yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

DeviceLock(R) Provides Data Leak Prevention for Skype Communications
DeviceLock Endpoint DLP Suite Software v7.2 Adds Powerful Skype Security Controls

SAN RAMON, CA -- (Marketwire) -- 11/15/12 -- DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software, today announced that their Endpoint DLP Suite software v7.2 delivers comprehensive control over Skype communications from corporate endpoint computers to prevent insider data leaks via this globally popular service. In addition, for BYOD solutions based on remote desktop and application virtualization, DeviceLock's new Virtual DLP feature extends the reach of its Skype control to tablets or smartphones on any mobile platform.

"There's been a great deal of interest in the IT security industry lately around finding ways to secure employees' use of Skype," said Vince Schiavo, DeviceLock CEO. "We believe our ability to provide granular controls for Skype security will give organizations a way to allow employees to use Skype for increased productivity, but to do so in a safer and more secure fashion. Our customers will be able to set and enforce policies for employees' use of Skype rather than trying to block the service altogether."

DeviceLock's DLP Suite software provides the ability to set and enforce selective contextual and content-aware filtering policies for Skype instant messages and attached file transfers.

The content of outgoing Skype chat messages and attached files is monitored in real-time and analyzed for compliance with corporate DLP policy. If a violation is detected, the transfer of the outgoing instant message or file can be blocked and a real-time security alert can be sent to the DeviceLock administrator via email or an external SNMP server. Audit records of the event and the shadow copy of the message or file may also be captured and stored in the central log database for forensic analysis. Incoming message content and files can also be selectively stored in the central log database, while generating security alerts and audit log records.

On the contextual level, DeviceLock enables Skype chats and file transfers to be selectively allowed or blocked. Voice and video calls between Skype users can also be allowed or blocked based on local sender and remote recipient IDs, while also optionally enforcing time-based permissions over their Skype communications.

For more information visit

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint device/port control for data leak prevention (DLP) in situations where employees are using mobile devices like smartphones, tablets, cameras or USB sticks along with company-owned endpoints like laptops or desktops. In addition, DeviceLock software can prevent data leaks via Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at

Add to Digg Bookmark with Add to Newsvine


Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers