Printer Friendly

CounterStorm Hosts On-Demand Webinar Focusing on the Increased Severity of Targeted Attacks; Industry Experts from CounterStorm, Fortune 1000 Company and Industry Analyst Firm to Provide Unique Insight Into The Growing Threat.

NEW YORK -- CounterStorm, Inc., the maker of the only internal network security solution that effectively stops zero-day and targeted attacks in seconds, today announced that it would join a featured Fortune 1000 company and an analyst firm, on a Webinar entitled, "In the Crosshairs: Fighting Targeted Attacks." The on-demand Web broadcast, specifically designed for CSOs, CISOs, IT security and network managers discusses the dangers associated with targeted attacks and how enterprises can protect their valuable assets from malicious hackers who specifically target their companies. The free Webinar is available for download at

When organizations are targeted for attack, they often discover that their existing security infrastructures are unable to detect or stop the attacks because they rely on signatures to identify attacks. Signatures are the unique pattern of code, like a fingerprint, used by most security solutions to identify and detect specific types of attacks. However, in the case of targeted attacks, attackers use sophisticated and covert methodologies for which signatures and patches have not yet been developed. This leaves the targeted organizations' confidential data and corporate assets vulnerable.

In the Webinar, Gartner Vice President John Pescatore explains current security issues inherent in targeted attacks. "We have seen a move to more financially motivated targeted attacks in the last year," said Pescatore. "Targeted attacks are when hackers go after a specific company looking for specific information, usually credit card numbers or valuable intellectual property. They are a growing and significant problem for enterprises today and will be one of the biggest network security problems facing companies for the next several years."

The global Fortune 1000 company participating in the Webinar deployed CounterStorm to help protect it from the potential threat of being targeted by malicious hackers. In the Webinar the security director will discuss how enterprises should protect their core assets in today's environment and provide tips from his experience on how best to defend corporate networks against targeted attacks.

Matt Miller, CounterStorm's Vice President of Engineering, discusses how CounterStorm plays a key role in internal network security. CounterStorm-1 is extremely accurate in identifying and stopping targeted attacks through a unique combination of behavioral attack recognition, anomaly detection and a dynamic honeypot engine. Evidence from each of these three engines is dynamically correlated in real-time to enable immediate and accurate containment of malicious activity. CounterStorm does not rely on signatures and can accurately identify and automatically stop destructive attacks without time-consuming false positives, making it the most effective defense against targeted attacks available on the market today.

"We are at a critical point in time where cyber criminals are becoming more sophisticated and are successfully launching more internal based network attacks than ever before," said Miller. "As experts in providing solutions to the internal network security problem, it is CounterStorm's responsibility to educate organizations about this growing problem so they are best able to defend their network against targeted attacks."

Additional information and extensive interviews with individuals from CounterStorm, Gartner Group and the Fortune 1000 company will be presented during the Webinar. For more details and to view the free presentation, please visit:

About CounterStorm

CounterStorm, based in New York City, is the maker of CounterStorm-1, the only internal network security solution that effectively stops zero-day and targeted attacks in seconds. CounterStorm is the first network security company to simultaneously win two Small Business Innovative Research Phase II grants from the Department of Homeland Security. DHS selected CounterStorm's technology because it provides unprecedented protection against zero-day and targeted attacks. Global enterprises and government agencies use CounterStorm-1 for the fastest and most accurate network protection available. For more information, please visit
COPYRIGHT 2006 Business Wire
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2006, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

Article Details
Printer friendly Cite/link Email Feedback
Publication:Business Wire
Date:May 4, 2006
Previous Article:FINEOS Corporation Announces FINEOS 5; Next Generation Product Platform Designed Specifically for Modular Approach to Operational Enablement and...
Next Article:Motive to Outline Home Networking Management Challenges and Opportunities at Broadband Services Forum Meeting.

Related Articles
Symantec still strong and growing.
CounterStorm Launches Breakthrough Security Appliance That Stops Unknown (Zero-Day) Attacks in Seconds; Department of Homeland Security selects...
CounterStorm Secures $9.5 Million in Funding; Funds Are in Addition to $1.5 Million in Grants Received from the Department of Homeland Security.
NewYork-Presbyterian Hospital Selects CounterStorm to Ensure Internal Network Security; CounterStorm-1 Protects New York State's Largest and Most...
CounterStorm Releases CounterStorm-1 V2.0 Providing Unmatched Protection From The Growing Number of Targeted Attacks.
The threat from within: the evolution of cyber attacks.
Info Security Products Guide Names CounterStorm-1 Winner of the Second Annual Best Deployment Scenario Award 2006.
CounterStorm-1 Named Winner of the 2006 Tomorrow's Technology Today Award by Info Security Products Guide; CounterStorm-1 Selected As Winner In...
CounterStorm Introduces the Security Industry's First Anomaly Detection Solution to Operate at Layer 7.
Security news and products; 2006: the year spam raised its game and threats got personal.

Terms of use | Copyright © 2018 Farlex, Inc. | Feedback | For webmasters