Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Tenable Network Security Awarded Common Criteria Certification for Continuous Monitoring Platform

Tenable Network Security, Inc., the leader in Unified Security Monitoring (USM), today announced it has been awarded Common Criteria certification, again meeting the rigorous security requirements defined by the Common Criteria for Information Technology Security Evaluation.

Internationally recognized as the evaluation standard for IT security products, the Common Criteria Certification is mandated for all IT solutions purchased by the U.S. federal government, as well as 25 other countries. Currently, Tenable’s products are relied upon throughout the U.S. federal government, including the entire Department of Defense, and 12 of the 14 U.S. Federal Civilian Departments.

Tenable’s USM platform has been certified under Common Criteria (CC) Evaluation at Evaluation Assurance Level Two Augmented with Flaw Remediation (EAL2+). The Target of Evaluation (TOE) includes all the elements that comprise a full deployment of Tenable’s USM platform, including SecurityCenter™, Nessus® vulnerability scanner, Log Correlation Engine™ (LCE), Passive Vulnerability Scanner™ (PVS), 3D Tool, and xTool.

“Organizations are battling sophisticated and relentless cybercriminals on an increasingly global scale, and standards like Common Criteria help ensure that security products are effective and trustworthy across international borders,” said Ron Gula, CEO of Tenable Network Security. “By keeping pace with Common Criteria’s meticulous standards, we demonstrate our dedication to constant improvement and an ability to stay ahead of today’s complex security threat landscape.”

With over one million users, Tenable is the top choice for businesses of all sizes, governments, and universities to manage network threats. The company’s flagship vulnerability management products, Nessus and SecurityCenter, are used by the most demanding security professionals and compliance auditors at 15,000 organizations worldwide. The company's technology is the cornerstone for information security in many of the world's largest private and government organizations.

Tenable's USM platform incorporates the world's most accurate vulnerability sensors with the industry's largest database of vulnerabilities, threats, and compliance data, delivering real-time network vulnerability intelligence and threat correlation.

Tenable recently secured strategic relationships with Accel Partners and In-Q-Tel to further accelerate the company’s mission of helping its customers stay ahead of emerging challenges, such as cloud, mobile, and virtual technologies, and to continue its expansion globally.

The National Information Assurance Project (NIAP) is a U.S. government initiative between the National Institute of Standards and Technology (NIST) and the National Security Agency. NIAP sponsors a variety of projects and activities, including the Common Criteria Evaluation and Validation Scheme (CCEVS). The Common Criteria is a recognized ISO standard (ISO/IEC15408) for evaluation of security measures in a given product. Many government agencies require that products they deploy have been evaluated under the Common Criteria process.

To view the certification of the Tenable suite from NIAP, please visit: http://www.niap-ccevs.org/vpl/.

About Tenable Network Security

Tenable Network Security is relied on by security and compliance professionals at many of the world’s largest companies and governments, including the entire U.S. Department of Defense, to stay ahead of emerging vulnerabilities, threats, and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks, and complying with a multitude of regulatory requirements. http://www.tenable.com

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide c...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," ...
SYS-CON Media announced that Centrify, a provider of unified identity management across cloud, mobile and data center environments that delivers single sign-on (SSO) for users and a simplified identity infrastructure for IT, has launched an ad campaign on Cloud Computing Journal....
"We help companies that are using a lot of Software as a Service. We help companies manage and gain visibility into what people are using inside the company and decide to secure them or use standards to lock down or to embrace the adoption of SaaS inside the company," explained S...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT or...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE