yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

Mandiant® Certified to Respond to Attacks via UK Cyber Security Initiative

Mandiant®, the leader in advanced threat detection and response solutions, announced it has been named as one of four companies certified to respond effectively to cyber security attacks via a new program, “Cyber Incident Response,” launched today by CESG, the Information Assurance arm of Government Communications Headquarters - one of the United Kingdom’s three intelligence agencies and the Centre for the Protection of National Infrastructure (CPNI).

“The growing cyber threat makes it inevitable that attacks will get through both where basic security is not implemented, and when targeted by a highly capable attacker,” said Chloe Smith, Minister for Cyber Security. “Cyber Incident Response services provide access to organizations certified by CESG/CPNI to respond effectively to cyber incidents. Together, GCHQ, CPNI, the incident response industry, and victims of cyber attack – can improve the cyber security of the UK; that is good for security, good for business and good for the UK’s prosperity.”

The new cyber security venture will be a CESG/CPNI quality-assured service providing assistance to organizations impacted by a cyber security incident. Primarily aimed at the public sector and organizations composing the UK’s critical national infrastructure, the pilot program will initially consist of four companies chosen for their knowledge and experience and selected by CESG/CPNI to work in partnership to provide response services. Built on the “10 Steps to Cyber Security” launched in September by the UK Government and aimed at providing advice to business leaders on measures to increase cyber security within their own organizations, “Cyber Incident Response” also supports the delivery of UK Cyber Security Strategy.

“We’re very pleased to have been selected by GCHQ to help protect and secure UK infrastructure,” said Mandiant Vice President of Professional Services, Steve Surdu. “Mandiant has extensive experience investigating and resolving network intrusions in very complex environments around the world. We are looking forward to applying that experience to assist organizations facing these types of incidents. Bringing together government and private industry as strategic partners will provide organizations with greater access to the information, technologies and tactics that will allow them to successfully respond to incidents and improve their defenses against future attacks.”

About Mandiant®

Mandiant is the leader in advanced threat detection and response solutions. Mandiant’s products and services protect the world’s most valuable data every day from targeted attacks. Headquartered in Alexandria, Virginia, with offices in New York, Los Angeles and San Francisco, Mandiant’s customers include Fortune 500 companies, financial institutions, government agencies, domestic and foreign police departments, and the world’s leading law firms. The authors of 12 books and quoted frequently by leading media organizations, Mandiant security consultants and engineers hold top government security clearances and advanced degrees from some of the leading computer science programs. To learn more about Mandiant visit, read the company blog, M-Unition™, follow on Twitter @Mandiant or Facebook at

About CESG

CESG is the UK Government's National Technical Authority for Information Assurance (IA) and is the IA arm of GCHQ. CESG protects the vital interests of the UK by providing policy and assistance on the security of communications and electronic data, working in partnership with industry and academia

About GCHQ

GCHQ is one of the three UK intelligence agencies. Further information can be found at:

About CPNI

CPNI is the government authority on protective security in relation to national security threat. It provides advice to businesses and organizations across the national infrastructure covering physical personnel and cyber security/information assurance.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers