Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


BeyondTrust Recognized as 2012 Industry Innovator by SC Magazine

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced that SC Magazine has recognized the company’s threat management console, Retina CS, as an Industry Innovator and a serious player in the vulnerability management market for 2012. This latest distinction reflects the unrivaled vulnerability reporting, mitigation and threat intelligence that Retina CS offers organizations to combat the ever-increasing threat landscape.

The SC Magazine report notes, “The company’s creativity and drive to innovate is what keeps this organization at the forefront of its market.” It goes on further to say, “While we focused on this Innovator’s vulnerability management tool, it is pretty important to note that the company is in a lot more market spaces. The imagination and creativity to integrate its overall vision for enterprise security extends from the cloud through the data center to mobile and other endpoint devices. It is the hallmark of this very creative and innovative company.”

“We are honored to be recognized as an innovator in vulnerability management by SC Magazine,” said John Mutch, CEO at BeyondTrust. “The proven abilities of Retina CS as a centralized threat and risk management console continue to help our customers operationalize security and drive down the costs associated with securing their networks. We’ll continue to focus a tremendous amount of energy around integrating the Retina CS technology with our PowerBroker privileged identity management product portfolio.”

Retina CS is the centerpiece of the BeyondTrust’s vision of Context-Aware Security Intelligence, aimed at helping organizations answer the most pressing questions in IT – what to fix first, what to fix next and why? Retina CS does this through unmatched security intelligence and analytics for the entire IT landscape, including support for emerging technology investments such as cloud, mobile and virtualization.

As a service for the security community, BeyondTrust offers a free version of Retina CS, which allows for the management of vulnerabilities and threats for up to 256 assets. You can get your free copy of Retina CS Community here - http://go.beyondtrust.com/cscommunity.

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust

Twitter: http://twitter.com/beyondtrust

Blog: http://blog.beyondtrust.com

LinkedIn: http://www.linkedin.com/companies/beyondtrust

Facebook: http://www.facebook.com/beyondtrust

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
I write and study often on the subject of digital transformation - the digital transformation of industries, markets, products, business models, etc. In brief, digital transformation is about the impact that collected and analyzed data can have when used to enhance business processes ...
I had the privilege of attending a mobile security event this week and speaking with many experts on the matter. I am not a mobile security expert, so my role was to speak on mobile strategies and trends and to learn as much as I could. What did I learn? I learned the difference b...
General Electric (GE) has been a household name for more than a century, thanks in large part to its role in making households easier to run. Starting with the light bulb invented by its founder, Thomas Edison, GE has been selling devices (“things”) to consumers throughout its 122-year...
It's time to condense all I've seen, heard, and learned about the IoT into a fun, easy-to-remember guide. Without further ado, here are Five (5) Things About the Internet of Things: 1. It's the end-state of Moore's Law. It's easy enough to debunk the IoT as “nothing new.” After all,...
The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable. ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE