yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

DeviceLock(R) Provides Data Leak Prevention for Skype Communications
DeviceLock Endpoint DLP Suite Software v7.2 Adds Powerful Skype Security Controls

SAN RAMON, CA -- (Marketwire) -- 11/15/12 -- DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software, today announced that their Endpoint DLP Suite software v7.2 delivers comprehensive control over Skype communications from corporate endpoint computers to prevent insider data leaks via this globally popular service. In addition, for BYOD solutions based on remote desktop and application virtualization, DeviceLock's new Virtual DLP feature extends the reach of its Skype control to tablets or smartphones on any mobile platform.

"There's been a great deal of interest in the IT security industry lately around finding ways to secure employees' use of Skype," said Vince Schiavo, DeviceLock CEO. "We believe our ability to provide granular controls for Skype security will give organizations a way to allow employees to use Skype for increased productivity, but to do so in a safer and more secure fashion. Our customers will be able to set and enforce policies for employees' use of Skype rather than trying to block the service altogether."

DeviceLock's DLP Suite software provides the ability to set and enforce selective contextual and content-aware filtering policies for Skype instant messages and attached file transfers.

The content of outgoing Skype chat messages and attached files is monitored in real-time and analyzed for compliance with corporate DLP policy. If a violation is detected, the transfer of the outgoing instant message or file can be blocked and a real-time security alert can be sent to the DeviceLock administrator via email or an external SNMP server. Audit records of the event and the shadow copy of the message or file may also be captured and stored in the central log database for forensic analysis. Incoming message content and files can also be selectively stored in the central log database, while generating security alerts and audit log records.

On the contextual level, DeviceLock enables Skype chats and file transfers to be selectively allowed or blocked. Voice and video calls between Skype users can also be allowed or blocked based on local sender and remote recipient IDs, while also optionally enforcing time-based permissions over their Skype communications.

For more information visit

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint device/port control for data leak prevention (DLP) in situations where employees are using mobile devices like smartphones, tablets, cameras or USB sticks along with company-owned endpoints like laptops or desktops. In addition, DeviceLock software can prevent data leaks via Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at

Add to Digg Bookmark with Add to Newsvine


Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Web 2.0 Latest News
Ten short years ago, Apache Hadoop was just a small project deployed on a few machines at Yahoo and within a few years, it had truly become the backbone of Yahoo’s data infrastructure. Additionally, the current Apache Hadoop market is forecasted to surpass $16 billion by 2020. This mi...
Last week, I was a keynote speaker at the Mobile Edge '16 conference in Lisbon, Portugal. Following the conference I met individually with many different companies. These companies represented a variety of industries, sizes and digital maturity levels. I was sharing my latest digital ...
COMED, my power company, sends out a monthly report that shows me my energy consumption relative to my neighbors. Every month I’m considerably higher than all my neighbors. This report also has a list of things I could do to reduce my energy consumption. The problem with this report is...
My favorite writer, Gil Press, sums it up with, “It’s Official: The Internet Of Things Takes Over Big Data As The Most Hyped Technology” where he talks about how Gartner released its latest Hype Cycle for Emerging Technologies, and how big data has moved down the “trough of disillusion...
When we talk about the impact of BYOD and BYOA and the Internet of Things, we often focus on the impact on data center architectures. That's because there will be an increasing need for authentication, for access control, for security, for application delivery as the number of potentia...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers