Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Arxan to Present at Application Security Summit on Emerging Mobile App Attack Targets and Mobile App Security Strategies for Financial Services
Expert Webinar Sessions Aimed at Both Educating the Enterprise on Emerging Mobile App Integrity Risk, as Well as Recommending Proven Mobile App Security Strategies for the Financial Services Market

BETHESDA, MD -- (Marketwire) -- 11/12/12 -- Arxan Technologies, a leading provider of software security solutions that protect the global App Economy, today announced it will participate in two mobile application security webinars as part of an Application Security Summit.

Taking place Nov. 14-15, the online Application Security Summit includes today's leading information security experts who will provide key insights on how to manage and secure applications, especially as mobile apps continue to proliferate a growing Global App Economy.

Enterprises such as financial services institutions are deploying applications to run critical processes or deliver services through Web, client or mobile apps. The application layer now hosts tremendous value and functionality and is being targeted by hackers. In conjunction with network or device security, application security has increasingly become a leading requirement not only for achieving the highest operational efficiency, but also to launch innovative offerings without being exposed to major threats and risks.

"ABI Research shows that the global market for mobile application security will be worth $398 million by the end of 2012. This includes revenues for paid apps, partnerships with manufacturers and operators, white label deals, and dataset sales. To date, ABI Research calculates that there have been over 130 billion downloads of mobile security apps."(1)

The Nov. 14 panel session on mobile application security strategies for the financial services market will discuss the unique security challenges faced by the financial services market.

As the application security framework has now extended to the mobile platform, risk mitigation requires both vulnerability-based solutions, which address programming flaws as well as multi-OS application hardening/shielding solutions given that mobile apps can reside outside the network or device perimeter. The emerging threat vectors which target the integrity of the mobile app itself, such as reversing and tampering, are becoming much more prevalent. This panel of application security experts will explore holistic mobile application security measures to guard against fraud as they roll-out new mobile solutions for the financial services market.

Panel Session: Mobile Application Security Strategies for Financial Services
11 a.m. ET, Nov. 14, 2012

Panelists: John Stevens, internal chief technology officer, Cigital, James Lynn, practice principal - Fortify on Demand & Mobile Security Services, HP Enterprise Security, and Kevin Morgan, vice president of engineering and chief technology officer, Arxan

Moderator: Derek Brink, research fellow, Aberdeen Group

To attend, please visit https://www.brighttalk.com/webcast/288/59045

The Nov. 15 webinar will present new security thought leadership on mobile application attack targets and application integrity risks. The session will also provide a detailed analysis into specific mobile attack targets highly sought by hackers, and a range of application hacking techniques used to tamper or reverse-engineer mobile apps. In addition, the speakers will present risk mitigations strategies and outline specific use cases that demonstrate the attack vectors and application integrity protection that was deployed to protect mobile apps.

General Session: Mobile Application Integrity Risks and Mitigations
12 p.m. ET, Nov. 15, 2012

Speakers: Kevin Morgan, vice president of engineering and chief technology officer, Arxan, and Dr. Hoi Chang, vice president of technology, Arxan

To attend, please visit https://www.brighttalk.com/webcast/288/58489

Arxan's proven security for mobile, desktop, server and embedded computing environments protect applications with best of breed anti-tamper and anti-reverse engineering technology. The company's multi-layered and multi-platform protection consists of a variety of security technologies, including passive and active defenses such as: obfuscation, anti-debug, repair, self-healing and anti-tamper to ensure durability, resiliency and performance in the field.

(1)ABI Research, "$389 Million Mobile Application Security Market Set to Explode as Threats Increase Significantly," Sept. 25, 2012

ABOUT ARXAN TECHNOLOGIES:
Arxan Technologies Inc. is the industry leader of application protection solutions that protect the App Economy. Arxan secures mobile, desktop, server and embedded applications against tampering and reverse-engineering attacks and is an integral part of end-to-end application security. Our security defends against tampering, unauthorized use, insertion of exploits, piracy, and theft of intellectual property for global leaders in markets such as Fortune 500 enterprises, financial services, ISV, gaming and digital media to proactively defend the integrity of their code and business models. Arxan's proven, scalable and durable application protection solutions defend, detect, alert and react to application attacks through a threat-based, customizable approach. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. For more information, please visit www.arxan.com. Follow us @Arxan or http://www.linkedin.com/company/arxan-technologies

CONTACT:
Arxan Technologies, Inc.
Jodi Wadhwa
Phone: +1-301-968-4295
jwadhwa@arxan.com

Lutz PR
Kelly Poffenberger
Phone: +1-714-553-9071
kelly@lutzpr.com

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Cloud Developer Stories
Hardware will never be more valuable than on the day it hits your loading dock. Each day new servers are not deployed to production the business is losing money. While Moore’s Law is typically cited to explain the exponential density growth of chips, a critical consequence of thi...
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distributi...
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed...
IDenticard Access Control is a leading manufacturer of integrated access control solutions to protect employees, visitors, and facilities. Owned by Brady Corporation (NYSE:BRC), a $1.15 billion manufacturer of identification products, IDenticard Access Control draws on its 30 yea...
SAP HANA combines database, data processing, and application platform capabilities in-memory. The platform provides libraries for predictive, planning, text processing, spatial, and business analytics. This new architecture enables converged OLTP and OLAP data processing within a...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE

Breaking Cloud Computing News
Fujitsu today announced the introduction of the FUJITSU Storage ETERNUS TR series, a storage system ...