TMCnet News
Thought Leaders Discuss Security Solutions "In The Boardroom" On SecuritySolutionsWatch.com - AMAG (GFS), Cisco, Cyberinc, Dell EMC (DVMT), Extenua, ImageWare (IWSY), NetWatcher, StrikeForce (SFOR)NEW YORK, Nov. 15, 2017 (GLOBE NEWSWIRE) -- Thank You For Joining Us "In The Boardroom" On SecuritySolutionsWatch.Com Kurt Takahashi, President, AMAG Technology - A G4S Company ***** VOTI Detection™ received a Companies-to-Watch award that recognizes early-stage companies with strong growth potential. As part of the Deloitte Technology Fast 50 program, the Companies-to-Watch Award category honours Canadian technology companies that demonstrate promising potential to be a future Technology Fast 50 candidate. ***** Kurt Takahashi, President of AMAG, said, “At first glance, access control systems may appear straightforward: built simply to lock and unlock a door. But delve deeper, and the administration of granting approval becomes extremely labor-intensive, and timely, in nature. Email traffic between security teams and site managers or business owners becomes overwhelming, as requests for approvals must be granted and access taken away manually, and precious time is wasted generating reports.While this in itself is problematic, it also leads to a rise in third-party compliance regulations. In the US, these can include everything from the Health Insurance Portability and Accountability Act for the healthcare sector to the North American Electric Reliability Corporation™ Critical Infrastructure Protection standards for utilities. So, how do you efficiently manage the way that physical identities are requesting approval, and ensure that it is carried out correctly? For our complete interview with Kurt Takahashi, President, AMAG Technology - A G4S Company, please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html In other recent AMAG news: Pelco and AMAG Join Forces to Provide Integrated Surveillance and Access Control Solution ***** • Cisco, Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group, Cisco, shared with us, “We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“ For our complete interview with Marc Blackmer please click here or here: ***** • Cyberinc, CEO, Samir Shah Samir Shah, CEO, Cyberinc, said, “Browsers are our window to the World Wide Web, as we access various types of browsers on a variety of smart devices, umpteen times a day. The ubiquitous web browser - the strategically important application on corporate desktops, ironically, is also the only application on the desktop that regularly downloads and executes code from both trusted and untrusted networks. To borrow an analogy from airport security, the browser, by default, does not ‘scan’ or ‘frisk’ the code that enters and executes on the endpoint. As a result, browsers which keep the business connected to the global economy, have also become the preferred channel for cybercriminals to snake their way into our devices & systems. Cyber hackers are exploiting the inherent vulnerabilities associated with browser code and plug-ins to launch devious cyber attacks, impacting business continuity and revenues, along with eroding consumer trust and loyalty. Multiple vulnerabilities detected across popular browsers such as Google Chrome, Thunderbird, SeaMonkey and Mozilla Firefox by cyber sleuths in India, all highlight security issues within the browser. A recent advisory issued by the Computer Emergency Response Team of India (CERT-IN) has listed key browser vulnerabilities: of how browsers could be exploited by a remote attacker to bypass certain security restrictions, disclose potentially sensitive information, gain escalated privileges, execute arbitrary code and cause denial of service condition on the affected system. For our complete interview with Samir Shah please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Shah_Cyberinc.html In other recent Cyberinc news: https://cyberinc.com/news/bpt-introduces-cyberinc-isla-web-malware-isolation-system-in-indonesia/ ***** • Dell EMC, Graham Porter, Business Development Director EMEA, Surveillance and Security “The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase image resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it. For our complete interview with Graham Porter please click here or here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Porter_DeLLEMC.html FOR MORE INFORMATION: Interview With Ken Mills, Dell EMC, General Manager, IoT, Surveillance and Security Interview With Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security Learn here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!solution_portfolio For Dell EMC Partner Validations, please click here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!partner_validations Please click here for the Dell EMC VIGILARE BLOG - Surveillance and Public Safety Emerging Trends • Extenua, President and CEO, Steve Visconti Steve Visconti, President and CEO, Extenua, told us, “A number of Fortune 500 companies have already started to leverage the advantages of Extenua’s dynamic product suite: IBM, Kaiser Permanente, Motorola, Shell, True Value...even the NCAA, just to name a few. Extenua’s award winning SilverSHielD SFTP for Windows is now available as an AMI service on Amazon AWS Marketplace. Use the industry’s most awarded SFTP SSH software to securely and safely transfer your data to your Amazon cloud service. More details here: https://aws.amazon.com/marketplace/pp/B01DOBG0AU/ref=srh_res_product_title?ie=UTF8&sr=0-3&qid=1460731254477 / http://www.extenua.com/silver-shield-saas/ Let us tell you how we can help mitigate Equifax type breaches and address all of your cybersecurity concerns with our cutting-edge solutions. Please visit us at Extenua.com “. For our complete interview with Steve Visconti please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Extenua_Visconti.html ***** • ImageWare Systems, Chairman and CEO, Jim Miller Jim Miller, ImageWare’s chairman and CEO, said, “We continue to demonstrate the strength of our GoVerifyID Enterprise Suite,” “Just last month, we received a highly accredited designation from IBM PartnerWorld, which validates our integration with IBM Security products to help protect their customers around the world. Ultimately, ISAM users will be able to utilize our multi-modal biometric authentication with mobile devices by swiping a fingerprint, taking a selfie, or even providing a voice sample to authenticate their identity. “During the third quarter, we secured an $11 million financing to bolster our balance sheet and accelerate our sales and marketing efforts. We believe this financing is a reflection of the strong progress we’ve made to commercialize our leading identity management solutions and position them for growth. We plan to capitalize on our operational momentum to further expand our partnership agreements for our mobile and cloud-based products.” More ImageWare Systems, Inc. (ImageWare or IWS) (OTCQB: IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the third quarter ended September 30, 2017, as well as a corporate update to highlight the company’s progress since its last quarterly update on August 14, 2017. Operational Highlights: For our complete interview with Jim Miller please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_ImageWare.html For more information: Twitter, LinkedIn, YouTube and Facebook. ***** • NetWatcher, CEO, Scott B. Suhy Scott Suhy, Chief Executive Officer, NetWatcher, told us, “From a business perspective NetWatcher has been busy with bringing on many new customers. The momentum is in 2 places –Government Contractors and Financial Services/Insurance/Banking customers doing business in New York State. The government contractors are signing up in droves due to the Dec 31st deadline set by the DFARS 252.204.7012 that requires contractors with access to Controlled Unclassified Information (CUI) data to become compliant with NIST 800-171. The Financial Services/Insurance/Banking customers are coming on board due to the March 2018 deadline set by the DFS NYCRR 500 legislation. From a technology perspective NetWatcher has released several new vulnerability scanner features and reporting enhancements. Next up will be additions to utilize the platform for Windows Audit tracking”. For our complete interview with Scott Suhy please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Netwatcher_Suhy.html ***** • StrikeForce, Chairman and CEO, Mark Kay For our complete interview with Mark Kay please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_StrikeForce.html ***** ***** Imperial Capital Imperial Capital is pleased to announce the 14th Annual Security Investor Conference (SIC) on December 6-7, 2017 at the InterContinental New York Barclay. SIC is the premier industry gathering connecting the leading security focused companies with an audience of key investors and business leaders. This conference provides investors access to senior management teams while they present their positioning and strategic growth plans to deliver the latest compelling security solutions across the Global Consumer, Enterprise and Government Markets. Whether you specialize in cutting edge technologies or more traditional security systems and services, SIC is a fundamental networking event that consistently attracts top management from leading security companies. ***** The 6th Regional Cybersecurity Summit TRUSTECH Following a brilliant first edition in Cannes last year, TRUSTECH Pay, Identify, Connect & Secure – will bring together once again the entire payments and identification ecosystem in the Palais des Festivals de Cannes, 28th to 30th November 2017. ***** Cyber Security Summit: Los Angeles IoT Evolution Expo Through a series of conference tracks, workshops, keynotes and general sessions, you will hear about Enterprise IoT adoption, implementation and the enormous impact these technologies will have on driving operational efficiencies and increasing revenue. ***** BORDER SECURITY EXPO Clarion Events can trace its roots back to 1947 and takes great pride in being one of the oldest independent event organisers in the UK. More recently the firm has developed an international portfolio of brands and now has interests in a number of global vertical industries. Clarion organises leading events which provide industry leaders, government officials and technical experts with a forum to share ideas, conduct business, develop partnerships, network and access export and growth markets. While the core of the portfolio comprises of military systems and related technologies, it is continually evolving to suit the needs of defence and security bodies in the fight against terrorism, policing humanitarian missions and emergency response and critical national infrastructure planning. CLICK HERE to learn more about our portfolio of Defense & Security events around the world. ***** TEC 2018 TEC, presented by PSA Security Network, is the premier education and networking event for all professional systems integrators. TEC features industry leading education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization. *****
***** The 18th edition of Airport Show will welcome 7,500 aviation professionals and key decision-makers, see the latest innovations and industry players under one roof and reach new markets. Each year, Airport Show attracts thousands of aviation professionals who look for airport and aviation-related products and services to enhance their business opportunities. ***** "The transportation industry is rapidly digitizing, leading to greater risks and potential impacts from cyber and physical events. Understanding how to better safeguard operations and protect critical networks and infrastructure from damage is paramount, and opportunities like TSSX18 that bring the industry together for training and solutions are welcomed by SANS.” ESX 2018 Registration Now Available ESX is the premier gathering place for professionals who are passionate about the business of electronic security and life safety. To open the event to even more industry professionals, ESX is launching registration with budgeting season in mind. "It takes people to drive profits," says George De Marco, ESX Chairman. "At a time when market competition has never been fiercer, it's important to invest in your people — to fuel their development. Launching registration early allows business owners and management to plan for ESX, while in budgeting mode. I urge you to think hard about professional development programming for you and your team — I'm confident there's no other event that can deliver the same impact to your business." About SecuritySolutionsWatch.com What's YOUR cybersecurity, physical security, mobility, payments, safety or "smart" solution? Please click here for our Media Kit (http://www.securitysolutionswatch.com/MediaKit.html) Please click here or here: http://www.securitysolutionswatch.com/Main/170502%20RATE_CARD-4.pdf for additional details about our offerings. ***** THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE:www.securitysolutionswatch.com/Main/Terms_of_Use.html. Contact: |