Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Top Links You Must Click On


BeyondTrust Combines Vulnerability and Identity Management to Reduce the Security Risk of Windows Systems

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the release of PowerBroker for Windows 5.5, the industry’s first identity management solution able to leverage the security context provided by vulnerability and privilege data, which allows customers to more effectively manage the risk of their Windows systems. This release also includes integration with the award-winning Retina CS Threat Management Console, providing robust, enterprise-ready analytics and reporting capabilities for PowerBroker Windows deployments, as well as support for implementing least privilege on Windows 8 systems.

PowerBroker for Windows is the fastest, easiest and most cost-effective way to secure Windows systems through the implementation of least privilege. It reduces help desk burdens and costs, while increasing the security of the Windows infrastructure. This new release allows IT organizations to effortlessly benefit from system and application vulnerability data when considering the requirements of elevated privileges for users, tasks and applications. Employing this approach, BeyondTrust customers can make more informed security strategy decisions, based on a system’s overall risk and susceptibility to attacks.

"The high velocity of change in today’s enterprise infrastructure often means security teams are making critical business decisions based on threats, regardless of the actual context of those threats,” said Brad Hibbert, executive vice president of product engineering at BeyondTrust. “This new product release allows organizations to make more effective security decisions, by delivering the context that can only be provided by fusing both vulnerability and privileged identity information.”

BeyondTrust is dedicated to helping their customers meet today’s security challenges by providing innovative security and compliance solutions. A common challenge with privilege management is the need to take a system’s overall risk into context when deciding what level of privileges a user or system should be given. Leveraging the real-time application events provided by PowerBroker for Windows, the BeyondTrust threat engine’s patent pending virtual application scans enable immediate alerting and threat prioritization of vulnerable application usage enabling more proactive remediation of the most critical and vulnerable assets.

Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the most pressing questions in security – what to fix first, what to fix next and why. Retina CS does this through unmatched security intelligence and analytics for an entire IT landscape.

Want to Learn More?

Product experts from BeyondTrust will be hosting a public webcast to discuss the new developments of PowerBroker for Windows 5.5, specifically how you can leverage vulnerability data to reduce the risk of corporate desktops and servers. Register here: https://www1.gotomeeting.com/register/730958713

Availability

For existing customers of the product, PowerBroker for Windows 5.5 is available as a free upgrade. For those interested in learning more and to obtain a free trial, please visit: http://www.beyondtrust.com/Products/PowerBrokerForWindows/

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust
Twitter: http://twitter.com/beyondtrust
Blog: http://blog.beyondtrust.com
LinkedIn: http://www.linkedin.com/companies/beyondtrust
Facebook: http://www.facebook.com/beyondtrust

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
The goal of Continuous Testing is to shift testing left to find defects earlier and release software faster. This can be achieved by integrating a set of open source functional and performance testing tools in the early stages of your software delivery lifecycle. There is one process ...
@ThingsExpo has been named the Most Influential ‘Smart Cities - IIoT' Account and @BigDataExpo has been named fourteenth by Right Relevance (RR), which provides curated information and intelligence on approximately 50,000 topics. In addition, Right Relevance provides an Insights offeri...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a...
It’s hard to believe that it’s already 2017. But with the new year comes new challenges, new opportunities—and, of course—new software projects. One of the most important questions beginner, intermediate, and advanced coders all have to answer before they begin their next project is wh...
Some people worry that OpenStack is more flash then substance; however, for many customers this could not be farther from the truth. No other technology equalizes the playing field between vendors while giving your internal teams better access than ever to infrastructure when they need...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for pe...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE