Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


Tenable First to Manage Threats from Massive Field of New IPv6 Internet Addresses

Tenable Network Security, Inc., the leader in real-time vulnerability management, today released the first vulnerability management solution designed to identify emerging threats and vulnerabilities as an entirely new field of Internet addresses are employed.

IPv6 (Internet Protocol version 6) is the latest revision of the Internet Protocol (IP), the primary communications protocol upon which the entire Internet is built. It is intended to replace the older IPv4, which is running out of addresses that are needed to connect the exploding number of devices like smartphones and tablets to the Internet.

Security solutions not yet able to discover and assess known devices and systems assigned the new IPv6 address leave networks vulnerable to security risk and compliance violations, especially to malicious users who will be trying to exploit networks that contain unknown IPv6 addresses.

No longer a job for scheduled scanning alone, upgrades to Tenable’s SecurityCenter Continuous View™ (CV) solution combines scheduled scanning and passive vulnerability monitoring to identify vulnerabilities, threats, and compliance violations located at any of 1.2*10^24 IPv6 addresses, a /48 space recommended for a “typical” organization.

Already unique in its ability to manage risk from mobile devices, cloud-based services and virtual infrastructure, enhancements to SecurityCenter CV components, SecurityCenter™ version 4.6 and Passive Vulnerability Scanner™ (PVS) version 3.8, extend Tenable’s lead in vulnerability management to identify security and compliance risk from rapidly evolving computing environments.

“Our customers are already the first to continuously manage risk from mobile, cloud and virtual infrastructure. Now they can add IPv6 to the list of challenges they’ve uniquely prepared their organizations for,” said Ron Gula, CEO and co-founder of Tenable Network Security. “This new release of SecurityCenter continues to set the pace for IT risk management, helping companies rapidly adopt new technologies, and reduce gaps in risk awareness from months to minutes by transitioning from periodic scanning to continuous real-time monitoring.”

The following enhancements to SecurityCenter and PVS™ improve monitoring, analysis and collaboration:

  • IPv6 – Enhancements to SecurityCenter and PVS automatically identify security and compliance risk in IPv6 assets as soon as and wherever they appear across hybrid IPv4/IPv6 address spaces, increasing situational awareness.
  • Unified IPv6 Scanning – Enhancements to SecurityCenter, when used with Tenable Perimeter Service, provide a comprehensive internal and external assessment of an organization’s IPv6 risk posture.
  • LDAP Access and Asset Calculator - Enhancements in SecurityCenter simplifies the creation of scans targeted at devices based on enterprise IT asset information. New Plugin Date Filters improve compliance trending and reporting.
  • Scan on Alert, Report on Scan, and Report Sharing - New collaboration functions allow SecurityCenter to trigger scans, share reports, and initiate incident and remediation workflow with rich information on vulnerabilities, threats, and malware detection. With Tenable’s Log Correlation Engine™ deployed, reports and scans can be triggered based on anomalous behavior (e.g., never-before-seen events).

A complete list of enhancements can be found at Tenable SecurityCenter.

About Tenable Network Security

Tenable Network Security is the de facto standard for vulnerability and compliance management solutions with over 15,000 customers worldwide. Tenable’s unique real-time vulnerability and threat management technologies are used by the most demanding security professionals, compliance auditors, and executive risk managers to reduce the risk from mobile, cloud and virtual technologies. Our solutions scale to meet the needs of the smallest to the largest enterprises and government agencies including the entire U.S. Department of Defense.

For more information, please visit Tenable.com.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
DevOps is a discontinuous innovation in the way organizations develop and deliver software. And as with any new discontinuous innovation, the implication is that creative destruction will follow. Companies that hold on to legacy business and technology models, without pursuing the ev...
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Jeff Tegethoff, CEO of Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, will take a closer look at the architectural design factors neede...
StackIQ offers a comprehensive software suite that automates the deployment, provisioning, and management of Big Infrastructure. With StackIQ’s software, you can spin up fully configured big data clusters, quickly and consistently — from bare-metal up to the applications layer — and ma...
Here’s the presentation I gave at the Linux Foundation’s CloudOpen in Dusseldorf on October 13, 2014 titled Mixing Your Open Source Cloud Cocktail Add two parts virtualization, one part orchestration add a little networking shake and pour. Unfortunately cloud computing isn’...
There's fog coming to the world of IT. Some people are calling this "The Cloud." This fog turns everything inside out. It will take your monolithic applications, the guts of which are contained within large bodies of code, and break them apart so that discrete units of functionality a...
In his session at 15th Cloud Expo, Mark Hinkle, Senior Director, Open Source Solutions at Citrix Systems Inc., will provide overview of the open source software that can be used to deploy and manage a cloud computing environment. He will include information on storage, networking(e.g.,...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE