SQL database after the process completes, like permissions change, creating additional objects, users, or creating a script to send an e-mail containing a deployment notice, etc. Using ApexSQL Build’s custom post-deployment SQL scripts can be included in the process to accomplish this task.

June 10, 2013

ApexSQL Audit SQL auditing paradigm

Having an SQL auditing system in place seems like a straightforward way to harden the security of your SQL data. This way you can at least track the activities and changes done to your SQL Server instance and databases, and depending on the specific auditing system you are using, you might even prevent or roll back malicious or inadvertent changes. However, it’s important to keep in mind that just having a SQL auditing system up and running is not enough. Poorly planned or supervised auditing solutions may lull you into a false sense of security, and actually result in you discovering an information leak or data loss much later than if you had no auditing set up in the first place

June 7, 2013

Database auditing: Tamper-Evident design

ApexSQL Audit has been designed by recognizing the principle that it is impossible to prevent tampering by trusted parties with software-only solutions. Even the worst-case scenario of an attacker obtaining trusted privileges is thus simply reduced to treating all tampering the same, no matter where it comes from. So we’ve applied this principle in all areas that affect auditing, from capturing of audited data all the way to its storage. This has been critical in ensuring not only easy compliance, but actually making tampering obvious

May 28, 2013

Copy SQL scripts into another programming language

Developers often have to copy and store SQL scripts in different languages as strings. Manually “translating” SQL scripts into a language-specific string is a tedious process where mistakes are easily made

ApexSQL Refactor is a SQL formatter that can help out by inserting a language specific code before and after a SQL statement and adding escape characters for quotes and code to terminate a line. Copy SQL code as feature provides a simple way to convert a SQL script into a language-specific string – Java, VB.NET, C#, Perl, PHP, Delphi, PowerBuilder, Ruby, C++, or any other custom language for which a conversion rules are defined

May 23, 2013

SQL auditing – Why We Developed ApexSQL Audit – Part II

As we have seen in the 1st part of this article, in order to solve the overarching problem of easy compliance, we had to solve many different problems main of which were:

  1. Capturing of what-was-executed and of other auditing events of interest
  2. Fault tolerant auditing
  3. Centralized storage of audited data and integrity checks
  4. Centralized reporting
  5. Prevention from tampering of audited data, or exposure when prevention is not possible (e.g. data tampered by trusted user accounts, hacked or otherwise)

In this 2nd part of this article, we will go deeper into solutions that we applied to each of these problems

May 21, 2013