RYE BROOK, NY--(Marketwire - Feb 16, 2012) -
CISCO
Mr. Roy Skillicorn, Senior Director, Physical Security Business Unit, Cisco, said, "Cisco Services and our partners have a deep knowledge of both the network infrastructure, including security solutions that require use of the network, and the video application layer. We and our partners can therefore work with customers on solving questions like: How do you send video to mobile endpoints like tablets? How do you enable interoperability across protocols?"
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_cisco_RS.html For more information: http://www.cisco.com/go/physec
**********
GENERAL DYNAMICS CYBERSECURITY
Mr. Chris Daly, Director of Business Development for Cybersecurity, General Dynamics C4 Systems (
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_GDC4S.html For more information: www.GDC4S.com
**********
KEYSCAN ACCESS CONTROL SYSTEMS
Mr. Steve Dentinger, Director of Sales and Marketing, Keyscan Access Control Systems, told us, "Many end-users are guarding their capital expenditures and with staffing levels at an all time low employers are seeking ways to optimize staff productivity and stay focused on the core competencies of the business. Centrally Managed Access Control addresses may of the concerns of business owners today; they don't need an access control administrator, they don't need an onsite computer, they don't need to manage/maintain the access control database, they don't need to perform software updates, all this and if they desire, they can lock/unlock doors, run reports, add or delete access permissions all via an internet connection using their smartphone, iPad, or laptop without any special software."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_Keyscan.html For more information: www.Keyscan.ca
**********
VIDEX
Videx was given the 2012 Top Product award by Building Operating Management magazine for its suite of CyberLock electromechanical lock cylinders and programmable smart keys.
CyberLock enables users to view records of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customized access privileges based on time, date, and authority level
The Top Products Awards recognize the most popular manufacturers and suppliers of the year, as determined by building and facility executives who participated in a national survey. CyberLock was selected among 560 products that were submitted for consideration and will be featured in the magazine's January 2012 issue.
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_VIDEX.html
For more information: http://www.cyberlock.com/
**********
WAVE SYSTEMS
CMS Products, Inc. and Wave Systems Corp. recently announced the availability of the first-ever external self-encrypting drive (SED) that meets the rigorous Opal standard. CE Secure DiskVault Wave Edition drives will ship with Wave's EMBASSY Trusted Drive Manager (http://www.wave.com/products/tdm.asp#mangerBenefits ) software for activating the drive's advanced security features.
"As businesses look to external drives for additional storage, it's important for data to be secured," said Ken Burke, President, CMS Products, Inc. "External SEDs are often used to store sensitive information, creating an even stronger need for industry-standard encryption. By encrypting the drive itself, customers can protect their data from intruders."
For more information: http://www.wave.com/news/
For the Wave Blog: http://blog.wave.com/
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf
For more information: www.wave.com (
********
CARTES IN North America
March 5-7, 2012 in Las Vegas, Nevada
Organizations face persistent challenges of ensuring security and privacy, confirming identity, managing authorization and legitimizing business transactions in both cyber and physical worlds. At CARTES in North America, http://www.cartes-northamerica.com/,security and smart card authorities will present a roadmap for organizations to address these issues along with real-world strategies for managing risks from the growing prevalence of mobile applications as well as new cloud-based services.
********
CLOUD EXPO NEW YORK
Globally, cloud computing is on course to become $120BN market.
The surest way to get yourself and your company fully "Cloud-ready" is by attending Cloud Expo New York (http://cloudcomputingexpo.com/) -- being held June 11-14, 2012, at The Javits Convention Center In New York City.
Cloud Expo New York offers a vast selection of technical and strategic Breakout Sessions, General Sessions, Industry Keynotes, our signature discussion "Power Panels" and a bustling 4-day Expo floor complete with a busy Demo Theater so that delegates can you can kick the tires of solutions and offerings.
Join your Cloud peers in June at 10th International Cloud Expo in New York, co-located with the 13th Virtualization Conference & Expo. It is the largest Cloud Computing event in the world!'
********
PSA Security Network
PSA-TEC....May 14 - 18, 2012 in Westminster, Colorado
"For over 35 years PSA Security Network has brought you PSA-TEC. This year PSA-TEC offers you hundreds of hours of education and networking, focusing on Business Optimization, Physical Security, IT and Managed Services--all specific to the physical security community.
Join us May 14 - 18, 2012 in Westminster, Colorado and get the training you and your staff need to meet everyday challenges and succeed in the security industry.
On behalf of PSA, we look forward to seeing you in Colorado!"
Bill Bozeman, CPP, CHS
President and CEO
PSA Security Network
Register for PSA-TEC here: http://www.cvent.com/events/psa-tec-2012/event-summary-f2ba1ca43c004a79b01c4e2156183c39.aspx
For our interview with Mr. Bill Bozeman: http://www.securitystockwatch.com/Interviews/in_Boardroom_PSA.html
For more PSA Security Network News: http://blog.buypsa.com/category/press-releases
********
Security Document World 2012
The Global Hub for Next Generation Citizen & Government ID Solutions
21-23 May 2012, Queen Elizabeth II Conference Centre, London, UK
Following the outstanding success of SDW 2011, which saw a packed exhibition floor and more than 1200 attendees, SDW 2012 will return to the Queen Elizabeth II Conference Centre, London UK on 21-23 May 2012.
The show will continue its focus on advanced security documents, border control, ePasports, eID, registered traveller and for 2012 will have a special focus on document anti-counterfeiting.
With over 85 companies on the exhibition floor, and an exciting two-day conference programme, this event is designed for government officials, company executives and technologists in the ePassport, visa, eID, driving license, registered traveller, law enforcement, digital identity, employee ID, security printing, biometric and smart card industries. Find out more at: www.sdw2012.com
Contact: Mark Lockie at Science Media Partners, Tel: +44 1491 672381,
Email: m.lockie@sciencemediapartners.com, Web: www.sdw2012.com
**********
THE TRUSTED COMPUTING GROUP
The Trusted Computing Group (TCG), http://www.trustedcomputinggroup.org/, a worldwide open industry standards organization, will host its popular annual half-day seminar at the RSA Conference as part of the conference's Association Events schedule.
"The Paradox of Security: Is the Status Quo Acceptable?", http://rsaconference.com/events/2012/usa/agenda/monday-events.htm#tcg, will be held Monday, Feb. 27, 10 a.m. - 2 p.m. in Esplanade Room 301-303, Moscone Center, San Francisco. The session will include a number of sessions and a boxed lunch, as well as demonstrations of widely available network security solutions, self-encrypting drives and systems protected with the Trusted Platform Module, all based on TCG specifications.
Attendees will learn more about using a hardware root of trust as an anchor for data leak and malware prevention; platform integrity; device and user identity; and network access for fixed and mobile devices used enterprise-wide.
"Chaos currently rules in the security market," notes Brian Berger, Trusted Computer Group director and marketing work group chair. "In a world where users routinely and unknowingly surrender personal information and choice, TCG and its members provide industry accepted security solutions to any platform."
Please read our Terms of Use, Conditions and Disclaimers ("Terms"): http://www.securitystockwatch.com/Main/Terms_of_Use.html .
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms".