Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


ISACA Survey Reveals Growing Acceptance of BYOD in Australia and New Zealand

Global not-for-profit IT association ISACA today released findings from its 2012 IT Risk/Reward Barometer survey. Respondents in Australia and New Zealand report a growing acceptance of “bring your own device” (BYOD) in the workplace, while also acknowledging that they believe the risk still outweighs the benefit.

The IT Risk/Reward Barometer surveyed more than 4,500 IT professionals worldwide about the risks and rewards associated with BYOD and cloud computing, among other topics. When it comes to BYOD, companies in Oceania and Africa tend to allow employees to use their own device for work purposes more than companies in other regions do. In fact, nearly half of responding enterprises in Oceania allow it (48%), while only 28% of European companies do.

Only 22% of respondents in Australia and New Zealand say the benefits—including increased productivity and efficiency and cost reduction—outweigh the risk, while 47% still believe that the risk is greater. Yet despite the dangers, 32% of enterprises still do not have a security policy in place for BYOD.

To help control BYOD risk, enterprises in Australia and New Zealand report having the following security controls in place:

  • Password management system (48%)
  • Remote wipe capability (40%)
  • Encryption (37%)

Nearly 70% of enterprises in Australia and New Zealand allow employees to access social networking sites from a work device, and 72% allow employees to shop online using a work-supplied device.

However, IT professionals report that the following employee activities pose a high risk to the enterprise:

  • Storing work passwords on a personal device (78%)
  • Losing a work-supplied computer or smart phone (67%)
  • Using an online file-sharing service for work documents (63%)
  • Downloading personal files onto a work-supplied device (51%)

“Enterprises in Oceania seem to understand and accept that employees are increasingly using their own devices for work and personal activities,” said Jo Stewart-Rattray, CISA, CISM, CGEIT, CRISC, FACS CP, director of ISACA and director of information security at BRM Holdich. “However, controls need to be in place that include clearly communicated policies and ongoing education that trains employees to help protect both the enterprise and the employees.”

ISACA, a not-for-profit association serving 100,000 IT professionals in 180 countries, provides resources to help enterprises address this challenging issue.

“ISACA recently published Securing Mobile Devices With COBIT 5 to help enterprises address mobile device security, including BYOD,” said Tony Hayes, CGEIT, AFCHSE, CHE, FACS, FCPA, FIIA, international vice president of ISACA. “By applying the COBIT framework to mobile device security, enterprises can better plan, implement and maintain comprehensive security for these devices.”

Full survey results are at www.isaca.org/risk-reward-barometer. COBIT 5 is at www.isaca.org/cobit.

About the IT Risk/Reward Barometer

The annual IT Risk/Reward Barometer helps gauge attitudes and organizational behaviors related to the risk and reward associated with the blurring boundaries between personal and work devices (BYOD), cloud computing, and increased enterprise risk related to online employee behavior. It is based on September 2012 online polling of 4,512 ISACA members from 83 countries, including 173 members in Oceania.

About ISACA

With 100,000 constituents in 180 countries, ISACA® (www.isaca.org) is a leading global association for information systems assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. It offers the CISA®, CISM®, CGEIT® and CRISC® designations and the COBIT® framework.

Follow ISACA on Twitter: https://twitter.com/ISACANews

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
StackIQ offers a comprehensive software suite that automates the deployment, provisioning, and management of Big Infrastructure. With StackIQ’s software, you can spin up fully configured big data clusters, quickly and consistently — from bare-metal up to the applications layer — and ma...

Unless you have been living under a rock the last year, you have probably heard about Docker. Docker describes itself as an open platform for distributed applications for developers and sysadmins. That sounds great, but why does it matter? Wait, virtualization isn’t new!? Virt...

When I took my operating systems fundamentals course in college I was taught that an operating system provides very specific capabilities that provides users with access compute resources for building and running applications. Over time as networking capabilities and bandwidth increase...
There's fog coming to the world of IT. Some people are calling this "The Cloud." This fog turns everything inside out. It will take your monolithic applications, the guts of which are contained within large bodies of code, and break them apart so that discrete units of functionality a...
DevOps is a discontinuous innovation in the way organizations develop and deliver software. And as with any new discontinuous innovation, the implication is that creative destruction will follow. Companies that hold on to legacy business and technology models, without pursuing the ev...
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Jeff Tegethoff, CEO of Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, will take a closer look at the architectural design factors neede...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE