NEW YORK, Nov. 15, 2017 (GLOBE NEWSWIRE) -- Thank You For Joining Us "In The Boardroom" On SecuritySolutionsWatch.Com
Kurt Takahashi, President, AMAG Technology - A G4S Company
Marc Blackmer, Cisco, Product Marketing Manager, Industry Solutions, Security Business Group
Samir Shah, CEO, Cyberinc
Ken Mills, General Manager, Dell EMC, Surveillance and Security
Graham Porter, Business Development Director EMEA, Dell EMC, Surveillance and Security
Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security
Steve Visconti, President & CEO, Extenua
Jim Miller, ImageWare Systems, Chairman and CEO
Scott B. Suhy, CEO, Netwatcher
Mark L. Kay, Chairman and CEO, StrikeForce Technologies
VOTI Detection™ named one of Canada’s Companies-to-Watch in the 2017 Deloitte
Technology Fast 50™ Awards
VOTI Detection™ received a Companies-to-Watch award that recognizes early-stage companies with strong growth potential. As part of the Deloitte Technology Fast 50 program, the Companies-to-Watch Award category honours Canadian technology companies that demonstrate promising potential to be a future Technology Fast 50 candidate.
VOTI Detection™ 's CEO Rory Olson, credits the innovative 3D Perspective™ technology and its software first approach with the company’s record growth, greatly exceeding the current industry rate. Olson said, “Bringing technology innovation to an industry that has not seen any in over 50 years and the ability to utilize the vast x-ray security screening data to optimize detection enables us to save lives, protect people and assets.” More
Kurt Takahashi, President of AMAG, said, “At first glance, access control systems may appear straightforward: built simply to lock and unlock a door. But delve deeper, and the administration of granting approval becomes extremely labor-intensive, and timely, in nature. Email traffic between security teams and site managers or business owners becomes overwhelming, as requests for approvals must be granted and access taken away manually, and precious time is wasted generating reports.While this in itself is problematic, it also leads to a rise in third-party compliance regulations. In the US, these can include everything from the Health Insurance Portability and Accountability Act for the healthcare sector to the North American Electric Reliability Corporation™ Critical Infrastructure Protection standards for utilities. So, how do you efficiently manage the way that physical identities are requesting approval, and ensure that it is carried out correctly?
For our complete interview with Kurt Takahashi, President, AMAG Technology - A G4S Company, please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html
In other recent AMAG news:
Pelco and AMAG Join Forces to Provide Integrated Surveillance and Access Control Solution
LifeSafety Power Announces Enhanced Partnership with AMAG Technology
LSP’s FlexPower® ACLASS™ Unified Power System for AMAG controllers combine power, lock and access control functionality in a single design.
Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group, Cisco, shared with us, “We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“ For our complete interview with Marc Blackmer please click here or here:
Samir Shah, CEO, Cyberinc, said, “Browsers are our window to the World Wide Web, as we access various types of browsers on a variety of smart devices, umpteen times a day. The ubiquitous web browser - the strategically important application on corporate desktops, ironically, is also the only application on the desktop that regularly downloads and executes code from both trusted and untrusted networks. To borrow an analogy from airport security, the browser, by default, does not ‘scan’ or ‘frisk’ the code that enters and executes on the endpoint. As a result, browsers which keep the business connected to the global economy, have also become the preferred channel for cybercriminals to snake their way into our devices & systems.
Cyber hackers are exploiting the inherent vulnerabilities associated with browser code and plug-ins to launch devious cyber attacks, impacting business continuity and revenues, along with eroding consumer trust and loyalty. Multiple vulnerabilities detected across popular browsers such as Google Chrome, Thunderbird, SeaMonkey and Mozilla Firefox by cyber sleuths in India, all highlight security issues within the browser. A recent advisory issued by the Computer Emergency Response Team of India (CERT-IN) has listed key browser vulnerabilities: of how browsers could be exploited by a remote attacker to bypass certain security restrictions, disclose potentially sensitive information, gain escalated privileges, execute arbitrary code and cause denial of service condition on the affected system.
For our complete interview with Samir Shah please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Shah_Cyberinc.html
Cyberinc included in “Cool Vendor” list by Gartner in Endpoint, Mobile, Network and Gateway Security, 2017
Cyberinc powers expansion of Isla® into global markets: Signs partnership with Hewlett Packard Enterprise (HPE)
• Dell EMC, Graham Porter, Business Development Director EMEA, Surveillance and Security
“The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase image resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it. For our complete interview with Graham Porter please click here or here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Porter_DeLLEMC.html
FOR MORE INFORMATION:
Learn here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!solution_portfolio
For Dell EMC Partner Validations, please click here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!partner_validations
Steve Visconti, President and CEO, Extenua, told us, “A number of Fortune 500 companies have already started to leverage the advantages of Extenua’s dynamic product suite: IBM, Kaiser Permanente, Motorola, Shell, True Value...even the NCAA, just to name a few. Extenua’s award winning SilverSHielD SFTP for Windows is now available as an AMI service on Amazon AWS Marketplace. Use the industry’s most awarded SFTP SSH software to securely and safely transfer your data to your Amazon cloud service.
Let us tell you how we can help mitigate Equifax type breaches and address all of your cybersecurity concerns with our cutting-edge solutions. Please visit us at Extenua.com “.
For our complete interview with Steve Visconti please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Extenua_Visconti.html
Jim Miller, ImageWare’s chairman and CEO, said, “We continue to demonstrate the strength of our GoVerifyID Enterprise Suite,” “Just last month, we received a highly accredited designation from IBM PartnerWorld, which validates our integration with IBM Security products to help protect their customers around the world. Ultimately, ISAM users will be able to utilize our multi-modal biometric authentication with mobile devices by swiping a fingerprint, taking a selfie, or even providing a voice sample to authenticate their identity.
“During the third quarter, we secured an $11 million financing to bolster our balance sheet and accelerate our sales and marketing efforts. We believe this financing is a reflection of the strong progress we’ve made to commercialize our leading identity management solutions and position them for growth. We plan to capitalize on our operational momentum to further expand our partnership agreements for our mobile and cloud-based products.” More
ImageWare Systems, Inc. (ImageWare or IWS) (OTCQB: IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the third quarter ended September 30, 2017, as well as a corporate update to highlight the company’s progress since its last quarterly update on August 14, 2017.
- Received IBM PartnerWorld’s Ready for IBM Security Intelligence designation for ImageWare’s GoVerifyID Enterprise Suite.
- Demonstrated the GoVerifyID Enterprise Suite for IBM Security Access Manager (ISAM) at the 2017 Money 20/20 event.
- Integrated into Fujitsu’s Secure DirectClick™, an encrypted communications and data transfer solution that can be embedded in any website or mobile application, which has also been integrated into Biometrics-as-a-Service™, a SaaS solution providing mobile, out-of-band, multi-biometric user authentication.
- Received notice that ImageWare was awarded two additional Canadian patents around its IWS Biometric Engine®.
- Completed an $11 million registered direct offering.
- Appointed Robert Clutterbuck and Charles Frischer to its Board of Directors.
For our complete interview with Jim Miller please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_ImageWare.html
For more information:
About ImageWare Systems (https://iwsinc.com/about)
ImageWare Systems Markets (https://iwsinc.com/solutions)
ImageWare Systems Products (https://iwsinc.com/products)
ImageWare Systems News (https://iwsinc.com/category/news)
ImageWare Systems Investors (https://iwsinc.com/about/investors)
ImageWare Systems Partners (https://iwsinc.com/partners)
ImageWare Systems Resources (https://iwsinc.com/resources)
ImageWare Systems Patent Portfolio https://iwsinc.com/about/intellectual-property/)
Scott Suhy, Chief Executive Officer, NetWatcher, told us, “From a business perspective NetWatcher has been busy with bringing on many new customers. The momentum is in 2 places –Government Contractors and Financial Services/Insurance/Banking customers doing business in New York State. The government contractors are signing up in droves due to the Dec 31st deadline set by the DFARS 252.204.7012 that requires contractors with access to Controlled Unclassified Information (CUI) data to become compliant with NIST 800-171. The Financial Services/Insurance/Banking customers are coming on board due to the March 2018 deadline set by the DFS NYCRR 500 legislation.
From a technology perspective NetWatcher has released several new vulnerability scanner features and reporting enhancements. Next up will be additions to utilize the platform for Windows Audit tracking”.
For our complete interview with Scott Suhy please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Netwatcher_Suhy.html
• StrikeForce, Chairman and CEO, Mark Kay
Mark Kay, Chairman and CEO, StrikeForce told us, “StrikeForce has been studying the bitcoin market and we see that our products, can definitely add great value to this new market (stopping Ransomware and Authentication) and we are looking into participating in some way in this new Blockchain Market. “
For our complete interview with Mark Kay please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_StrikeForce.html
Imperial Capital is pleased to announce the 14th Annual Security Investor Conference (SIC) on December 6-7, 2017 at the InterContinental New York Barclay. SIC is the premier industry gathering connecting the leading security focused companies with an audience of key investors and business leaders. This conference provides investors access to senior management teams while they present their positioning and strategic growth plans to deliver the latest compelling security solutions across the Global Consumer, Enterprise and Government Markets. Whether you specialize in cutting edge technologies or more traditional security systems and services, SIC is a fundamental networking event that consistently attracts top management from leading security companies.
Following a brilliant first edition in Cannes last year, TRUSTECH Pay, Identify, Connect & Secure – will bring together once again the entire payments and identification ecosystem in the Palais des Festivals de Cannes, 28th to 30th November 2017.
The event was first held over thirty years ago under the name «Cartes Secure Connexions», to promote the newborn technology of smartcards. In 2016, it is re-named TRUSTECH to better reflect the way the industry and the event have evolved, and its focus on trust-based technologies. More than ever, this event is a unique opportunity to meet the whole ecosystem and get an insight into the latest innovations in payments and identification industries. 350+ exhibitors and sponsors are expected – either to present their latest innovations on their stand or to pitch on the Innovation Stage. Among those who have already confirmed their participation: Be2bill, Dermalog, Ingenico, Matica, NBS Technologies, Next Biometrics, NXP Semiconductors, Otto Kuennecke, Spire Payments, ST Microelectronics, Thales E-Security, Verifone, … and many more!
Through a series of conference tracks, workshops, keynotes and general sessions, you will hear about Enterprise IoT adoption, implementation and the enormous impact these technologies will have on driving operational efficiencies and increasing revenue.
Clarion Events can trace its roots back to 1947 and takes great pride in being one of the oldest independent event organisers in the UK. More recently the firm has developed an international portfolio of brands and now has interests in a number of global vertical industries. Clarion organises leading events which provide industry leaders, government officials and technical experts with a forum to share ideas, conduct business, develop partnerships, network and access export and growth markets. While the core of the portfolio comprises of military systems and related technologies, it is continually evolving to suit the needs of defence and security bodies in the fight against terrorism, policing humanitarian missions and emergency response and critical national infrastructure planning. CLICK HERE to learn more about our portfolio of Defense & Security events around the world.
TEC, presented by PSA Security Network, is the premier education and networking event for all professional systems integrators. TEC features industry leading education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.
TEC 2018 will be held at the Sheraton Downtown Denver in Denver, CO on March 12-16, 2018. The education program will deliver sessions focused on emerging technologies, critical issues in the industry, and tool development to augment attendees’ knowledge base needed to continue to drive the industry forward. Sessions will be selected that serve a variety of disciplines including business management, sales and marketing, HR and recruiting, project management and operations, and installation and service.
Joint 2018 Payments Summit / ICMA Expo and U.S. Payments Forum Meeting
March 26-29, 2018
Omni Orlando Resort at ChampionsGate, Championsgate, FL
LAAD Security 2018
São Paulo, Brasil
April 10-12, 2018
The LAAD Security brings together decision makers from across Latin America active in areas related to Public Security and Corporate. LAAD Security is an international security fair in Latin America and has the institutional support of the main Public Security Councils and Councils in Brazil. Institutional support of the Ministry of Justice and the Brazilian Public Security structure, Support of the most representative associations and media of the defense and security sector. The event counts on the expressive participation of the industrial production chain - national and international - of all safety links: in 2016 there were over 100 exhibiting brands from 12 countries.
The 18th edition of Airport Show will welcome 7,500 aviation professionals and key decision-makers, see the latest innovations and industry players under one roof and reach new markets. Each year, Airport Show attracts thousands of aviation professionals who look for airport and aviation-related products and services to enhance their business opportunities.
"The transportation industry is rapidly digitizing, leading to greater risks and potential impacts from cyber and physical events. Understanding how to better safeguard operations and protect critical networks and infrastructure from damage is paramount, and opportunities like TSSX18 that bring the industry together for training and solutions are welcomed by SANS.”
Doug Wylie, Director, Industrials & Infrastructure Portfolio, SANS Institute
ESX is the premier gathering place for professionals who are passionate about the business of electronic security and life safety. To open the event to even more industry professionals, ESX is launching registration with budgeting season in mind.
"It takes people to drive profits," says George De Marco, ESX Chairman. "At a time when market competition has never been fiercer, it's important to invest in your people — to fuel their development. Launching registration early allows business owners and management to plan for ESX, while in budgeting mode. I urge you to think hard about professional development programming for you and your team — I'm confident there's no other event that can deliver the same impact to your business."
SecuritySolutionsWatch.com features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco Security, Dell EMC, HP Cybersecurity, Gemalto, HID Global, ImageWare, Siemens Security and SONY Security, just to name a few.
What's YOUR cybersecurity, physical security, mobility, payments, safety or "smart" solution?
We invite you to please join us "In The Boardroom", more details here, or here: http://www.securitysolutionswatch.com/Main/ThoughtLeadershipOpportunity_July2017.pdf
Please click here for our Media Kit (http://www.securitysolutionswatch.com/MediaKit.html)
Please click here or here: http://www.securitysolutionswatch.com/Main/170502%20RATE_CARD-4.pdf for additional details about our offerings.
FOR MORE CONTENT ABOUT SECURITY THREATS AND SOLUTIONS...
...PLEASE CLICK HERE FOR OUR MONTHLY NEWLETTER
PLEASE VISIT US ON TWITTER HERE: https://twitter.com/SecStockWatch
Publishing Team Leader
ALE (at) SecuritySolutionsWatch (dot) com