yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
Lumension Announces The Completed Acquisition Of CoreTrace Corporation
Asset Acquisition strengthens Lumension's software capabilities, patent/IP portfolio and leadership in the application control space

SCOTTSDALE, Ariz., Nov. 5, 2012 /PRNewswire/ -- Lumension, a global leader in endpoint management and security, today announced the completed asset acquisition of CoreTrace Corporation, an innovative application control software provider.  Austin-based CoreTrace delivers solutions that prevent the execution of malware and unknown executables.  The acquisition will enhance Lumension's application control feature set, grow its software and patent/IP portfolio and extend Lumension's growing customer, OEM and reseller bases.

The rise of advanced persistent attacks and weaponized malware has resulted in a new generation of widely distributed malware.  In upcoming State of the Endpoint Lumension-sponsored research to be released in early December, researchers identified growing alarm among IT security professionals related to advanced persistent threats (APTs). Understanding this new threat environment, Lumension has strengthened its leadership position in the endpoint management and security space by acquiring the assets of CoreTrace Corporation, and further consolidating market share in the application control space.

"The threat of advanced persistent attacks is growing at a significant rate," said Pat Clawson, Chairman and CEO of Lumension. "Look at oil operators in the middle east who have suffered devastating cyber attacks. With this rise in advanced persistent threats, and weaponized malware, along with the fact that Gartner projects[i] that 'by 2015, more than 50% of enterprises will have instituted 'default deny' policies' that restrict the applications users can install,' Lumension felt a strategic acquisition of CoreTrace would further equip both current and prospective customers in the ever-evolving threat landscape and cement Lumension's leadership in next generation technologies. We are thrilled to have CoreTrace on board to continue our drive to advanced, persistent protection for organizations of all sizes."

With the acquisition of CoreTrace assets, Lumension will add more than 130 customers, key development staff, and additional OEM and reseller partners.

Key Facts:

  • Lumension acquires key IP and patent portfolio from CoreTrace.
  • Lumension will likely integrate key aspects of CoreTrace's technology into Lumension® Application Control and continue to offer Lumension Application Control through the Lumension Endpoint Management Security Suite.
  • Lumension will continue to provide technical and support services to CoreTrace's current application control commercial customers.
  • Lumension will provide existing CoreTrace customers with a seamless upgrade path to Lumension's endpoint management platform once key features of the CoreTrace technology are integrated.
  • Lumension will likely continue to offer the CoreTrace Bouncer® product through existing commercial sales channels.

A financial analyst briefing will be held at 11:30 a.m. EST on Wednesday, Nov. 7. RSVP is required; please contact Kim Doyle at or 480-444-1229 for dial-in instructions.

Additional Acquisition Resources:

Supporting Resources:

About Lumension
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Texas, Florida, Ireland, Luxembourg, the United Kingdom, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at

About CoreTrace
CoreTrace provides the most advanced threat protection for physical and virtual Windows servers, desktops and laptops, as well as Linux enterprise servers. The Company's flagship solution, CoreTrace Bouncer®, protects customers' most valuable intellectual property and systems by preventing the most advanced threats. Bouncer's advanced threat protection is based upon adaptive application whitelisting to prevent the execution of all unauthorized code, memory protection to stop attackers from exploiting whitelisted applications and risk-profiling of all applications via cloud-based reputation services.

[i] Predicts 2012: Sophisticated Attacks, Complex IT Environments and Increased Risks Demand New Approaches to Infrastructure Protection; By Ray Wagner, Mark Nicolett, Lawrence Orans, John Pescatore, Kelly M. Kavanagh   Peter Firstbrook, Neil MacDonald, Rob McMillan, Joseph Feiman; Nov. 29, 2011 


Kim Doyle 

Jason Deal


Lois Paul and Partners

(480) 444-1229 

(512) 784-7103

SOURCE Lumension

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

SOA World Latest Stories
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or ma...
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevO...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and...
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid i...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with parti...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers