COSTA MESA, CA--(Marketwire - Oct 10, 2012) - ISC8®, Inc. (
The presentation, "Big Data for Network Security: Powering Effective Cyber Operations and Cyber Intelligence" will identify a "gap" seen by government agency cyber analysts specializing in collecting, analyzing and managing Big Data network activity. Current investigative technologies, including traditional packet capture or targeted interception, are limiting and present a coverage "gap." How are analysts going to overcome this "gap?" More importantly, how are analysts going to extract actionable information based on historical network activity? This session will present key methodologies in extracting contextualized network data on a massive scale and over virtually unlimited time periods, while achieving instantaneous responses to queries.
ISC8 is actively engaged in the development and sale of intelligent cybersecurity solutions for commercial and government environments worldwide. ISC8's Cyber products are aimed at detecting next-generation malware and Advanced Persistent Threats (APTs). ISC8 provides hardware, software and service offerings that enable Enterprise Threat Management leveraging anti-tamper, 3D stacked chip assemblies, high-speed processors, and miniaturized sensors -- all technologies it has developed. ISC8 was founded in 1974 and is headquartered in Costa Mesa, California. For more information about ISC8 visit www.isc8.com.
ISC8 Statement Under the Private Securities Litigation Reform Act
This release may contain information about future expectations, plans and prospects of ISC8's management that constitute forward-looking statements for purposes of the safe harbor provisions under The Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including, but not limited to, competitive forces, general economic, market or business conditions, the effects of any attempts to intentionally disrupt our services or network by hackers or others, changes in ISC8's technologies such that they are no longer inter-operable, failure of customers to adopt, or delays in their adoption of, ISC8 products or services discussed above, and other factors, most of which are beyond ISC8's control, as well as those discussed in the Company's Annual Report on Form 10-K, quarterly reports on Form 10-Q, and other documents periodically filed with the SEC. Except as required by law, we undertake no obligation to revise or update publicly any forward-looking statements for any reason.