RYE BROOK, NY--(Marketwired - Nov 12, 2013) - ImageWare Systems, Inc. (
Fujitsu North America
Mr. Shawn McPherron, Cloud Marketing Manager, Fujitsu North America, told us, "Up until now, anytime a company wanted to embed biometric security into their systems and applications, they had to first buy licenses and hardware, complete a systems set-up, hire IT staff, and start on a lengthy development and deployment project. Our work with ImageWare enables us to deliver a SaaS-based solution -- or 'BioID as a Service.' Now, your BioID projects can be implemented in days, not months, and you only pay for what you use, eliminating the need for large capital investments up front. This is a game-changer for security enablement."
For the complete interview with Shawn McPherron: www.securitysolutionswatch.com/Interviews/in_Boardroom_Fujitsu.html
HP Enterprise Services
Mr. Ed Keegan, Director, Cybersecurity Strategies & Portfolio, U.S. Public Sector, HP Enterprise Services, told us, "CM represents a maturation of information technology. Over the past 15 to 20 years, various tools have been created to address individual problems, such as perimeter protection, endpoint protection, data loss prevention and so on. Once implemented, the tools are presumed to be doing the job. Therefore, original information assurance programs were written to ensure these tools were present -- not to ensure they were integrated and operating properly. CM represents the next logical step in this process -- automated, continuous auditing of the cyber environment to ensure proper configuration along with proactive monitoring for threats and vulnerabilities. This will ensure security compliance resulting in the prioritization and initiation of actions required to further secure the governments' information and systems."
For more information:
ImageWare recently announced that, "Global Payout, Inc. has signed an agreement with ImageWare Systems, Inc. (
Multi-modal biometrics are being adopted by industries requiring limited access to restricted areas -- such as in the transportation, utility, and governmental markets. The financial services and banking industry has begun adopting the technology for use in the banking, payment processing, and eCommerce sectors. By including ImageWare Systems GoCloudID with ID document capture, and biometric authentication, Global Payout is delivering the next generation method to automate and verify the "know your customer" (KYC) process.
In 2012 the United States saw more than 12 million identity fraud victims at a dollar cost of $21 billion. In fact, an identity is stolen every three seconds. "Worldwide mobile payments are expected to become a $400 billion market by 2015," said Jim Miller, CEO of ImageWare Sytems. "We are pleased to work with Fujitsu to offer Global Payout clients worldwide, with the additional level of, and the IT security industry's most reliable form of identity theft protection for accessing their gateway accounts through desktop and mobile devices."
"Our MoneyTrac Consolidated Payment Gateway platform enables our multinational business clients to efficiently make payouts to their employees, contractors, and affiliates through a single management console," says Bill Rochfort, president and executive vice president of sales and marketing, Global Payout. "Working with ImageWare Systems, our gateway solution can now offer a second level of access authentication to each individual's electronic wallet account, reinforcing the accurate identification of the end-user."
ImageWare's services will be delivered for a onetime enrollment fee per new customer and a monthly subscription fee basis that will vary per customer). Services are to be delivered via Fujitsu's global data center networks, with the Fujitsu platform providing full configured, on-demand IT infrastructure for the ImageWare CloudID SaaS.
"We are pleased to be able to provide authentication and verification over the Fujitsu Cloud IaaS Trusted Public S5 platform from ImageWare Systems to Global Payout customers around the world," said David Berry, executive vice president, infrastructure services, Fujitsu America. "Our cloud platform addresses the needs of the enterprise, service providers and consumers by enabling the deployment of a secure, agile and reliable could-based identity management solution."
For more information:
IWS CloudID™: http://iwsinc.com/products/next-generation-iws-cloudid-product-suite/
ImageWare Systems Solutions: http://www.iwsinc.com/markets/overview
ImageWare Systems Products: http://www.iwsinc.com/products/overview2
For ImageWare Systems Investors: http://www.iwsinc.com/about-iws/investors/overview1
For more information: www.iwsinc.com
Mr. Net Payne, Chief Marketing Officer, March Networks, An Infinova Company, told us, "March Networks is ranked the #1 provider of enterprise digital video recorders (DVRs) in the Americas, as well as the #1 supplier of video surveillance equipment to the Americas' banking market (IHS Inc., formerly IMS Research). While our video surveillance solutions can be used in a variety of industries and applications, we focus in particular on providing the financial and retail markets with integrated solutions that help them increase profits and realize faster returns on their technology investments. We are also a leader in providing mobile video surveillance solutions to bus and light rail transit authorities."
For More Information About March Networks Solutions:
March Networks Financial Solutions (www.marchnetworks.com/solutions/financial/default.aspx)
March Networks Retail Solutions (www.marchnetworks.com/solutions/retail/default.aspx)
March Network Airports-Seaports Solutions (http://www.marchnetworks.com/solutions/airports-seaports/default.aspx)
March Network Commercial-Industrial Solutions (http://www.marchnetworks.com/solutions/commercial-industrial/default.aspx)
March Networks Critical Infrastructure Solutions (http://www.marchnetworks.com/solutions/critical-infrastructure/default.aspx)
March Networks Government Solutions (http://www.marchnetworks.com/solutions/government/default.aspx)
And, For More Information:
About March Networks (www.marchnetworks.com/company/about-us/)
What's New At March Networks (www.marchnetworks.com/products/whats-new.aspx)
March Networks Blog (http://www.marchnetworks.com/intelligent-ip-video-blog/)
For the latest March Networks News (www.marchnetworks.com/company/news-center/2013/9/24/497)
Mr. Raj Samani, McAfee, EMEA CTO, told us, "Our dependency on services that are IP enabled is growing significantly and will continue to grow; from smart meters, power and water grids, train systems and every day devices such as units in cars, refrigerators and televisions. The need to correctly identify and authenticate when they connect to the Internet will be of critical importance, particularly if we consider devices related to health. In addition there is a need to ensure that they are capable of resisting cyber attack, as the impact of their unavailability could lead to serious economic effects."
For more information: www.McAfee.com
StrikeForce Technologies, a company that specializes in Cyber Security solutions for the prevention of Data Breaches and Cyber Theft, recently announced, "...a new partnership with FlexiP Group, a leading IT Security Solutions provider in Lagos, Nigeria."
"We are very excited to have FlexiP as a strategic sales partner," says Mark L. Kay, CEO of StrikeForce. "They are a Premier IT Solutions Provider, with a special emphasis on Enterprise Cyber Security Solutions for Financial Services, the Oil & Gas Industry, Telecommunications, Manufacturing and Government Agencies. This new partnership follows our corporate strategy to build a strong global sales channel with security focused distributors that are already trusted by their numerous clients."
"We believe that the StrikeForce suite of solutions will greatly help us extend our IT security portfolio and deliver superior value to our customers in the war against identity theft and cybercrimes," says Rex Mafiana, CEO of FlexiP Group. "Now that we are a StrikeForce partner, we have already started the process of reaching out to our customers to discuss StrikeForce's ProtectID® Out-of-Band Authentication, their GuardedID® Anti-Keylogging Keystroke Encryption Technology and their soon to release MobileTrust® Mobile Device Security solutions."
For more information about:
CyberLock shared with us the following product news.
Grand Master Key
The CyberKey Grand Master is more than just your average master key. The Grand Master can perform multiple functions, depending on which software solution is in use.
In Enterprise the Grand Master can be programmed to perform any or all of the following:
- Open locks
- Program new locks
- Update locks
- Download lock audit trails
- Create emergency keys
In Professional the Grand Master can be programmed in one of two ways:
It can be configured to program, download, and update CyberLock cylinders and padlocks. This key configuration is ideal during the initial set up of a system. New locks can be quickly and easily added to the system simply by touching them with the Grand Master key.
It can be configured to create emergency keys and open locks. By configuring your Grand Master this way, you have a built-in contingency plan in case of emergency.
After initial setup of a system, it's a common practice for Professional level users to reprogram their Grand Master from the 'program, download, and update' mode to the 'emergency key' mode. Grand Master keys that are programmed as emergency keys should be stored in a secure location that can only be accessed by authorized personnel.
For more information about CyberLock products: www.cyberlock.com/cyberlock_products.html.
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, CyberLock: www.securitysolutionswatch.com/Interviews/in_Boardroom_VIDEX.html
For CyberLock News & Events: www.cyberlock.com/news_events.html
For the CyberLock Solutions Center: www.cyberlock.com/solutions_center.html
For more information: http://www.cyberlock.com
November 19-21, 2013
Paris Nord Villepinte - France
CARTES Secure Connexions Event 2013 is the comprehensive event (trade show, conferences and awards) entirely dedicated to the digital security and smart technology sector and its innovations.
Integrating its full value chain, CARTES Secure Connexions 2013 is the only event enabling global synergies at a human and technological level, ideal for business deals and partnerships.
Connect:ID - An Exploration of Physical & Digital Identity in the 21st Century
Ronald Reagan Conference Center, Washington, DC, USA
Conference: March 17-19, 2014 - Exhibition: March 18-19, 2014
Science Media Partners Ltd and the International Biometrics & Identification Association (IBIA) have launched a visionary new international conference and exhibition -- connect:ID -- that focuses on all aspects of personal identity and the opportunities for its management in both the physical and digital worlds.
Taking place on March 17-19, 2014, in the heart of Washington, DC, connect:ID will unite solutions adopters and stakeholders from the four corners of the globe and will explore the development and fusion of multiple advanced identity technologies -- including biometrics, secure credentials and digital identity systems.
November 18, 19, 20
Gaylord Texan Hotel
GovSec, the national event for government security, is bringing its top-notch education and security expo to the Western United States -- an area that meets the challenge of protecting our nation's borders 24 hours a day.
GovSec West is the conference and expo helping you secure the homeland. Taking a comprehensive approach to securing our nation, it addresses the need for protecting critical infrastructure from domestic and international terrorism, preparing for and responding to natural and accidental disasters, as well as building, maintaining and integrating comprehensive security architecture to protect against cybercrime, cyberterrorism and other domestic and international threats. This combination provides security professionals and first responders with the necessary insights, tools and tactics to protect their communities and our nation.
GovSec West serves the needs of government security decision makers from the military, federal civilian agencies and departments, state and local emergency response officials and law enforcement from the federal, state and local level.
2013 Security Investor Conference
Waldorf New York
Imperial Capital is pleased to announce the 2013 Security Investor Conference to take place on December 11-12 at the Waldorf New York.
November 20-21, 2013
Javits Center North, NY, NY
ISC East is the Northeast's Local Connection to the World of Security. Join us November 20-21, 2013 at the Javits Center North in New York, NY.
Your registration gets you:
Direct access to technical reps from more than 200 brands -- review the latest products, technologies & services to stay ahead of what's new in Security.
Free business seminars designed to help you increase revenue and reduce costs -- high quality, commercial-free information and insight into the most relevant new products, technologies and business strategies you need to know about in today's evolving security market to stay ahead of your competition.
Drinks & networking on the exhibit floor -- a casual environment to join your colleagues and peers for collaborating, sharing ideas, and good, old fashioned socializing.
Local expertise from association leaders in NY, NJ, CT and PA -- meet and chat with leaders of your local chapters from the security industry.
ISC East is sponsored by the Security Industry Association. Register to attend today: www.ISCEast.com
MIS TRAINING INSTITUTE
The Conference on Mobile & Smart Device Security
November 19-21, 2013
Renaissance Boston Waterfront Hotel, Boston, MA
Mobile computing has changed the IT and data security landscape. Device adoption has mushroomed, network access is almost universally available and BYOD is the new normal. Understanding the risks to data and corporate information and planning for sustainable ways to manage those risks is critical. There are new attack models in the next-gen mobile paradigm, but there are also new protection models. The Conference on Mobile & Smart Device Security brings together organizations that have adopted innovative security technologies and programs while still leveraging the power of mobile. You will learn best practices from front-line practitioners and the latest solutions to help you implement effective data protection in our mobile world. Contact: Dina Dvinov at email@example.com
MIS TRAINING INSTITUTE
Annual CSA Congress
December 4-5, 2013
The CSA Congress is the industry's premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. In addition to offering best practices and practical solutions for remaining secure in the cloud, CSA Congress will focus on emerging areas of growth and concern in cloud security, including standardization, transparency of controls, mobile computing, Big Data in the cloud and innovation.
Contact: Dina Dvinov at firstname.lastname@example.org
PSA Security Network
Build your Dream Team with PSA Security Network
SecuritySolutionsWatch.com: PSA is known for high-caliber education. Tell us a little more about your new programs at PSA.
Bill Bozeman: PSA Security Network is excited to announce Dream Team, 3 new educational programs built specifically for today's security integrator. It addresses three different areas of expertise in your operation, including: targeted training for leadership, technical training and sales optimization.
SecuritySolutionsWatch.com: What do you mean by Dream Team?
Bill Bozeman: The Dream Team series of programs was developed to help support your whole team! It is about having the right people, with the right skills, knowledge and attitude to help you execute your strategic plan to achieve your business outcome objectives. These easy to manage programs allow you to track your progression, as well as your teams, from start to finish, making tracking simple and fast.
SecuritySolutionsWatch.com: What type of training do you get with each program?
Bill Bozeman: Leadership IQ is designed to engage, motivate and unite PSA Owner Companies. This program offers you and your workforce practical approaches, tools and scripts gleaned from the world's greatest managers. Convergent Selling Process helps you to master the art of qualifying, designing and selling integrated or phased security solutions that get funded and approved. Security CEU Technician Certification Program. The Security CEU Technical Certification Program offers some outstanding content from IP Video and Access Control to Networking. The opportunity to earn a credential benefits both you and your customers. This credential identifies you as a trained security professional.
If you would like more information about these programs and what they can do for you and your employees, please contact Barbara Shaw at BShaw@psasecurity.com or visit our Dream Team page to learn more and get started today!
SDW 2014 - The Global Hub For Next Generation Citizen & Government ID Solutions
QEII Conference Centre, Westminster, London, UK
Conference: 16-18 June 2014 - Exhibition 17-18 June 2014
SDW 2014 (Security Document World) -- the world's leading document security show -- focuses on ePassports, visas, driving licenses, national IDs, worker credentials, advanced border control, anti-counterfeiting, fraud detection, and much more. The event will provide a global showcase for next-generation human identity solutions, focusing on intrinsic document security and on the new cutting-edge secure infrastructure now required to produce and use these advanced documents in live situations. Plus, a special focus on Biometrics, Document Fraud Detection and Intelligent Border Control.
Security Industry Association (SIA)
Celebrate Security with SIA Honors Night
On Nov. 20, the Security Industry Association (SIA) hosts SIA Honors Night: Celebrating Performance, Partnerships and People in the Security Industry (http://www.securityindustry.org/Pages/IndustryEvents/SIA-Honors-Night.aspx) in conjunction with ISC East (www.isceast.com) in New York, N.Y.
At The Lighthouse at Chelsea Piers, SIA will present the George R. Lippert Memorial Award to Ray Dean, former vice president of key accounts for Stanley Convergent Security Solutions. Cygnus Business Media's Security Technology Executive magazine co-hosts the event and also honors award recipients.
A portion of the proceeds benefits the Mission 500 non-profit organization, which strives to get every company in the security industry to sponsor at least one child, providing access to life-changing basics like food, clean water, healthcare and education.
Attend ISC East and Meet Up with SIA
Over two days of exposition and education opportunities, with roughly 180 exhibiting companies and more than 8,000 attendees projected, ISC East offers a vital nexus for security industry professionals in the Javits Center, a hub in midtown New York City. Catch up on exciting innovations and trends in a convenient setting with exhibitors, educators and executives all on hand. The cost of registration for ISC East is $75 in advance and $125 on site.
While at ISC East, attend The Advance, the annual meeting of SIA Membership, at the Javits Center North on Wednesday, Nov. 20. At The Advance, meet other members for breakfast at 7:45-8:30 a.m., and then a meeting and awards ceremony at 8:30-9:30 a.m.
For more information, visit http://www.isceast.com.
SERVICE TECHNOLOGY SYMPOSIUM
6th International SERVICE TECHNOLOGY SYMPOSIUM
Mexico City, Mexico / December 4-5, 2013
The top Cloud Computing, SOA, Big Data and Service Technology experts and authors will be participating at the 6th International Service Technology Symposium (www.techsymp.com) in Mexico City on December 4-5, 2013. Founded by Arcitura, this is the world's largest event dedicated to Service Technology, SOA, Cloud Computing and Big Data, featuring top industry experts and authors from around the world. Also scheduled are a series of CCP and SOACP certification workshops from SOASchool.com and CloudSchool.com.
The Symposium conference series is governed by Arcitura Education, and is based on a substance-only philosophy whereby selected speaker submissions are judged primarily on their educational and informational value. Spanning two conference days, the speaker sessions are organized across the following conference tracks:
- Cloud Computing Architecture, Brokers & Patterns
- Big Data & Event Processing (Practices & Tools)
- Emerging Service Technology Innovations
- API Design & Architecture (including Mobile, Social)
- New SOA & Service-Orientation Practices & Models
- BPM & Adaptive Case Management
- Service Infrastructure, SDN & Virtualization (including PaaS, IaaS)
- Service-Enabled Enterprise Architecture
- Governance & Management for API/SOA/Cloud
- Real World Case Studies & Business Cases for Service Technology
By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."
- Internet & Networking Technology
- Technology & Electronics