Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


ISACA Survey Reveals Growing Acceptance of BYOD in Australia and New Zealand

Global not-for-profit IT association ISACA today released findings from its 2012 IT Risk/Reward Barometer survey. Respondents in Australia and New Zealand report a growing acceptance of “bring your own device” (BYOD) in the workplace, while also acknowledging that they believe the risk still outweighs the benefit.

The IT Risk/Reward Barometer surveyed more than 4,500 IT professionals worldwide about the risks and rewards associated with BYOD and cloud computing, among other topics. When it comes to BYOD, companies in Oceania and Africa tend to allow employees to use their own device for work purposes more than companies in other regions do. In fact, nearly half of responding enterprises in Oceania allow it (48%), while only 28% of European companies do.

Only 22% of respondents in Australia and New Zealand say the benefits—including increased productivity and efficiency and cost reduction—outweigh the risk, while 47% still believe that the risk is greater. Yet despite the dangers, 32% of enterprises still do not have a security policy in place for BYOD.

To help control BYOD risk, enterprises in Australia and New Zealand report having the following security controls in place:

  • Password management system (48%)
  • Remote wipe capability (40%)
  • Encryption (37%)

Nearly 70% of enterprises in Australia and New Zealand allow employees to access social networking sites from a work device, and 72% allow employees to shop online using a work-supplied device.

However, IT professionals report that the following employee activities pose a high risk to the enterprise:

  • Storing work passwords on a personal device (78%)
  • Losing a work-supplied computer or smart phone (67%)
  • Using an online file-sharing service for work documents (63%)
  • Downloading personal files onto a work-supplied device (51%)

“Enterprises in Oceania seem to understand and accept that employees are increasingly using their own devices for work and personal activities,” said Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, FACS CP, director of ISACA and director of information security at BRM Holdich. “However, controls need to be in place that include clearly communicated policies and ongoing education that trains employees to help protect both the enterprise and the employees.”

ISACA, a not-for-profit association serving 100,000 IT professionals in 180 countries, provides resources to help enterprises address this challenging issue.

“ISACA recently published Securing Mobile Devices With COBIT 5 to help enterprises address mobile device security, including BYOD,” said Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, international vice president of ISACA. “By applying the COBIT framework to mobile device security, enterprises can better plan, implement and maintain comprehensive security for these devices.”

Full survey results are at www.isaca.org/risk-reward-barometer. COBIT 5 is at www.isaca.org/cobit.

About the IT Risk/Reward Barometer

The annual IT Risk/Reward Barometer helps gauge attitudes and organizational behaviors related to the risk and reward associated with the blurring boundaries between personal and work devices (BYOD), cloud computing, and increased enterprise risk related to online employee behavior. It is based on September 2012 online polling of 4,512 ISACA members from 83 countries, including 173 members in Oceania.

About ISACA

With 100,000 constituents in 180 countries, ISACA® (www.isaca.org) is a leading global association for information systems assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. It offers the CISA®, CISM®, CGEIT® and CRISC® designations and the COBIT® framework.

Follow ISACA on Twitter: https://twitter.com/ISACANews

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Over the past year, Microsoft has been introducing Azure Resource Manager (ARM) as the preferred way to provision and manage resources in its Azure cloud. ARM is the successor to the original Service Management model, also known as “Classic.”[1] While Classic will continue to be suppor...
@DevOpsSummit taking place June 7-9, 2016 at Javits Center, New York City, and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the le...
I attended a HIVE-sponsored Meetup yesterday evening titled, “Rocking the database world with RocksDB”. Since I had never heard of RocksDB, I was curious to learn how it is rocking the database world. Facebook built this key value store storage layer originally to use for MySQL (ins...
Since launching SwaggerHub in 2015, we've received a ton of great feedback from users about how we can improve the platform to help teams collaborate on and coordinate more effectively across the workflow of the API cycle. To kick off 2016, we are excited to announce a few significant...
Most of the Java developers I know don’t like JavaScript. Initially. They would give you different reasons why, but the real one is simple: too much to learn to make it work. For many Java developers creating the front end of a Web application in JavaScript is a chore to write and a bu...
The Linux Foundation, the nonprofit organization enabling mass innovation through open source, and Linux Academy today announced a new partnership to provide subscription-based Linux training for SysAdmins at a discounted rate. Those interested in receiving access to all of Linux Acade...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE