Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Arxan to Present at Application Security Summit on Emerging Mobile App Attack Targets and Mobile App Security Strategies for Financial Services
Expert Webinar Sessions Aimed at Both Educating the Enterprise on Emerging Mobile App Integrity Risk, as Well as Recommending Proven Mobile App Security Strategies for the Financial Services Market

BETHESDA, MD -- (Marketwire) -- 11/12/12 -- Arxan Technologies, a leading provider of software security solutions that protect the global App Economy, today announced it will participate in two mobile application security webinars as part of an Application Security Summit.

Taking place Nov. 14-15, the online Application Security Summit includes today's leading information security experts who will provide key insights on how to manage and secure applications, especially as mobile apps continue to proliferate a growing Global App Economy.

Enterprises such as financial services institutions are deploying applications to run critical processes or deliver services through Web, client or mobile apps. The application layer now hosts tremendous value and functionality and is being targeted by hackers. In conjunction with network or device security, application security has increasingly become a leading requirement not only for achieving the highest operational efficiency, but also to launch innovative offerings without being exposed to major threats and risks.

"ABI Research shows that the global market for mobile application security will be worth $398 million by the end of 2012. This includes revenues for paid apps, partnerships with manufacturers and operators, white label deals, and dataset sales. To date, ABI Research calculates that there have been over 130 billion downloads of mobile security apps."(1)

The Nov. 14 panel session on mobile application security strategies for the financial services market will discuss the unique security challenges faced by the financial services market.

As the application security framework has now extended to the mobile platform, risk mitigation requires both vulnerability-based solutions, which address programming flaws as well as multi-OS application hardening/shielding solutions given that mobile apps can reside outside the network or device perimeter. The emerging threat vectors which target the integrity of the mobile app itself, such as reversing and tampering, are becoming much more prevalent. This panel of application security experts will explore holistic mobile application security measures to guard against fraud as they roll-out new mobile solutions for the financial services market.

Panel Session: Mobile Application Security Strategies for Financial Services
11 a.m. ET, Nov. 14, 2012

Panelists: John Stevens, internal chief technology officer, Cigital, James Lynn, practice principal - Fortify on Demand & Mobile Security Services, HP Enterprise Security, and Kevin Morgan, vice president of engineering and chief technology officer, Arxan

Moderator: Derek Brink, research fellow, Aberdeen Group

To attend, please visit https://www.brighttalk.com/webcast/288/59045

The Nov. 15 webinar will present new security thought leadership on mobile application attack targets and application integrity risks. The session will also provide a detailed analysis into specific mobile attack targets highly sought by hackers, and a range of application hacking techniques used to tamper or reverse-engineer mobile apps. In addition, the speakers will present risk mitigations strategies and outline specific use cases that demonstrate the attack vectors and application integrity protection that was deployed to protect mobile apps.

General Session: Mobile Application Integrity Risks and Mitigations
12 p.m. ET, Nov. 15, 2012

Speakers: Kevin Morgan, vice president of engineering and chief technology officer, Arxan, and Dr. Hoi Chang, vice president of technology, Arxan

To attend, please visit https://www.brighttalk.com/webcast/288/58489

Arxan's proven security for mobile, desktop, server and embedded computing environments protect applications with best of breed anti-tamper and anti-reverse engineering technology. The company's multi-layered and multi-platform protection consists of a variety of security technologies, including passive and active defenses such as: obfuscation, anti-debug, repair, self-healing and anti-tamper to ensure durability, resiliency and performance in the field.

(1)ABI Research, "$389 Million Mobile Application Security Market Set to Explode as Threats Increase Significantly," Sept. 25, 2012

ABOUT ARXAN TECHNOLOGIES:
Arxan Technologies Inc. is the industry leader of application protection solutions that protect the App Economy. Arxan secures mobile, desktop, server and embedded applications against tampering and reverse-engineering attacks and is an integral part of end-to-end application security. Our security defends against tampering, unauthorized use, insertion of exploits, piracy, and theft of intellectual property for global leaders in markets such as Fortune 500 enterprises, financial services, ISV, gaming and digital media to proactively defend the integrity of their code and business models. Arxan's proven, scalable and durable application protection solutions defend, detect, alert and react to application attacks through a threat-based, customizable approach. Arxan Technologies is headquartered in the United States with global offices in EMEA and APAC. For more information, please visit www.arxan.com. Follow us @Arxan or http://www.linkedin.com/company/arxan-technologies

CONTACT:
Arxan Technologies, Inc.
Jodi Wadhwa
Phone: +1-301-968-4295
jwadhwa@arxan.com

Lutz PR
Kelly Poffenberger
Phone: +1-714-553-9071
kelly@lutzpr.com

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Cloud Developer Stories
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focu...
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to m...
15th Cloud Expo, which took place Nov. 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA, expanded the conference content of @ThingsExpo, Big Data Expo, and DevOps Summit to include two developer events. IBM held a Bluemix Developer Playground on November 5 and...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small ti...
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foresee...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE