Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


BeyondTrust Recognized as 2012 Industry Innovator by SC Magazine

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced that SC Magazine has recognized the company’s threat management console, Retina CS, as an Industry Innovator and a serious player in the vulnerability management market for 2012. This latest distinction reflects the unrivaled vulnerability reporting, mitigation and threat intelligence that Retina CS offers organizations to combat the ever-increasing threat landscape.

The SC Magazine report notes, “The company’s creativity and drive to innovate is what keeps this organization at the forefront of its market.” It goes on further to say, “While we focused on this Innovator’s vulnerability management tool, it is pretty important to note that the company is in a lot more market spaces. The imagination and creativity to integrate its overall vision for enterprise security extends from the cloud through the data center to mobile and other endpoint devices. It is the hallmark of this very creative and innovative company.”

“We are honored to be recognized as an innovator in vulnerability management by SC Magazine,” said John Mutch, CEO at BeyondTrust. “The proven abilities of Retina CS as a centralized threat and risk management console continue to help our customers operationalize security and drive down the costs associated with securing their networks. We’ll continue to focus a tremendous amount of energy around integrating the Retina CS technology with our PowerBroker privileged identity management product portfolio.”

Retina CS is the centerpiece of the BeyondTrust’s vision of Context-Aware Security Intelligence, aimed at helping organizations answer the most pressing questions in IT – what to fix first, what to fix next and why? Retina CS does this through unmatched security intelligence and analytics for the entire IT landscape, including support for emerging technology investments such as cloud, mobile and virtualization.

As a service for the security community, BeyondTrust offers a free version of Retina CS, which allows for the management of vulnerabilities and threats for up to 256 assets. You can get your free copy of Retina CS Community here - http://go.beyondtrust.com/cscommunity.

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust

Twitter: http://twitter.com/beyondtrust

Blog: http://blog.beyondtrust.com

LinkedIn: http://www.linkedin.com/companies/beyondtrust

Facebook: http://www.facebook.com/beyondtrust

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies.

Cloud computing adoption has m...
Many workloads are already in the cloud: Most organizations today run at least some workloads in the cloud. For newer organizations, they will often run ALL of their workloads in the cloud. For cloud-based workloads, sending log data to a cloud-based logging provider is not quite as bi...
Cloud computing seems to still be one of the reigning buzzwords in high-tech these days. Everything is either “in the cloud”, “powered by the cloud”, or some variation on the theme. I remember when hosted email was just that: hosted email. Today, such offerings are considered cloud off...
Last week as I was writing Amazon Declares War on VMware, VMware was preparing to announce the acquisition of a pro services team to aid in cloud migration (see coverage in CRN): VMware Acquires Professional Services Firm To Boost Cloud Migration, DevOps Expertise. You can get my thoug...
Many projected use cases for IoT won’t directly generate revenues. To achieve greater efficiency, companies are deploying IoT sensors internally throughout their organizations to optimize their use of everything from computer servers to lighting to HVAC systems to employee productivity...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE