yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

CA Technologies Positioned in the Leaders Quadrant of Two Gartner Inc. Magic Quadrants: Identity and Access Governance and User Administration/Provisioning

CA Technologies (NASDAQ: CA) today announced that it has again been positioned by Gartner, Inc. in the Leaders Quadrant of two Gartner reports: Magic Quadrant for Identity and Access Governance (IAG)*, and Magic Quadrant for User Administration and Provisioning (UAP).**

“The adoption of mobile, cloud and social applications demands that identity and access management (IAM) solutions transform to support new business models and identity needs while still addressing compliance concerns. Our broad portfolio of security solutions offers the functionality, ease of use and multiple choices of delivery – on premise or cloud – that address the evolving needs of our customers and prospects,” said Mike Denning, general manager, Security business at CA Technologies. “We consider our position as a Leader in these quadrants confirmation that we are advancing IAM transformation.”

Magic Quadrant for Identity and Access Governance

According to the report, Magic Quadrant for Identity and Access Governance*, “Identity and access governance (IAG) is defined as (1) the process of requesting, approving, certifying and auditing access to applications, data and other IT services; and (2) the process of delivering security and business intelligence (BI) on how identities are created, managed and used for access. Software tools and services that provide support for most or all of this process are known as IAG products.

“Today, IAG is the fastest-growing sector of identity and access management (IAM). Gartner estimates that 2011 IAG product sales alone ranged from $200 million to $300 million, with estimated growth rates in 2012 continuing to exceed 35 percent to 40 percent for most IAG vendors.”

CA GovernanceMinder™ was evaluated for this report.

Magic Quadrant for User Administration/Provisioning

The report, Magic Quadrant for User Administration / Provisioning**, states, “User administration and provisioning (UAP) is a combination of administration and analytics technologies that provide an effective foundation for authentication and authorization in the enterprise. Characterized in this way, user administration is a fundamental part of an overall IAM technology strategy and program.

“UAP solutions address enterprise requirements to create, modify, disable and delete identity objects across heterogeneous IT system infrastructures, including OSs, databases, directories, business applications and security systems.”

Gartner analysts evaluated the following CA IAM solutions for this report: CA IdentityMinder™, CA GovernanceMinder™ and CA User Activity Reporting.

According to this report, “By 2016, user administration/provisioning and identity and access governance products will converge, creating a new market for advanced identity analytics.

“In recognition of this trend, and the interdependence between provisioning and IAG functions and processes, Gartner plans to create a combined UAP and IAG Magic Quadrant beginning in 2013.”

To receive a complimentary copy of the reports, please visit: to access the Magic Quadrant for User Administration / Provisioning and to access the Magic Quadrant for Identity and Access Governance. To learn more about CA Technologies Identity and Access Management solutions, visit

* Gartner, Inc., “Magic Quadrant for Identity and Access Governance,” Earl Perkins, December 17, 2012.
** Gartner, Inc., “Magic Quadrant for User Administration and Provisioning,” Earl Perkins, December 27, 2012.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About CA Technologies

CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. Learn more about CA Technologies at

Follow CA Technologies

Social Media Page
Press Releases

Legal Notices

Copyright © 2013 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers