23:54:46 EDT Fri 19 Apr 2024
Enter Symbol
or Name
USA
CA



Security Thought Leaders at AMAG, Cisco, HP, Identiv, ImageWare Systems and Nok Nok Labs, SRC, StrikeForce, and Tyco Are Featured on SecuritySolutionsWatch.com

2015-07-07 00:01 ET - News Release

NEW YORK, NY -- (Marketwired) -- 07/07/15

ImageWare Systems, Inc. (OTCQB: IWSY); Identiv (NASDAQ: INVE); StrikeForce Technologies, Inc. (OTC PINK: SFOR)

AMAG Technology

AMAG recently issued a SYMMETRY WHITE PAPER "Support for Critical Infrastructure Protection (CIP) Cyber Security Standards"

"The Symmetry security management system from AMAG Technology is used by a large number of electric energy generation and distribution companies. This white paper has highlighted areas within the NERC Critical Infrastructure Protection Cyber Security Standards where the Symmetry system supports the efforts of the Responsible Entity in securing the physical perimeter of their facility. Furthermore, being a cyber-asset (server and workstation) itself, the PACS inherently supports the features necessary to facilitate the RE policies, procedures, and documentation requirements.

"Some of the CIP requirements and/or TWIC support necessitate specific implementations of the Symmetry system. If Symmetry has not been installed in a way to support the efforts of the local Responsible Entity, AMAG Technology is available to assist in your efforts to become compliant with the regulations. AMAG Technology has Regional Sales Managers, Regional Sales Engineers, and Technical Support ready to assist with your security challenges."

For our complete interview with Matt Barnette, President, AMAG, please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_MattBarnette.html. For more information: www.AMAG.com

*****

Cisco

Mr. Christian Matthews, Director of Product Management for IoT Software, Cisco, told us, "Simply monitoring high-value assets provides a general example. Video surveillance combined with other sensor output such as audio, motion, or building contacts is used to increase protection and monitor assets without constant human supervision. Threats of incidents are detected and the risks mitigated by alerting personnel or automatically initiating preventative actions. When combined with advance video analytics, benefits continue to grow. At the University of San Francisco (USF), IP cameras and the Cisco Video Surveillance Manager deliver facial recognition to detect when unauthorized individuals enter an area and then notify appropriate staff. Dallas Area Rapid Transit (DART) use Cisco's IoT Physical Security solutions to increase effectiveness of the transit police. With better intelligence, first responders and their associated operations teams have increased productivity substantially. They have done this at scale with a centralized command center managing more than 1700 remotely deployed IP cameras. Recently the system has been extended across busses and emergency response vehicles."

For the complete interview with Christian Matthews at Cisco, please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Cisco_Matthews.html

For more information:
Connected Safety and Security (http://www.cisco.com/c/en/us/products/physical-security/index.html)
Cisco Case Studies (http://www.cisco.com/c/en/us/products/physical-security/customer-case-study.html)

*****

HP Enterprise Services

Mr. Carl Bradley, U.S. Navy (Ret.), Information Assurance & IT Security, Consulting & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks -- a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients' security posture must be agile and responsive to better defend against threats -- internal and external -- in addition to vulnerabilities, in order to mitigate their risk."

For the complete interview with Carl Bradley at HP, please click here, or here: http://securitysolutionswatch.com/Interviews/in_Boardroom_HP_CarlBradley.html

For more information:
Transform to the New Style of IT - HP Solutions for U.S. Public Sector

*****

Identiv

Identiv, Inc. (NASDAQ: INVE) has been awarded four U.S. patents by the United States Patent and Trademark Office (USPTO) for its NFC, mobile and security inventions. Identiv has a strong intellectual property (IP) portfolio of more than 75 patents, granted and pending.

"Google and Apple are continuing to drive Near Field Communication (NFC) and Bluetooth Low Energy (BLE) compatibility within mobile handsets targeted at the payment and advertising markets. This nearly universal technology furthers Identiv's objective of allowing people to use their mobile devices to interact with physical objects and sensors with touch or presence," said Matthew Herscovitch, CTO of Identiv. "These patents validate our innovative approach to solving the problems of privacy and security in the connected world, especially for mobile NFC devices as they interact with the Internet of Things (IoT)."

For our interview with Mr. Jason Hart, President, Identiv, please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Identiv_Hart.html

And, please also see our interview with Mr. Paul Brady, Technology and Solution Evangelist Senior Director at Identiv, please click here or here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Identiv_Brady.html

For more information www.Identiv.com

*****

ImageWare Systems, Inc.

ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare) a leader in mobile and cloud-based, multi-modal biometric identity management solutions, recently announced:

- ImageWare Systems and OnlineAuction.com Bring Biometric Authentication to the Online Marketplace
(http://finance.yahoo.com/news/imageware-systems-onlineauction-com-bring-123000321.html)

- ImageWare Systems Granted Patents in Canada and Australia for Multi-Modal Biometric Platform
(http://finance.yahoo.com/news/imageware-systems-granted-patents-canada-123000933.html)

For our complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html

For more information: www.iwsinc.com

*****

Nok Nok Labs recently announced:

Nok Nok Labs and IDEX combine best in class security and fingerprint sensor technologies for convenient online security
(https://www.noknok.com/what-they-say/press-releases/nok-nok-labs-and-idex-combine-best-class-security-and-fingerprint )

See the latest Nok Nok Labs White Paper here:
Four Barriers to Adopting Strong Authentication
(https://www.noknok.com/how-we-do-it/white-papers/four-barriers-adopting-strong-authentication)

This whitepaper describes four major barriers to the use of strong authentication: Cost, Usability, Security, and Privacy ("CUSP").

And, see the Nok Nok Labs Video "How It Works" here.
(https://www.youtube.com/embed/gHDM4Yv3u18?rel=0&wmode=transparent&autoplay=1&width=1280&height=720&iframe=true)

Mr. Ramesh Kesanupalli, Founder of Nok Nok Labs, Founding Member, FIDO Alliance, told us, "Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We're at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT."

For the complete interview with Ramesh Kesanupalli please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_NokNok_Ramesh.html

*****

SRC, Inc.

Mr. Derek Gabbard, President, FourV Systems, told us, "SRC, the parent company of FourV, is a not-for-profit company that has provided research and development services to U.S. government customers for more than 55 years. Over the last several years, in response to customer challenges and market needs, SRC has been developing analytic platforms for what is known today as 'big data.' Due to some recent, high profile data breaches (that you can read about in the news), SRC saw an opportunity to focus on the commercial application of its research and development, and began to focus on products and services in the big data analytics market. SRC formed FourV to offer its analytic platform, known as the GreySpark™ Reasoning Engine, into the commercial marketspace. We're committed to making the GreySpark Reasoning Engine the industry leader in combining historical big data analytics and real-time, fast data analytics and processing. The core of GreySpark is incredibly flexible and can be applied across a number of use cases within the enterprise. We are developing flexible yet powerful modules to be deployed with the core engine to address enterprise needs in fraud detection, financial market analysis and have additional capabilities in the roadmap for other use cases as well."

For the complete interview with Derek Gabbard, President, FourV Systems, please click here, or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_SRC_Gabbard

For more information: SRC, Inc.

*****

StrikeForce Technologies... recently announced:

- Microsoft Litigation Lawsuit From StrikeForce Commences

- StrikeForce Commences Patent Litigation Against Microsoft

For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here or here: www.securitystockwatch.com/Interviews/in_Boardroom_StrikeForce.html.

For more information:www.strikeforcetech.com

*****

Tyco Integrated Security

Mr. Mark VanDover, President, Tyco Integrated Security, told us, "In the last six months, we've seen security technology changing the way businesses operate across multiple industries. For example, expanded use of RFID-enabled technologies is helping retailers identify and combat operational loss, deepen the customer experience and improve omni-channel operations. Additionally, in heavily regulated industries like food manufacturing and pharmaceuticals, we've seen physical security play a bigger role in ensuring standard compliance. On another level, since entering the small business market last fall, we've seen firsthand how affordable commercial-grade security solutions can make a difference for small business owners' bottom line."

For our complete interview with Mark VanDover, please click here: or here: www.securitystockwatch.com/Interviews/in_Boardroom_Tyco_MarkVanDover2.html. For more information: www.TycoIS.com

*****

TRADE SHOWS... We are proud to be media sponsors of these important upcoming events...

AFCEA

The annual Global Identity Summit is the U.S. federal government's primary outreach and collaboration-building event with the worldwide identity community and focuses on identity management solutions for the corporate, defense and homeland security communities. Over 50 sessions, concurrent tracks, and keynotes, along with over 100 exhibitors, will bring together a distinctive yet comprehensive look at the identity management capabilities, challenges and solutions in the topic areas of biometrics, radio frequency identification, mobile computing, cybersecurity, smart card technology and big data. The immersive environment offers a place for professionals to dedicate three continuous days to information sharing and collaboration building.

*****

ASIS International 61stAnnual Seminar & Exhibits
Sept. 28, 2015 - Oct. 1, 2015

Join thousands of security professionals from around the world this September at ASIS International 61st Annual Seminar & Exhibits in Anaheim, CA! Examine the latest issues and trends in security management, network with colleagues, and discover the newest products and services on the market for security professionals.

Highlights include:
Negligent Security and the Active Shooter
Anti-terrorism Social Media Monitoring Tools
Panopticon 2015: Continued Erosion of Privacy Rights
The Internet of Things: Now Everything is Hackable

You don't want to miss this show! Learn more and register today!

*****

BORDER SECURITY EXPO 2016 CELEBRATES 10TH ANNIVERSARY WITH MOVE TO SAN ANTONIO, TEXAS
Largest border security conference and exhibition heads to San Antonio, TX in 2016

On April 13-14, 2016, the 10th Annual Border Security Expo will open at the Henry B. Gonzalez Convention Center, San Antonio, Texas.

Border Security Expo draws attendees from around the world and has become the most highly anticipated conference and exhibition on border security. As in years past, the exhibit hall will feature more than 150 companies showcasing a wide array of cutting-edge border security products, technologies and systems aimed at increasing security while facilitating legitimate trade and travel. In addition to the expansive exhibit hall, attendees benefit from a comprehensive conference program covering the key issues addressing border security, as well as networking, special events, ceremonies, and idea-sharing throughout the two-day event.

"Border Security Expo has proudly served the needs of federal, state, local and international law enforcement, as well as private-industry focused on border security, for the past decade," said Paul Mackler, President & CEO of Eagle Eye Expositions, producers of the annual event. "Given the confluence of federal and state events over the past year on the southwest border, including the newly formed Joint Task Force West, Southern Border Approaches Campaign, headed up by Director Robert Harris, being headquartered in San Antonio, and the sweeping $800 million border security legislation signed into law by Texas Gov. Abbott (House Bill 11), a change of venue to Texas in 2016 is in order to continue to best serve the needs of the border security community."

Border Security Expo's Advisory Board is chaired by Jayson P. Ahern, Principal at The Chertoff Group, and former Acting Commissioner, U.S. Customs and Border Protection. The Advisory Board includes a diverse and distinguished group of leading experts well-versed on all facets of border security.

While the same high caliber speaker roster is expected, event management says there are new dynamics to the conference and exhibition that will make the overall event even more productive for exhibitors and attendees with the move to San Antonio. The full program will be announced in the months to come.

For more information, visit www.BorderSecurityExpo.com.

*****

Cyber Security Summit

The Cyber Security Summit is an exclusive "By Invitation Only" Summit series connecting C-Level & Senior Executives responsible for protecting their companies' critical infrastructures with cutting-edge technology providers and renowned information security experts. The one day event, being held on June 3rd in the DC Metro Area, September 18th in New York City & October 9th in Boston will focus on educating attendees on how to best protect their highly vulnerable business applications, intellectual property and discover the latest products and services for enterprise Cyber Defense. www.CyberSummitUSA.com

*****

Money20/20
October 25-28, 2015, The Venetian, Las Vegas, NV, United States
http://money2020.com/register, http://money2020.com/, Info@Money2020.com, Organizer Email: Rob@Money2020.com

Money20/20 is the largest global event enabling payments and financial services innovation for connected commerce at the intersection of mobile, retail, marketing services, data and technology. With 10,000+ attendees, including more than 1,000 CEOs, from over 3,000 companies and 75 countries, expected at its 2015 U.S. event, Money20/20 is critical to realizing the vision of disruptive ways in which consumers and businesses manage, spend and borrow money. The next Money20/20 will be held in Las Vegas, October 25-28, 2015, followed by Money20/20 Europe in Spring 2016.

*****

Nordic IT Security - 3rd November 2015, Stockholmsmässan, Sweden

Cybersecurity is experiencing enormous growth, as an industry and as a theme in the daily lives of people and businesses using technology. And because our technology keeps changing at an astounding rate, threats are evolving fast too -- with cybercriminals finding new and creative ways to exploit users and technology all the time. To combat the threat in 2015, information security professionals must understand the trends.

This year's Nordic IT Security will take place on November 3rd, 2015 in Stockholm and will gather senior IT security professionals from across the Nordics and industry verticals to cover key areas of concerns for organizations from both public and private sector. Over the course of one day, you will experience recent case studies, insightful demos, dedicated roundtables, in-depth workshops, technological lightning talks, and plenty of networking opportunities to give you greater insight on strategic implementations of the latest technology showcased in the Exhibition Hall.

FREE tickets available (limited supply). Register here: www.nordicitsecurity.com/register-today

*****

WORLD SMART WEEK

The Connected Innovation Summer Forum

Conferences & Innovation Show - Sept. 15-17, 2015 - Marseille Provence, France

World Smart Week explores the innovation and business opportunities of the smart, connected technologies. Designed to foster exchanges between IT and vertical industries, this global forum combines four complementary conferences (Smart Contactless World, M2M Innovation World, World e-ID & Cybersecurity, Connect Security World) and a new innovation hub, Smart Innovation Show. Beyond an exhibition, the Show features workshops and tutorials, business meetings, Innovation Awards, etc.

Held at the Palais du Pharo in Marseille, the 2nd city of France, World Smart Week 2015 expects 3000 participants from 60 countries, including more than 250 speakers and 30 exhibitors.

Visit us at www.worldsmartweek.com

*****

THIS PRESS RELEASE, AND ALL CONTENT, ADVERTISING, MATERIAL AND INFORMATION PERTAINING TO SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.securitysolutionswatch.com/Main/Terms_of_Use.html

© 2024 Canjex Publishing Ltd. All rights reserved.