yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
A Preposition Makes All the Difference in / of / for / from the Cloud
How a simple preposition alters the scope and meaning from problem to solution

No, this isn't 7th grade English...I promise.

With all the important decisions IT departments make, what’s the big deal whether cloud security means from the cloud, in the cloud, of the cloud or for the cloud. Well, a lot. Among the various media, blogs, professional chatter, webinars, conferences and the like, the concept of cloud security is getting a significant amount of airplay. However, the difference in the application of a simple preposition completely alters the scope and meaning of these conversations to that of a problem or a solution.

Security IN the cloud frames the overarching issue. It is the problems often discussed by IT professionals today. They range from questions about the safety of data held within a virtualized environment to that of cyber hactivism or why do my users keep insisting on using their smartphones to access the network? These issues often point to the cloud as some wide open Wild, Wild West situation. Sorry, but I disagree. I think the cloud as a platform has matured to the point where it is a viable, protective and proactive choice.   These issues would exist on any enterprise’s on-premise set up. Companies like ADP,, Office365, Azure have taken great pains to ensure the data processed or stored on or via their servers have a degree of security equal to or exceeding that of any on premise set-up.

But what about Yahoo? What about LinkedIn? All those passwords breached. But before you set your hair on fire and scream the “cloud is falling,” - for every cloud-centric breach, there are just as many (or more) on-premise breaches. Poor or porous security knows no platform. It favors no deployment scenario and creates no safe haven for users. Security, like any other element of an enterprise is built on smart process, consistent monitoring and effective tools. A substandard, half-hearted approach to any of these three and those unsettling headlines we read about every few months might feature a familiar company name.

In stark contrast, security FROM the cloud is the means to protect IT assets without having the heavy investments in servers, software and a variety of other related costs. But it is much more than cost savings and democratizing access to protection. For some it is the holistic application of best practices, real time visibility and best of breed solutions. “From” the cloud is providing a scalable layer of security that was typically reserved for trillion dollar companies easily deployed for any company of any size.  For others it is the ability to link all the independent silos of information including transactions, proprietary data, applications (legacy and in the cloud) and manage them centrally with a greater degree of focus and accuracy.

Security FROM the cloud answers the questions posed by security IN the cloud. Who has access? Who controls that access? Can we report activity to maintain compliance? What is harmless traffic and what needs to be remediated in real time? Do I have the resources to monitor and react to issues 24/7/365? How do I centralize security analysis so I don’t have to repeat processes system after system? How do I control all those applications the sales team accesses from beyond the so-called network perimeter? What happens when an employee leaves the company or a vendor’s contract expires? Who controls all the passwords? How is data aggregated, stored/destroyed, transited and digested? Is my data safe? So many issues, so little bandwidth…until you apply an answer FROM the cloud.

Now of course, security-as-a-service (aka security FROM the cloud) or cloud-based security is not a panacea. It still depends on workflow process and the expertise to define and apply that process. But the issues surrounding scope, scale, control, capability, centralization, correlation, fast-to-market and cost are answered. The important thing to remember is that FROM the cloud is a holistic (and sometimes automated) set of enterprise controls designed to protect assets. The fact that it is managed and controlled from the cloud is simply a value added advantage. It provides a cost-effective means and accelerated degree of flexibility that can be translated into a redirection of core competency priorities. Simply put…you can worry about one less things and get to work on IT issues that drive your company forward. Of the many hats we often force our IT professionals to wear, here is one they can take off with the confidence that the goals of the enterprise are being met and its assets are properly protected.

So a preposition can make all the difference. Now the next time a blogger or industry pundit explains the wonders or the perils of the cloud…you just have to remember FROM where real solutions come.

About Kevin Nikkhoo
With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

SOA World Latest Stories
The dynamic nature of the cloud means that change is a constant when it comes to modern cloud-based infrastructure. Delivering modern applications to end users, therefore, is a constantly shifting challenge. Delivery automation helps IT Ops teams ensure that apps are providing an optim...
"We started a Master of Science in business analytics - that's the hot topic. We serve the business community around San Francisco so we educate the working professionals and this is where they all want to be," explained Judy Lee, Associate Professor and Department Chair at Golden Gate...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability...
We call it DevOps but much of the time there’s a lot more discussion about the needs and concerns of developers than there is about other groups. There’s a focus on improved and less isolated developer workflows. There are many discussions around collaboration, continuous integration a...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is founda...
"CA has been doing a lot of things in the area of DevOps. Now we have a complete set of tool sets in order to enable customers to go all the way from planning to development to testing down to release into the operations," explained Aruna Ravichandran, Vice President of Global Marketin...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers