Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
BeyondTrust Combines Vulnerability and Identity Management to Reduce the Security Risk of Windows Systems

BeyondTrust, the security industry’s only provider of Context-Aware Security Intelligence, today announced the release of PowerBroker for Windows 5.5, the industry’s first identity management solution able to leverage the security context provided by vulnerability and privilege data, which allows customers to more effectively manage the risk of their Windows systems. This release also includes integration with the award-winning Retina CS Threat Management Console, providing robust, enterprise-ready analytics and reporting capabilities for PowerBroker Windows deployments, as well as support for implementing least privilege on Windows 8 systems.

PowerBroker for Windows is the fastest, easiest and most cost-effective way to secure Windows systems through the implementation of least privilege. It reduces help desk burdens and costs, while increasing the security of the Windows infrastructure. This new release allows IT organizations to effortlessly benefit from system and application vulnerability data when considering the requirements of elevated privileges for users, tasks and applications. Employing this approach, BeyondTrust customers can make more informed security strategy decisions, based on a system’s overall risk and susceptibility to attacks.

"The high velocity of change in today’s enterprise infrastructure often means security teams are making critical business decisions based on threats, regardless of the actual context of those threats,” said Brad Hibbert, executive vice president of product engineering at BeyondTrust. “This new product release allows organizations to make more effective security decisions, by delivering the context that can only be provided by fusing both vulnerability and privileged identity information.”

BeyondTrust is dedicated to helping their customers meet today’s security challenges by providing innovative security and compliance solutions. A common challenge with privilege management is the need to take a system’s overall risk into context when deciding what level of privileges a user or system should be given. Leveraging the real-time application events provided by PowerBroker for Windows, the BeyondTrust threat engine’s patent pending virtual application scans enable immediate alerting and threat prioritization of vulnerable application usage enabling more proactive remediation of the most critical and vulnerable assets.

Retina CS is the centerpiece of the BeyondTrust vision of Context Aware Security Intelligence which helps organizations answer the most pressing questions in security – what to fix first, what to fix next and why. Retina CS does this through unmatched security intelligence and analytics for an entire IT landscape.

Want to Learn More?

Product experts from BeyondTrust will be hosting a public webcast to discuss the new developments of PowerBroker for Windows 5.5, specifically how you can leverage vulnerability data to reduce the risk of corporate desktops and servers. Register here: https://www1.gotomeeting.com/register/730958713

Availability

For existing customers of the product, PowerBroker for Windows 5.5 is available as a free upgrade. For those interested in learning more and to obtain a free trial, please visit: http://www.beyondtrust.com/Products/PowerBrokerForWindows/

About BeyondTrust

BeyondTrust is the only security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting.

BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company’s products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.

With more than 25 years of global success, BeyondTrust is the pioneer of both Threat Management and Privileged Identity Management (PIM) solutions for heterogeneous IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world's 10 largest banks, eight of the world's 10 largest aerospace and defense firms, and 7 of the 10 largest U.S. pharmaceutical companies, as well as renowned universities across the globe.

Follow BeyondTrust
Twitter: http://twitter.com/beyondtrust
Blog: http://blog.beyondtrust.com
LinkedIn: http://www.linkedin.com/companies/beyondtrust
Facebook: http://www.facebook.com/beyondtrust

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Cloud Developer Stories
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website require...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the I...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets...
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software p...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE