Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


Mandiant® Certified to Respond to Attacks via UK Cyber Security Initiative

Mandiant®, the leader in advanced threat detection and response solutions, announced it has been named as one of four companies certified to respond effectively to cyber security attacks via a new program, “Cyber Incident Response,” launched today by CESG, the Information Assurance arm of Government Communications Headquarters - one of the United Kingdom’s three intelligence agencies and the Centre for the Protection of National Infrastructure (CPNI).

“The growing cyber threat makes it inevitable that attacks will get through both where basic security is not implemented, and when targeted by a highly capable attacker,” said Chloe Smith, Minister for Cyber Security. “Cyber Incident Response services provide access to organizations certified by CESG/CPNI to respond effectively to cyber incidents. Together, GCHQ, CPNI, the incident response industry, and victims of cyber attack – can improve the cyber security of the UK; that is good for security, good for business and good for the UK’s prosperity.”

The new cyber security venture will be a CESG/CPNI quality-assured service providing assistance to organizations impacted by a cyber security incident. Primarily aimed at the public sector and organizations composing the UK’s critical national infrastructure, the pilot program will initially consist of four companies chosen for their knowledge and experience and selected by CESG/CPNI to work in partnership to provide response services. Built on the “10 Steps to Cyber Security” launched in September by the UK Government and aimed at providing advice to business leaders on measures to increase cyber security within their own organizations, “Cyber Incident Response” also supports the delivery of UK Cyber Security Strategy.

“We’re very pleased to have been selected by GCHQ to help protect and secure UK infrastructure,” said Mandiant Vice President of Professional Services, Steve Surdu. “Mandiant has extensive experience investigating and resolving network intrusions in very complex environments around the world. We are looking forward to applying that experience to assist organizations facing these types of incidents. Bringing together government and private industry as strategic partners will provide organizations with greater access to the information, technologies and tactics that will allow them to successfully respond to incidents and improve their defenses against future attacks.”

About Mandiant®

Mandiant is the leader in advanced threat detection and response solutions. Mandiant’s products and services protect the world’s most valuable data every day from targeted attacks. Headquartered in Alexandria, Virginia, with offices in New York, Los Angeles and San Francisco, Mandiant’s customers include Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments, and the world’s leading law firms. The authors of 12 books and quoted frequently by leading media organizations, Mandiant security consultants and engineers hold top government security clearances and advanced degrees from some of the leading computer science programs. To learn more about Mandiant visit www.mandiant.com, read the company blog, M-Unition™, follow on Twitter @Mandiant or Facebook at www.facebook.com/mandiantcorp.

About CESG

CESG is the UK Government's National Technical Authority for Information Assurance (IA) and is the IA arm of GCHQ. CESG protects the vital interests of the UK by providing policy and assistance on the security of communications and electronic data, working in partnership with industry and academia www.cesg.gov.uk

About GCHQ

GCHQ is one of the three UK intelligence agencies. Further information can be found at: www.gchq.gov.uk

About CPNI

CPNI is the government authority on protective security in relation to national security threat. It provides advice to businesses and organizations across the national infrastructure covering physical personnel and cyber security/information assurance. www.cpni.gov.uk

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
Cryptocurrencies have gained traction in the past half-decade for a variety of reasons. Bitcoin has become the most popular cryptocurrency in the world due to its sudden rise in value and acceptance within the international marketplace. You might be wondering: What does cloud computing...
HP charts a better path to simplified, just-in-time, and pan-IT support improvements -- despite dynamic and complex IT environments. Much of the attention to coping with mega IT challenges such as cloud, bring your own device (BYOD), mobile applications, and big data focuses on adopti...
The IT infrastructure of modern businesses require a number of seemingly never-ending cycles to track assets. As these assets go through different stages of usefulness or functionality, IT teams must constantly manage the process, which takes them away from other more important tasks a...
Moscow-based OpenBank, one of the largest private financial services groups in Russia, has built out a business intelligence capability for wholly new business activity monitoring benefits. The next BriefingsDirect deep-dive big data benefits case study interview explores how Moscow-b...
Don’t emphasize network security at the cost of endpoint security; the two can be integrated and work hand in hand. The result is a safer, more secure business ready for the challenges of the future.
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE