yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

DeviceLock(R) Endpoint DLP Software Achieves Citrix Ready Certification
DeviceLock Data Leak Prevention Software Is Now Certified to Provide DLP Protection to Citrix XenApp-Based Virtual Endpoint Environments

SAN RAMON, CA -- (Marketwire) -- 11/15/12 -- DeviceLock, Inc., a worldwide leader in endpoint data leak prevention (DLP) software, today announced that their DeviceLock Endpoint DLP Suite has been verified as Citrix Ready. XenApp users can now protect their virtual endpoints with the leader in endpoint DLP software.

Citrix Ready is an end-to-end partner program from Citrix (NASDAQ: CTXS) that showcases and recommends products demonstrating compatibility with the Citrix Application Delivery Infrastructure. The program allows users to quickly and easily find solutions recommended by Citrix that are trusted to enhance Citrix offerings. Customers can be confident that the DeviceLock Endpoint DLP Suite has passed verification tests designed by Citrix and can be trusted to work in Citrix XenApp environments. These environments would include those deploying a 'Bring Your Own Device' (BYOD) model that provides employees secure access to corporate applications and data while using virtually any type of remote personal computer, laptop, tablet or smartphone device connected via the Citrix Receiver 'app.'

With its Virtual DLP feature, DeviceLock enforces flexible contextual and content-aware filtering controls over data flows between server-hosted virtual applications or desktops and redirected peripheral devices of remote BYOD endpoints. In addition, user network communications from within the terminal session are controlled by the DeviceLock DLP mechanisms. As a result, the isolated corporate environment on the employee's personal device remains under corporate control, as are all data exchanges between the user's virtual workspace and their personal device, local peripherals and the network.

"We are pleased to be able to offer Citrix customers the high level of endpoint protection which DeviceLock DLP Suite has long provided to the physical desktop," said Vince Schiavo, Chief Executive Officer, DeviceLock. "This Citrix Ready verification clearly demonstrates our strategy to provide comprehensive data leak prevention for our customers moving to virtualized endpoints, both at the application and desktop level."

DeviceLock 7.2 provides advanced content-aware controls over endpoint data leakage channels from a company's computers -- whether they are laptops, desktops, servers, and now even virtualized endpoints. The Endpoint DLP Suite consists of three software modules -- DeviceLock, NetworkLock and ContentLock -- that together protect any sized organization from endpoint data leak threats across the widest array of threat vectors. These include:

  • Transferring sensitive company data via endpoint-connected iPhones, Androids, BlackBerry, other smart-phones, iPods, iPads, digital cameras, CD/DVD ROM, USB drives, SD, Compact Flash and other forms of removable media
  • Transferring company data to cloud-based file sharing solutions such as Dropbox, GoogleDrive, SkyDrive, RapidShare and iFolder
  • Leaking company info from endpoints via social media, Skype, IM, webmail, email or printing
  • Data leakage from endpoints via FTP/FTPS, HTTP/HTTPS, and other protocols

"Our mission is to make the DeviceLock Endpoint DLP Suite the most easily deployed, integrated, scalable and flexible software available on the market for organizations that must protect confidential data from leaking out of their employees' computers -- whether physical or virtual," said Mr. Schiavo. "Earning the Citrix Ready certification truly speaks to our company's dedication to make our endpoint DLP software the very best in its category."

For more information on the DeviceLock Endpoint DLP Suite and to read the product review in its entirety, please visit

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint device/port control for data leak prevention (DLP) in situations where employees are using mobile devices like smart-phones, tablets, cameras or USB sticks along with company-owned endpoints like laptops or desktops. In addition, DeviceLock software can prevent data leaks via Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at

Add to Digg Bookmark with Add to Newsvine


Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Enterprise Open Source Magazine Latest Stories . . .
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one lo...
Widespread fragmentation is stalling the growth of the IIoT and making it difficult for partners to work together. The number of software platforms, apps, hardware and connectivity standards is creating paralysis among businesses that are afraid of being locked into a solution. EdgeX...
One problem that all developers and companies struggle with is trying to decide if they should "build it" or "buy it". Software developers love to build things. That is what we do! Their natural reaction tends to lean towards building things. We are also always up for a new challenge. ...
MongoDB, an open-source document store and most popular NoSQL database on the market today, offers a variety of advanced features to administer security over your MongoDB deployments. In this tutorial post, we’re going to show you how to set up role-based access control (RBAC) to manag...
SYS-CON Events announced today that Evatronix will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Evatronix SA offers comprehensive solutions in the design and implementation ...
First, let's outline a frame of reference for multithreading and why we may need to use a thread pool. A thread is an execution context that can run a set of instructions within a process - aka a running program. Multithreaded programming refers to using threads to execute multiple ta...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers