Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

CounterStorm protects from targeted and zero day attacks

Trusted Computer Solutions : 31 July, 2009  (New Product)
Trusted Computer Solutions launches CounterStorm for the rapid and accurate detection of zero day threats
Trusted Computer Solutions (TCS) has announced the general availability of CounterStorm, a new solution for identifying security threats in seconds without the need for signatures. CounterStorm goes beyond current Network Behavioural Anomaly Detection (NBAD) solutions in its ability to rapidly detect and quickly take action by utilizing multiple anomaly detection techniques and then correlating to quickly find worms and botnets before the damage spreads.

"CounterStorm is a highly effective tool for detecting potential attacks on your internal networks," said Andrew Baker, former CIO of Warner Music Group, current CIO of ARGI. "I deployed CounterStorm at Warner and am using it now at ARGI. It's so effective that we don't even investigate when we receive an alert. We just take the box off the network and rebuild it, which is the level of trust we have in the solution. We're looking forward to all of the new functionality coming out in the next version that broadens the detection even more."

Traditional NBAD solutions have failed to meet industry expectations because they are ineffective against fast-spreading attacks, prone to high false positive rates, and do not provide fully automated responses.

CounterStorm has proven in beta field testing that the solution is capable of addressing the shortcomings of these prior solutions. Key CounterStorm features include:

* Statistical Payload Analysis (SPA) Detection Engine - builds models of normal network traffic content with this patent-pending technology to detect malicious or atypical data traffic being transferred across the network. This goes beyond the standard flow-based anomaly detection by adding a layer of content analysis resulting in more thorough detection beyond traditional Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
* Volumetric Anomaly Detector - pinpoints clients or servers producing unusually high levels of network activity and identifies the characteristics of insider activities and actively exploited compromised systems.
* Enhanced Behavioural Engine - detects patterns of malicious network activity such as worm-like malware. In addition, it provides visibility into attackers targeting specific high-value systems.
* Rogue Detection Engine - searches for botnets or exfiltration behaviour by looking for clients communicating with servers that they do not normally access. Additionally, it can detect clients that exhibit unauthorized behaviour such as becoming zombie computers performing unexpected activities.

"The advancing sophistication of attackers in combination with aging security technologies has made integrating capabilities to stay ahead of the threat imperative for organizations of all sizes," said Michael Montecillo of Enterprise Management Associates (EMA), a leading industry analyst and consulting firm. "Trusted Computer Solutions assists organizations in their efforts to stay ahead of these threats through an advanced analysis engine that integrates statistical and content anomaly detection with standard Network Behavioral Anomaly Detection capabilities."

In onsite operations at a healthcare company, CounterStorm sustained 97 percent accuracy in detection over a six-month period. The company operates a number of centrally managed hospital facilities with two data centers, and over 20,000 employees. In another operational situation with a publishing company, CounterStorm sustained 90 percent accuracy over five months. Threats detected included zero day attacks, botnets, root-kits, P2P, and worms. The publishing organization has an international presence with locations in 13 countries.

"Attackers have become increasingly sophisticated and are initiating zero day attacks without known signatures targeting commercial and government systems worldwide. The consequences of doing nothing can result in disablement of mission critical systems and theft of sensitive and proprietary information at a tremendous cost," said Ed Hammersla, Chief Operating Officer, TCS. "CounterStorm offers businesses a viable solution that detects threats in a matter of seconds versus hours or even days. The unique combination of behavioral, statistical and content anomaly detection features sets CounterStorm apart from other solutions in the market today."
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo