Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


nCircle Announces the Addition of Data Leakage Prevention Coverage in nCircle IP360™

nCircle, the leader in information risk and security performance management, today announced the addition of data leakage prevention coverage in nCircle IP360™. The new coverage encompasses the market leaders in three major file sharing threat vectors: cloud-based file sharing services, peer-to-peer file sharing services and mass storage services.

In order to detect and prevent accidental leakage and intentional exfiltration, traditional data leakage prevention technology is designed to monitor critical business information in transit. IP360’s new data leakage prevention coverage allows customers to monitor their network for the applications most frequently used for data exfiltration, dramatically reducing the probability that sensitive data will leave the network.

Data sharing and storage applications are difficult to block because they may dynamically change ports or change protocols and many applications can be configured to evade intrusion detection systems.

“Data leakage prevention tools focus on data in motion – that’s like trying to catch a bullet in flight,” said Tim Erlin, director of IT security and risk strategy for nCircle. “It’s important, but it’s late in the cycle. It’s much more efficient to dramatically reduce the probability that data can leave your environment unintentionally by closely monitoring the applications used to move it.”

IP360 data leakage includes coverage for major file hosting services, peer-to-peer file sharing services and storage vendors.

File hosting service coverage includes:

  • Dropbox
  • SugarSync
  • Box.net
  • CloudApp
  • iCloud
  • Symform
  • JustCloud
  • MediaFire

Peer-to-peer file sharing service coverage includes:

  • uTorrent
  • Tixati
  • Vuze
  • Transmission
  • Xtorrent
  • BitTorrent

Storage vendor coverage includes:

  • Mac OS X Portable Storage Detection
  • Windows Portable Storage Detection

For more information on IP360 please visit: https://www.ncircle.com/index.php?s=products_ip360.

About nCircle Suite360

nCircle provides the world's most comprehensive suite of solutions for agentless security and configuration auditing for physical and virtual IT environments. nCircle's solutions combine the broadest discovery and deepest assessment of networks and their operating systems, applications, vulnerabilities and configurations with advanced analytics to help enterprises reduce security risk and achieve compliance. nCircle Suite360 is an integrated suite that shares a unified scan engine, common scoring methodologies and centralized reporting and analytics. Suite360 includes IP360™ for vulnerability management, WebApp360™ for web application scanning, Configuration Compliance Manager (CCM)™ for configuration auditing and file integrity monitoring, Certified PCI Scan Service™ for on-demand self-service PCI scanning and Suite360 Intelligence Hub™ for IT governance, risk and compliance (ITGRC) reporting and analytics.

About nCircle

nCircle is the leading provider of information risk and security performance management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to (1) automate compliance and reduce risk, and (2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer’s premises, as a cloud-based service, or in combination, for maximum flexibility and value.

nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. To learn how you can more effectively protect your company visit us at http://www.ncircle.com.

nCircle is a registered trademark of nCircle Network Security, Inc. All other registered or unregistered trademarks are the sole property of their respective owners.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
DevOps Summit at Cloud Expo 2014 Silicon Valley was a terrific event for us. The Qubell booth was crowded on all three days. We ran demos every 30 minutes with folks lining up to get a seat and usually standing around. It was great to meet and talk to over 500 people! My keynote was we...

#IoT #IDM #SDAS #infosec

As the Internet of Things continues to expand (and it is expanding rapidly) the issue of access to applications is going to get a lot more messy.

One of the benefits of cloud, so I'm told, is it is "easy access" for everyone...

#DevOps

App deployment should be viewed as a comprehensive, end to end process.But we treat it today like each silo is a fork in a project that never merges back together, causing disjointed operations, reporting, measurement and ultimately, failure to meet business priori...

Cryptocurrencies have gained traction in the past half-decade for a variety of reasons. Bitcoin has become the most popular cryptocurrency in the world due to its sudden rise in value and acceptance within the international marketplace. You might be wondering: What does cloud computing...
HP charts a better path to simplified, just-in-time, and pan-IT support improvements -- despite dynamic and complex IT environments. Much of the attention to coping with mega IT challenges such as cloud, bring your own device (BYOD), mobile applications, and big data focuses on adopti...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE