yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Computing
Conference & Expo
November 2-4, 2009 NYC
Register Today and SAVE !..

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
In many cases, the end of the year gives you time to step back and take stock of the last 12 months. This is when many of us take a hard look at what worked and what did not, complete performance reviews, and formulate plans for the coming year. For me, it is all of those things plus a time when I u...
CryptoMill and Seagate usher in a new era of Laptop PC Data Security
CryptoMill and Seagate usher in a new era of Laptop PC Data Security

TORONTO, May 1 /PRNewswire/ -- CryptoMill Technologies(R) today announced that it is offering management solutions for Seagate's encrypting notebook hard drive, Momentus 5400 FDE.2, using CryptoMill's endpoint data security solution - SEAhawk. The CryptoMill-Seagate solution addresses the critical need in the marketplace to protect against the real internal and external data security threats that organizations face from loss or misuse of sensitive information on laptops and mobile storage devices.

81% of companies reported the loss of one or more laptops containing sensitive information during the past 12 months. - Ponemon Institute, 2006.

Data breaches have become the most critical security issue enterprises face today, as a result of endless losses and thefts of laptops and removable storage devices. As users rely on laptops and mobile storage devices the potential for data loss continues to grow. These threats have stirred attention at the highest level among worldwide regulators, industry bodies and heads of global corporations. There is a growing need for more comprehensive and complete solutions to preserve the privacy and confidentiality of core data in enterprises.

Seagate Technology is a market leader and independent maker of hard drives used to store data. Seagate's DriveTrust(TM) technology provides hard drive-based full disk encryption that automatically encrypts all data written to the disk without any performance impact to computer systems. The level of security Seagate's DriveTrust technology brings to the commercial market is unprecedented. It marks the beginning of a new way of thinking about the capabilities of the hard drive, beyond just storage, to address the current environment of data breaches and identity theft.

CryptoMill's relationship with Seagate ushers in a new era of data protection for laptops and mobile storage devices. It brings to the marketplace for the first time, a complete data security solution - one that is beyond encryption, and addresses both internal and external security threats. CryptoMill's SEAhawk will offer transparent management of the market's leading secure, encrypting hard drive, Seagate Momentus 5400 FDE.2, to achieve maximum benefits with minimum complexity. SEAhawk will provide enterprise-class key management and recovery, as well as integration with user management services in Microsoft(R) Windows(R) and Active Directory(R).

"Providing organizations of all sizes with an easy, centralized way to manage computers using DriveTrust technology to secure and encrypt sensitive data is key to widespread adoption and deployment of these secure systems," said John Bedrick, Senior Director of IT Security - New Market Development at Seagate Technology. "Seagate is teaming with CryptoMill and other independent software vendors to deliver simple management of systems powered by Momentus 5400 FDE.2, our full-disc encryption secure notebook hard drive."

Seagate DriveTrust technology is a powerful new security platform that combines strong, fully automated hardware-based security with a programming foundation that makes it easy to add security-based software applications for organization-wide encryption key management, multi-factor user authentication and other capabilities that help lock down digital information at rest.

CryptoMill SEAhawk and Seagate DriveTrust will comprehensively address laptop and mobile storage security problems in a single unified solution that will offer unparalleled levels of security, scalability, ease of use, and simple management. CryptoMill aims to be at the forefront of leveraging DriveTrust technology for organizations of all sizes, including its ability to do instantaneous cryptographic erasure, and smart card facilities to bring endpoint and mobile storage device security to new levels of assurance and trust for all organizations.

"Every organization wants its people to freely manage, intelligently move and use data while keeping it secure." - said Nandini Jolly, CryptoMill's CEO. "Pairing our SEAhawk product with Momentus 5400 FDE.2 will allow users and organizations to do just that, preserving privacy and trust even while data is mobile and liberated. This is truly revolutionary."

About CryptoMill Technologies

CryptoMill's SEAhawk combines three critical elements in one solution needed for true data security - Protection, Control and Containment. Protection provides for automatic and transparent encryption for data on endpoints and mobile storage devices. This will come with no noticeable impact on performance, while ensuring that the enterprise can always get access to its data. Control provides a program and storage firewall that prevents unauthorized transfer of data to mobile storage devices. This prevents data leakage through information-dense channels. Containment is a revolutionary technology which cryptographically binds data to the enterprise and prevents internal breaches, which account for over half of all security incidents - a feature which is unique in the industry.

CryptoMill's breakthrough Containment Technology features a sophisticated and transparent key management technology which ties user data to the enterprise, based on trusted groups of storage and computers known as security domains. Using trusted security domains, SEAhawk ensures that protected data storage can only be decrypted and used by PCs assigned to a given domain. Protected media cannot be used outside of their respective domains, even if the passwords are given away.

SEAhawk includes a unique virtual disk technology called SEAhawk Disk that provides a fully encrypted and mobile storage vault which is device independent. SEAhawk Disk is designed to meet a universal set of data protection requirements, from protecting small files for emailing to large volumes of information on any fixed disk, removable media, or network drive. With this virtual disk technology, when the user logs off, the SEAhawk Disk dismounts and becomes inaccessible to others, and cannot be opened by anyone outside the enterprise. This allows users to keep their individual data private even on computers that have shared access, going beyond the privacy and data availability that traditional device-based encryption provides.

CryptoMill SEAhawk introduces an entirely new management paradigm based on simple every-day administrative activities, letting IT staff set up and define policies with point-and-click ease. SEAhawk management is server-less and does not require any complicated IT infrastructure; it is a true 'set and forget' solution that can work in an enterprise of any size or complexity.

Learn More about CryptoMill

To learn more about CryptoMill, go to

CryptoMill Technologies Ltd.

CONTACT: Nandini Jolly, President & CEO, Phone: (416) 837-9332

About PR Newswire
Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

SOA World Latest Stories
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand usin...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and sy...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portabil...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is founda...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder an...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers
Most Read This Week