Welcome!

News Feed Item

CounterTack Joins ‘Powered by Cloudera’ OEM Program

CounterTack, a pioneer in delivering real-time endpoint threat detection, context and visibility around targeted attacks, today announced that it has joined the ‘Powered by Cloudera’ OEM Program. CounterTack leverages Cloudera’s Big Data platform, Cloudera Manager Enterprise Edition, to ingest colossal amounts of endpoint data to deliver a deeper behavioral analysis at scale for its enterprise customers. This gives security operators unprecedented context into attacks in real-time, so they can implement a prioritized response across hundreds of thousands of endpoints.

Countertack was recently recognized in CRN as a cool startup (The 10 Coolest Security Startups of 2014 (So Far)), addressing the demands for better incident response, advanced threat detection, and spotting unusual system and user behaviors that could signal an attack. Organizations are faced with the nearly impossible task of efficiently handling and analyzing often incalculable quantities of endpoint threat data, and with Cloudera, Sentinel eliminates the need for cloud-based solutions to manage larger amounts of security information at a scale.

CounterTack’s Sentinel platform consists of stealth collection technology and other integral components that work with Cloudera’s Big Data technologies to provide real-time endpoint threat analysis and ultimately help operators make better security decisions with instant search results in enterprise endpoint environments. Leveraging Cloudera’s on-premise data cluster and CounterTack’s threat intelligence capability, CounterTack Sentinel operators will be equipped with real-time data analytics and forensic-level analysis across workstation, laptop and server endpoints.

“By joining the ‘Powered by Cloudera’ OEM Program, CounterTack is excited to be part of the industry’s largest Big Data ecosystem, giving companies with cloud security challenges an opportunity to take control of their endpoints in real-time,” said Neal Creighton, CEO, CounterTack. “Identifying endpoint threats in real-time is imperative to today’s evolving threat landscape and what sets CounterTack apart from competitors is our ability to deliver to customers context and visibility into advanced persistent threats at scale.”

The ‘Powered by Cloudera’ OEM Program affords a wide variety of opportunities for companies such as CounterTack to jointly deliver integrated Big Data solutions to the market. With the largest and most vibrant partner ecosystem in the market, Cloudera ensures that organizations can deploy an enterprise data hub where and how they need to, build and deploy solutions efficiently, and run a wide variety of applications, tools, frameworks and platforms within their Cloudera deployment.

“For our customers in finance, government, healthcare, and other highly-regulated industries, inappropriate access to sensitive data is a significant concern,” said Tim Stevens, vice president, Corporate and Business Development, Cloudera. “Security is a non-negotiable and is mission-critical for enterprises to operate today. CounterTack’s Sentinel platform based on our market leading Cloudera Enterprise technology ensures security issues are easier to manage. We welcome them to the ‘Powered by Cloudera’ OEM Program and look forward to continued success.”

CounterTack is exhibiting at the 2014 Black Hat Conference at booth #764. The company will be giving live demonstrations of its industry-leading CounterTack Sentinel platform.

About CounterTack

CounterTack's real-time endpoint threat detection and response platform, CounterTack Sentinel, delivers unprecedented visibility and context to enterprise security teams around targeted, persistent threats. CounterTack dramatically reduces the impact of advanced attacks, providing real-time, behavioral-based intelligence on attacker activity upon infiltration, so organizations can defend their business leveraging Sentinel's contextual attack evidence for a rapid, prioritized response.

By combining 'stealthware' technology and Big Data analytics, CounterTack turns the tables on attackers, giving security teams and incident responders an advantage over their adversaries to make better security decisions with real-time, automated, forensic-level analysis. CounterTack is revolutionizing how companies defend their endpoints -- across the enterprise.

To learn more, visit www.countertack.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...