yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

MY True Cloud Announces the Release of “Invisible Cloud-Token”

MY TrueCloud’s Invisible Cloud-Token uses proprietary technology to deliver the industry's only token-less solution that delivers above military grade proprietary 2-Factor Authentication security via the Cloud and the users’ browser.

Invisible Cloud-Token addresses the 2 biggest concerns of adopting 2-Factor Authentication, end-user adoption and high-costs. MTC’s proprietary algorithms empower the browser to manage the process of One Time Passwords (OTPs) totally invisible to the end-user – adoption is automatic. Also, with no need to have a secondary device, companies can realize significant savings using a 100% cloud technology.

“Invisible Cloud-Token is a true game changer. It sets a new industry standard for secure SaaS platforms in a Mobile world. Invisible Cloud-Token combined with MTC’s advance cloud based collaboration platform provides the industry’s only secure token-less solution suite for companies pursuing a mobile strategy. Based on our years of research and development and listening to our customers, we feel Invisible Cloud-Token allows for cost-effective mobile deployment across the enterprise which will be a huge home run for our customers,” explains Mitch Alcon, CEO.

Data privacy concerns must be addressed before companies can take full advantage of mobile technology. Passwords offer only single factor authentication and are relatively easy to breach. 2 Factor Authentication using Hardware Tokens in various forms have been introduced to mitigate the real threat of password theft. However, hardware tokens are expensive to deploy and are easily lost or forgotten. Invisible Cloud-Token solves these problems by providing a unique, on-demand solution with the strength of both passwords and tokens without the disadvantages of low security and high deployment costs of physical tokens.

Invisible Cloud-Token is a completely web based two factor Authentication method which requires a SSL/VPN portal. You can use your existing VPN, or purchase MTC’s SSL/VPN with proprietary tunneling technology that optimizes MTC’s token-less technology. Your browser is enrolled when used for the first time with a technology that seamlessly configures your browser and integrates a OTP-token into it. A SMS OTP seed is placed in the browser and the next time authentication occurs, a script automatically generates and sends a OTP. Invisible Cloud-Token utilizes a proprietary algorithm that completely removes the SMS OTP seed to prevent the possibility of hackers reverse-engineering the authentication code to gain unauthorized access.

MY TrueCloud is a secure mobile cloud platform that addresses the key issues of data privacy and costs of mobile deployment. The key benefits of Invisible Cloud-Token 2 Factor Authentication are low cost, ease of deployment, convenience and state of the art next generation security. Invisible Cloud-Token is based on industry standards; it uses HTML5 and OATH, runs on any platform that is HTML5 enabled, including Windows Desktop, Android, Blackberry, Java ME and iOS Devices. End users can continue to use password-based authentication and existing passwords in directories such as LDAP or Active Directory.

“We are confident that our comprehensive SaaS collaboration suite consisting of integrated Customer Relations Management (CRM), Document Management, e-Marketing, Project Management, Social Media, Chat and toll free Webinar/Video Conferencing in a single, secure Cloud application with strong 2-factor authentication, anywhere with any device will change the paradigm of how organizations work together to achieve shared goals,” explains Glen Passaretti, Manager Sales and Marketing.

MY TrueCloud is an Aliso Viejo, California based company. To learn more about Invisible Cloud-Token and our SaaS Cloud based collaboration solutions contact Glen Passaretti at 866-426-5485 or email

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Ten short years ago, Apache Hadoop was just a small project deployed on a few machines at Yahoo and within a few years, it had truly become the backbone of Yahoo’s data infrastructure. Additionally, the current Apache Hadoop market is forecasted to surpass $16 billion by 2020. This mi...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his ...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Servic...
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will ad...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the n...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers