yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

Nearly Half of IT Staff Fear Unauthorized Access to Virtual Servers
Research Reveals Virtualization Is Still Black Box for IT Security

NEW YORK, NY -- (Marketwire) -- 01/29/13 -- Research conducted by Varonis, the leading provider of comprehensive data governance software, found that data security in virtualized environments is often neglected by IT organizations, with 48% either reporting or suspecting unauthorized access to files on virtualized servers. The study, conducted at VM World conferences(i), suggests that there is a limited awareness of security matters when it comes to virtualized servers, with 70% of respondents having little or no auditing in place on virtual servers.

According to Gartner, there are more than 50 million installed virtual machines (VMs) on servers.(ii) In line with this, application servers were virtualized by almost all respondents (87%), mainly due to speedier deployment (76%) and disaster recovery (74%). On the other hand, those who do not virtualize cite disk storage (37%), performance (30%) and a lack of advantages (20%) as the three main reasons for not doing so.

Across different company sizes, one area that appears to be neglected by organizations is file security. While almost 60% said they were very careful about setting permissions and controlling subsequent updates, a revealing 70%, regardless of company size, had implemented little or no auditing -- even at the high end of the enterprise space. In fact, 20% of enterprises with more than 5,000 employees admitted to having no file logging capabilities in place.

The lack of sufficient security is further highlighted by 48% either reporting or suspecting unauthorized access to files on their virtualized servers -- putting sensitive company information at risk of being misused, lost or stolen. Surprisingly, even for those who do audit all activity, a significant 68% believe there is still unauthorized access.

"We suspect that for IT departments, virtualization may be something of a black box. We have found that, after a workload is virtualized, the actual details of managing file permissions and monitoring access is considered to be automatically 'taken care of.' It is also quite possible that the teams managing virtualization projects see file security and governance as outside their discipline. The security team may have no visibility of what is happening," said David Gibson, VP of Strategy at Varonis.

The results suggest that, while virtualization has been groundbreaking in allowing IT to isolate applications and services with a few clicks, it doesn't solve permissions management and access auditing -- in fact it might make it even more complex.

"Data protection, obviously, requires the same level of vigilance in a virtual environment -- and perhaps even more so given the complexities of managing multiple operating systems on a single computing box. For organizations to stay on top of their digital assets it is vital to further IT education in this area, both in terms of training staff in understanding virtual file systems, as well as in effectively using automation to uncover security holes, monitor activity, and control permissions," said Gibson.

To download the full virtualization research report, visit

About Varonis
Varonis is the leader in unstructured and semi-structured data governance software. Based on patented technology and a highly accurate analytics engine, Varonis solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times from all devices, all use is monitored, and abuse is flagged.

Varonis makes digital collaboration secure, effortless and efficient so that people can create and share content easily with whom they must, and organizations can be confident their content is protected and managed efficiently.

Voted one of the "Fast 50 Reader Favorites" on, and winner of the SC Magazine Innovation, Product or Service of the Year, and Best Network Security Awards, Varonis has more than 4,500 installations worldwide and is headquartered in New York, with regional offices in Europe, Asia and Latin America.

Varonis, the Varonis logo, DatAdvantage®, DataPrivilege® and the IDU Classification Framework® are registered trademarks of Varonis® Systems in the United States and/or other countries and Metadata Framework™, DatAnywhere™, and Data Transport Engine™ are under a registration process in the United States and/or other countries. All other product and company names and marks mentioned in this document are the property of their respective owners and are mentioned for identification purposes only.

(i) Survey conducted by Varonis in August 2012 at VM World Conferences in Barcelona and San Francisco with 107.

(ii) Reconsidering Heterogeneous x86 Server Virtualization, Gartner (2012)

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Enterprise Open Source Magazine Latest Stories . . .
Ten short years ago, Apache Hadoop was just a small project deployed on a few machines at Yahoo and within a few years, it had truly become the backbone of Yahoo’s data infrastructure. Additionally, the current Apache Hadoop market is forecasted to surpass $16 billion by 2020. This mi...
The Open Connectivity Foundation (OCF), sponsor of the IoTivity open source project, and AllSeen Alliance, which provides the AllJoyn® open source IoT framework, today announced that the two organizations’ boards have approved a merger under the OCF name and bylaws. This merger will ad...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Servic...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the n...
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers