NEW YORK, NY--(Marketwired - Oct 16, 2015) - Aware (
*****
"Most Casi Rusco Picture Perfect Access Control Systems were installed in the 1990s and have reached legacy status opening the door to potential security risks. AMAG Technology's Symmetry™ is futureproof and the world's most widely installed Access Control System. Symmetry is recognized for its ease of use and comprehensive feature set. AMAG has developed a new Symmetry Door Controller solution which allows plug-and-play swap outs to Symmetry for users of Picture Perfect, Secure Perfect™ and Facility Commander Wnx (FCWnx). Some of the largest Picture Perfect users around the world are already moving to Symmetry. This White Paper explains the thinking behind the solution and provides further information."
For AMAG's White Paper "Migrating to Symmetry from Legacy Casi-Rusco Access Control Systems" please click here or here: http://www.amag.com/uploads/Amag/White%20Papers/White%20Paper%20-%20Migrating%20to%20Symmetry%20from%20Legacy%20%20Casi%20Rusco%20final.pdf
And, for our complete interview with Matt Barnette, President, AMAG, please click here or here:
www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_MattBarnette.html. For more information: www.AMAG.com
*****
Mr. David Benini, VP of Marketing, Aware, told us, "Certisign is the largest certificate authority in Latin America, and is now introducing biometrics-as-services in Brazil through its new subsidiary, Certibio. Identity fraud prevention services are in high demand in Brazil and very synergistic with Certisign's current business. The new services aim to help Certibio customers reduce identity fraud by enabling them to use biometrics to thoroughly verify an applicant's identity information and ensure the integrity of their identity data. Biometrics collected in this process can then be used in the future to quickly verify the identities of individuals enrolled in the system. A wide variety of services and privileges can be better protected, including digital certificate issuance, healthcare, driver's licenses, telecom services, bank accounts, government services, and even registration of new companies. Aware has provided Certisign with the identity platform and much of the biometrics software used to build the sizable infrastructure needed to support thousands of endpoints, millions of users, and many millions of daily transactions."
For the complete interview with Mr. David Benini at Aware, please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Aware_Benini.html
*****
Mr. Ken Mills, Global Surveillance Strategy & Business Development, EMC, told us, "To address the changing surveillance data needs of organizations all over the world, EMC has built and continues to develop, validate, and document a robust portfolio of surveillance solutions built on a data lake architecture and offering an open platform, best-of-breed EMC Federation storage technologies, and an extensive partner ecosystem. Disparate data sources feed into a scalable surveillance storage layer comprising distributed, centralized, and cloud architectures, and are enhanced by over 21 tested and validated partner solutions built to simplify surveillance. Storage is the foundation layer of the data lake architecture. It must support an open platform capable of managing disparate data sets (from multiple devices) while addressing the challenge of scale head-on. There are three major surveillance architectures, and organizations must determine which is best suited to their size, requirements, and business objectives."
For the complete interview with Mr. Ken Mills at EMC, please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_EMC_Mills.html
*****
Mr. Carl Bradley, U.S. Navy (Ret.), Information Assurance & IT Security, Consulting & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks -- a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients' security posture must be agile and responsive to better defend against threats -- internal and external -- in addition to vulnerabilities, in order to mitigate their risk."
For the complete interview with Carl Bradley at HP, please click here, or here: http://securitysolutionswatch.com/Interviews/in_Boardroom_HP_CarlBradley.html
For more information:
Transform to the New Style of IT - HP Solutions for U.S. Public Sector
*****
ImageWare Systems, Inc. (
Operational Highlights
- Awarded patents by the Canadian Intellectual Property Office and Patent Office of Australia for technology used in ImageWare's multi-modal Biometric Engine® product.
- Signed agreement with OnlineAuction.com to provide ImageWare's patented GoVerifyID® mobile biometric security software to 200,000 online auction members, beginning August 2015.
- Signed a three year licensing agreement with Lockheed Martin under which ImageWare will integrate its patented Biometric Engine into the Lockheed Martin cloud-based multimodal biometric IDHaystack® Identity as a Service Platform.
Management Commentary
"ImageWare's strategy to target large IT service providers and deliver security for their cloud and mobile customers remains on track," said Jim Miller, ImageWare's chairman and CEO. "Ultimately our model is dependent upon our partners, and we have formed very significant relationships with Fujitsu, TransUnion, CA Technologies, IBM, Deutsche Telekom, Agility, Extenua, and more recently, with Lockheed Martin and Online Auction. All of these partners have now moved from the testing to integration phase and some are even moving to the launch of aggressive marketing campaigns.
"These companies see and live in the same world as we do -- a world that saw 50% of all organizations experience some form of data breach in the last 12 months, with two-thirds of those breaches involving the compromise of pins and passwords. So we have the right products in the right place at precisely the right time. We believe that we are now at the start of large consumer adoption and that our technology will be front and center as that rollout commences."
For more information, please click here, or here: http://iwsinc.com/q2-revenues-up-81-to-1-7-million/
For our complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html
For more information: www.iwsinc.com
*****
Identiv Releases Connected IOT Premises Access Control Solution With Its Global Partners
Identiv, Inc. (INVE) announced the launch of the Identiv Connected Physical Access Manager (ICPAM) solution. ICPAM is a distributed intelligent premises access control solution, providing state-of-the-art secure access to facilities using standards-based networking, and is backwards compatible for legacy wiring topologies and devices.
ICPAM software is tightly integrated with industry-leading Cisco technology, including routers, switches, Cisco Video Surveillance Manager, and Cisco IP Telephony. ICPAM has a low cost of ownership and provides all the functionality of comparable proprietary systems while offering superior security and deployment options by using standard network topology. ICPAM becomes part of an organization's intelligent information network, allowing monitoring and information exchange between devices as an intelligent platform that grows as an organization requires it.
The ICPAM solution includes a Power over Ethernet (POE)-enabled local door controller, state-of-the-art multi-frequency door reader and sensor, and management software. ICPAM is an overall premises monitoring, intrusion, remote VoIP guard, and access solution suitable for organizations of all sizes with single or multiple locations and geographies. The ICPAM solution is available immediately through Cisco Authorized Technology Provider (ATP) Partners.
"ICPAM finally bridges the gap for our customers to unify and manage both physical and logical access control solutions," said Ted Alben, Dimension Data Practice Manager, IoT. "Since all of the components are integrated with Cisco's world class security portfolio, ICPAM provides a win-win model, and all from a single vendor."
"IoE is the future and it's happening now," said Stephen Lurie, Zones Vice President IoT Solutions. "IP-connected devices, unified security operations, and sharing -- that's where access management is headed. With ICPAM, we can help fulfill our customers' evolving needs."
"With ICPAM, we get the security we expect and the Cisco integration we need," said David Pelkey, Presidio Director, Business Development. "As buildings become more intelligent, ICPAM provides a crossover to industry open standards that leverages network infrastructure with the lowest cost of ownership."
"Premises solutions are evolving from proprietary bespoke systems to becoming part of an interconnected environmental ecosystem. ICPAM is an access management solution that provides a platform that connects and collects information from an array of Internet of Things (IoT) devices and sensors," said Jason Hart, Identiv President.
For further information, please visit identiv.com/icpam.
*****
Route1 Inc. (
Tony Busseri, Route1's CEO, said, "Q3 was a very successful quarter for Route1. We achieved a record number of subscribers, subscriber based revenue and average revenue per subscriber. We are continuing to increase our customer and user count among government agencies. Our success with some of the most security conscious organizations in the world is the ultimate seal of approval for our MobiKEY technology and is serving to attract customers in the broader corporate marketplace who are recognizing the business necessity of secure mobile access on demand."
Brian Brunetti, Route1 President, said, "We are seeing greater recognition of the importance of fully securing authentication for all enterprise users, especially as it pertains to mobile devices. According to a recent study from Intel Security, internal corporate employees account for 43% of data loss, and the majority of these breach incidents are accidental, stemming from improper access protocols. Additionally, Trend Micro recently found that 41% of all breaches are the result of lost or stolen mobile devices. Failing to secure sensitive data in a mobile environment can lead to serious legal consequences for enterprises, as evidenced by a U.S. District Court's recent green light on a class action lawsuit brought against Coca-Cola as a result of lost company laptops resulting in a breach of sensitive employee information. These and countless other incidents are forcing business leaders to realize that data security is not only a technology issue, but also a boardroom issue of the highest importance."
For the complete Route1 Q3 Operations Update and Press Release, please click here, or here: https://www.route1.com/investors/press-releases/item/756-route1-provides-q3-operations-update.html
And, for our complete interview with Mr. Brian Brunetti, President, Route1, please click here, or here http://securitysolutionswatch.com/Interviews/in_Boardroom_Route1_Brunetti.html
Route1 also recently announced that, "Fasken Martineau Turns to MobiKEY to Deliver Secure Mobile Access."
For more information: www.Route1.com / TSX VENTURE:ROI
Download the MobiKEY Technology Overview, please click here, or here: https://www.route1.com/mobikey-technology-overview.html
*****
StrikeForce Technologies....recently announced:
"On August 24, 2015, the Company entered into an asset purchase and licensing agreement with Cyber Safety, Inc., a New York corporation ("Cyber Safety") to license and retain an option to purchase the patents and Intellectual Property related to the GuardedID and MobileTrust software (the "Asset Purchase Agreement") for a purchase price of Nine Million Dollars ($9,000,000), which may be paid in the form of a promissory note due by and no later than September 30, 2020. Pursuant to the terms and conditions of the Asset Purchase Agreement, Cyber Safety will license and have the option to purchase the white label version of the "GuardedID" software for up to $120,000 of development and the MobileTrust software products. StrikeForce's license granted to Cyber Safety does not affect or impact existing distributor relationships. StrikeForce, directly and through its distribution channel, will maintain the right to sell in the retail space in perpetuity.
As a condition of the Asset Purchase Agreement, Cyber Safety will license the Malware Suite (as defined in the Asset Purchase Agreement) up to and until September 30, 2020. Pursuant to this license, Cyber Safety shall compensate the Company with fifteen percent (15%) of the net amount Cyber Safety receives (defined as the amount received by Cyber Safety from the sale or licensing of the Malware Suite), which amount may be increased to twenty percent (20%) under certain conditions, and is subject to reduction for commissions and support costs Cyber Safety will pay StrikeForce. In conjunction with the licensing, the Company has executed a Distributor and Reseller Agreement with Cyber Safety, dated August 24, 2015 (the "Distributor and Reseller Agreement").
In conjunction with the licensing and the option to purchase, Cyber Safety will loan the Company an aggregate of $300,000 (over a period of 120 days), of which an initial $75,000 has been provided. Cyber Safety, at its discretion, may loan to the Company up to an additional $150,000. Subject to certain conditions, the loan is repayable 365 days after the last loan disbursement with no interest or equity provided."
For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_StrikeForce.html.
For more information: www.strikeforcetech.com
*****
We are proud to be media sponsors of these important upcoming security events and trade shows...
U.S. and Canadian border security leaders and private industry will gather October 27-28 in Detroit at the US/Canada Border Conference to discuss the Beyond the Border Action Plan; the one time and place each year where both countries discuss the current and future goals and initiatives in border security -- encompassing both security threats and the advancement of lawful trade and travel.
For more information and to register visit: http://www.beyond-border.com
*****
CARTES SECURE CONNEXIONS 2015 will be held at the Paris-Nord Villepinte Exhibition Centre, from November 17 to 19, 2015. This 30th edition of the secure-connections sector's leading global event will showcase the world's most comprehensive range of Secure Payment, Connection and Identification solutions. Beyond the +400 international exhibitors, CARTES SECURE CONNEXIONS 2015 will offer over 140 conferences and 7 panel discussions, welcome more than 40 CEO speakers and host the internationally recognized SESAMES Awards.
Register and learn more about the conference programme: www.cartes.com
*****
Cloud Expo is the single show where delegates and technology vendors can meet to experience and discuss the entire world of the cloud.
Cloud Expo 2015 Silicon Valley, November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, offers a vast selection of technical and strategic Industry Keynotes, General Sessions, Breakout Sessions, and signature Power Panels. The exhibition floor features 100+ exhibitors offering specific solutions and comprehensive strategies. The floor also features a Demo Theater that gives delegates the opportunity to get even closer to the technology they want to see and the people who offer it. http://www.cloudcomputingexpo.com/
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. Big Data Expo, November 3-5, 2015, at the Santa Clara Convention Center in Silicon Valley, is the place where you can see the technologies and use cases that are delivering Big Data to enterprise IT. Attend Big Data Expo and benefit from technical and strategic Breakout Sessions, General Sessions, Keynotes, Power Panels, and a large exhibition floor. http://www.bigdataexpo.net/
*****
The Cyber Security Summit, an exclusive one-day conference, will take place in Boston on October 21st. The event will connect C-Suite & Senior Level Executives responsible for protecting their companies' critical infrastructures with cutting-edge technology providers and renowned information security experts.
Thought leaders from The FBI, The NSA, Palo Alto Networks, Symantec, Intel Security, & many more will discuss threats, trends and available solutions. Comprised of business meetings, as well as keynote presentations, panel discussions and networking opportunities, our Summit delivers the most efficient & effective way to connect business leaders with the latest cyber security solutions for their enterprises. A catered breakfast, lunch, & cocktail reception are all included. For a limited time, executives can purchase full Summit passes for 50% off. Standard price: $250. Use Promo-code SSWBoston and pay only $125. Government Executives / Active Military pricing: $50. Full event details: http://CyberSummitUSA.com Keep your organization at the forefront of cyber security and most importantly, secure!
*****
Money20/20
October 25-28, 2015, The Venetian, Las Vegas, NV, United States
http://money2020.com/register, http://money2020.com/, Info@Money2020.com, Organizer Email: Rob@Money2020.com
Money20/20 is the largest global event enabling payments and financial services innovation for connected commerce at the intersection of mobile, retail, marketing services, data and technology. With 10,000+ attendees, including more than 1,000 CEOs, from over 3,000 companies and 75 countries, expected at its 2015 U.S. event, Money20/20 is critical to realizing the vision of disruptive ways in which consumers and businesses manage, spend and borrow money. The next Money20/20 will be held in Las Vegas, October 25-28, 2015, followed by Money20/20 Europe in Spring 2016.
*****
Nordic IT Security - 3rd November 2015, Stockholmsmässan, Sweden
Over 500 participants have already registered for this year's Nordic IT Security, taking place on November 3rd, 2015 at Stockholmsmässan, Sweden. This event is one of the biggest platforms for senior IT security professionals from across the Nordics and industry verticals. Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implementations of the latest technology showcased in the Exhibition Hall. FREE tickets available (limited supply). Register here: www.nordicitsecurity.com/register-today
*****
IMPERIAL CAPITAL SECURITY INVESTOR CONFERENCE
December 9-10, 2015, Waldorf Astoria New York
OVERVIEW
Imperial Capital is pleased to host its 12th Annual Security Investor Conference (SIC) on December 9-10, 2015, at the Waldorf Astoria New York. SIC is the industry's leading conference that brings together a select group of companies to present their positioning and strategic growth plans to an audience of key investors and business leaders. Whether your firm specializes in cutting edge technologies or more traditional security systems and services, you will have the opportunity to listen to, and network with, the leaders of companies delivering the latest compelling security solutions across Government, Consumer and Enterprise markets.
CONFERENCE HIGHLIGHTS
- Presentations: 25 minute presentations from more than 65 leading public and privately held security companies presenting to an audience regularly exceeding 400
- One-On-One Meetings: Private meetings between management teams and investors
- Panel Discussions & Lunch Program: Featured speakers providing the latest information in the security industry
- Networking Opportunities: SIC is a perfect place to build a professional network, find business partners, generate new ideas, and learn from companies that impact your business
SEE THE LIST OF PRESENTING COMPANIES - PLEASE CLICK HERE, or here: http://imperialcapital-sic.com/presenters-2/
For additional information on SIC, please visit our website or call (310) 246-3658.
*****
THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.securitysolutionswatch.com/Main/Terms_of_Use.html.
*****