yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

BeyondTrust Strengthens Channel Presence in India

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced a distribution partnership with Peritas IT Solutions, one of India’s fastest growing IT security distributors. This partnership will improve market penetration of the PowerBroker Suite in India and support local customers’ identity and compliance initiatives whilst at the same time offering unrivaled vulnerability management.

“We have seen a significant increase in demand in the Indian market for our suite of products, hence our investment within the region,” said Brent Thurrell, vice president for Europe, Middle East, Africa and India, for BeyondTrust. “Our partnership with Peritas will enable us to provide an unmatched level of solutions for visibility into privileged user activities for our customers throughout India. We are delighted to add Peritas to our portfolio of global partners and are encouraged by their commitment to help grow the global business for BeyondTrust.”

Peritas is a Value Added Distributor focused on providing security products and services across India. They cater to the entire security life-cycle of an organization. Peritas works closely with channel partners and end users to provide cost effective, high-value, innovative IT security solutions. The company’s main strength lies in launching new technologies and educating end users in the Indian market that ultimately provide unique value propositions to customers.

"We are expecting the Indian Global Privilege Identity Management market to grow around 20-25 percent annually over the next five years,” said Raghu Setlur, director at Peritas. “By becoming a Value Added Distributor for BeyondTrust we are able to drive demand within the end-user space and through the education of our solid partner base. We are confident that the BeyondTrust suite will enable us to do this and grow the business for both organisations.”

“We are proud to be partnering with BeyondTrust who are leaders in Context-Aware Security Intelligence. Their unique solution will help organizations provide true return on investment and at the same time secure both the internal and external environment,” commented Subhendu, director at Peritas.

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust


About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers