Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
DeviceLock(R) Announces Support for President Obama's Insider Threat Policy
DeviceLock Helps Government IT Security Teams Comply With National Insider Threat Policy

SAN RAMON, CA -- (Marketwire) -- 12/03/12 -- DeviceLock, Inc., a worldwide leader in endpoint data loss prevention (DLP) software, today announced full support for President Obama's National Insider Threat policy for IT Security. DeviceLock's Endpoint DLP Suite software can be a key element in a comprehensive arsenal of IT security tools for data loss prevention -- preventing the unauthorized transfer of sensitive information outside of federal government networks.

"With his recent memorandum for the heads of executive departments and agencies, President Obama has recognized and validated the concern that many IT security professionals share," said Vince Schiavo, DeviceLock CEO. "Namely, that the vast majority of serious data breach incidents are not being caused by malicious outside hackers, but by trusted insiders with authorized access."

A Ponemon study published earlier this year found that 63 percent of serious data breach incidents are caused by insiders -- either through unintentional mistakes, negligence or misconfigurations.

The president's memorandum specifically promotes "the development of effective insider threat programs within departments and agencies to deter, detect, and mitigate actions by employees who may represent a threat to national security. These threats encompass... unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems."

DeviceLock's Endpoint DLP Suite software provides government IT security professionals the ability to set and enforce policies for the transfer of sensitive data outside of protected government networks from millions of government servers, laptops, desktops, smartphones and tablets. The software provides comprehensive controls over what sorts of information may be printed, sent in emails, burned to CD or DVD, transferred to USB drives, stored on Dropbox or other cloud-file-sharing services, etc. The policy can specify which types of transfers should be allowed, blocked or logged. In this way network security managers can be immediately alerted when someone tries to move data outside the organization in a way that violates policy.

The most notorious example of the need for this type of software is the incident in which Bradley Manning, a US Army enlisted soldier with authorized access to sensitive State Department documents, burned a large number of files onto a CD-ROM and passed the information to Wikileaks. Had the installation where he worked been using DeviceLock's software, the incident could have been prevented. The transfer attempt would have been blocked, the files in question copied to a secure archive and IT security management would have been alerted immediately.

For more information visit www.devicelock.com.

About DeviceLock, Inc.
Deployed on over 4 million devices by over 66,000 customers, DeviceLock stops data leaks at the source. DeviceLock software provides endpoint data loss prevention (DLP) in situations where employees are using mobile devices like smartphones, tablets, cameras or USB sticks or Internet and cloud-based pathways such as: Twitter, Facebook, Google+, Tumblr, Skype, Dropbox and many others.

DeviceLock, Inc. has a vast range of corporate customers including financial institutions, state and federal government agencies, classified military networks, healthcare providers, telecommunications companies, and educational institutions. Based in San Ramon, California, DeviceLock, Inc. is an international organization with offices in California, Washington, DC, London, Düsseldorf, Moscow and Milan.

COPYRIGHT ©2012 DeviceLock, Inc. All rights reserved. DeviceLock®, ContentLock, NetworkLock, and the DeviceLock logo are registered trademarks of DeviceLock, Inc. All other product names, service marks, and trademarks mentioned herein are trademarks of their respective owners. For more information, visit DeviceLock web-site at www.devicelock.com.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2169605

Add to Digg Bookmark with del.icio.us Add to Newsvine

DEVICELOCK MEDIA CONTACT

Dan Chmielewski
Madison Alexander PR, Inc.
P: 714/832-8716
C: 949/231-2965
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Cloud Developer Stories
Compute virtualization has been transformational, yet security policy implementation and enforcement has lagged behind in agility and automation. There are a number of key considerations when implementing policy in private and hybrid clouds. In his session at 15th Cloud Expo, H...
Samsung VP Jacopo Lenzi, who headed the company's recent SmartThings acquisition under the auspices of Samsung's Open Innovaction Center (OIC), answered a few questions we had about the deal. This interview was in conjunction with our interview with SmartThings CEO Alex Hawkinson...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framewo...
SYS-CON Events announced today that SOA Software, an API management leader, will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. SOA Software is a leading provider of API M...
SYS-CON Events announced today that Utimaco will exhibit at SYS-CON's 15th International Cloud Expo®, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Utimaco is a leading manufacturer of hardware based security solutions that...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE

Breaking Cloud Computing News
MOUNTAIN VIEW, CA and MANCHESTER, UNITED KINGDOM--(Marketwired - October 22, 2014) - IIX Inc., a lea...