Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


Comodo Introduces Industry Changing Endpoint Security Solution
Patent Pending Panoramic display technology lets IT Managers see endpoints' 12 critical metrics in one view

Clifton, N.J., Feb. 27, 2013 /PRNewswire/ -- Comodo, a leading internet security provider, announces their latest solution for centralized administration of security, including anti-virus protection of endpoints.  Comodo Endpoint Security Manager 3.0 (ESM 3.0) sets the tone for powerful security management with its easy to manage user interface.

Combining a very short learning curve, the management of Comodo's award winning Endpoint Security suite and day-to-day information required to maximize and maintain user productivity, Endpoint Security Manager now offers a more powerful and intuitive platform for the business network.  The patent pending innovative panoramic technology display allows IT Managers to view all endpoints, such as a desktop computer, laptop, mobile device or printer, quickly and on one screen.  This feature of ESM 3.0  allows the manager to sweep left or right  as well as zoom in and out over  the virtual landscape of their endpoint estate.  With Windows 8® compatibility, Comodo ESM 3.0 puts important information right at the IT Manager's fingertips, literally, with the convenience of a touch screen interface. 

Our new 'info tiles' interface means problem endpoints can be identified quickly and efficiently.  Each endpoint is represented in its own info-tile consisting of fully customizable policies and metrics, such as power management and USB device control that can be further examined to allow an administrator to make swift and accurate decisions.  With just one click, the administrator is able to view or stop services and processes as well as browse and uninstall applications.

"Comodo is well-known for its ability to introduce internet security with a unique approach to protecting users.  Defense+ Host Intrusion Protection Software (HIPS) goes beyond traditional HIPS to stop viruses and malware before they enter endpoints," said Melih Abdulhayoglu, CEO of Comodo. "You wouldn't open the door of your home to a complete stranger, so why do that with your endpoints."

ESM 3.0 requires minimal system resources allowing installation on non-dedicated Windows® PCs or servers.  Browser based consoles gives administrators the flexibility of monitoring endpoints from anywhere at anytime.

Additionally, protection of endpoints is further extended using Comodo's Default Deny Protection which leverages the most reliable 'whitelist' of verified applications and vendors to automatically decide if an application is allowed to run on your network or not without interruption of the network.

Comodo ESM 3.0 incorporates 'Defense in Depth' to the desktop environment.  It features blacklist based detection, the industry recognized Comodo Firewall, the behavioral analysis engine of the Defense+Host Intrusion Prevention System (HIPS) which  filters unknown or malicious programs allowing only known-good programs to run along with  the unique Auto-Sandbox which defends systems from potentially malicious files. Comodo offers you the most comprehensive solution to locking down and managing your endpoints.

For more information on Comodo's complete line of internet security products, visit www.comodo.com

About Comodo

Comodo is a leading internet security provider. With U.S. Headquarters in New Jersey and global resources in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security services, including SSL certificates, PCI scanning, desktop security, and remote PC support. Securing online transactions for more than 200,000 businesses, and with more than 35 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online®. To learn more, visit Comodo's website: Comodo.com.

Windows® is a registered trademark of Microsoft Corporation in the United States and other countries.

SOURCE Comodo

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
As this year comes to a close, let's take one last look at the most pervasive cloud computing trends -- including increased usage across the different cloud service models, the key business drivers and the impact of agile innovation strategies.

Cloud computing adoption has m...
Many workloads are already in the cloud: Most organizations today run at least some workloads in the cloud. For newer organizations, they will often run ALL of their workloads in the cloud. For cloud-based workloads, sending log data to a cloud-based logging provider is not quite as bi...
Cloud computing seems to still be one of the reigning buzzwords in high-tech these days. Everything is either “in the cloud”, “powered by the cloud”, or some variation on the theme. I remember when hosted email was just that: hosted email. Today, such offerings are considered cloud off...
Last week as I was writing Amazon Declares War on VMware, VMware was preparing to announce the acquisition of a pro services team to aid in cloud migration (see coverage in CRN): VMware Acquires Professional Services Firm To Boost Cloud Migration, DevOps Expertise. You can get my thoug...
Many projected use cases for IoT won’t directly generate revenues. To achieve greater efficiency, companies are deploying IoT sensors internally throughout their organizations to optimize their use of everything from computer servers to lighting to HVAC systems to employee productivity...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE