yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
Top Links You Must Click On

DeviceLock(R) and COMPUTERLINKS Ink Deal for North American Distribution
DeviceLock Signs COMPUTERLINKS for North American Distribution of Industry-Leading Endpoint Data Leak Prevention (DLP) Software Product Offerings

SAN RAMON, CA -- (Marketwire) -- 02/12/13 -- DeviceLock, Inc., a worldwide leader in Endpoint Data Leak Prevention (DLP) software, today announced a distribution agreement with COMPUTERLINKS North America.

The COMPUTERLINKS Group, based in Austin, Texas, is a global market leader with more than 20 years' experience in the distribution of IT security and Internet technology products and services. COMPUTERLINKS offers a single source of supply of world-leading international hardware and software manufacturers' products, as well as unrivalled logistics for both local and international supply along with comprehensive technical support services. COMPUTERLINKS is the distributor of choice for thousands of resellers worldwide, with offices in 19 countries and more than 550 employees.

"As our business in North America continues to accelerate, we're looking to COMPUTERLINKS to help us identify, recruit and train a very focused network of IT security-specialized VARs," said Vladimir Chernavsky, Executive Vice President, Americas Operations, DeviceLock. "As an enterprise DLP solution, we're not looking to set up mass distribution or mail-order of our products in every IT products and services outlet in North America. Instead we intend to scale our business by focusing on regional VARs who are thoroughly trained and competent in the area of IT security. COMPUTERLINKS knows these kinds of resellers, and has a very successful track record in that regard. We're looking forward to working closely with them to build out a DLP-savvy North American channel."

"DeviceLock offers COMPUTERLINKS a great opportunity to benefit from participation in the hottest market within IT security, based on a Gartner-published survey of top IT executives a few months ago that showed DLP was the top area of concern," said Russell Zientek, President, COMPUTERLINKS North America. "DeviceLock's Endpoint DLP Suite was reviewed by SC Magazine in August and was given the highest possible 5-star rating in every single category. No other vendor scored higher. So, we're excited to add DeviceLock to our line-up of industry-leading IT security products."

About DeviceLock, Inc.

Deployed on more than four million computers by more than 66,000 customers around the world, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint device and port control for data leak prevention (DLP) in situations where employees are using mobile devices like smart phones, tablets, cameras or USB sticks along with company-managed endpoints like laptops or desktops. In addition, DeviceLock software can prevent data leaks via network and cloud-based threat vectors such as: Gmail, Hotmail, Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in Washington DC, London, Düsseldorf, Moscow and Milan.

For more information about DeviceLock, readers can visit


COMPUTERLINKS is one of the leading value-added distributors for international top manufacturers in information technology. As the link between the manufacturers and resellers, COMPUTERLINKS smoothes the path for the successful distribution of intelligent IT solutions from the areas of e-security and e-business. The COMPUTERLINKS product portfolio is geared to the growing needs of customers for security in the field of ever more complex, global IT structures. With branches in 18 countries COMPUTERLINKS' reach is constantly expanding to cover new territories as the company strives to retain its position as a leading value added distributor (VAD) for international IT manufacturers, who are all market leaders in their fields.

Additional information about COMPUTERLINKS can be found at

COPYRIGHT ©2013 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners.

Add to Digg Bookmark with Add to Newsvine


Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Enterprise Open Source Magazine Latest Stories . . .
Developers generally like to share their code, and many of them do so by open sourcing it on GitHub, a social code hosting and collaboration service. Many companies also use GitHub as a convenient place to host both private and public code repositories by creating GitHub organizations ...
Using any programming framework to the fullest extent possible first requires an understanding of advanced software architecture concepts. While writing a little client-side JavaScript does not necessarily require as much consideration when designing a scalable software architecture, t...
Test-driven development (TDD) has been around for a while now. Behavior-driven development (BDD), a comparably recent methodology, emerged from the practice of TDD and could reasonably be called a narrower application of TDD. The TDD process allows a developer to use a failing unit t...
It is no surprise that OpenStack has evolved into a widely adopted cloud management framework. As it hurtles on a trajectory of rapid growth, a new breed of demands are making themselves felt – demands that a mature platform of this nature and scope must satisfy. One such requirement i...
The combined notions of open source and the ‘community contribution’ model of collaborative software application development are, of course, not new. The history of open source is actually traced back to early software exchanges between universities driven by academic principles of kn...
Cloud computing delivers on-demand IT resources that provide businesses flexibility. The challenge is the cost and complexity of cloud security compliance (PCI, HIPAA, FFIEC). Raxak Protect automated cloud security enables cloud apps to be deployed quickly and cost-effectively. Get the...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers