Corero’s First Line of Defense Doesn’t Play Games When It Comes to Protecting G4BOX’s Business

Leading Publisher of Free-to-Play Online Multiplayer Games, G4BOX INC., Relies on Corero to Ensure Continuous Availability and High Performance for Superior Gaming Experience

Hudson, Mass., September 16, 2013 – Corero Network Security (CNS:LN) today announced that G4BOX INC., a leading Publisher of Free-to-Play Online Multiplayer Games, selected Corero’s First Line of Defense solution to safeguard its gaming sites against Distributed Denial of Service (DDoS) attacks and other unwanted traffic to ensure availability.

G4BOX was founded in 2006 on the principle that online, community-based video games offer unique and compelling gaming experiences with untapped mass market potential and wide social appeal. The company currently offers a growing portfolio of successful, massive multiplayer online game properties.As a business that operates completely online, system performance, game responsiveness and availability are crucial to maintaining a trusted relationship with its customers. A disruption or slow-down may cause their customers to go elsewhere to play. G4BOX chose Corero to ensure the protection of its customers and their online information, as well as continuous availability and high performance.

“I knew I wanted to bring in the Corero First Line of Defense. I evaluated other solutions, but they did not compare to Corero, which not only stopped the network layer and application DDoS attacks but also other unwanted traffic that we were unaware was hitting us at the perimeter,” said James Kim, who manages the network infrastructure for both G4BOX and SG Interactive. Kim’s team had evaluated several DDoS mitigation solutions, including those from Arbor Networks, RioRey Inc. and Radware Ltd., but none paralleled the comprehensive protection provided by Corero’s First Line of Defense.

Corero's First Line of Defense was selected because of its proven ability to stop DDoS attacks and other unwanted traffic at the perimeter. The company’s solutions are designed to stop both known and unknown attacks, before they reach the firewall, freeing the existing IT infrastructure to do what it was designed to do.

With the Corero solution in place, G4BOX has not suffered downtime from DDoS attacks. Kim can see from security reports that the attack attempts continue, but to no avail. “The attackers keep trying to get to us, but their tactics are blocked automatically. They don’t quit, but they aren’t hurting us. Even as they shift their tactics in the future, we are confident that, based on our experience, Corero’s device will be able to block them,” Kim said. G4BOX also feels more confident about its relationship with its customers. “Succumbing to a DDoS attack breaks the trust that our customers have in us,” Kim explained. “There could be other things happening on the back end that our customers might worry about, like whether the attack is a smoke screen for data theft. This concern has gone away now that the attacks are repelled without repercussion. Customer trust is the strongest asset we have,” Kim added.

Corero’s CEO Ashley Stephenson said: "We are very pleased to know that Corero is enabling G4BOX to meet its mission of providing continuously available, high performance gaming to its customers. For organizations that rely on the Internet like G4BOX, it just makes good business sense to use Corero as a first line of defense in order to eliminate the risk of downtime and security breaches associated with DDoS attacks.”

About Corero

Corero Network Security, an organization’s First Line of Defense®, is an international network security company and a leading provider of Distributed Denial of Service (DDoS) defense and next generation security solutions. As the First Line of Defense, Corero’s products and services stop attacks at the perimeter including DDoS, server targeted, and zero-day attacks, protecting IT infrastructure and eliminating downtime. Corero’s solutions are dynamic and automatically respond to evolving cyber attacks, known and unknown, allowing existing IT infrastructure – such as firewalls which are ineffective at stopping much of today’s unwanted traffic at the perimeter – to perform their intended purposes.