Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."
For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html
For more information: http://www.cisco.com/go/medianet, http://blogs.cisco.com/category/video
Mr. Jim Miller, Chairman and CEO, ImageWare Systems, said, "Los Angeles World Airports is the flagship deployment for our next generation biometric identity management and advanced credentialing platform. When this solution is fully implemented -- which we expect by Q4 2012 -- it will not only deliver a state of the art biometric-based airport credentialing solution, but will also ensure that the Los Angeles World Airports can adapt this credentialing solution to meet developing needs and evolving technology capabilities, thus 'Future Proofing' their investment for the long term. Our BE 2.0 platform allows our clients to treat biometrics as a 'plug-and-play' model while safeguarding the underlying data. Our recent selection in Ecuador to provide biometric credentials for the country's seaports is a replication of this implementation in the Spanish language."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html
For more information: www.iwsinc.com, (IWSY)
Mr. Jason Waxman, General Manager, Cloud Infrastructure Group, Intel, told us, "With cloud infrastructure, servers are typically virtualized and shared across multiple lines of business or even among multiple organizations rather than dedicated to specific lines of business. When IT wants to link multiple cloud data centers together to gain efficiencies -- the tools to secure this far-reaching infrastructure are still evolving. This lack of visibility -- even in private clouds that are behind a company's firewall -- have people concerned because they no longer have dedicated equipment for their line of business and instead are using shared, multi-tenant resources. This is why 61% of IT that were surveyed are concerned about having less control and visibility over these shared resources, even in a private cloud. Intel and McAfee are working to address these challenges and advance security solutions for cloud services."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_Intel.html
For more information: www.intel.com/itcenter, (INTC)
Mr. Michael Harris, Chief Technology Officer, Precise Biometrics, said, "We have secured our position as the leading provider for Match-on-Card within national identity cards and the deployment of desktop readers for government logical access. As enterprises, such as this leading automobile manufacturer, are now migrating from desktops to mobile, we are ready to support them with our Tactivo product line. Using Tactivo enables the BYOD (Bring Your Own Device) initiative to become a reality as it fully supports the same security infrastructures deployed across desktops around the world. We are truly bridging the gap between corporate and enterprise IT security rules and the ease of use the user community expects."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_Precise_Biometrics.html
For more information: www.PreciseBiometrics.com, http://precisebiometrics.com/tactivo-goverment-ad?tp=2746, (PREC.ST) (ISIN code is SE0001823303.)
CyberLock by Videx announced the release of its new CyberKey smart key. The CyberKey II is a programmable smart key that operates as part of the CyberLock® access control system.
The CyberKey II electronic key serves as an authorizing credential within the CyberLock system (http://www.cyberlock.com/cyberlock_overview.html). It contains a rechargeable battery that powers the key and energizes the electronic lock cylinder when the two devices make contact. Each key can be pre-set with a date to begin operation as well as an expiration date. It has the flexibility to work at all times for all locks or can be programmed to work at specific times on only specific locks. If a key is lost it can be quickly blocked from accessing any locks, eliminating the time and expense of re-keying a facility.
The CyberKey II features a micro USB port enabling users to recharge the key from a computer, car charger, or any other compatible USB device. The key can also be recharged through the key tip using a CyberKey charging station. The USB port allows users to download the audit trail from the key to the management software. The key information can also be downloaded via a CyberLock communication device. While communicating with the software, via the USB port or communication device, the key is updated with any new system information, such as new locks and/or schedule changes. Detailed audit reporting will increase accountability and can be very valuable when a facility manager needs to know who and when someone has accessed an area when an unusual situation arises.
"The CyberKey II is an important piece of the CyberLock system, and it offers a powerful access control solution to businesses with key control problems and concerns about who has access to their buildings," said James McGowan, VP of Sales and Marketing at Videx. "With CyberLock eCylinders and CyberKey II smart keys, facility managers have the opportunity to implement an affordable system that is easy to install and can quickly provide the physical security and key control required."
Videx, Inc. will be showcasing the CyberLock System of electronic locks and programmable keys at the ASIS show in Philadelphia, PA, September 10-12, booth 730.
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx: http://www.securitystockwatch.com/Interviews/in_Boardroom_VIDEX.html
For CyberLock News & Events: http://www.cyberlock.com/news_events.html
For the CyberLock Solutions Center: http://www.cyberlock.com/solutions_center.html
For more information: http://www.cyberlock.com
Wave Systems Corp. recently announced that it "... launched Wave Cloud, a cloud-based service for enterprise-wide management of self-encrypting drives (SEDs). The company's new subscription-based service introduces a game-changing platform for enterprises that wish to rapidly deploy centrally-managed hardware-based data encryption on laptops -- all without the complexity and cost associated with maintaining on-premise servers.
"SEDs provide one of the best defenses against data breach. Based on the Opal specification published by the Trusted Computing Group, the drives are available from leading storage vendors at little to no incremental cost from a wide range of PC suppliers, including Dell, HP, Lenovo and others. Solid-state versions of SEDs are also available. Advantages over software encryption include better performance (because encryption happens on a chip, it doesn't compete for processing cycles); faster deployment (unlike software, SEDs don't require an initial encryption cycle); and enhanced security (encryption cannot be turned off or otherwise compromised by the end user).
"Yet despite the advantages, the need for dedicated servers and in-house IT expertise -- along with tight IT budgets -- has hampered wider encryption adoption."
"Organizations are looking for ways to leverage cloud offerings to reduce the complexity and costs of deploying endpoint encryption," said Eric Ouellet, VP Secure Business Enablement at Gartner. "While the endpoint encryption market is relatively mature, deployment challenges remain. Offerings that can provide standardized, simple-to-use frameworks for typically cumbersome tasks could help accelerate growth in this segment."
These factors, coupled with the rising popularity of cloud-based services, were the drivers for the development of Wave Cloud.
"Wave Cloud opens the door for a new generation of users to discover the top-shelf endpoint data protection afforded by SEDs," said Brian Berger, Wave's Executive Vice President of Marketing and Sales. "The service offers a capital-efficient and easily scalable means for rolling out self-encrypting drives in the enterprise -- with the same management features to be expected from the Wave brand: remote management, policy enforcement and password retrieval."
Subscriptions start at $37 per drive per year with a one-year agreement.
For complete details about this announcement: http://www.wave.com/news/
For Wave Webcasts and Presentations: http://www.wave.com/news/webcasts.asp
For the Wave Blog: http://blog.wave.com/
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier:
For more information: www.wave.com, (WAVX)
Keep Your IP
Mr. Davin A. Roos, Principal, Keep Your IP, said, "Our solution complements the growth burst of Internet-based alarm systems by allowing an IP alarm panel to be programmed with an IPv4 address that is controlled and owned by the alarm dealer. Today the only way for an alarm dealer to implement an IPv4 address is by having the Central Station supply it and that gives the control to the Central Station and not the alarm dealer (good for the CS but not for the Dealer)."
For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_KYIP.html
For more information: www.KeepYourIP.com
ASIS International 58th Annual Seminar & Exhibits
September 10-13, 2012 I Philadelphia, Pennsylvania
ASIS 2012...DRIVING SECURITY'S FUTURE
More than 20,000 security professionals will head to Philadelphia this September 10-13 for the most exciting, informative, and innovative security event of the year -- ASIS 2012 (http://www.asis2012.org/Pages/Seminar-Home-Page.aspx). If you are responsible for protecting human, logical, or physical assets for your organization, city, or nation -- you can't afford to miss ASIS 2012. It is here that you will discover what's changed, what works, and what's next in the industry.
- Best education program in the industry
- Unparalleled networking opportunities
- Exhibit hall packed with innovative solutions
Register today! www.asis2012.org
PSA Security Network Announces Dates for PSA-TEC 2013
May 6-10, 2013
PSA Security Network announced the date and location of its 2013 industry leading education and networking event, PSA-TEC. PSA-TEC offers physical security professionals the opportunity to earn or maintain industry credentials, as well as build their knowledge and professional network in business optimization and acumen, the latest technologies, managed services, leadership development, and much more.
PSA-TEC 2013 will be held from May 6-10, 2013, with the exhibit hall open on Wednesday, May 8, at the Westin Westminster in Westminster, Colorado. Early bird registration is set to begin on February 18, 2013 and end on April 19, 2013.
"PSA-TEC is truly one-of-a-kind and is open to all security professionals, from the integrator to the end-user. The 2012 event exceeded the expectations of PSA-TEC attendees and event sponsors, and we fully expect PSA-TEC 2013 to continue the tradition of constant improvement," stated Bill Bozeman, President and CEO of PSA Security Network. "We are proud to be able to bring together elite professionals and visionaries from the security industry to learn about the latest specialized technologies, industry developments, and business management techniques. There is something of value here for personnel at any level of the organization."
For more information: http://www.buypsa.com/Education/PSA-TEC
For our interview with Mr. Bill Bozeman:
For more PSA Security Network News: http://blog.buypsa.com/category/press-releases
For more information about PSA Security Network: http://www.buypsa.com/
October 30-31, 2012
New York, New York
"After consulting with ISC attendees, exhibitors, supporters, and Associations to determine what is working and what needs improvement, the consensus was to have the Northeast's largest annual gathering of security professionals go back to its roots. As a result, ISC Solutions will again be known and run as ISC East. Over and over, people familiar with the show told us that 'We don't care what you name it, we call it ISC East," emphasizes Ed Several, senior vice president, ISC Events. "They want it to be the East Coast version of ISC West for all segments of the security channel. They want a place where they can network with peers, meet their customers, see new products, and get relevant education to improve their skills. Therefore, we will be adding the best of ISC West along with some distinctly Northeast features to ISC East.
"The exhibition, to be held October 30-31, 2012, at the Javits Center will feature over 300 exhibitors showcasing new products, technologies and services to a wide range of security professionals. For dealers, installers, integrators, and specifiers, the Event will focus on retro-fitting and updating to increase profits. For end users, achieving business optimization is the main theme. Both concepts will be supported by key exhibitors and free high quality education."
For more information see ISC's Press release here: http://www.isceast.com/en/Press/Press-Releases/We-Call-it-ISC-East/
5th International Service Technology Symposium
September 24-25, 2012
Over 100 speakers and over 200 organizations will be participating at this year's International Service Technology Symposium (www.servicetech.co) in London. Founded by Arcitura, this is the world's largest event dedicated to Service Technology, SOA, Cloud Computing and Big Data, featuring top industry experts and authors, along with CCP and SOACP certification workshops from SOASchool.com and CloudSchool.com. Look for talks from: Gartner, Oracle, Microsoft, IBM, NASA, DoD, HP, SAP, Open Group, OASIS, OMG, and many more. For an exclusive registration fee of $99/£ 65/EUR 80, enter Promo Code: JQ4TYU01M
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms."