Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


Leading Analyst Firm Names Aveksa a Leader in Identity and Access Governance

Aveksa, the leading provider of business-driven Identity and Access Management solutions, today announced that for the second year in a row, it has been positioned by Gartner, Inc. in the “Leaders” quadrant of the analyst firm’s annual “Magic Quadrant for Identity and Access Governance”1 report.

The new Magic Quadrant report from Gartner identifies the leading providers of Identity and Access Governance (IAG) solutions after a thorough examination of the offerings, differentiators and strategies of vendors in the IAG market. Vendors were evaluated based on their ability to execute and completeness of vision.

In the report, which was published on December 17, 2012, Gartner Analyst Earl Perkins states “Identity and access governance is replacing user administration and provisioning as the new center of gravity for identity and access management”, and “Today, IAG is the fastest growing sector of Identity and Access Management (IAM)”1, with 2012 growth rates in excess of 35%.

“Gartner’s latest Magic Quadrant report for Identity and Access Governance clearly demonstrates the strategic importance of IAG as enterprises continue to work to optimize access controls for both on-premise and cloud-based applications and data,” said Vick Viren Vaishnavi, president and CEO of Aveksa. “The report also cites the importance of scalability and extensibility in order for IAG solutions to meet rapidly growing end user requirements. Aveksa is very proud to be named a leader in the IAG market, the fastest growing segment of Identity and Access Management.”

Gartner’s recognition of Aveksa as a leader in the Identity and Access Governance market caps another impressive year for the company. In 2012, Aveksa continued its rapid growth by increasing its headcount over 50% which resulted in the company moving to a much larger corporate headquarters. During the year, Aveksa launched several new innovative products including: version 6.0 of its Identity and Access Management platform; MyAccessLive, a new cloud-based version of the company’s IAM solutions; new product capabilities designed to enable enterprises to take a business-driven approach to IAM for data and applications both inside the firewall as well as in cloud environments; and new integrations that enable enterprises to utilize Identity and Access business context across a wider range of IT security areas, such as Security Information and Event Management (SIEM).

1 Gartner “Magic Quadrant: Identity and Access Governance” by Earl Perkins, [December 17, 2012].

About Aveksa

Aveksa is the leading provider of Business-Driven Identity and Access Management solutions. Through its business-driven approach, the Aveksa platform provides a robust way for organizations to shift the accountability and responsibility for making access decisions away from Information Security, and out to the line of business, while enforcing policies and maintaining oversight. Aveksa achieves this by managing the complete lifecycle of user access to information resources through an automated, continuous process for access request, approval, fulfillment, review, certification and remediation. With Aveksa, IT organizations can reduce Access Management complexity and increase operational efficiency while minimizing risk and ensuring sustainable compliance. Many Global 2000 organizations in financial services, healthcare, retail, energy/utility, telecommunications, transportation, manufacturing and other industries rely on Aveksa to efficiently address their Identity and Access Management demands. For more information, please visit www.aveksa.com.

About Gartner’s Magic Quadrant

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises are u...
Does a Content Delivery Network (CDN) protect against Distributed Denial of Service (DDoS) attacks? It’s a good question. A CDN by its very nature will absorb DDoS attacks for the content that it serves and this could be considered protection but, as is often the case, this is only the...
The explosion of cloud onto the enterprise scene has, literally, revolutionized how businesses across the size spectrum do business, yet there’s a price tag tucked into this cloud’s silver lining that smart decision-makers should pay heed to. This is the era of what I like to call the...
Just as writing has come to mean texting, blogging or any form of digital writing, the cloud today means one or all of the three Cs: computing, connectivity and communication. And just as nearly all thought to putting pen to paper has disappeared, all reference to the natural cloud is ...
Yes, Lori has been reading the Internet again. And what she’s been seeing makes baby Lori angry. It also makes this former test designer and technology editor cry. Really, I weep at both the excuses offered for such testing and the misleading headline. I have read no less than two con...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE