Home » Computer & Software » Hardware » CounterTack CTO Michael Davis to Present Webinar on Turning the Table on Persistent Cyber Attackers
Ihren XING-Kontakten zeigen

CounterTack CTO Michael Davis to Present Webinar on Turning the Table on Persistent Cyber Attackers

WALTHAM, MA — (Marketwired) — 11/14/13 — , a pioneer in embedding real-time threat detection into endpoint operating systems for unprecedented visibility around targeted attacks, will present a webinar “”.

Tuesday, November 19, 2013

2:00 – 3:00 p.m. EST

Today, traditional defense methodologies do little to prevent and defend against persistent attacks. To best defend against emerging threats organizations need to think — and act — like the attackers.

In this webinar, CounterTack will address the fundamental shift in thinking and approach required to be successful, specifically four critical steps — Detect, Remediate, Analyze and Resist. It will instruct attendees how to:

Use attacker technology and tools against attackers to detect their presence on all endpoints.

Incorporate the same stealth techniques attackers use to hide to monitor them.

Leverage forensics at the point of attack to better understand the overall threat.

Use analytics to understand attacker behavior and to draw conclusions about the areas of your systems that require attention.

Michael Davis, CTO at CounterTack

To register for the webinar click . All attendees will be automatically entered into a drawing to win a Mophie PowerStation Duo.

CounterTack is revolutionizing security by bringing real-time attack detection and forensics to the endpoint, rendering traditional endpoint security obsolete with Sentinel, shortening the gap between detection and infection for enterprise organizations. By actively engaging attackers, CounterTack helps organizations dramatically reduce the dwell time of advanced, persistent adversaries and the damage they can cause. Through blazing-fast detection, real-time attack capture and automated intelligence, CounterTack provides unparalleled visibility into malicious behavior, enabling organizations to make smarter decisions on countering known and unknown threats to protect their business.

To learn more, visit .

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop