Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
DeviceLock(R) Announces Support for President Obama's Insider Threat Policy
DeviceLock Helps Government IT Security Teams Comply With National Insider Threat Policy

SAN RAMON, CA -- (Marketwire) -- 12/03/12 -- DeviceLock, Inc., a worldwide leader in endpoint data loss prevention (DLP) software, today announced full support for President Obama's National Insider Threat policy for IT Security. DeviceLock's Endpoint DLP Suite software can be a key element in a comprehensive arsenal of IT security tools for data loss prevention -- preventing the unauthorized transfer of sensitive information outside of federal government networks.

"With his recent memorandum for the heads of executive departments and agencies, President Obama has recognized and validated the concern that many IT security professionals share," said Vince Schiavo, DeviceLock CEO. "Namely, that the vast majority of serious data breach incidents are not being caused by malicious outside hackers, but by trusted insiders with authorized access."

A Ponemon study published earlier this year found that 63 percent of serious data breach incidents are caused by insiders -- either through unintentional mistakes, negligence or misconfigurations.

The president's memorandum specifically promotes "the development of effective insider threat programs within departments and agencies to deter, detect, and mitigate actions by employees who may represent a threat to national security. These threats encompass... unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems."

DeviceLock's Endpoint DLP Suite software provides government IT security professionals the ability to set and enforce policies for the transfer of sensitive data outside of protected government networks from millions of government servers, laptops, desktops, smartphones and tablets. The software provides comprehensive controls over what sorts of information may be printed, sent in emails, burned to CD or DVD, transferred to USB drives, stored on Dropbox or other cloud-file-sharing services, etc. The policy can specify which types of transfers should be allowed, blocked or logged. In this way network security managers can be immediately alerted when someone tries to move data outside the organization in a way that violates policy.

The most notorious example of the need for this type of software is the incident in which Bradley Manning, a US Army enlisted soldier with authorized access to sensitive State Department documents, burned a large number of files onto a CD-ROM and passed the information to Wikileaks. Had the installation where he worked been using DeviceLock's software, the incident could have been prevented. The transfer attempt would have been blocked, the files in question copied to a secure archive and IT security management would have been alerted immediately.

For more information visit www.devicelock.com.

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint data loss prevention (DLP) in situations where employees are using mobile devices like smartphones, tablets, cameras or USB sticks or Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2169605

Add to Digg Bookmark with del.icio.us Add to Newsvine

DEVICELOCK MEDIA CONTACT

Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Cloud Developer Stories
Whether you're a startup or a 100 year old enterprise, the Internet of Things offers a variety of new capabilities for your business. IoT style solutions can help you get closer your customers, launch new product lines and take over an industry. Some companies are dipping their t...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophi...
Internet of @ThingsExpo announced today a limited time free "Expo Plus" registration option. On site registration price of $600 will be set to 'free' for delegates who register during this period. To take advantage of this opportunity, attendees can use the coupon code "IoTAugust...
The devil made him do it. Or maybe it's that the devil is in the details for Matt Olander, Chief Science Officer of iXsystems and a long-time contributor to FreeBSD. A red devil icon plays a prominent role in this NAS storage company's branding and image, which is open souce “in...
The industry is heated with debates on whether adopting private or public cloud is the smartest, best, cheapest, you name it choice. But this debate is missing the mark. Businesses shouldn’t be discussing public vs. private, but rather how can they make the two work together to t...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE