Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


VASCO adds virtual appliance to its IDENTIKEY product range
Virtual appliance offers remote access security

OAKBROOK TERRACE, Ill. and ZURICH, Jan. 16, 2013 /PRNewswire/ -- VASCO Data Security International, Inc. (Nasdaq: VDSI; www.vasco.com), a leading software security company specializing in strong authentication products and services, announced today the release of its IDENTIKEY Virtual Appliance.

IDENTIKEY Virtual appliance complements VASCO's successful IDENTIKEY Appliance product range offering hypervisor remote access security providing customers with the flexibility to choose the deployment model that best meets their unique security requirements.  

The virtual appliance delivers the same unmatched security features and functionality as the current stand-alone hardware IDENTIKEY Appliance. Offering the many benefits of virtualization such as cost savings, rapid deployment and provisioning, simplified policy management and a web based administrator interface, IDENTIKEY Virtual Appliance is an excellent choice for organizations that have developed a virtualization strategy and are looking to move their security infrastructure to a virtual environment.

IDENTIKEY Virtual Appliance validates DIGIPASS generated one-time passwords and e-signatures to secure remote access to corporate networks and web-based applications offering high-level security by replacing weak static passwords. The appliance is supported on the most popular hypervisor products, guaranteeing a widespread acceptance.

The virtual appliance complements the existing IDENTIKEY offering:

  • IDENTIKEY Authentication Server: a robust and complete off-the-shelf centralized authentication server
  • IDENTIKEY Federation Server: a server appliance providing you with the most powerful identity & access management platform
  • IDENTIKEY Appliance: merges the IDENTIKEY Authentication Server and a 19" physical appliance into a completely managed server

"With the release of the IDENTIKEY Virtual Appliance, VASCO answers organizations' growing business needs driven by increasing mobility and virtualization," states Jan Valcke, President and COO of VASCO Data Security. "The extended portfolio of VASCO's authentication server products provides customers with a wide choice of highly scalable and cost-effective security solutions allowing them to stay ahead in the rapid changing IT landscape while protecting their corporate assets."

This complete and strong offer is available as of mid-February and addresses the needs of small and large companies in any market, as well as financial institutions that are looking to deploy an on-premise solution with the highest security.

About VASCO
VASCO is a leading supplier of strong authentication and e-signature solutions and services specializing in Internet security applications and transactions. VASCO has positioned itself as a global software company for Internet security serving a customer base of approximately 10,000 companies in more than 100 countries, including approximately 1,700 international financial institutions. VASCO's prime markets are the financial sector, enterprise security, e-commerce and e-government.

Forward Looking Statements:
Statements made in this news release that relate to future plans, events or performances are forward-looking statements. These forward-looking statements (1) are identified by use of terms and phrases such as "expect," "believe," "will," "anticipate," "emerging," "intend," "plan," "could," "may," "estimate," "should," "objective" and "goal," "possible," "potential," and similar words and expressions, but such words and phrases are not the exclusive means of identifying them, and (2) are subject to risks and uncertainties and represent our present expectations or beliefs concerning future events. VASCO cautions that the forward-looking statements are qualified by important factors that could cause actual results to differ materially from those in the forward-looking statements. These risks, uncertainties and other factors have been described in greater detail in the Annual Report on Form 10-K for the fiscal year ended December 31, 2010 filed with the Securities and Exchange Commission and include, but are not limited to, (a) risks of general market conditions, including currency fluctuations and the uncertainties in world economic and financial markets, (b) risks inherent to the computer and network security industry, including rapidly changing technology, evolving industry standards, increasing numbers of patent infringement claims, changes in customer requirements, price competitive bidding, and changing government regulations, and (c) risks specific to VASCO, including, demand for our products and services, competition from more established firms and others, pressures on price levels and our historical dependence on relatively few products, certain suppliers and certain key customers. Reference is made to VASCO's public filings with the U.S. Securities and Exchange Commission for further information regarding VASCO and its operations.

This document may contain trademarks of VASCO Data Security International, Inc. and its subsidiaries, including VASCO, the VASCO "V" design, DIGIPASS, VACMAN, aXsGUARD and IDENTIKEY.

For more information contact: Jochem Binst, +32 2 609 97 00, jbinst@vasco.com

Follow us on Twitter: http://twitter.com/VASCODataNews

SOURCE VASCO Data Security International, Inc.

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
In Part 1, I looked at what could be behind Facebook’s acquisition of WhatsApp and subsequent purchase of Oculus Rift. How are these seemingly different acquisitions related? There is no question that both Facebook and Google are in a race to build the next-generation computing/communi...
In the pharmaceutical industry, the drug development clock is ticking at the rate of warp-speed. As a result, companies are constantly looking for solutions to help them accelerate time to market – and many are realizing that implementing a cloud-based information management system can...
Good morning! Or evening, if you happen to be reading this on the other side of the world. Our topic for today is the internet. What? You already know about the internet? No, no, I don’t mean that internet, the boring old one you use to access YouTube and send Facebook updates, e...
Having an effective BYOD policy is one of the most critical steps to ensuring BYOD success. Learn the basics for securing your company's data and clarifying the process. Employees like the ability to choose. Whether it be choosing the hours they work or whether or not they can teleco...
I was recently reading Freakonomics’ authors Steven D. Levitt & Stephen J. Dubner’s latest book, Think Like a Freak, and passed over a quote that really resonated with me: So rather than address their root causes, we often spend billions of dollars treating the symptoms and are left t...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE