NEW YORK, NY--(Marketwired - Apr 9, 2015) - CA Technologies (
*****
HP Enterprise Services
Mr. Stu Hammer, Director, USPS Application Services Practice, HP Enterprise Services, U.S. Public Sector, told us, "Applications modernization has become imperative as the maintenance of "mature" applications has increased -- consuming a disproportionate share of resources. HP aligns critical applications and infrastructure with your overall modernization program. We can help you address risk, optimize benefits and prioritize the business needs of your applications. There are some very significant benefits that we can get through modernization. We've seen between 25 and 45 percent savings in a reduction in operations cost, development cost and overall portfolio size. The approach HP uses has been successfully executed with hundreds of modernization projects -- leveraging the Advise, Transform and Manage approach, which is backed up with a strong methodology, tools and the experience to execute and de-risk the approach. What's critical in this process is to start with a complete assessment. It's mandatory that you get the plan right and you know what your portfolio, know what your application environment is so you can execute successfully. We've seen clients fail by ineffectively planning this assessment phase. If you do nothing, your costs are going to continue to rise; executing a transformation plan is critical."
For the complete interview with Stu Hammer at HP, please click here, or here: http://securitysolutionswatch.com/Interviews/in_Boardroom_HP_Hammer.html .
For more information:
HP Application Security Solutions
Transform to the New Style of IT - HP Solutions for U.S. Public Sector
*****
Mr. Paul Brady, Technology and Solution Evangelist Senior Director, Identiv, told us regarding recent cybersecurity breaches, "The weak link is the fact that, in most cases, these breaches happened because the accounts (Target, Home Depot, and JPMorgan) were using password-based authentication. That is the weak link. Had the exploited accounts required the use of Identiv's uTrust Credential to securely login without a password, these attacks could have been mitigated. Identiv's uTrust Credentials are incredibly easy to use because they are a form of authentication we are all used to -- the idea of a card plus PIN is something users accept, we are all accustomed to using a card plus PIN to authenticate an ATM, a gas pump, etc. Identiv has recently helped a large network hardware provider secure its administrator accounts and remote access security. The company uses Identiv's uTrust Credentials and built-in group policy to enforce smart-card-only login to Windows, Linux, and other servers. Identiv is also currently working with major energy companies to help them become NERC-compliant while securing both physical and logical access; we are working with one of the largest credit reporting agencies to secure remote access to its networks as well as physical access to its facilities; and we have helped one of the largest insurance companies in the world move away from insecure proximity technology to secure contactless physical access."
For the complete interview with Mr. Paul Brady at Identiv, please click here or here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Identiv_Brady.html
And, please also see our interview with Mr. Jason Hart, President, Identiv, please click here or here:
www.securitysolutionswatch.com/Interviews/in_Boardroom_Identiv_Hart.html
For more information www.Identiv.com
*****
ImageWare Systems, Inc.
ImageWare Systems, Inc. (
Extenua and ImageWare Deliver Revolutionary Enterprise Secure Cloud Storage
(www.iwsinc.com/extenua-and-imageware-deliver-revolutionary-enterprise-secure-cloud-storage/)
Agility and ImageWare Partner to Bring Biometric Solutions to New Markets
(www.iwsinc.com/agility-and-imageware-partner-to-bring-biometric-solutions-to-new-markets/)
ImageWare Systems Joins as an Advanced Partner in the CA Technologies Tech Partner Program
(www.iwsinc.com/iws-joins-as-an-advanced-partner-in-the-ca-technologies-tech-partner-program/)
ImageWare To Combine Technologies with TransUnion
(www.iwsinc.com/imageware-to-combine-technologies-with-transunion/)
For our complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html
For more information: www.iwsinc.com
*****
Nok Noks Labs recently announced that, "MedImpact Healthcare Systems, Inc., an independent, trend-focused Pharmacy Benefit Manager, will be the first to deploy FIDO authentication for the healthcare industry. MedImpact will use Nok Nok Labs technology to enable its Physician Access Portal with FIDO biometric fingerprint authentication to protect patient privacy. Healthcare providers who have been invited to use the MedImpact Physician Access Portal will be the first community of users to experience the convenience and security of FIDO authentication. Ultimately, MedImpact will make FIDO authentication in all its web applications available to its client health insurance providers and their 50 million covered members. The initial solution will launch summer 2015.
Utilizing Nok Nok Labs' S3 Authentication Suite, MedImpact can enable authorized healthcare providers to access its Physician Portal with a supported fingerprint reader -- instead of a password. MedImpact's Physician Portal is a solution for busy healthcare providers who need a fast, secure and convenient way to see a patient's full prescription history.
"We opted for a solution powered by Nok Nok Labs to replace the need for passwords for healthcare providers accessing our Physician Portal. By allowing them to use the fingerprint readers built in to devices they are already carrying around with them, we offer an easy path to adoption and fundamentally more secure and more convenient authentication mechanism. It lets these healthcare providers focus on providing care to their patients rather than worrying about following best practices for managing passwords," said John Treiman, Senior Vice President and Chief Information Officer at MedImpact.
"MedImpact is using our pioneering FIDO Ready™ server to meet the challenge of providing stronger security than the traditional username/password mechanism," said Ramesh Kesanupalli, Founder and FIDO Visionary, Nok Nok Labs. "As our FIDO Ready capability comes pre-installed on some Samsung smartphones and Lenovo laptops and is available as an app for iOS devices, MedImpact's external user community can avoid the challenges typically associated with using high-security, multifactor authentication."
"The FIDO Alliance welcomes MedImpact's announcement of their deployment of a FIDO solution and thanks them for their commitment to strong authentication in the interest of the online community of providers and users. MedImpact -- like millions of websites, service providers, and relying parties -- understands the need for a new model in user authentication that both confirms and protects user identity, while simplifying the user experience," said Dustin Ingalls, FIDO Alliance president. "Every organization that joins in the commitment to the FIDO specifications' groundbreaking approach reinforces the value of a collaborative ecosystem based on swift, intelligent authentication."
For more information, please click here or here: https://www.noknok.com/what-they-say/press-releases/medimpact-first-healthcare-deploy-fido-authentication-nok-nok-labs .
Mr. Ramesh Kesanupalli, Founder of Nok Nok Labs, Founding Member, FIDO Alliance, told us, "Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We're at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.
For the complete interview with please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_NokNok_Ramesh.html
*****
CA Technology
Mr. Jim Reno, Distinguished Engineer, Chief Architect, CA Technologies, told us, "IoT unquestionably introduces new avenues for vulnerabilities. As with many new technologies, IoT is moving fast in introducing new functionality, and security, which sadly is often an afterthought, lags behind. We need a different mindset about devices. A thermostat isn't just a thermostat, it's both a computer as well as possibly an active agent on a network. There are two sides to how we need to think about connected devices. We first need to think of them as computers, on a par with any other computer system. They can be attacked by many of the same pathways. Once attacked, their primary function can be subverted. For example, your home security system might be made to unlock your doors. The second side is to think of these devices as if they were users -- that is, as active agents with identities that reach out on the network and do things. In doing so, the same sorts of security questions around identity arise as for any other computer or user."
For the complete interview with Mr. Jim Reno, Distinguished Engineer, Chief Architect, CA Technologies please click here or here:
www.securitysolutionswatch.com/Interviews/in_Boardroom_catechnologies_Reno.html
For more information CA Technologies
*****
Sun Chemical
Mr. Curt Baskin, Marketing Manager for the Plastic Card Market, Sun Chemical, told us, "Our technology of UV curable screen and offset ink systems were designed specifically for use in the manufacturing of plastic cards. Sun Chemical also offers security products and electronic materials products. Sun Chemical and its parent company, DIC, can provide a complete solution for credit card and laminated plastic card printing. We have a full line of ink systems, coatings, adhesives, and magnetic tapes. In addition to our color management solutions, we offer anti-counterfeiting brand protection products and silver/graphite conductive inks."
For the complete interview with Mr. Curt Baskin, please click here or here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_SunChemical_Baskin.html
*****
StrikeForce Technologies Releases GuardedID Version 4 of Its Keystroke Encryption Technology
Over $1Billion Dollars in Data Breaches Could Have Been Prevented
StrikeForce Technologies, Inc. (SFORD), a company that specializes in Cyber Security solutions for the prevention of Identity Theft and Data Breaches, recently announced the release of GuardedID ® v4 of its multi-patented (8,566,608, & 8,732,483) Anti-Keylogging Keystroke Encryption technology.
"Data breaches are skyrocketing out of control, and the fact is that the majority of them were preventable," says Mark L. Kay, CEO of StrikeForce. "In just the last two years companies like Target, Home Depot, JP Morgan Chase, Michaels, Neiman Marcus and CitiBank all had data breaches that could have been thwarted by our GuardedID Anti-Keylogging Keystroke Encryption technology. Just last week, over 100 Banks throughout Europe fell victim to a sophisticated cyber-attack that was estimated to net the hackers over $1Billion dollars. The malware tool that the hackers relied on in that breach was a keylogger, which GuardedID prevents."
Keyloggers are a type of malware with a single purpose: steal everything typed onto a keyboard (i.e. usernames, passwords, social security numbers, credit card numbers and confidential, sensitive information). The viruses and trojans that the hackers use to deliver the keyloggers are designed to automatically avoid detection from all Anti-Virus and Anti-Malware programs, which is why every individual and company needs GuardedID.
"Our GuardedID Keystroke Encryption technology was designed to take a very different approach to protect an individual or corporate user, instead of trying to stop the malware from getting on your computer, GuardedID proactively encrypts each and every keystroke in real time, not giving the keylogging malware access to your keystrokes. We now have a number of deals with GuardedID rolled out over the next couple of months, which will greatly increase our revenues. Stay tuned," says Kay.
Our GuardedID v4 now comes in a "Standard" and "Premium" version, the Standard version now protects all five browsers (IE, FF, Chrome, Safari & Opera), while our Premium version protects the same five browsers as well as all other programs on your computer (i.e. MS Office, VPN clients, IM clients, tax and accounting programs, etc).
For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_StrikeForce.html
For more information: www.strikeforcetech.com
*****
THIS PRESS RELEASE, AND ALL MATERIAL PERTAINING TO SECURITYSOLUTIONSWATCH.COM AND SECURITYSTOCKWATCH.COM, ONLINE OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: http://securitysolutionswatch.com/Main/Terms_of_Use.html