Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


BeyondTrust Strengthens Channel Presence in India

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced a distribution partnership with Peritas IT Solutions, one of India’s fastest growing IT security distributors. This partnership will improve market penetration of the PowerBroker Suite in India and support local customers’ identity and compliance initiatives whilst at the same time offering unrivaled vulnerability management.

“We have seen a significant increase in demand in the Indian market for our suite of products, hence our investment within the region,” said Brent Thurrell, vice president for Europe, Middle East, Africa and India, for BeyondTrust. “Our partnership with Peritas will enable us to provide an unmatched level of solutions for visibility into privileged user activities for our customers throughout India. We are delighted to add Peritas to our portfolio of global partners and are encouraged by their commitment to help grow the global business for BeyondTrust.”

Peritas is a Value Added Distributor focused on providing security products and services across India. They cater to the entire security life-cycle of an organization. Peritas works closely with channel partners and end users to provide cost effective, high-value, innovative IT security solutions. The company’s main strength lies in launching new technologies and educating end users in the Indian market that ultimately provide unique value propositions to customers.

"We are expecting the Indian Global Privilege Identity Management market to grow around 20-25 percent annually over the next five years,” said Raghu Setlur, director at Peritas. “By becoming a Value Added Distributor for BeyondTrust we are able to drive demand within the end-user space and through the education of our solid partner base. We are confident that the BeyondTrust suite will enable us to do this and grow the business for both organisations.”

“We are proud to be partnering with BeyondTrust who are leaders in Context-Aware Security Intelligence. Their unique solution will help organizations provide true return on investment and at the same time secure both the internal and external environment,” commented Subhendu, director at Peritas.

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust

Twitter: http://twitter.com/beyondtrust
Blog: http://blog.beyondtrust.com
LinkedIn: http://www.linkedin.com/companies/beyondtrust
Facebook: http://www.facebook.com/beyondtrust

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
Cloud computing in the form of Infrastructure-as-a-Service (IaaS) has revolutionized the expectations of IT. Infrastructure that used to take weeks to months to provision is now available in minutes. Moreover, most of the traditional drawbacks associated with infrastructure have disap...
This is the third in a series of cloud predictions for 2015, starting with When the Walls Come Down, which predicted that workload migration (into the cloud) costs would drop by more than 50% in 2015; then continuing with The Cloud Startup Ecosystem Explosion, which predicted the impac...
Kirk Byers at SDN Central writes frequently on the topic of DevOps as it relates (and applies) to the network and recently introduced a list of seven DevOps principles that are applicable in an article entitled, "DevOps and the Chaos Monkey. " On this list is the notion of reducing var...
General Electric (GE) has been a household name for more than a century, thanks in large part to its role in making households easier to run. Starting with the light bulb invented by its founder, Thomas Edison, GE has been selling devices (“things”) to consumers throughout its 122-year...
With the growing number of CSS Preprocessors like LESS, Sass, Turbine, Stylus and Swith CSS to name a few, it’s hard to decide which to choose for your project, and which will provide the best CSS authoring. Rather than focus on evaluating every CSS Preprocessor (that would simply take...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE