Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


DeviceLock(R) Announces Support for President Obama's Insider Threat Policy
DeviceLock Helps Government IT Security Teams Comply With National Insider Threat Policy

SAN RAMON, CA -- (Marketwire) -- 12/03/12 -- DeviceLock, Inc., a worldwide leader in endpoint data loss prevention (DLP) software, today announced full support for President Obama's National Insider Threat policy for IT Security. DeviceLock's Endpoint DLP Suite software can be a key element in a comprehensive arsenal of IT security tools for data loss prevention -- preventing the unauthorized transfer of sensitive information outside of federal government networks.

"With his recent memorandum for the heads of executive departments and agencies, President Obama has recognized and validated the concern that many IT security professionals share," said Vince Schiavo, DeviceLock CEO. "Namely, that the vast majority of serious data breach incidents are not being caused by malicious outside hackers, but by trusted insiders with authorized access."

A Ponemon study published earlier this year found that 63 percent of serious data breach incidents are caused by insiders -- either through unintentional mistakes, negligence or misconfigurations.

The president's memorandum specifically promotes "the development of effective insider threat programs within departments and agencies to deter, detect, and mitigate actions by employees who may represent a threat to national security. These threats encompass... unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems."

DeviceLock's Endpoint DLP Suite software provides government IT security professionals the ability to set and enforce policies for the transfer of sensitive data outside of protected government networks from millions of government servers, laptops, desktops, smartphones and tablets. The software provides comprehensive controls over what sorts of information may be printed, sent in emails, burned to CD or DVD, transferred to USB drives, stored on Dropbox or other cloud-file-sharing services, etc. The policy can specify which types of transfers should be allowed, blocked or logged. In this way network security managers can be immediately alerted when someone tries to move data outside the organization in a way that violates policy.

The most notorious example of the need for this type of software is the incident in which Bradley Manning, a US Army enlisted soldier with authorized access to sensitive State Department documents, burned a large number of files onto a CD-ROM and passed the information to Wikileaks. Had the installation where he worked been using DeviceLock's software, the incident could have been prevented. The transfer attempt would have been blocked, the files in question copied to a secure archive and IT security management would have been alerted immediately.

For more information visit www.devicelock.com.

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint data loss prevention (DLP) in situations where employees are using mobile devices like smartphones, tablets, cameras or USB sticks or Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2169605

Add to Digg Bookmark with del.icio.us Add to Newsvine

DEVICELOCK MEDIA CONTACT

Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Enterprise Open Source Magazine Latest Stories . . .
It’s hard to believe that it’s already 2017. But with the new year comes new challenges, new opportunities—and, of course—new software projects. One of the most important questions beginner, intermediate, and advanced coders all have to answer before they begin their next project is wh...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for pe...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a...
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need...
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engag...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used t...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE