Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


U.S. Department of Defense Extends Vulnerability Management Contract with BeyondTrust For Ninth Consecutive Year

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the Defense Information Systems Agency (DISA) has chosen to extend their contract with BeyondTrust to provide critical vulnerability assessment and management solutions for all branches of the U.S. Department of Defense (DoD). The relationship between BeyondTrust (through the acquisition of eEye Digital Security) and the DoD dates back to 2004 and provides coverage for every networked asset within the armed services networks. This contract extension also makes BeyondTrust’s award-winning Retina Network and Retina CS technology available to agencies operating under the Assured Compliance Assessment Solution (ACAS) program that need to confidently deploy a scalable vulnerability management solution.

Retina CS is the centerpiece of the BeyondTrust’s vision of Context-Aware Security Intelligence, aimed at helping commercial and government organizations answer the most pressing questions in IT – what to fix first, what to fix next and why? Retina CS does this through unmatched security intelligence and analytics for the entire IT landscape, including support for emerging technology investments such as cloud and mobile computing and virtualization.

“We honored to continue our strong relationship with the DoD by providing technology that is specific to their requirements and designed to meet the needs of highly complex, and heterogeneous government agency infrastructures,” said Kevin Hickey, president and chief operating officer at BeyondTrust. “We have a long and distinguished history as a provider of threat management and compliance solutions for both government agencies and enterprise commercial organizations. Our goal is to help our customers make better informed security strategy decisions by way of our technology.”

BeyondTrust is committed to serving government customers by providing innovative security and compliance solutions that support for SCAP, FDCC, and DIACAP initiatives. For more information about Retina CS and all of the PowerBroker offerings, please visit www.beyondtrust.com.

Availability

As a service to the network security community, BeyondTrust provides community offerings of Retina and Retina CS, the same technology relied upon by the DoD. You can get your copy, free of charge, here: http://www.beyondtrust.com/Community

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust

Twitter: http://twitter.com/beyondtrust

Blog: http://blog.beyondtrust.com

LinkedIn: http://www.linkedin.com/companies/beyondtrust

Facebook: http://www.facebook.com/beyondtrust

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
At the onset of 2015 it seems that Business Intelligence software has become a nearly consensual part of any data-driven organization. Today companies large and small are realizing, more than ever, that "data is power", and that harnessing this power requires the right tools for the jo...
"The year ahead brings accelerated disruption, as those technologies which we spoke about last year as being emergent -- have now begun to evolve to practical application," stated Puneet Gupta, Brillio's Chief Technology Officer. "We are seeing the industry's rapid adoption of next-gen...
Large technology manufacturers that focus on channel sales through distributors and resellers have traditionally operated with informal processes, using tools like spreadsheets and information driven by anecdotal stories from channel partners, unstructured data, and the "gut instinct" ...
In terms of requirements, IoT systems require the ability: to gather, process and store all the data from a wide range of different of sensors; to produce alerts on certain conditions being detected in the incoming data; to analyze or view historical data with incoming sensor data.
The follow up article to Welcome to the Age of the Consumer: No Opinion Matters More Now we go into how to take advantage of those essential first few days or even minutes that you have your potential customer’s attention in order to follow through on heightened expectations of ste...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE