OTTAWA, March 13, 2014 (GLOBE NEWSWIRE) -- Validian Corp. (OTCQB:VLDI), first-to-market with next generation cyber security technology that provides secure access of critical applications and secure access, transfer and storage of digital information on wired, wireless and mobile networks over the Internet, announced today that it has launched its next generation Intrusion Prevention System, which is the first technology in the market to actually prevent cyber attacks that result from breaching critical applications, and the improper access and theft of valuable digital information. Bruce Benn, Chief Executive Officer of Validian, commented, "Currently more than 90% of all successful cyber attacks today occur by a hacker gaining improper access to an application. This is the initial part of a cyber attack after which the hacker then steals valuable digital information. In the case of the cyber attacks against Target, reports state that the hackers gained access to a distributed application used by a company to monitor services it provided to Target. Hackers then used this access to penetrate Target as they have done to countless other corporations." U.S. government findings and reports have concluded that they are not aware of any current technology, including Intrusion Detection Systems, that could stop these types of cyber attacks, and that intrusion prevention not only intrusion detection is needed to prevent them moving forward. Intrusion Detection Systems, including those marketed as intrusion prevention systems, detect malicious cyber attacks once they occur and then take steps to stop the cyber attack and mitigate the damage. Mr. Benn continued, "Validian's next generation Intrusion Prevention System is specifically designed to prevent a hacker from gaining access to applications in the first place, which is a pre-condition for the hacker to launch the rest of its cyber attack. We are pleased to be the first-to-market with a technology that has the potential to save corporations billions by preventing cyber attacks at the source."