yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Aberdeen Group Reports on "The Virtues of Virtual Patching"-- Trend Micro Deep Security 9 Solves Organizations' Patching Challenge

CUPERTINO, Calif., Nov. 13, 2012 /PRNewswire/ -- With the publication of its Analyst Insight on "The Virtues of Virtual Patching," research firm Aberdeen Group raises awareness on alternatives to endless cycle of Patch Tuesdays, emergency patches and workarounds, regression testing and unplanned downtime.  Aberdeen's findings show that while current use of patch management is foundational for success, taken by itself it does not differentiate top performance – in other words, success is not only a function of whether a company patches, but also a function of how.

Selected highlights from Aberdeen's research and analysis include:

  • On average, about three-fourths (75%) of all companies have current deployments of patch management.
  • Even if your patching is 100%, some significant residual risks will remain
  • Vendors in general are unable to keep pace with the number of vulnerabilities and threats: industry sources report that just 58% of the vulnerabilities disclosed in 2011 had vendor patches available on the same day, and 36% still had no patch available three months into 2012.
  • Based on Aberdeen's research, the average total cost of a security incident was $130K; incidents that involved loss or exposure of sensitive data saw an average total cost per incident of as much as $640K.
  • An important patch management strategy to consider is to buy more time; virtual patching refers to the strategic deployment of selected compensating controls to provide a kind of protective shield that allows the organization more time to assess, plan, test, and remediate threats and vulnerabilities on a schedule of their own choosing.
  • Virtual patching is one way that companies deal with security issues in their applications. Aberdeen's research shows that the leading organizations are 2-times more likely (57%) than lagging performers to use virtual patching (26%).  

Trend Micro's Deep Security is comprised of anti-malware, web reputation, firewall, intrusion prevention, integrity monitoring and log inspection technologies in one integrated solution. This server security platform uses virtual patching to protect physical, virtual, and cloud servers and virtual desktops from known vulnerabilities and zero-day exploits without expensive emergency patching. Deep Security leverages both agentless and agent-based protection mechanisms to automatically and efficiently secure virtual servers and desktops, and private and public clouds and accelerate ROI.

"Virtual patching can represent a strong operational and financial case for the business," said Derek Brink, vice president and research fellow for IT Security at Aberdeen Group. "Among several other advantages, it can give enterprises the flexibility to patch on their own schedule, and it can help to mitigate the high opportunity cost of unplanned downtime, which can easily range to tens of thousands of dollars per hour. Companies should give strong consideration to virtual patching as a strategy to augment their traditional patch management processes, and to improve the overall efficiency and effectiveness of managing the vulnerabilities and threats to their IT infrastructure."

Link to Aberdeen Group Report - The Virtues of Virtual Patching

About Trend Micro

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and the products and services are available at Trend This Trend Micro news release and other announcements are available at  and as part of an RSS feed at  Or follow our news on Twitter at @TrendMicro.

SOURCE Trend Micro Incorporated

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipeli...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to p...
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operat...
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate ris...
Countless business models have spawned from the IaaS industry – resell Web hosting, blogs, public cloud, and on and on. With the overwhelming amount of tools available to us, it's sometimes easy to overlook that many of them are just new skins of resources we've had for a long ti...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers