SlideShare a Scribd company logo
1 of 18
Download to read offline
How Can Test Data Management Overcome
Mainframe Testing Challenges?
Tom Finch
DevOps: Continuous Delivery
CA Technologies
Sr. Consultant, Presales
DO4X140S
@CAWorld
#CAWorld
Andrew Chapman
CA Technologies
VP, Product Management
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For Informational Purposes Only
Terms of this Presentation
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World
2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references
relate to customer's specific use and experience of CA products and solutions so actual results may vary.
Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights
and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software
product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current
information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The
development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion.
Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this
presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release
may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-available
basis. The information in this presentation is not deemed to be incorporated into any contract.
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
How a sophisticated, end-to-end test data
management strategy can be used to reduce
infrastructure costs and mitigate risk while
providing testers with all the data they need,
when they need it.
Tom Finch
CA Technologies
Sr. Consultant Pre-sales
Andrew
Chapman
CA Technologies
VP, Product
Management
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
WHAT IS TEST DATA MANAGEMENT (TDM)?
WHY IS TDM NEEDED?
SUMMARY
CA TEST DATA MANAGER
SUBSETTING AND MASKING
DATA GENERATION
1
2
3
4
5
6
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What is Test Data Management (TDM)?
‘… is the practice of applying a structured and
centralized approach to the management of test data at
an enterprise level, in order to reduce cost whilst
increasing efficiency and quality in development and
testing’
6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Why do we need to Mask or Generate Data on the Mainframe?
1. Copying production data risks non-compliance
2. The data is not of sufficient quality for testing
3. The way it is stored and provisioned is
inefficient, in terms of time and cost
4. Manual data creation is slow and error prone
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Using production data in testing is expensive, typically covers just 10-20% of the tests needed
and risks exposing sensitive data.
 Masking production data replaces sensitive data with equivalent but safe values
 Subsetting reduces infrastructure costs and provides an intelligent spread of data
 Generating “synthetic data” lets you quickly create smaller, more intelligent test data sets
which safely, provide maximum coverage and are reusable
 Security teams are pushing for engineering to have ‘Live Data Exception’ model
CA TDM, how it can help
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Data Subsetting and Masking
 Take subset of data – e.g. DB2 or IMS
CustID Name SSN Street
08052 Andrew Chapman 181-23-7171 87 Featherbed Lane
09112 Brian James 112-32-4435 12 Park Lane
08052 Andrew Chapman 181-23-7171 87 Featherbed Lane
07221 Tom Angle 771-11-8972 8 Boardwalk
CustID Name SSN Street
10000 Hikaru Sulu 545-95-1245 87 Featherbed Lane
10001 Nyota Uhura 802-41-3411 12 Park Lane
10000 Hikaru Sulu 545-95-1245 87 Featherbed Lane
10002 Pavel Chekov 325-74-6517 8 Boardwalk
CustID Item# Order Date
07221 80-25442 2015-01-25
07221 80-25442 2015-03-14
CustID Item# Order Date
10002 80-25442 2015-02-15
10002 80-25442 2015-05-19
Data retains structure, context and referential
integrity but does not contain “real” information.
Data masking is a mandatory operation for modern organizations. The
average cost per incident of data breach worldwide is $3.5m. In the
US, the risk was as high as $5.85m1.
In as many as 59% of these incidents, the risk could have been
mitigated by implementing best practices in masking sensitive data
and personally identifiable information.
1 Ponemon Institute, 2014
CA TDM allows users to mask data directly on the mainframe reducing
the reliance on slow, expensive Extract, Transform and reload
technologies to secure sensitive data and ensure compliance.
Masking the data directly on the mainframe can provide teams with
millions of rows of high quality, meaningful, referentially intact data,
in a matter of minutes!
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Production data sources
and files
Validation
Profiling
PII Discovery
Data Subset
CA TDM
1 2 3
Secure Data
Subsets
Test/Dev
Environments
Subset
SubsetSubset
DefinitionCustom Masking
Functions
Masking
Rules
Native Engines run on
mainframe
DB2 z/OS
DB2 UDB
VSAM
ISAM
IMS
non-indexed flat files
FTP
Efficient and effective data masking and subsetting
10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
“Empty”
Provision fit for purpose data anytime and every time!
Provision data with or without access to production systems!
Ready for Testing!
1. Automatically profile data, model it, and accurately measure its coverage
2. Generate rich synthetic data from out of the box functions which provides 100% coverage
3. Cover every outlier, unexpected result, boundary condition and negative path
4. Create thousands of rows of complex, inter-related data in minutes
Synthetically generate all the data you need
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Substitution Variables
Combinable Functions
CA TDM
Data Model
Generation
Bulking Scripts
Test
Data
Warehouse
Test/Dev Environments
1 2
4 5
Secure Data sets
3
6
Production data sources
and files
DB2 z/OS
DB2 UDB
VSAM
ISAM
IMS
non-indexed flat files
Synthetic Data Generation
12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Full enterprise Coverage, Mainframe and Distributed
 Mainframe:
– DB2 z/OS
– DB2 UDB
– VSAM
– ISAM
– IMS
– non-indexed flat files
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
CA Test Data Manager
The CA Test Data Management application suite can:
 Profile, subset and mask data
 Create synthetic data
– Create synthetic data on demand via web portal
 Optimize test cases
– Match test case criteria to existing data (Test Matching)
– Analyze the coverage of the existing data (Data Coverage)
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
DO4X142S
Move as Fast as Your Users with Mobile Test
Automation
11/19/2015 at 4:30pm
DO3T22S DevOps for a 10-Year-Old (Codebase) 11/19/2015 at 4:30pm
DO4X130S
Syntel's approach to Automated Testing Enabling
DevOps
11/19/2015 at 4:30pm
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Must-See Demos
Test Data
Manager
DevOps
Theater 4
DevOps Sim
DevOps
Theater 3
Test Case
Optimizer
DevOps
Theater 4
TDM
Integrations
DevOps
Theater 4
17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Follow On Conversations At…
Smart Bar
DevOps
Theater 4
Tech Talks
DevOps
Theater 4
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa
[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa
[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa
Insight Technology, Inc.
 
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
オラクルエンジニア通信
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
Amit Gatenyo
 

What's hot (20)

Oracle GoldenGate Performance Tuning
Oracle GoldenGate Performance TuningOracle GoldenGate Performance Tuning
Oracle GoldenGate Performance Tuning
 
[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa
[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa
[D11] SQL Server エンジニアに知ってもらいたい!! SQL Server チューニングアプローチ by masayuki ozawa
 
Clients in sap
Clients in sapClients in sap
Clients in sap
 
MySQL InnoDB Cluster - A complete High Availability solution for MySQL
MySQL InnoDB Cluster - A complete High Availability solution for MySQLMySQL InnoDB Cluster - A complete High Availability solution for MySQL
MySQL InnoDB Cluster - A complete High Availability solution for MySQL
 
Introduzione al cloud computing e microsoft azure
Introduzione al cloud computing e microsoft azureIntroduzione al cloud computing e microsoft azure
Introduzione al cloud computing e microsoft azure
 
Building Your Data Warehouse with Amazon Redshift
Building Your Data Warehouse with Amazon RedshiftBuilding Your Data Warehouse with Amazon Redshift
Building Your Data Warehouse with Amazon Redshift
 
Managing Websphere Application Server certificates
Managing Websphere Application Server certificatesManaging Websphere Application Server certificates
Managing Websphere Application Server certificates
 
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices FrameworkIntroducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
Extreme Replication - Performance Tuning Oracle GoldenGate
Extreme Replication - Performance Tuning Oracle GoldenGateExtreme Replication - Performance Tuning Oracle GoldenGate
Extreme Replication - Performance Tuning Oracle GoldenGate
 
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
[Oracle DBA & Developer Day 2012] 高可用性システムに適した管理性と性能を向上させるASM と RMAN の魅力
 
How Bayer Stopped Payments Pain with ISO20022
How Bayer Stopped Payments Pain with ISO20022How Bayer Stopped Payments Pain with ISO20022
How Bayer Stopped Payments Pain with ISO20022
 
CAP theorem and distributed systems
CAP theorem and distributed systemsCAP theorem and distributed systems
CAP theorem and distributed systems
 
From Development to Deployment - Use Akamai to Facilitate Workflow Automation
From Development to Deployment - Use Akamai to Facilitate Workflow AutomationFrom Development to Deployment - Use Akamai to Facilitate Workflow Automation
From Development to Deployment - Use Akamai to Facilitate Workflow Automation
 
게임 데이터 분석을 위한 Data Lake 구축과 Machine Learning 을 활용한 분석 Hands on Lab (안효빈 솔루션즈 ...
게임 데이터 분석을 위한 Data Lake 구축과 Machine Learning 을 활용한 분석 Hands on Lab (안효빈 솔루션즈 ...게임 데이터 분석을 위한 Data Lake 구축과 Machine Learning 을 활용한 분석 Hands on Lab (안효빈 솔루션즈 ...
게임 데이터 분석을 위한 Data Lake 구축과 Machine Learning 을 활용한 분석 Hands on Lab (안효빈 솔루션즈 ...
 
Mainframe – CONTROL-M
Mainframe – CONTROL-MMainframe – CONTROL-M
Mainframe – CONTROL-M
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Best practices for MySQL High Availability Tutorial
Best practices for MySQL High Availability TutorialBest practices for MySQL High Availability Tutorial
Best practices for MySQL High Availability Tutorial
 
Security best practices for informix
Security best practices for informixSecurity best practices for informix
Security best practices for informix
 
RDS Postgres and Aurora Postgres | AWS Public Sector Summit 2017
RDS Postgres and Aurora Postgres | AWS Public Sector Summit 2017RDS Postgres and Aurora Postgres | AWS Public Sector Summit 2017
RDS Postgres and Aurora Postgres | AWS Public Sector Summit 2017
 

Similar to How Can Test Data Management Overcome Mainframe Testing Challenges?

Similar to How Can Test Data Management Overcome Mainframe Testing Challenges? (20)

Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
Case Study: Manheim Implements Test Data Management to Reduce Testing Time an...
 
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
Infrastructure Performance Management: Flexibility Combining Breadth, Depth ...
 
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
When Downtime Isn’t an Option: Performance Optimization Analytics in the Era ...
 
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
The Known Unknown—Finding Lost, Abandoned and Hidden Regulated or Sensitive D...
 
Introduction to CA Service Virtualization
Introduction to CA Service VirtualizationIntroduction to CA Service Virtualization
Introduction to CA Service Virtualization
 
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodayBackup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, Today
 
Big Iron + Big Data = BIG DEAL! Unlock The Power of Your Mainframe Data
Big Iron + Big Data = BIG DEAL! Unlock The Power of Your Mainframe DataBig Iron + Big Data = BIG DEAL! Unlock The Power of Your Mainframe Data
Big Iron + Big Data = BIG DEAL! Unlock The Power of Your Mainframe Data
 
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance ManagementGo Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
Go Deep and Wide: No It’s Not a Football, It’s End-to-End Performance Management
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...
 
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
Technology Primer: Hey IT—Your Big Data Infrastructure Can’t Sit in a Silo An...
 
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT MonitoringCase Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
Case Study: U.S. Cellular Shares Its Playbook for Efficient IT Monitoring
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Using Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service VirtualizationUsing Artificial Intelligence to power Service Virtualization
Using Artificial Intelligence to power Service Virtualization
 
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
Case Study: Ball Corporation Spurs Customer Experience and Staff Productivity...
 
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
 

More from CA Technologies

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

How Can Test Data Management Overcome Mainframe Testing Challenges?

  • 1. How Can Test Data Management Overcome Mainframe Testing Challenges? Tom Finch DevOps: Continuous Delivery CA Technologies Sr. Consultant, Presales DO4X140S @CAWorld #CAWorld Andrew Chapman CA Technologies VP, Product Management
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only Terms of this Presentation © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2015 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 18, 2015, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if-available basis. The information in this presentation is not deemed to be incorporated into any contract.
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract How a sophisticated, end-to-end test data management strategy can be used to reduce infrastructure costs and mitigate risk while providing testers with all the data they need, when they need it. Tom Finch CA Technologies Sr. Consultant Pre-sales Andrew Chapman CA Technologies VP, Product Management
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHAT IS TEST DATA MANAGEMENT (TDM)? WHY IS TDM NEEDED? SUMMARY CA TEST DATA MANAGER SUBSETTING AND MASKING DATA GENERATION 1 2 3 4 5 6
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What is Test Data Management (TDM)? ‘… is the practice of applying a structured and centralized approach to the management of test data at an enterprise level, in order to reduce cost whilst increasing efficiency and quality in development and testing’
  • 6. 6 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Why do we need to Mask or Generate Data on the Mainframe? 1. Copying production data risks non-compliance 2. The data is not of sufficient quality for testing 3. The way it is stored and provisioned is inefficient, in terms of time and cost 4. Manual data creation is slow and error prone
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Using production data in testing is expensive, typically covers just 10-20% of the tests needed and risks exposing sensitive data.  Masking production data replaces sensitive data with equivalent but safe values  Subsetting reduces infrastructure costs and provides an intelligent spread of data  Generating “synthetic data” lets you quickly create smaller, more intelligent test data sets which safely, provide maximum coverage and are reusable  Security teams are pushing for engineering to have ‘Live Data Exception’ model CA TDM, how it can help
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Data Subsetting and Masking  Take subset of data – e.g. DB2 or IMS CustID Name SSN Street 08052 Andrew Chapman 181-23-7171 87 Featherbed Lane 09112 Brian James 112-32-4435 12 Park Lane 08052 Andrew Chapman 181-23-7171 87 Featherbed Lane 07221 Tom Angle 771-11-8972 8 Boardwalk CustID Name SSN Street 10000 Hikaru Sulu 545-95-1245 87 Featherbed Lane 10001 Nyota Uhura 802-41-3411 12 Park Lane 10000 Hikaru Sulu 545-95-1245 87 Featherbed Lane 10002 Pavel Chekov 325-74-6517 8 Boardwalk CustID Item# Order Date 07221 80-25442 2015-01-25 07221 80-25442 2015-03-14 CustID Item# Order Date 10002 80-25442 2015-02-15 10002 80-25442 2015-05-19 Data retains structure, context and referential integrity but does not contain “real” information. Data masking is a mandatory operation for modern organizations. The average cost per incident of data breach worldwide is $3.5m. In the US, the risk was as high as $5.85m1. In as many as 59% of these incidents, the risk could have been mitigated by implementing best practices in masking sensitive data and personally identifiable information. 1 Ponemon Institute, 2014 CA TDM allows users to mask data directly on the mainframe reducing the reliance on slow, expensive Extract, Transform and reload technologies to secure sensitive data and ensure compliance. Masking the data directly on the mainframe can provide teams with millions of rows of high quality, meaningful, referentially intact data, in a matter of minutes!
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Production data sources and files Validation Profiling PII Discovery Data Subset CA TDM 1 2 3 Secure Data Subsets Test/Dev Environments Subset SubsetSubset DefinitionCustom Masking Functions Masking Rules Native Engines run on mainframe DB2 z/OS DB2 UDB VSAM ISAM IMS non-indexed flat files FTP Efficient and effective data masking and subsetting
  • 10. 10 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD “Empty” Provision fit for purpose data anytime and every time! Provision data with or without access to production systems! Ready for Testing! 1. Automatically profile data, model it, and accurately measure its coverage 2. Generate rich synthetic data from out of the box functions which provides 100% coverage 3. Cover every outlier, unexpected result, boundary condition and negative path 4. Create thousands of rows of complex, inter-related data in minutes Synthetically generate all the data you need
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Substitution Variables Combinable Functions CA TDM Data Model Generation Bulking Scripts Test Data Warehouse Test/Dev Environments 1 2 4 5 Secure Data sets 3 6 Production data sources and files DB2 z/OS DB2 UDB VSAM ISAM IMS non-indexed flat files Synthetic Data Generation
  • 12. 12 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Full enterprise Coverage, Mainframe and Distributed  Mainframe: – DB2 z/OS – DB2 UDB – VSAM – ISAM – IMS – non-indexed flat files
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Test Data Manager The CA Test Data Management application suite can:  Profile, subset and mask data  Create synthetic data – Create synthetic data on demand via web portal  Optimize test cases – Match test case criteria to existing data (Test Matching) – Analyze the coverage of the existing data (Data Coverage)
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME DO4X142S Move as Fast as Your Users with Mobile Test Automation 11/19/2015 at 4:30pm DO3T22S DevOps for a 10-Year-Old (Codebase) 11/19/2015 at 4:30pm DO4X130S Syntel's approach to Automated Testing Enabling DevOps 11/19/2015 at 4:30pm
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Must-See Demos Test Data Manager DevOps Theater 4 DevOps Sim DevOps Theater 3 Test Case Optimizer DevOps Theater 4 TDM Integrations DevOps Theater 4
  • 17. 17 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Follow On Conversations At… Smart Bar DevOps Theater 4 Tech Talks DevOps Theater 4
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15