yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

U.S. Department of Defense Extends Vulnerability Management Contract with BeyondTrust For Ninth Consecutive Year

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the Defense Information Systems Agency (DISA) has chosen to extend their contract with BeyondTrust to provide critical vulnerability assessment and management solutions for all branches of the U.S. Department of Defense (DoD). The relationship between BeyondTrust (through the acquisition of eEye Digital Security) and the DoD dates back to 2004 and provides coverage for every networked asset within the armed services networks. This contract extension also makes BeyondTrust’s award-winning Retina Network and Retina CS technology available to agencies operating under the Assured Compliance Assessment Solution (ACAS) program that need to confidently deploy a scalable vulnerability management solution.

Retina CS is the centerpiece of the BeyondTrust’s vision of Context-Aware Security Intelligence, aimed at helping commercial and government organizations answer the most pressing questions in IT – what to fix first, what to fix next and why? Retina CS does this through unmatched security intelligence and analytics for the entire IT landscape, including support for emerging technology investments such as cloud and mobile computing and virtualization.

“We honored to continue our strong relationship with the DoD by providing technology that is specific to their requirements and designed to meet the needs of highly complex, and heterogeneous government agency infrastructures,” said Kevin Hickey, president and chief operating officer at BeyondTrust. “We have a long and distinguished history as a provider of threat management and compliance solutions for both government agencies and enterprise commercial organizations. Our goal is to help our customers make better informed security strategy decisions by way of our technology.”

BeyondTrust is committed to serving government customers by providing innovative security and compliance solutions that support for SCAP, FDCC, and DIACAP initiatives. For more information about Retina CS and all of the PowerBroker offerings, please visit


As a service to the network security community, BeyondTrust provides community offerings of Retina and Retina CS, the same technology relied upon by the DoD. You can get your copy, free of charge, here:

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust





About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Enterprise Open Source Magazine Latest Stories . . .
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radica...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers