yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Today's Top SOA Links

Aveksa Works with HP to Deliver Full Business Identity and User Context with HP Security Intelligence Platform

Aveksa, Inc., the provider of the industry’s most comprehensive Business-Driven Identity and Access Management platform, today announced that it has worked with HP to provide full business identity and user context with the HP Security Intelligence platform to enhance threat detection for customers. In addition, Aveksa has received HP ArcSight Action Connector certification and has joined the HP Enterprise Security Technology Alliances Program.

While Security Information and Event Management (SIEM) solutions provide enterprises with visibility into activity across the IT infrastructure, such as external threats, internal threats and compliance pressures, they can benefit from added identity context of individual IT users.

To address this opportunity, Aveksa provides customers with access to full business context for identities, users and activities, all within the HP ArcSight Security Intelligence platform. By using the full set of identity information maintained by Aveksa in conjunction with data provided by HP ArcSight IdentityView, enterprises can make better decisions and better respond to today's security threats.

Another benefit of the two companies working together is that customers can leverage real-time activity and threat intelligence for true closed-loop validation and enforcement of enterprise access control processes. By doing so, enterprises can now detect granting or usage of sensitive entitlements, and validate whether they are truly compliant with corporate access request policies and processes.

“In order for SIEM solutions to provide enterprises the best threat detection, it is imperative that they can distinguish between authorized and unauthorized access at a very granular level,” said Deepak Taneja, Chief Technology Officer, Aveksa. “By working with HP, our customers benefit from a fully-integrated Identity/SIEM solution that enables a richer detection of threats by incorporating granular identity context, such as user roles, profiles, access rights and Information Security policies.”

“Increasingly, enterprises are looking for tightly-integrated solutions to solve their complex IT security challenges while reducing operational complexity and mitigating critical security threats,” said Buck Watia, Director of Business Development, Enterprise Security, HP. “HP is working with Aveksa to provide customers with enhanced context for identity and user access, which is crucial in quickly detecting threats and reducing business risk.”

Click here to learn more about the Aveksa/HP ArcSight partnership.

About Aveksa

Aveksa provides the industry’s most comprehensive Business-Driven Identity and Access Management platform. By uniquely integrating Identity and Access Governance, Provisioning and Authentication, Aveksa enables enterprises to manage the complete lifecycle of user access for SaaS and On-premise applications and data. With Aveksa, IT organizations can reduce Access Management complexity and increase operational efficiency while minimizing risk and ensuring sustainable compliance. Aveksa provides enterprises with the industry’s fastest time to value with over 90% of customers reporting live implementations of the company’s business-driven Identity & Access Management solutions and over 80% of these customers live with the latest version of the Aveksa platform. For more information, visit

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
Intuit uses deep-data analytics to gain a 360-degree view of its TurboTax application's users’ behavior and preferences for rapid applications improvements. The next BriefingsDirect big-data innovation case study highlights how Intuit uses deep-data analytics to gain a 360-degree view...
Certain CIOs for incomprehensible reasons keep off their cloud transformation projects several key IT disciplines including Enterprise Architecture (EA), IT Service Management (ITSM) and most importantly Project Management. Do they consider them obsolete? useless? irrelevant? ITaaS St...
In today’s pharmaceutical supply chain, counterfeit activity is thriving. As pharma companies have expanded target markets and outsourced production over the last decade, the supply chain has become increasingly global, virtual, and vulnerable. Illicit activity has thrived, and patient...
Here’s the thing: as sure as we’ll have another record-setting year for NFL streaming, you can also be sure that apps will fail and streaming services will go down. Whether you are dabbling in streaming or diving in whole-hog, you need to know what to do to give your users the most rel...
This is how a typical software product lifecycle works : You gather requirements, build a prototype, detail out the architecture and design, develop the product, test it, deploy the product, handle migration and maintenance and ensure product support. This is a closed loop where the Pr...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers