yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

Arxan to Present at Application Security Summit on Emerging Mobile App Attack Targets and Mobile App Security Strategies for Financial Services
Expert Webinar Sessions Aimed at Both Educating the Enterprise on Emerging Mobile App Integrity Risk, as Well as Recommending Proven Mobile App Security Strategies for the Financial Services Market

BETHESDA, MD -- (Marketwire) -- 11/12/12 -- Arxan Technologies, a leading provider of software security solutions that protect the global App Economy, today announced it will participate in two mobile application security webinars as part of an Application Security Summit.

Taking place Nov. 14-15, the online Application Security Summit includes today's leading information security experts who will provide key insights on how to manage and secure applications, especially as mobile apps continue to proliferate a growing Global App Economy.

Enterprises such as financial services institutions are deploying applications to run critical processes or deliver services through Web, client or mobile apps. The application layer now hosts tremendous value and functionality and is being targeted by hackers. In conjunction with network or device security, application security has increasingly become a leading requirement not only for achieving the highest operational efficiency, but also to launch innovative offerings without being exposed to major threats and risks.

"ABI Research shows that the global market for mobile application security will be worth $398 million by the end of 2012. This includes revenues for paid apps, partnerships with manufacturers and operators, white label deals, and dataset sales. To date, ABI Research calculates that there have been over 130 billion downloads of mobile security apps."(1)

The Nov. 14 panel session on mobile application security strategies for the financial services market will discuss the unique security challenges faced by the financial services market.

As the application security framework has now extended to the mobile platform, risk mitigation requires both vulnerability-based solutions, which address programming flaws as well as multi-OS application hardening/shielding solutions given that mobile apps can reside outside the network or device perimeter. The emerging threat vectors which target the integrity of the mobile app itself, such as reversing and tampering, are becoming much more prevalent. This panel of application security experts will explore holistic mobile application security measures to guard against fraud as they roll-out new mobile solutions for the financial services market.

Panel Session: Mobile Application Security Strategies for Financial Services
11 a.m. ET, Nov. 14, 2012

Panelists: John Stevens, internal chief technology officer, Cigital, James Lynn, practice principal - Fortify on Demand & Mobile Security Services, HP Enterprise Security, and Kevin Morgan, vice president of engineering and chief technology officer, Arxan

Moderator: Derek Brink, research fellow, Aberdeen Group

To attend, please visit

The Nov. 15 webinar will present new security thought leadership on mobile application attack targets and application integrity risks. The session will also provide a detailed analysis into specific mobile attack targets highly sought by hackers, and a range of application hacking techniques used to tamper or reverse-engineer mobile apps. In addition, the speakers will present risk mitigations strategies and outline specific use cases that demonstrate the attack vectors and application integrity protection that was deployed to protect mobile apps.

General Session: Mobile Application Integrity Risks and Mitigations
12 p.m. ET, Nov. 15, 2012

Speakers: Kevin Morgan, vice president of engineering and chief technology officer, Arxan, and Dr. Hoi Chang, vice president of technology, Arxan

To attend, please visit

Arxan's proven security for mobile, desktop, server and embedded computing environments protect applications with best of breed anti-tamper and anti-reverse engineering technology. The company's multi-layered and multi-platform protection consists of a variety of security technologies, including passive and active defenses such as: obfuscation, anti-debug, repair, self-healing and anti-tamper to ensure durability, resiliency and performance in the field.

(1)ABI Research, "$389 Million Mobile Application Security Market Set to Explode as Threats Increase Significantly," Sept. 25, 2012

Arxan Technologies Inc. is the industry leader of application protection solutions that protect the App Economy. Arxan secures mobile, desktop, server and embedded applications against tampering and reverse-engineering attacks and is an integral part of end-to-end application security. Our security defends against tampering, unauthorized use, insertion of exploits, piracy, and theft of intellectual property for global leaders in markets such as Fortune 500 enterprises, financial services, ISV, gaming and digital media to proactively defend the integrity of their code and business models. Arxan's proven, scalable and durable application protection solutions defend, detect, alert and react to application attacks through a threat-based, customizable approach. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. For more information, please visit Follow us @Arxan or

Arxan Technologies, Inc.
Jodi Wadhwa
Phone: +1-301-968-4295

Lutz PR
Kelly Poffenberger
Phone: +1-714-553-9071

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers