Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


nCircle Announces the Addition of Data Leakage Prevention Coverage in nCircle IP360™

nCircle, the leader in information risk and security performance management, today announced the addition of data leakage prevention coverage in nCircle IP360™. The new coverage encompasses the market leaders in three major file sharing threat vectors: cloud-based file sharing services, peer-to-peer file sharing services and mass storage services.

In order to detect and prevent accidental leakage and intentional exfiltration, traditional data leakage prevention technology is designed to monitor critical business information in transit. IP360’s new data leakage prevention coverage allows customers to monitor their network for the applications most frequently used for data exfiltration, dramatically reducing the probability that sensitive data will leave the network.

Data sharing and storage applications are difficult to block because they may dynamically change ports or change protocols and many applications can be configured to evade intrusion detection systems.

“Data leakage prevention tools focus on data in motion – that’s like trying to catch a bullet in flight,” said Tim Erlin, director of IT security and risk strategy for nCircle. “It’s important, but it’s late in the cycle. It’s much more efficient to dramatically reduce the probability that data can leave your environment unintentionally by closely monitoring the applications used to move it.”

IP360 data leakage includes coverage for major file hosting services, peer-to-peer file sharing services and storage vendors.

File hosting service coverage includes:

  • Dropbox
  • SugarSync
  • Box.net
  • CloudApp
  • iCloud
  • Symform
  • JustCloud
  • MediaFire

Peer-to-peer file sharing service coverage includes:

  • uTorrent
  • Tixati
  • Vuze
  • Transmission
  • Xtorrent
  • BitTorrent

Storage vendor coverage includes:

  • Mac OS X Portable Storage Detection
  • Windows Portable Storage Detection

For more information on IP360 please visit: https://www.ncircle.com/index.php?s=products_ip360.

About nCircle Suite360

nCircle provides the world's most comprehensive suite of solutions for agentless security and configuration auditing for physical and virtual IT environments. nCircle's solutions combine the broadest discovery and deepest assessment of networks and their operating systems, applications, vulnerabilities and configurations with advanced analytics to help enterprises reduce security risk and achieve compliance. nCircle Suite360 is an integrated suite that shares a unified scan engine, common scoring methodologies and centralized reporting and analytics. Suite360 includes IP360™ for vulnerability management, WebApp360™ for web application scanning, Configuration Compliance Manager (CCM)™ for configuration auditing and file integrity monitoring, Certified PCI Scan Service™ for on-demand self-service PCI scanning and Suite360 Intelligence Hub™ for IT governance, risk and compliance (ITGRC) reporting and analytics.

About nCircle

nCircle is the leading provider of information risk and security performance management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to (1) automate compliance and reduce risk, and (2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer’s premises, as a cloud-based service, or in combination, for maximum flexibility and value.

nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. To learn how you can more effectively protect your company visit us at http://www.ncircle.com.

nCircle is a registered trademark of nCircle Network Security, Inc. All other registered or unregistered trademarks are the sole property of their respective owners.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
These days attacks are becoming more sophisticated and more common. Mobile devices, cloud computing and the Internet of Things have increased the number of access points that must be secured. To complicate matters, CISOs are been directed to secure system without compromising the seaml...
There's an impulse to roll one's eyes and think of legacy applications as problematic, almost by definition. They're old, and they may run on hardware that's slower or more difficult to maintain. But in many instances, that's too simplistic an assessment. Would you respond the same way...
While marketing automation by itself is extremely powerful and is mostly based in the cloud, the effectiveness of such strategies can be enhanced by leveraging the benefits that cloud computing offers. Not too long ago, marketers had to inevitably choose between two options - keep mark...
My daughter is taking a class on entrepreneurship in her senior year of high school (yep, that’s the Silicon Valley for you). She loves the class, the energy of the teacher, and the creativity associated with the subject. As a result, we have had several conversations about what does i...
The origins of SAP GRC software goes back decades, but adoption has been slow. But with the rigor of modern compliance regimes like SOX, coupled with the sheer volume and complexity of online transactions, there’s been an accelerating movement away from document-centric review processe...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE