Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


DeviceLock(R) Provides Data Leak Prevention for Skype Communications
DeviceLock Endpoint DLP Suite Software v7.2 Adds Powerful Skype Security Controls

SAN RAMON, CA -- (Marketwire) -- 11/15/12 -- DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software, today announced that their Endpoint DLP Suite software v7.2 delivers comprehensive control over Skype communications from corporate endpoint computers to prevent insider data leaks via this globally popular service. In addition, for BYOD solutions based on remote desktop and application virtualization, DeviceLock's new Virtual DLP feature extends the reach of its Skype control to tablets or smartphones on any mobile platform.

"There's been a great deal of interest in the IT security industry lately around finding ways to secure employees' use of Skype," said Vince Schiavo, DeviceLock CEO. "We believe our ability to provide granular controls for Skype security will give organizations a way to allow employees to use Skype for increased productivity, but to do so in a safer and more secure fashion. Our customers will be able to set and enforce policies for employees' use of Skype rather than trying to block the service altogether."

DeviceLock's DLP Suite software provides the ability to set and enforce selective contextual and content-aware filtering policies for Skype instant messages and attached file transfers.

The content of outgoing Skype chat messages and attached files is monitored in real-time and analyzed for compliance with corporate DLP policy. If a violation is detected, the transfer of the outgoing instant message or file can be blocked and a real-time security alert can be sent to the DeviceLock administrator via email or an external SNMP server. Audit records of the event and the shadow copy of the message or file may also be captured and stored in the central log database for forensic analysis. Incoming message content and files can also be selectively stored in the central log database, while generating security alerts and audit log records.

On the contextual level, DeviceLock enables Skype chats and file transfers to be selectively allowed or blocked. Voice and video calls between Skype users can also be allowed or blocked based on local sender and remote recipient IDs, while also optionally enforcing time-based permissions over their Skype communications.

For more information visit www.devicelock.com.

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint device/port control for data leak prevention (DLP) in situations where employees are using mobile devices like smartphones, tablets, cameras or USB sticks along with company-owned endpoints like laptops or desktops. In addition, DeviceLock software can prevent data leaks via Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

DEVICELOCK MEDIA CONTACT

Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
If you’ve been paying close attention lately you’ll know that the “Internet of Things” has become one of the technology industry’s biggest buzz phrases. It’s not hard to figure why. The internet has been around for the last twenty years and it has truly revolutionized our lives, the wa...
In recent years, the US government has become a leading advocate for continuous monitoring of security threats and vulnerabilities. But how effectively are departments and agencies in implementing these programs? And how do we measure success? Moving Towards Continuous Monitoring Tho...
A lot is written on mobile technologies, the Internet of Things, social media and analytics, but little is written on how all these might work together in a retail environment. I think best by writing, so let's think this through together. Blind spots are defined as, "Areas where a p...
Google, with one fell swoop, changed their search algorithm and changing the lives (and livelihoods) of billions. Enter Mobilegeddon. With smartphones becoming as ubiquitous as ever, people are increasingly using them for tasks that they used to do on their PCs, like search. And just ...
As an engineer who started my career working on real-time embedded systems for industrial automation, I can tell you what a Herculean task it can be to get a tiny piece of hardware to run very sophisticated software on comparatively low spec CPU. All the while having it execute quickly...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE