Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
GFI Software Announces ThreatTrack 2.0 to Plug Malware Holes in Real-Time
Intelligent monitoring solution provides invaluable security data in the fight against malware

CLEARWATER, Fla., Jan. 17, 2013 /PRNewswire/ -- Today GFI Software™  announced the launch of GFI ThreatTrack™ 2.0, the latest version of the company's proven security intelligence solution that provides users with deep visibility into the threat landscape. A culmination of information collected from GFI SandBox™, GFI's automated malware analysis tool, and the company's extensive partnerships with security organizations worldwide and the company's own malware research professionals, ThreatTrack 2.0 produces a range of data streams containing more than 69 million malicious URLs, IP addresses and other malware samples.

(Logo: http://photos.prnewswire.com/prnh/20121204/MM23629LOGO)

ThreatTrack users rely on this actionable intelligence to play an important part in their efforts to stop malicious websites, emails and other Internet traffic before they can put corporate networks at risk. For example, security integrators and in-house IT security teams integrate ThreatTrack data streams into their security infrastructure to strengthen firewall filtering and third-party proxy solutions, and to respond to emerging threats faster than ever before. Security vendors leverage ThreatTrack to populate their malware reputation database with the latest threats in order to better defend their customers. Additionally, academic researchers use ThreatTrack's data to predict and track malware, and thus, assist the IT security community in their efforts to combat cybercrime.

"When you are up against sophisticated cybercriminals, every minute counts," said Julian Waits, general manager of GFI Software's Security Business Unit. "Zero-day malware threats are much harder for security systems to detect than known malicious files that are already blacklisted. The security industry and the academic world work together closely to analyze new and evolving malware samples and identify ways to stop these threats before they can infect enterprise networks. ThreatTrack can be an invaluable part of this process, as it provides the real-time intelligence needed to combat malware as cybercriminals look for new backdoor vulnerabilities to target."

The latest version of ThreatTrack provides users with up to seven times the data available in version 1.0. Users can now also access the powerful data they have come to rely on to catch malware threats quicker and easier than ever before – which can mean the difference between suffering a breach or remaining secure. Additional benefits of ThreatTrack 2.0 include:

  • Increased Accessibility – Previously available through a file transfer protocol (FTP) site, ThreatTrack 2.0 data streams are now accessible via a REST API, providing customers with direct, real-time access to continuously updated information. Users no longer have to struggle with large FTP downloads to get their hands on malware data essential to their organization.
  • Real-Time Accessibility – ThreatTrack 2.0 data streams are updated in near real-time to provide customers with immediate access to information about the latest malware threats.
  • Enhanced Customization – Through the REST API, customers can now also tailor data retrieval to their own personal needs. They can customize the type and amount of data they download to ensure they are analyzing only the information that is pertinent to their organization.
  • Flexible Formatting – Users can now select from XML, JSON or TXT formatting options so data streams are easily integrated into their products.

GFI ThreatTrack 2.0 is available now. The ThreatTrack Intelligent Monitoring Essentials Suite is comprised of three real-time data streams encompassing the most critical threat intelligence for defending enterprise networks: the Malicious HTTP Block, Suspicious HTTP Alert and Malicious HTTP Phishing streams. ThreatTrack Essentials Suite customers looking for more in-depth intelligence can choose from four powerful add-ons: Dynamic Behavioral Analysis, Border Patrol, Malware Executable Repository and Malware Traffic streams. To learn more about ThreatTrack 2.0, visit www.gfi.com, send an email to ATG@gfi.com or call 855-443-4284.

About GFI
GFI Software provides web and mail security, archiving and fax, networking and security software and hosted IT solutions for small to medium-sized businesses (SMB) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMBs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States, UK, Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold ISV Partner.

For more information
GFI Software
Please email David Kelleher at David.Kelleher@gfi.com 
GFI - Malta: Tel: +356 2205 2000; Fax: +356 21382419
URL: http://www.gfi.com

Davies Murphy Group
Please email Brian Alberti at gfi@daviesmurphy.com
GFI – U.S.: Tel: +1-781-418-2403

Disclaimer
Copyright © 2013 GFI Software. All rights reserved. All other trademarks are the property of their respective owners. To the best of our knowledge, all details were correct at the time of publishing; this information is subject to change without notice

SOURCE GFI Software

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the ...
CodeFutures, a provider of agile Big Data technologies, on Tuesday announced the release of Cory Isaacson’s newest book, “Understanding Big Data Scalability.” Isaacson is the CEO/CTO for CodeFutures and an industry-leading innovator of data management software. “Understanding Big...
Cloud Computing is evolving into a Big Three of Amazon Web Services, Google Cloud, and Microsoft Azure. Cloud 360: Multi-Cloud Bootcamp, being held Nov 4–5, 2014, in conjunction with 15th Cloud Expo in Santa Clara, CA, delivers a real-world demonstration of how to deploy and co...
Avaya has escalated its efforts to get customers to fast-track to the cloud with the first of several sweeping initiatives that will optimize solutions and processes for delivery of collaboration as a service (CaaS) via the Avaya Collaborative Cloud. Strong demand for Avaya commu...
We are reaching the end of the beginning with WebRTC and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE

Breaking Cloud Computing News
LEXINGTON, MA--(Marketwired - July 23, 2014) - Tokutek®, delivering database performance at scale, t...