yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

Arxan to Present at Application Security Summit on Emerging Mobile App Attack Targets and Mobile App Security Strategies for Financial Services
Expert Webinar Sessions Aimed at Both Educating the Enterprise on Emerging Mobile App Integrity Risk, as Well as Recommending Proven Mobile App Security Strategies for the Financial Services Market

BETHESDA, MD -- (Marketwire) -- 11/12/12 -- Arxan Technologies, a leading provider of software security solutions that protect the global App Economy, today announced it will participate in two mobile application security webinars as part of an Application Security Summit.

Taking place Nov. 14-15, the online Application Security Summit includes today's leading information security experts who will provide key insights on how to manage and secure applications, especially as mobile apps continue to proliferate a growing Global App Economy.

Enterprises such as financial services institutions are deploying applications to run critical processes or deliver services through Web, client or mobile apps. The application layer now hosts tremendous value and functionality and is being targeted by hackers. In conjunction with network or device security, application security has increasingly become a leading requirement not only for achieving the highest operational efficiency, but also to launch innovative offerings without being exposed to major threats and risks.

"ABI Research shows that the global market for mobile application security will be worth $398 million by the end of 2012. This includes revenues for paid apps, partnerships with manufacturers and operators, white label deals, and dataset sales. To date, ABI Research calculates that there have been over 130 billion downloads of mobile security apps."(1)

The Nov. 14 panel session on mobile application security strategies for the financial services market will discuss the unique security challenges faced by the financial services market.

As the application security framework has now extended to the mobile platform, risk mitigation requires both vulnerability-based solutions, which address programming flaws as well as multi-OS application hardening/shielding solutions given that mobile apps can reside outside the network or device perimeter. The emerging threat vectors which target the integrity of the mobile app itself, such as reversing and tampering, are becoming much more prevalent. This panel of application security experts will explore holistic mobile application security measures to guard against fraud as they roll-out new mobile solutions for the financial services market.

Panel Session: Mobile Application Security Strategies for Financial Services
11 a.m. ET, Nov. 14, 2012

Panelists: John Stevens, internal chief technology officer, Cigital, James Lynn, practice principal - Fortify on Demand & Mobile Security Services, HP Enterprise Security, and Kevin Morgan, vice president of engineering and chief technology officer, Arxan

Moderator: Derek Brink, research fellow, Aberdeen Group

To attend, please visit

The Nov. 15 webinar will present new security thought leadership on mobile application attack targets and application integrity risks. The session will also provide a detailed analysis into specific mobile attack targets highly sought by hackers, and a range of application hacking techniques used to tamper or reverse-engineer mobile apps. In addition, the speakers will present risk mitigations strategies and outline specific use cases that demonstrate the attack vectors and application integrity protection that was deployed to protect mobile apps.

General Session: Mobile Application Integrity Risks and Mitigations
12 p.m. ET, Nov. 15, 2012

Speakers: Kevin Morgan, vice president of engineering and chief technology officer, Arxan, and Dr. Hoi Chang, vice president of technology, Arxan

To attend, please visit

Arxan's proven security for mobile, desktop, server and embedded computing environments protect applications with best of breed anti-tamper and anti-reverse engineering technology. The company's multi-layered and multi-platform protection consists of a variety of security technologies, including passive and active defenses such as: obfuscation, anti-debug, repair, self-healing and anti-tamper to ensure durability, resiliency and performance in the field.

(1)ABI Research, "$389 Million Mobile Application Security Market Set to Explode as Threats Increase Significantly," Sept. 25, 2012

Arxan Technologies Inc. is the industry leader of application protection solutions that protect the App Economy. Arxan secures mobile, desktop, server and embedded applications against tampering and reverse-engineering attacks and is an integral part of end-to-end application security. Our security defends against tampering, unauthorized use, insertion of exploits, piracy, and theft of intellectual property for global leaders in markets such as Fortune 500 enterprises, financial services, ISV, gaming and digital media to proactively defend the integrity of their code and business models. Arxan's proven, scalable and durable application protection solutions defend, detect, alert and react to application attacks through a threat-based, customizable approach. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. For more information, please visit Follow us @Arxan or

Arxan Technologies, Inc.
Jodi Wadhwa
Phone: +1-301-968-4295

Lutz PR
Kelly Poffenberger
Phone: +1-714-553-9071

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
LittleBits Electronics offers the CloudBit Module which is a easy and quick option to create Internet connected devices. You can tag on Internet to many things without you needing to program anything. There are many, many projects that you can do with this module. Using IFTTT (read abo...
CodeBug is a cute, programmable and wearable device designed to introduce simple programming and electronic concepts to anyone, at any age. It is easy to program CodeBug using the online interface, which features colourful drag and drop blocks, an in-browser emulator and engaging commu...
DevOps Summit at Cloud Expo 2014 Silicon Valley was a terrific event for us. The Qubell booth was crowded on all three days. We ran demos every 30 minutes with folks lining up to get a seat and usually standing around. It was great to meet and talk to over 500 people! My keynote was we...
I have three words for everyone in software testing: prioritize, prioritize, and prioritize. You can't test every possible permutation of your software, especially so with APIs and IoT devices where you're placing much of the user experience in the hands of integrators to your core pro...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an o...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers