NEW YORK, NY--(Marketwired - Sep 25, 2015) - Identiv (
AMAG Technology Launches Policy-Based Platform Symmetry CONNECT™
Symmetry CONNECT Helps Businesses Solve Security Challenges
AMAG Technology is proud to announce the expansion of its product line to include Symmetry CONNECT™. The enterprise-wide software platform helps large multi-site organizations to operate more efficiently -- mitigating risk, increasing safety, and reducing operating costs. AMAG Technology is an access control, video management and end-to-end security management system provider.
Symmetry CONNECT offers multi-site organizations an easy to use software solution that automates process so companies more efficiently use their security system to secure their facility and meet industry specific compliance and audit requirements. Symmetry CONNECT allows organizations to build sustainable policies and automate manual disjointed procedures reducing manual errors and labor intensive processes. Users can be up and running the same day with the hosted solution, and there are no long term contracts or commitments to make. The flexible policy-based software platform easily expands or contracts as business needs dictate.
"Businesses are suffering from rapid global growth and consolidation which means more disparate security systems, data and manual disjointed growth while striving to meet regulatory and compliance requirements," said AMAG Technology, President Matt Barnette. "Symmetry CONNECT automates manual processes thereby eliminating errors, streamlining data, minimizing risk and reducing cost to help companies meet audit and compliance requirements and provide a more secure environment."
For more information, please click here, or here: http://www.amag.com/news/SConnect.aspx
For our complete interview with Matt Barnette, President, AMAG, please click here or here:
www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_MattBarnette.html.
For more information: www.AMAG.com
*****
Connect with Identiv and Cisco at the ASIS International 61st Annual Seminar and Exhibits, September 28 - 30, 2015, at Anaheim Convention Center, Anaheim, CA. Come and check out our new intelligent premises access control solution for a chance to win an Apple Watch! Identiv will also be providing demonstrations of its FICAM-compatible solution for the U.S. Federal government, as well as the latest Velocity 3.6 supporting IPV6.
Identiv and Cisco at Booth 621
Identiv and Cisco Systems, Inc. have teamed up to provide solutions for the IoE. At ASIS, Identiv will be debuting its next-generation, networked PACS solution that interacts with other IoE elements, such as Cisco Video Surveillance Manager (VSM) cameras and Cisco voice-over-IP (VoIP) telephony products. Learn more about the Identiv and Cisco partnership.
Request a Demo
Experience a demo by scheduling a meeting during ASIS... TO SCHEDULE NOW CLICK HERE, OR HERE: http://identiv.actonsoftware.com/acton/ct/3355/s-04c3-1509/Bct/l-0111/l-0111:5/ct2_0/1?sid=KbqmOs6cq
Identiv, Inc. (
Chronicled worked with Identiv Labs to develop a solution that validates each sneaker with innovative, high-security technology including NFC, Bluetooth, and digital certificates, integrated into a tamper proof SmartLabel. Chronicled joins more than 30 existing Identiv Labs customers who have partnered to bring their products to the Internet of Things (IoT).
"As a $1 billion market, collectible sneakers are at risk for rampant counterfeiting," said Maurizio Greco, Chronicled CTO. "To combat fakes and re-instill trust and confidence, Chronicled is working with Identiv to create a 100-percent authenticated consumer platform. We plan to expand the use of authentication to other premium consumer goods, combating the more than $250 billion in counterfeit goods sold globally each year."
The solution combines Identiv's expertise in identity verification through digital certificates and purpose-built secure hardware, establishing secure objects with a trusted SmartLabel for each item. Chronicled's identity for products is paired with a consumer mobile application, allowing users to check authenticity, track products as they are resold, and understand the full item history. The Chronicled platform will be supported by an open-source registry upon which developers, partners, and third parties can build.
"Consumers no longer trust a simple printed label as a basis of authenticity, reducing trust and confidence in brand names," said Jason Hart, Identiv CEO. "SmartLabels are the next evolution -- the appearance of the product is not adversely affected as the sensor is small and can be hidden -- and consumers can be confident that what they are purchasing, wearing, and reselling is authentic. We're excited to be partnering closely with Chronicled to deliver the complete solution."
Chronicled plans to launch its authenticated consumer platform utilizing SmartLabels near the end of 2015 and is initially targeting more than 15,000 pairs of sneakers.
*****
ImageWare Systems, Inc. (
Operational Highlights
- Awarded patents by the Canadian Intellectual Property Office and Patent Office of Australia for technology used in ImageWare's multi-modal Biometric Engine® product.
- Signed agreement with OnlineAuction.com to provide ImageWare's patented GoVerifyID® mobile biometric security software to 200,000 online auction members, beginning August 2015.
- Signed a three year licensing agreement with Lockheed Martin under which ImageWare will integrate its patented Biometric Engine into the Lockheed Martin cloud-based multimodal biometric IDHaystack® Identity as a Service Platform.
Management Commentary
"ImageWare's strategy to target large IT service providers and deliver security for their cloud and mobile customers remains on track," said Jim Miller, ImageWare's chairman and CEO. "Ultimately our model is dependent upon our partners, and we have formed very significant relationships with Fujitsu, TransUnion, CA Technologies, IBM, Deutsche Telekom, Agility, Extenua, and more recently, with Lockheed Martin and Online Auction. All of these partners have now moved from the testing to integration phase and some are even moving to the launch of aggressive marketing campaigns.
"These companies see and live in the same world as we do -- a world that saw 50% of all organizations experience some form of data breach in the last 12 months, with two-thirds of those breaches involving the compromise of pins and passwords. So we have the right products in the right place at precisely the right time. We believe that we are now at the start of large consumer adoption and that our technology will be front and center as that rollout commences."
For more information, please click here, or here: http://iwsinc.com/q2-revenues-up-81-to-1-7-million/
For our complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html
For more information: www.iwsinc.com
*****
Mr. Raj Samani, McAfee, EMEA CTO, told us, "If I utter the words cyber, what is the term that springs to mind? In most cases they will be negative, such as crime, espionage, war, etc. However the reality is that this is only one side of the coin, and one term that is often forgotten is opportunity. Technology has transformed every industry, every person, every section of society. We have to recognize this and maximize the opportunities for the benefit of each of us, but do so in a way that reduces the risk to a level we are all comfortable with."
For our complete interview with Mr. Raj Samani, McAfee, EMEA CTO, please click here
http://securitysolutionswatch.com/Interviews/in_Boardroom_McAfee.html
For more information: www.McAfee.com / NasdaqGS INTC
*****
INFOGRAPHIC: THE FIDO ECOSYSTEM
Author: Todd Thiemann
In our many conversations with organizations requiring strong authentication for mobile apps and across the mobile device ecosystem, we're often asked about the possibilities of FIDO. Yes, it starts with standards, but what are the actual use cases? Will there be a demand within specific vertical industries based on the security, privacy, compliance and usability challenges those industries face with authenticating consumers or employees today? We believe the answer to that question is a resounding "yes."
So we decided to create this infographic to show FIDO's versatility and usability in five key industries -- while re-stating what we mean when we say "Any Device. Any Application. Any Authenticator." We've certainly seen strong interest in the payment sector with our public deployments like AliPay and PayPal. We're also seeing strong interest for other use cases as well -- eHealth, Cloud Services, Online Commerce and Government services. The latter was recently in the spotlight with NSTIC/NIST and the United Kingdom Cabinet Office recently joining the FIDO Alliance.
We hope this infographic helps illuminate the FIDO value proposition for you and we look forward to hearing your feedback so we can make the next one even better!
For more information, please click here, or here: http://www.noknok.com/what-they-say/blog/infographic-fido-ecosystem, www.NokNok.com
***
Mr. Mark VanDover, President, Tyco Integrated Security, told us, "In the last six months, we've seen security technology changing the way businesses operate across multiple industries. For example, expanded use of RFID-enabled technologies is helping retailers identify and combat operational loss, deepen the customer experience and improve omni-channel operations. Additionally, in heavily regulated industries like food manufacturing and pharmaceuticals, we've seen physical security play a bigger role in ensuring standard compliance. On another level, since entering the small business market last fall, we've seen firsthand how affordable commercial-grade security solutions can make a difference for small business owners' bottom line."
For our complete interview with Mark VanDover, please click here: or here: www.securitystockwatch.com/Interviews/in_Boardroom_Tyco_MarkVanDover2.html. For more information: www.TycoIS.com
*****
StrikeForce Technologies... recently announced:
"On August 24, 2015, the Company entered into an asset purchase and licensing agreement with Cyber Safety, Inc., a New York corporation ("Cyber Safety") to license and retain an option to purchase the patents and Intellectual Property related to the GuardedID and MobileTrust software (the "Asset Purchase Agreement") for a purchase price of Nine Million Dollars ($9,000,000), which may be paid in the form of a promissory note due by and no later than September 30, 2020. Pursuant to the terms and conditions of the Asset Purchase Agreement, Cyber Safety will license and have the option to purchase the white label version of the "GuardedID" software for up to $120,000 of development and the MobileTrust software products. StrikeForce's license granted to Cyber Safety does not affect or impact existing distributor relationships. StrikeForce, directly and through its distribution channel, will maintain the right to sell in the retail space in perpetuity.
As a condition of the Asset Purchase Agreement, Cyber Safety will license the Malware Suite (as defined in the Asset Purchase Agreement) up to and until September 30, 2020. Pursuant to this license, Cyber Safety shall compensate the Company with fifteen percent (15%) of the net amount Cyber Safety receives (defined as the amount received by Cyber Safety from the sale or licensing of the Malware Suite), which amount may be increased to twenty percent (20%) under certain conditions, and is subject to reduction for commissions and support costs Cyber Safety will pay StrikeForce. In conjunction with the licensing, the Company has executed a Distributor and Reseller Agreement with Cyber Safety, dated August 24, 2015 (the "Distributor and Reseller Agreement").
In conjunction with the licensing and the option to purchase, Cyber Safety will loan the Company an aggregate of $300,000 (over a period of 120 days), of which an initial $75,000 has been provided. Cyber Safety, at its discretion, may loan to the Company up to an additional $150,000. Subject to certain conditions, the loan is repayable 365 days after the last loan disbursement with no interest or equity provided."
For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_StrikeForce.html.
For more information: www.strikeforcetech.com
*****
We are proud to be media sponsors of these important upcoming security events and trade shows...
ASIS International 61st Annual Seminar & Exhibits
Sept. 28, 2015 – Oct. 1, 2015
If you're in the security profession you can't afford to wait until next spring to discover the best solutions for your organization and find out what's new in the industry. Join us next week when 20,000+ operational and cyber security professionals descend on Anaheim for the ASIS International 61st Annual Seminar and Exhibits (ASIS 2015).
- Access to hundreds of solution providers, thousands of brands, and exciting new products and services
- Keynote presentations by renowned leaders Raymond W. Kelly on Tuesday, Sept. 29 and General Michael Hayden on Wednesday, Sept. 30
- Education program addressing the latest issues as well as best practices for protecting assets and mitigating risk. Choose from 200+ sessions and 25 tracks
- Endless opportunities to make meaningful connections and expand your professional network
Learn more and register at www.securityexpo.org. Onsite registration opens at noon on Sunday, Sept. 27.
*****
U.S. and Canadian border security leaders and private industry will gather October 27-28 in Detroit at the US/Canada Border Conference to discuss the Beyond the Border Action Plan; the one time and place each year where both countries discuss the current and future goals and initiatives in border security -- encompassing both security threats and the advancement of lawful trade and travel.
No other forum exists to provide local, state, provincial and federal agencies and industry with a comprehensive platform like this. And there's no better place to hear from and network with U.S. and Canadian policy-makers, law enforcement officials and procurement officers in border security.
2015 Speaker Highlights Include:
- Alan Bersin, Assistant Secretary, International Affairs/Chief Diplomatic Officer, U.S. Department of Homeland Security
- Mark S. Borkowski, Assistant Commissioner, Office of Technology Innovation and Acquisition, U.S. Customs and Border Protection
- Mike Cabana, Deputy Commissioner, Federal Policing, Royal Canadian Mounted Police
- François Guimont, Deputy Minister of Public Safety, Canada
- R. Gil Kerlikowske, Commissioner, U.S. Customs and Border Protection
- Linda Lizotte-MacPherson, President, Canada Border Services Agency
- Alejandro Mayorkas, Deputy Secretary, U.S. Department of Homeland Security
- Joe Oliver, Assistant Commissioner Technical Operations, Royal Canadian Mounted Police
- Sarah R. Saldaña, Director, U.S. Immigration and Customs Enforcement
For more information and to register visit: http://www.beyond-border.com
*****
Discover an exclusive analysis about Mobile Biometrics made by CARTES SECURE CONNEXIONS and based on Juniper Research datas.
CARTES SECURE CONNEXIONS 2015 will be held at the Paris-Nord Villepinte Exhibition Centre, from November 17 to 19, 2015. This 30th edition of the secure-connections sector's leading global event will showcase the world's most comprehensive range of Secure Payment, Connection and Identification solutions. Beyond the +400 international exhibitors, CARTES SECURE CONNEXIONS 2015 will offer over 140 conferences and 7 panel discussions, welcome more than 40 CEO speakers and host the internationally recognized SESAMES Awards.
Discover the conference track about Biometrics ID on Tuesday November 17 chaired by Michelle Whitfield from Biometrics Institute. What are the main obstacles of Biometrics in Finance? Who Is Doing What to Protect My Mobile Device Data and How? Those topics among others will be treated during this session.
Register and learn more about the conference programme: www.cartes.com
*****
Cloud Expo is the single show where delegates and technology vendors can meet to experience and discuss the entire world of the cloud.
Cloud Expo 2015 Silicon Valley, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, offers a vast selection technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies. The floor also features a Demo Theater that gives delegates the opportunity to get even closer to the technology they want to see and the people who offer it. http://www.cloudcomputingexpo.com/
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. Big Data Expo, November 3-5, 2015, at the Santa Clara Convention Center in Silicon Valley, is the place where you can see the technologies and use cases that are delivering Big Data to enterprise IT. Attend Big Data Expo and benefit from technical and strategic Breakout Sessions, General Sessions, Keynotes, Power Panels, and a large exhibition floor. http://www.bigdataexpo.net/
*****
The Cyber Security Summit, an exclusive one-day conference, will take place in Boston on October 21st. The event will connect C-Suite & Senior Level Executives responsible for protecting their companies' critical infrastructures with cutting-edge technology providers and renowned information security experts.
Thought leaders from The FBI, The NSA, Palo Alto Networks, Symantec, Intel Security, & many more will discuss threats, trends and available solutions.
Comprised of business meetings, as well as keynote presentations, panel discussions and networking opportunities, our Summit delivers the most efficient & effective way to connect business leaders with the latest cyber security solutions for their enterprises.
A catered breakfast, lunch, & cocktail reception are all included. For a limited time, executives can purchase full Summit passes for 50% off.
Standard price -- $250. Use Promo-code SSWBoston and pay only $125. Government Executives / Active Military pricing: $50.
Full event details: http://CyberSummitUSA.com
Keep your organization at the forefront of cyber security and most importantly, secure!
*****
Money20/20
October 25-28, 2015, The Venetian, Las Vegas, NV, United States
http://money2020.com/register, http://money2020.com/, Info@Money2020.com, Organizer Email: Rob@Money2020.com
Money20/20 is the largest global event enabling payments and financial services innovation for connected commerce at the intersection of mobile, retail, marketing services, data and technology. With 10,000+ attendees, including more than 1,000 CEOs, from over 3,000 companies and 75 countries, expected at its 2015 U.S. event, Money20/20 is critical to realizing the vision of disruptive ways in which consumers and businesses manage, spend and borrow money. The next Money20/20 will be held in Las Vegas, October 25-28, 2015, followed by Money20/20 Europe in Spring 2016.
*****
Nordic IT Security - 3rd November 2015, Stockholmsmässan, Sweden
Over 500 participants have already registered for this year's Nordic IT Security, taking place on November 3rd, 2015 at Stockholmsmässan, Sweden. This event is one of the biggest platforms for senior IT security professionals from across the Nordics and industry verticals. Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implementations of the latest technology showcased in the Exhibition Hall.
FREE tickets available (limited supply). Register here: www.nordicitsecurity.com/register-today
*****
THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.securitysolutionswatch.com/Main/Terms_of_Use.html.