yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
DeviceLock(R) Announces Support for President Obama's Insider Threat Policy
DeviceLock Helps Government IT Security Teams Comply With National Insider Threat Policy

SAN RAMON, CA -- (Marketwire) -- 12/03/12 -- DeviceLock, Inc., a worldwide leader in endpoint data loss prevention (DLP) software, today announced full support for President Obama's National Insider Threat policy for IT Security. DeviceLock's Endpoint DLP Suite software can be a key element in a comprehensive arsenal of IT security tools for data loss prevention -- preventing the unauthorized transfer of sensitive information outside of federal government networks.

"With his recent memorandum for the heads of executive departments and agencies, President Obama has recognized and validated the concern that many IT security professionals share," said Vince Schiavo, DeviceLock CEO. "Namely, that the vast majority of serious data breach incidents are not being caused by malicious outside hackers, but by trusted insiders with authorized access."

A Ponemon study published earlier this year found that 63 percent of serious data breach incidents are caused by insiders -- either through unintentional mistakes, negligence or misconfigurations.

The president's memorandum specifically promotes "the development of effective insider threat programs within departments and agencies to deter, detect, and mitigate actions by employees who may represent a threat to national security. These threats encompass... unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems."

DeviceLock's Endpoint DLP Suite software provides government IT security professionals the ability to set and enforce policies for the transfer of sensitive data outside of protected government networks from millions of government servers, laptops, desktops, smartphones and tablets. The software provides comprehensive controls over what sorts of information may be printed, sent in emails, burned to CD or DVD, transferred to USB drives, stored on Dropbox or other cloud-file-sharing services, etc. The policy can specify which types of transfers should be allowed, blocked or logged. In this way network security managers can be immediately alerted when someone tries to move data outside the organization in a way that violates policy.

The most notorious example of the need for this type of software is the incident in which Bradley Manning, a US Army enlisted soldier with authorized access to sensitive State Department documents, burned a large number of files onto a CD-ROM and passed the information to Wikileaks. Had the installation where he worked been using DeviceLock's software, the incident could have been prevented. The transfer attempt would have been blocked, the files in question copied to a secure archive and IT security management would have been alerted immediately.

For more information visit

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint data loss prevention (DLP) in situations where employees are using mobile devices like smartphones, tablets, cameras or USB sticks or Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at

Image Available:

Add to Digg Bookmark with Add to Newsvine


Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Cloud Developer Stories
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is requi...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the C...
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to p...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers