RYE BROOK, NY--(Marketwired - Aug 5, 2014) - ImageWare Systems, Inc. (
Mr. Ramesh Kesanupalli, Founder of Nok Nok Labs, Founding Member, FIDO Alliance, told us, "Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We're at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.
For the complete interview: www.securitysolutionswatch.com/Interviews/in_Boardroom_NokNok_Ramesh.html
About The FIDO Alliance
The FIDO (Fast IDentity Online) Alliance, www.fidoalliance.org, was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords. The Alliance plans to change the nature of authentication by developing standards-based specifications for simpler, stronger authentication that define an open, scalable, interoperable set of mechanisms that reduce reliance on passwords. FIDO authentication is stronger, private, and easier to use when authenticating to online services.
HP Enterprise Services
Mr. George Romas, Technical Director, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector, told us, "IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities. An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smart phone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house. "
For the complete interview with George Romas: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_Romas2.html
For more information on these topics:
HP blog post, "The Internet of (Secure) Things - Embedding Security in the IoT."
Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497)
Public Sector Services and Solutions (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1131347)
ImageWare Systems, Inc. (
The contract was awarded by the Funciones Ocupacionales Insha, S.A. de C.V., the prime contractor on the project. For ImageWare, the contract is valued at more than $1.0 million and its software will help generate more than one million licenses over the next three years. ImageWare will receive one time license fees for its software upon delivery and ongoing payments for its professional services and maintenance as delivered.
ImageWare will help to deploy the system at governmental offices in the largest cities in the state, including Tijuana, Mexicali, Tecate and Rosarito, as well as implement mobile stations through the state. The project will begin in the third quarter of 2014.
"As security needs become more complex and demanding, our customers increasingly appreciate the unique power and flexibility of our patented cloud-based, multi-modal biometric solutions," said Jim Miller, ImageWare's chairman and CEO. "Our proven track record of providing state-of-the-art biometric solutions for government agencies was a key factor in winning this award."
The multi-modal biometric driver license system will be based on ImageWare's CloudID™ modular software platform that supports the rapid development and deployment of highly secure, yet flexible identity management solutions for the creation of credentials, including IDs, passports, driver's licenses, smart cards and access control credentials. IWS CloudID is designed to deliver a "future proof" identity management solution, allowing unlimited population sizes and stations, as well as adding additional biometric modalities and incorporating new biometric devices.
The company's IWS QuickApps™ will provide the user interfaces to register applicants, validate identities and print and encode cards. Both IWS CloudID and IWS QuickApps are driven by ImageWare's patented, multi-modal Biometric Engine® 2.0, and the system can be integrated with the government's existing biometric identification and verifications processes. Security for the system will be managed by ImageWare's Desktop Security System, with the use of multifactor authentication, data encryption and a secured log of all actions by the user.
About ImageWare Systems, Inc.
ImageWare Systems, Inc. (
For the complete Press Release: http://iwsinc.com/iwsy-awarded-1m-multi-modal-biometric-contract/
For more information:
ImageWare Systems Solutions: http://iwsinc.com/solutions/
ImageWare Systems Products: http://iwsinc.com/products/
ImageWare Systems Investors: http://iwsinc.com/about-iws/investors/
For more information: www.iwsinc.com
Mr. Michael D. Day, IBM Distinguished Engineer, Virtualization and Linux, said, "None of the security issues associated with networked computing have gone away with Cloud Operating Systems. In many ways we are more vulnerable than ever to breaches being escalated. The Trusted Platform Module is a partial solution which can validate the boot chain of a compute node. (Verify the platform has come up without a root kit). The TPM is well supported by Linux and by the KVM hypervisor, but not widely used, although it should be. As bad as the security issues are with data center computing, they are much worse with the IoT right now, primarily because that set of products has evolved in a disconnected state and has not been exposed to attack in the same way our data processing infrastructure has been for decades."
For the complete interview: www.securitysolutionswatch.com/Interviews/in_Boardroom_IBM_MichaelDay.html
StrikeForce Technologies, Inc. (
"We are very pleased that our ProtectID Two-Factor Authentication Platform will NOW protect Microsoft Office 365," says Mark L. Kay, CEO of StrikeForce. "ProtectID will secure Office applications via integration into Active Directory Federation Services (ADFS). A number of our current and pilot clients are looking for this capability and many others are moving in this direction. According to Microsoft, SharePoint is used by 78% of Fortune 500 companies."
Active Directory Federation Services is the component within Microsoft® Windows Server™ that provides web Single Sign-On (SSO) technologies through federation using standard authentication mechanisms such as Security Assertion Markup Language (SAML) and Kerberos. Microsoft applications secured by ProtectID now include:
- Azure cloud services
- Exchange Online
- Lync communications services
Microsoft Office 365 gives SMB's and all sized companies the opportunity to access advanced IT services and solutions without the need to manage programmers in house -- or even have any IT expertise. Employees can gain anywhere access to the programs they use on their office PC -- such as Word, PowerPoint, Outlook, and Excel. This ensures they can work more effectively when away from their desk, using a laptop, tablet or smartphone.
"Authentication is required more now than ever with Microsoft Office 365's increasingly wide low cost access to your enterprise's secured applications. The ProtectID Authentication Platform is a solution that provides the greatest number of authentication methods, options and patents to protect you and your company," says Mr. Kay.
For more information about:
ASIS International 60th Annual Seminar and Exhibits
September 29-October 2, 2014
Join us in Atlanta, Georgia, September 29-October 2, 2014 for the ASIS International 60th Annual Seminar and Exhibits--the world's most influential security event.
Program highlights include:
- 250 education sessions spanning all security disciplines and industry sectors
- Security products and services from 600+ leading solutions providers
- Unmatched peer-to-peer networking opportunities
- Colocated event: (ISC)² Security Congress.
The New York City Cyber Security Summit
Thursday, September 18th
The Hilton New York • New York City
REGISTER NOW with promo code SECURITYSOLUTIONSWATCH to access your 50% OFF Full Conference Passes.
REGISTRATION LINK: http://cybersummitusa.com/register/
The Cyber Security Summit, an executive conference series sponsored by The Wall Street Journal, is to be held on September 18th in New York City. The Cyber Security Summit brings together the nation's leading solution providers and renowned information security experts for Senior Executives to discover the latest products, services and strategies necessary for enterprise cyber defense. In today's digital world, every organization needs an effective cyber security plan to protect their business, employees and customers from emerging threats. Join us this September and learn how to best protect highly vulnerable business applications and intellectual property.
Speaker presentations will cover: The Insider Threat / Human Element, Social Computing, Mobile Security & BYOD, Cyber Supply Chain Security, Threats Facing Banks & Financial Institutions and more!
To view a full list of participating sponsors & speakers visit: CyberSummitUSA.com
Keep your organization at the forefront of cyber security and most importantly, secure!
Congress Centre Düsseldorf
October 13 - 15, 2014
LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
US/Canada Border Conference
Cobo Center, Detroit, MI
September 16-17, 2014
Beyond the Border 2.0
The US/Canada Border Conference will bring together local, state, provincial and federal agencies, as well as business organizations, in a central location convenient to both nations, to advance the "Beyond the Border" Action Plan between the United States and Canada.
Government and industry leaders share their knowledge and thoughts at a conference designed to enlighten, inform and educate the audience on the complex challenges outlined in the bi-lateral plan. The program advances the mission by providing a forum that helps foster collaboration while gaining a better understanding of the political, infrastructure and technological needs in the combat against current and future security threats, while improving the efficient flow of legal cross-border activity
Sponsors will attend all keynotes, panel sessions and food functions and have the unique opportunity to meet face-to-face with border security leadership from both the US and Canada.
Contact: John Moriarty, jmoriarty@EagleEyeExpos.com, 203-822-7953
WORLD SMART WEEK
Chip-to-Cloud Security Forum
Advances in Securing Embedded, Mobile & Cloud Services and Ecosystems
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
Chip-to-Cloud Security Forum provides an independent collaboration and information-sharing platform dedicated to advance end-to-end digital security. Created from the former e-Smart and Smart Mobility conferences, its wide-ranging technical conference covers four key themes: embedded security, security & mobility, M2M & IoT security and secure cloud applications. The full digital security value chain will attend, with 300 expected attendees from Academia and Industry. Part of World Smart Week (1700 participants), the Forum offers great networking and forward-thinking opportunities with the attendees of the three co-located conferences dedicated to contactless/mobile, e-ID and M2M services and also includes a 50-booth exhibition. Visit us online at www.chip-to-cloud.com
M2M Innovation World Congress
Smart Services for Vertical Markets
Conference & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
M2M Innovation World Congress invites all the M2M stakeholders to shift from a technology-driven to a business- and user-centric approach. Focused on emerging business models, technologies and best practices, this conference & exhibition gives its participants new inspirations to innovate and setup business while meeting prominent figures both from M2M industry and verticals. The conference will explore in particular M2M innovations in Smart Grids, Smart Cities, Retail and Consumer Electronics. Held in conjunction with the three other smart devices-related conferences and 50-booth exhibition forming World Smart Week, the Congress provides its 300 attendees rich opportunities to network, share knowledge and develop business with 1700 participants overall. Visit us online: www.m2minnovationworldcongress.com
NFC World Congress
Mobile Proximity: Innovation, Services & Business
Conference & Exhibition September 22-24, 2014 - Marseille Provence, France
Now in its 4th edition, NFC World Congress explores the emerging ways to interact with the digital world through NFC and related mobile proximity technologies.
From start-ups to leading IT/mobile players and implementers from verticals, its conference gathers 600 participants from 60 countries eager to advance mobile proximity business in all its applications. Within World Smart Week, the Congress benefits from synergies of contents with three co-located conferences and a 50-booth joint exhibition. 1700 participants overall will converge at this global meeting of contactless/mobile, e-ID, M2M and digital security industries. Visit the Congress online: http://www.nfcworldcongress.com
World e-ID Congress
Identity services for Government, Mobility & Enterprise
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
Since 2004 World e-ID gathers e-ID programs managers, government officials and technology experts around world's most inspiring large scale rollouts and latest innovations. Over 400 delegates from 60 countries are expected in 2014. Among the conference highlights: mobile ID advances, emerging countries and EU projects' latest results, cyber-security policies, e-ID for banking... Its 50-booth exhibition, featuring e-ID solutions leaders, will add knowledge sharing and networking opportunities with the mobile/contactless, M2M and digital security professionals attending World Smart Week (1700 participants overall). Visit the Congress online: http://worlde-idcongress.com
By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."