yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

DeviceLock(R) Endpoint DLP Software Achieves Windows 8 Certification

SAN RAMON, CA -- (Marketwire) -- 01/15/13 -- DeviceLock, Inc., a worldwide leader in endpoint data loss prevention (DLP) software, today announced that the upcoming 7.2 release of their DeviceLock Endpoint DLP Suite has been verified as logo-certified for Windows 8. Upon v7.2's release, DeviceLock DLP can be installed on all Windows 8 desktops and laptops for immediate protection from insider-originated data breaches.

Per Microsoft's website for developers, "...the Windows 8 Desktop Application Certification... is made up of program and technical requirements to help ensure that third-party applications carrying the Windows brand are both easy to install and reliable on PCs running Windows. Customers value stability, compatibility, reliability, performance, and quality in the systems they purchase. Microsoft focuses its investments to meet these requirements for software applications designed to run on the Windows platform for PCs. These efforts include compatibility tests for consistency of experience, improved performance, and enhanced security on PCs running Windows software. Microsoft compatibility tests have been designed in collaboration with industry partners and are continuously improved in response to industry developments and consumer demand."

"With many companies considering deployment of Windows 8 devices to their environments, we wanted to ensure DeviceLock continues to provide our customers with advanced endpoint DLP tools," said Mr. Ashot Oganesyan, Chief Technical Officer, DeviceLock. "This underscores our commitment to providing a best-in-class endpoint DLP product to support our customers in their effort to stay up to date with Microsoft technologies and remain compliant with stringent regulations and industry standards regarding protection of their corporate and customer data."

DeviceLock 7.2 provides advanced content-aware controls over endpoint data leakage channels from a company's computers -- whether they are laptops, desktops, servers, and now even virtualized endpoints. The Endpoint DLP Suite protects any sized organization from endpoint data leak threats across the widest array of threat vectors. These include:

  • Transferring sensitive company data via endpoint-connected iPhones, Androids, BlackBerry, other smart phones, iPods, iPads, digital cameras, CD/DVD ROM, USB drives, SD, Compact Flash and other forms of removable media
  • Transferring company data to cloud-based file sharing solutions such as Dropbox, Google Drive, SkyDrive, RapidShare and iFolder
  • Leaking company info from endpoints via social media, Skype, IM, webmail, email or printing
  • Data leakage from endpoints via FTP/FTPS, HTTP/HTTPS, MAPI (Microsoft Exchange), SMB and other protocols

About DeviceLock, Inc.
Since 1996, DeviceLock, Inc. has been providing endpoint device control and data leak prevention software solutions to businesses of all sizes and industries. Protecting more than four million computers in more than 66,000 organizations worldwide, DeviceLock has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. DeviceLock, Inc. is an international organization with offices in San Ramon, California, London (UK), Ratingen (Germany), Moscow (Russia) and Milan (Italy).

COPYRIGHT ©2013 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at

Add to Digg Bookmark with Add to Newsvine


Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Enterprise Open Source Magazine Latest Stories . . .
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid i...
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at, and Tomer Levy, co-founder and CEO of, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in ...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or ma...
Application availability is not just the measure of “being up”. Many apps can claim that status. Technically they are running and responding to requests, but at a rate which users would certainly interpret as being down. That’s because excessive load times can (and will be) interpreted...
For almost two decades, businesses have discovered great opportunities to engage with customers and even expand revenue through digital systems, including web and mobile applications. Yet, even now, the conversation between the business and the technologists that deliver these systems ...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 17th Cloud Expo, Dave Nielsen, Developer...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers