NEW YORK, NY--(Marketwired - Nov 10, 2015) - Aware (
*****
Mr. Matt Barnette, President, AMAG, told us, "We are moving ahead with our strategy to be known globally as the premier solution provider for Security Management Systems. Our focus will be on grass-roots efforts to increase brand recognition, hiring the best people to provide our creed of exceptional customer service and developing futuristic products that solve customer's sometimes complex, sometimes basic, security management needs. We have support throughout North America from our sister G4S companies to assist and provide expertise where needed, and the vision and resources to make our goals a reality. With Symmetry, Symmetry CompleteView VMS and Symmetry CONNECT, AMAG's powerful trifecta product offering, our customer get everything from ONE company and for a lot less than what our competitors are offering."
And, for our complete interview with Matt Barnette, President, AMAG, please click here or here:
www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_MattBarnette.html. For more information: www.AMAG.com
*****
Mr. David Benini, VP of Marketing, Aware, told us, "Certisign is the largest certificate authority in Latin America, and is now introducing biometrics-as-services in Brazil through its new subsidiary, Certibio. Identity fraud prevention services are in high demand in Brazil and very synergistic with Certisign's current business. The new services aim to help Certibio customers reduce identity fraud by enabling them to use biometrics to thoroughly verify an applicant's identity information and ensure the integrity of their identity data. Biometrics collected in this process can then be used in the future to quickly verify the identities of individuals enrolled in the system. A wide variety of services and privileges can be better protected, including digital certificate issuance, healthcare, driver's licenses, telecom services, bank accounts, government services, and even registration of new companies. Aware has provided Certisign with the identity platform and much of the biometrics software used to build the sizable infrastructure needed to support thousands of endpoints, millions of users, and many millions of daily transactions."
For the complete interview with Mr. David Benini at Aware, please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Aware_Benini.html
*****
Mr. Ken Mills, Global Surveillance Strategy & Business Development, EMC, told us, "To address the changing surveillance data needs of organizations all over the world, EMC has built and continues to develop, validate, and document a robust portfolio of surveillance solutions built on a data lake architecture and offering an open platform, best-of-breedEMC Federation storage technologies, and an extensive partner ecosystem. Disparate data sources feed into a scalable surveillance storage layer comprising distributed, centralized, and cloud architectures, and are enhanced by over 21 tested and validated partner solutions built to simplify surveillance. Storage is the foundation layer of the data lake architecture. It must support an open platform capable of managing disparate data sets (from multiple devices) while addressing the challenge of scale head-on. There are three major surveillance architectures, and organizations must determine which is best suited to their size, requirements, and business objectives."
For the complete interview with Mr. Ken Mills at EMC, please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_EMC_Mills.html
*****
Mr. George Romas, Technical Director, HP Enterprise Services, U.S. Public Sector, told us, "The current atmosphere of porous government networks and unprotected information is demanding attention from government leaders and CIOs. The idea of a cybersecurity sprint seems to have been a decent approach to jumpstarting efforts to improve security. However, this top-down approach does not adequately address the variety of issues that lead to compromise of government networks, including cyber terrorism, cybercrime, and hacktivism. The Cyber Sprint had four specific goals: for DHS to share priority threat-actor Techniques, Tactics and Procedures (TTPs); immediately patch critical vulnerabilities on a weekly basis; improve controls and governing policies on privileged users; accelerate implementation of multi-factor authentication. While these short-term measures are adequate for improved security, they are not nearly sufficient because software does not exist in a vacuum; you must also consider vulnerabilities of the overall design of the architecture and platform."
For the complete interview with Carl Bradley at HP, please click here, or here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_Romas2.html
*****
Mr. Phil Hartstein, President & CEO, Finjan Holdings, told us, "As we look ahead to the emergence of the Internet of Things (IoT), experts estimate that there will be 20-50 billion devices connected to the internet. All of these IoT devices are nothing more that miniature computers with internet access. More devices connected to the internet could lead to more ways for an intelligent hacker to gather data and personal information or even as a gateway to larger hacking prizes. Protecting the networks and devices that use these services and carry data will become increasingly vital since decision making in the evolving IoT world is often done without human intervention."
For our complete interview with Mr. Phil Hartstein, President & CEO, Finjan Holdings, please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Finjan_Hartstein.html
In other recent news: Finjan Provides Litigation Update in Palo Alto Networks and Symantec Cases, please click here: www.finjan.com/news-media/press-releases/detail/620/finjan-provides-litigation-update-in-palo-alto-networks-and
US PTAB Denies Sophos' Petitions for Inter Partes Review of Finjan's '494 and '926 Patents; Litigation Continues With All Eight Patents, please click here: www.finjan.com/news-media/press-releases/detail/617/us-ptab-denies-sophos-petitions-for-inter-partes-review-of
For more information: www.Finjan.com / NASDAQ: FNJN
*****
Extenua, a pioneering developer of enterprise security software that simplifies the use and access of ubiquitous cloud storage, and Imageware Systems, Inc. (OTC: IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, announced that their strategic partnership has gone live on Amazon Web Services. Several U.S. federal agencies and American Systems Corporation have signed up as initial users of the joint product.
The partnership was formed to combine Extenua's award-winning Cloud2Drive™ storage product with ImageWare's patented mobile, multi-modal biometric GoVerifyID® product. Cloud2Drive client software coupled with GoVerifyID puts cloud storage to work with the virtual drive cluster file system, SAFE AITM. This includes the industry's most hardened encryption system and ImageWare's mobile application that provides out-of-band biometric authentication from any mobile device. Together, they create the first and only end-to-end secure cloud storage platform for office and mobile devices.
"Extenua's Cloud2Drive makes shared cloud storage secure, easily accessible and simple to deploy, regardless of the enterprise's existing cloud storage provider," said Steve Visconti, CEO of Extenua. "Security is a challenge for enterprises, both large and small, and many would like to take advantage of a productive and secure cloud storage solution for their mobile workforce. We now offer the best encryption techniques and multi-modal biometric identity management software to address this challenge and provide an unprecedented level of security to companies utilizing cloud storage, whether it is public, private, or hybrid."
"Cloud2Drive, with integrated out-of-band biometric identification, represents a new level of highly secure platforms required for today's cloud and on-premise storage networks," said Tom Suder, Mobilegov's President. "Combining Cloud2Drive and ImageWare GoVerifyID into a single platform plays an important role in countering threats to our cyber networks."
Cloud2Drive has been designed from the ground up to provide enterprises a controlled, secure and easy access solution for their cloud data by delivering critical, high-value features, including:
- Cloud2Drive allows users to see and use their cloud storage like it's a local hard disk drive, for quick learnability. With an easy set up wizard, users can access cloud storage in minutes. Cloud2Drive runs on most Windows platforms, such as Android, iOS, Linux, and MAC OSX. It can also manage the complexities that arise with most back-end multi-cloud support structures offered from cloud vendors, such as Amazon S3, Microsoft Azure, Fujitsu GCP/LCP, IBM Softlayer, Rackspace, WebDAV, SFTP, and many others.
- Administrators can aggregate multiple cloud services in the back-end and present them as one virtual drive or many virtual drives to the user's device. Aggregated cloud services offers maximum flexibility and can deliver more capacity, mirrored RAID 1 type high-availability and fault-tolerance, or as a migration tool from one cloud vendor to the next without interruption of service.
- Cloud2Drive is 100% enterprise ready. It allows multiple users to access the same files and can prevent multiple users from accidentally corrupting a file if they access it at the same time.
- Cloud2Drive uses the most accurate artificial intelligence in order to predict what files a user will need, then it caches and encrypts these files locally so the user can work offline.
- Local encryption, independent of the cloud provider, is a crucial feature of strong security. The administrator controls the encryption key, so not even the cloud provider can access the organization's data. This control exceeds HIPAA and PCI compliance standards.
- Cloud2Drive is very flexible and allows online access, anywhere, without the need for creating VPNs, gateways, or other bottlenecks that can be a single point of failure. This is perfect for public, private, and hybrid cloud solutions.
ImageWare's out-of-band biometric authentication product, GoVerifyID, delivers patented, advanced fraud-prevention capabilities to organizations. Biometric authentication, which includes voice, eye, signature, fingerprint and facial recognition, provides an additional layer of security and fraud defense to enterprise cloud storage users.
"Cloud2Drive is already a 'best-in-class' cloud storage product, and the addition of GoVerifyID and multi modal biometrics has now made it even better by adding both security and ease of use features," said Jim Miller, chairman and CEO of ImageWare. "We are pleased to partner with Extenua to make biometric authentication available to the cloud storage market. Together, we provide the most advanced level of data security the industry has been looking for."
For more information, please click here, or here: http://iwsinc.com/extenua-and-imageware-launch-cloud2drive-on-amazon-web-services/
For our complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html
For more information: www.iwsinc.com
*****
Identiv Releases Connected IOT Premises Access Control Solution With Its Global Partners
Identiv, Inc. (INVE) recently announced the launch of the Identiv Connected Physical Access Manager (ICPAM) solution. ICPAM is a distributed intelligent premises access control solution, providing state-of-the-art secure access to facilities using standards-based networking, and is backwards compatible for legacy wiring topologies and devices.
ICPAM software is tightly integrated with industry-leading Cisco technology, including routers, switches, Cisco Video Surveillance Manager, and Cisco IP Telephony. ICPAM has a low cost of ownership and provides all the functionality of comparable proprietary systems while offering superior security and deployment options by using standard network topology. ICPAM becomes part of an organization's intelligent information network, allowing monitoring and information exchange between devices as an intelligent platform that grows as an organization requires it.
The ICPAM solution includes a Power over Ethernet (POE)-enabled local door controller, state-of-the-art multi-frequency door reader and sensor, and management software. ICPAM is an overall premises monitoring, intrusion, remote VoIP guard, and access solution suitable for organizations of all sizes with single or multiple locations and geographies. The ICPAM solution is available immediately through Cisco Authorized Technology Provider (ATP) Partners.
"ICPAM finally bridges the gap for our customers to unify and manage both physical and logical access control solutions," said Ted Alben, Dimension Data Practice Manager, IoT. "Since all of the components are integrated with Cisco's world class security portfolio, ICPAM provides a win-win model, and all from a single vendor."
"IoE is the future and it's happening now," said Stephen Lurie, Zones Vice President IoT Solutions. "IP-connected devices, unified security operations, and sharing -- that's where access management is headed. With ICPAM, we can help fulfill our customers' evolving needs."
"With ICPAM, we get the security we expect and the Cisco integration we need," said David Pelkey, Presidio Director, Business Development. "As buildings become more intelligent, ICPAM provides a crossover to industry open standards that leverages network infrastructure with the lowest cost of ownership."
"Premises solutions are evolving from proprietary bespoke systems to becoming part of an interconnected environmental ecosystem. ICPAM is an access management solution that provides a platform that connects and collects information from an array of Internet of Things (IoT) devices and sensors," said Jason Hart, Identiv President.
For further information, please visit identiv.com/icpam.
**********
Nok Nok Labs, an innovator in modern authentication and a founding member of the FIDO Alliance, recently announced the launch of its latest version of the Nok Nok™ S3 Authentication Suite, the first unified platform enabling organizations to use standards-based authentication that supports existing and emerging methods of biometric authentication. The Nok Nok S3 Authentication Suite is ideal for organizations deploying customer-facing applications that require Internet scale authentication supporting the latest mobile devices with biometric authentication. This updated version provides improved user/customer engagement, stronger security leveraging the FIDO Universal Authentication Framework (UAF), lower costs associated with authentication, and enhanced privacy.
With this announcement, Nok Nok Labs addresses the growing trend of mobile device manufacturers embedding biometrics and security modules, including native support in platforms that include iOS 9 and Android Marshmallow. The Nok Nok S3 Authentication Suite is a FIDO Certified™ solution enabling simple, strong and scalable authentication for organizations with Internet-scale mobile applications and web properties, while also providing "future-proofing" with forward compatibility to future authentication methods that support FIDO specifications.
"With the continued high-profile data breaches and the growing diversity of devices and users that relying parties need to support, the evidence continues to build that mobile authentication must evolve beyond today's password-centric framework," said Phillip Dunkelberger, President and CEO of Nok Nok Labs. "As a founding member of the FIDO Alliance, we recognize the demand in the market for a unified solution that allows a more secure, yet simpler experience across heterogeneous devices, services and operating systems. With this latest release of our Nok Nok S3 Authentication Suite, we are delivering omnichannel authentication that enables organizations to better engage their customers and quickly leverage the latest biometric innovations."
For more information, please click here, or here: https://www.noknok.com/what-they-say/press-releases/nok-nok-labs-delivers-vision-omnichannel-mobile-authentication
For the complete interview with Mr. Ramesh Kesanupalli, Founder of Nok Nok Labs, www.noknok.com, Founding Member Fido Alliance please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_NokNok_Ramesh.html
**********
Route1 Inc. (
Tony Busseri, Route1's CEO, said, "Q3 was a very successful quarter for Route1. We achieved a record number of subscribers, subscriber based revenue and average revenue per subscriber. We are continuing to increase our customer and user count among government agencies. Our success with some of the most security conscious organizations in the world is the ultimate seal of approval for our MobiKEY technology and is serving to attract customers in the broader corporate marketplace who are recognizing the business necessity of secure mobile access on demand."
Brian Brunetti, Route1 President, said, "We are seeing greater recognition of the importance of fully securing authentication for all enterprise users, especially as it pertains to mobile devices. According to a recent study from Intel Security, internal corporate employees account for 43% of data loss, and the majority of these breach incidents are accidental, stemming from improper access protocols. Additionally, Trend Micro recently found that 41% of all breaches are the result of lost or stolen mobile devices. Failing to secure sensitive data in a mobile environment can lead to serious legal consequences for enterprises, as evidenced by a U.S. District Court's recent green light on a class action lawsuit brought against Coca-Cola as a result of lost company laptops resulting in a breach of sensitive employee information. These and countless other incidents are forcing business leaders to realize that data security is not only a technology issue, but also a boardroom issue of the highest importance."
For the complete Route1 Q3 Operations Update and Press Release, please click here, or here: https://www.route1.com/investors/press-releases/item/756-route1-provides-q3-operations-update.html
And, for our complete interview with Mr. Brian Brunetti, President, Route1, please click here, or here
http://securitysolutionswatch.com/Interviews/in_Boardroom_Route1_Brunetti.html
Route1 also recently announced that, "Fasken Martineau Turns to MobiKEY to Deliver Secure Mobile Access."
For more information: www.Route1.com / TSX VENTURE:ROI
Download the MobiKEY Technology Overview, please click here, or here: https://www.route1.com/mobikey-technology-overview.html
*****
StrikeForce Technologies....recently announced:
"On August 24, 2015, the Company entered into an asset purchase and licensing agreement with Cyber Safety, Inc., a New York corporation ('Cyber Safety') to license and retain an option to purchase the patents and Intellectual Property related to the GuardedID and MobileTrust software (the 'Asset Purchase Agreement') for a purchase price of Nine Million Dollars ($9,000,000), which may be paid in the form of a promissory note due by and no later than September 30, 2020. Pursuant to the terms and conditions of the Asset Purchase Agreement, Cyber Safety will license and have the option to purchase the white label version of the 'GuardedID' software for up to $120,000 of development and the MobileTrust software products. StrikeForce's license granted to Cyber Safety does not affect or impact existing distributor relationships. StrikeForce, directly and through its distribution channel, will maintain the right to sell in the retail space in perpetuity.
As a condition of the Asset Purchase Agreement, Cyber Safety will license the Malware Suite (as defined in the Asset Purchase Agreement) up to and until September 30, 2020. Pursuant to this license, Cyber Safety shall compensate the Company with fifteen percent (15%) of the net amount Cyber Safety receives (defined as the amount received by Cyber Safety from the sale or licensing of the Malware Suite), which amount may be increased to twenty percent (20%) under certain conditions, and is subject to reduction for commissions and support costs Cyber Safety will pay StrikeForce. In conjunction with the licensing, the Company has executed a Distributor and Reseller Agreement with Cyber Safety, dated August 24, 2015 (the 'Distributor and Reseller Agreement').
In conjunction with the licensing and the option to purchase, Cyber Safety will loan the Company an aggregate of $300,000 (over a period of 120 days), of which an initial $75,000 has been provided. Cyber Safety, at its discretion, may loan to the Company up to an additional $150,000. Subject to certain conditions, the loan is repayable 365 days after the last loan disbursement with no interest or equity provided."
For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_StrikeForce.html.
For more information: www.strikeforcetech.com
We are proud to be media sponsors of these important upcoming security events and trade shows...
CARTES
CARTES SECURE CONNEXIONS 2015 will be held at the Paris-Nord Villepinte Exhibition Centre, from November 17 to 19, 2015. This 30th edition of the secure-connections sector's leading global event will showcase the world's most comprehensive range of Secure Payment, Connection and Identification solutions. Beyond the +400 international exhibitors, CARTES SECURE CONNEXIONS 2015 will offer over 140 conferences and 7 panel discussions, welcome more than 40 CEO speakers and host the internationally recognized SESAMES Awards.
Register and learn more about the conference programme: www.cartes.com
*****
IMPERIAL CAPITAL SECURITY INVESTOR CONFERENCE
December 9-10, 2015, Waldorf Astoria New York
REGISTER NOW
OVERVIEW
Imperial Capital is pleased to host its 12th Annual Security Investor Conference (SIC) on December 9-10, 2015, at the Waldorf Astoria New York. SIC is the industry's leading conference that brings together a select group of companies to present their positioning and strategic growth plans to an audience of key investors and business leaders. Whether your firm specializes in cutting edge technologies or more traditional security systems and services, you will have the opportunity to listen to, and network with, the leaders of companies delivering the latest compelling security solutions across Government, Consumer and Enterprise markets.
CONFERENCE HIGHLIGHTS
- Presentations: 25 minute presentations from more than 65 leading public and privately held security companies presenting to an audience regularly exceeding 400
- One-On-One Meetings: Private meetings between management teams and investors
- Panel Discussions & Lunch Program: Featured speakers providing the latest information in the security industry
- Networking Opportunities: SIC is a perfect place to build a professional network, find business partners, generate new ideas, and learn from companies that impact your business
SEE THE LIST OF PRESENTING COMPANIES - PLEASE CLICK HERE, or here: http://imperialcapital-sic.com/presenters-2/
For additional information on SIC, please visit our website or call (310) 246-3658.
*****
The leading IT companies are seeking qualified Security Cleared professionals who hold who hold an active security clearance this November in Maryland 11/10 and Virginia 11/12! Interview for 100's of positions with the industry's top Defense, Government & IT employers. For more information on registration, exhibiting & attending TECHEXPO visit: www.TechExpoUSA.com
Are you a Cyber Warrior & seeking a new employment opportunity? Don't miss TECHEXPO's Cyber Security Job Fair taking place on November 17th in Vienna, VA. Security Clearance Not Required. For more information on registration, exhibiting & attending any TECHEXPO event visit: https://www.TechExpoUSA.com
*****
THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.securitysolutionswatch.com/Main/Terms_of_Use.html.
*****