Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Tenable Network Security Awarded Common Criteria Certification for Continuous Monitoring Platform

Tenable Network Security, Inc., the leader in Unified Security Monitoring (USM), today announced it has been awarded Common Criteria certification, again meeting the rigorous security requirements defined by the Common Criteria for Information Technology Security Evaluation.

Internationally recognized as the evaluation standard for IT security products, the Common Criteria Certification is mandated for all IT solutions purchased by the U.S. federal government, as well as 25 other countries. Currently, Tenable’s products are relied upon throughout the U.S. federal government, including the entire Department of Defense, and 12 of the 14 U.S. Federal Civilian Departments.

Tenable’s USM platform has been certified under Common Criteria (CC) Evaluation at Evaluation Assurance Level Two Augmented with Flaw Remediation (EAL2+). The Target of Evaluation (TOE) includes all the elements that comprise a full deployment of Tenable’s USM platform, including SecurityCenter™, Nessus® vulnerability scanner, Log Correlation Engine™ (LCE), Passive Vulnerability Scanner™ (PVS), 3D Tool, and xTool.

“Organizations are battling sophisticated and relentless cybercriminals on an increasingly global scale, and standards like Common Criteria help ensure that security products are effective and trustworthy across international borders,” said Ron Gula, CEO of Tenable Network Security. “By keeping pace with Common Criteria’s meticulous standards, we demonstrate our dedication to constant improvement and an ability to stay ahead of today’s complex security threat landscape.”

With over one million users, Tenable is the top choice for businesses of all sizes, governments, and universities to manage network threats. The company’s flagship vulnerability management products, Nessus and SecurityCenter, are used by the most demanding security professionals and compliance auditors at 15,000 organizations worldwide. The company's technology is the cornerstone for information security in many of the world's largest private and government organizations.

Tenable's USM platform incorporates the world's most accurate vulnerability sensors with the industry's largest database of vulnerabilities, threats, and compliance data, delivering real-time network vulnerability intelligence and threat correlation.

Tenable recently secured strategic relationships with Accel Partners and In-Q-Tel to further accelerate the company’s mission of helping its customers stay ahead of emerging challenges, such as cloud, mobile, and virtual technologies, and to continue its expansion globally.

The National Information Assurance Project (NIAP) is a U.S. government initiative between the National Institute of Standards and Technology (NIST) and the National Security Agency. NIAP sponsors a variety of projects and activities, including the Common Criteria Evaluation and Validation Scheme (CCEVS). The Common Criteria is a recognized ISO standard (ISO/IEC15408) for evaluation of security measures in a given product. Many government agencies require that products they deploy have been evaluated under the Common Criteria process.

To view the certification of the Tenable suite from NIAP, please visit: http://www.niap-ccevs.org/vpl/.

About Tenable Network Security

Tenable Network Security is relied on by security and compliance professionals at many of the world’s largest companies and governments, including the entire U.S. Department of Defense, to stay ahead of emerging vulnerabilities, threats, and compliance-related risks. Its Nessus and SecurityCenter solutions continue to set the standard for identifying vulnerabilities, preventing attacks, and complying with a multitude of regulatory requirements. http://www.tenable.com

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT or...
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to m...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation o...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE