yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

Key Management and Encryption in VMware-Based Clouds
Cloud key management and encryption requirements

VMware is without a doubt a major platform for private as well as public cloud deployments. But as in any other cloud-based system, data security, and more specifically cloud encryption and key management are fundamental building blocks.

Cloud key management and encryption requirements
We have found that external users have many of the same security requirements, whether the cloud is public or private: from an external user’s point of view, the differences between public and private clouds are technical details, and the user requires the same guarantees from the provider.

In particular, users expect to own their data. In a business context, a user is often another business. These businesses want to know that they are enjoying the benefits of the provided service, but that the provider cannot read their data.

As a consequence, cloud infrastructure must provide an ability to encrypt sensitive data, and to keep encryption keys under the control of the user. This requirement shows up in public deployments, as a requirement to control keys that encrypt disks. It also shows up in private deployments, as a requirement to control keys that are used by the software solution: each user wants to have separate keys, so that other users and the solution provider cannot read the users data. Such solutions are beginning to emerge, for example split-key encryption and homomorphic key management.

Public cloud deployments
Public providers often want to “chop” a large storage array into chunks that are usable for customers. Virtualization technology is very natural here, but the challenge is to make each “chunk” encrypted by different keys, so that customers remain in control.

A natural solution here has emerged from Porticor: Virtual Appliances are deployed on the same VMware-based infrastructure that the provider has chosen. These appliances know how to consume a LUN or VMFS, and re-expose it as a new LUN or VMFS, this time encrypted using keys that are specific to a customer. (For further details read the white paper here)

The Porticor solution actually leverages the same flexibility to carve up storage and compute – that is available from the VMware cloud infrastructure – and adds encryption and key management as a natural layer.

Private cloud deployments
Private providers often have a specific software solution in mind. Here Porticor’s ability to provide unique “tokens” for users, groups or roles – and an API that integrates with the provider’s identity & access management solution – allows individual and group identities to be maintained at the encryption layer.

Providers can offer full multi-tenancy, yet guarantee that the user’s individual data is encrypted using a key that only the user knows. The provider’s employees literally provide the service yet cannot read the data.

The flexibility of modern virtualization environments is often presented as a security challenge, but with the right technology, it can actually enhance security and offer users greater control of their data – without the hassle of managing it themselves.

The post Key management and encryption in VMware-based clouds appeared first on Porticor Cloud Security.

Read the original blog entry...

About Gilad Parann-Nissany
Gilad Parann-Nissany, Founder and CEO at Porticor is a pioneer of Cloud Computing. He has built SaaS Clouds for medium and small enterprises at SAP (CTO Small Business); contributing to several SAP products and reaching more than 8 million users. Recently he has created a consumer Cloud at - a cloud operating system that delighted hundreds of thousands of users while providing browser-based and mobile access to data, people and a variety of cloud-based applications. He is now CEO of Porticor, a leader in Virtual Privacy and Cloud Security.

Enterprise Open Source Magazine Latest Stories . . .
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers