Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Cost of Cybercrime to Business Continues to Soar; High Detection Rates Save Money
A Detection Improvement of Even 1 Percent Can Potentially Save a Business Thousands in Malware Cleanup Costs; F-Secure Security Solutions* Detect New Malware at a Rate of 100 Percent

SAN JOSE, CA -- (Marketwire) -- 02/07/13 -- As the cost of cybercrime continues to soar, affecting businesses around the world, F-Secure is introducing the latest version of its corporate endpoint security product, F-Secure Client Security, with elevated threat detection technology that has been independently tested by AV-TEST with top-notch scores against new malware **, including support for Windows 8.

With businesses spending sizable sums of money to clean up damage from malware, high malware detection rates take on greater importance. Cyber attacks cost large enterprises millions of dollars per year, and some businesses can spend thousands per month. Small firms are also increasingly popular targets for attacks, as they are not as likely to be adequately protected.

"Not only are businesses spending for malware cleanup, they also have the costs of lost productivity, data loss, investigation and post-incident management," said Pekka Usva, Vice President of Corporate Security at F-Secure. "Add those together, and malware that has gone undetected can have serious ramifications to a business. Even a one percent higher detection rate can save thousands."

Attacks can include theft of an organization's intellectual property, confiscation of online bank accounts, distribution of viruses, posting of confidential business information on the Internet, and disruption of a company's network with a denial of service attack.

Detection for new and existing malware, centrally managed

Responsible for Client Security's high detection rate is DeepGuard 4, the latest incarnation of F-Secure's detection engine, which uses heuristical, behavioral and reputation-based technologies to provide proactive protection against both existing malware and brand-new, previously unknown threats. In independent tests for preventing new "zero-day" malware attacks, DeepGuard 4 performs at 98 to 100 percent, while the industry average hovers around 90 percent.**

F-Secure Client Security's enhanced protection for corporate desktops and laptops supports recent versions of Windows, including Windows 8, without compromising performance. Its improved browsing protection works with all major browsers.

Central management is taken care of by the latest version of F-Secure Policy Manager, the comprehensive and easy-to-use security management tool that allows IT administrators to manage and add new workstations, servers or remote offices using one central console. Among Policy Manager's new features are support for Client Security updates and Windows 8.

F-Secure Client Security and F-Secure Policy Manager are available through thousands of reseller partners globally.

* Based on AV-TEST's results for F-Secure Internet Security 2013 from July-December 2012. F-Secure Client Security 10 is based on the same technology as F-Secure Internet Security 2013.

**AV-TEST bimonthly test results: F-Secure Client Security 9, the previous version, was tested at 98 to 100% effectiveness against new malware in AV-TEST's report from July-December 2012. DeepGuard 4, part of F-Secure Client Security 10, received 100% detection results in AV-TEST's real-world testing scenarios from July-December 2012.

More information: http://www.f-secure.com/en/web/business_us/products-services

F-Secure - Protecting the irreplaceable

While you concentrate on what is important to you, we make sure you are protected and safe online whether you are using a computer or a smartphone. We also backup and enable you to share your important files. Our services are available through over 200 operators around the world and trusted in millions of homes and businesses. Founded in 1988, F-Secure is listed on NASDAQ OMX Helsinki Ltd.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Press contact:

Melanie Lombardi
LEWIS PR for F-Secure
+ 1 (415) 432-2400
Email Contact

About Marketwired .
Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Cloud Developer Stories
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been grea...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT or...
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more so...
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choic...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE