RYE BROOK, NY — (Marketwired) — 11/12/13 — ImageWare Systems, Inc. (OTCQB: IWSY), Intel Corporation (NASDAQ: INTC) and StrikeForce Technologies, Inc. (OTCBB: SFOR)
()
Mr. Shawn McPherron, Cloud Marketing Manager, Fujitsu North America, told us, “Up until now, anytime a company wanted to embed biometric security into their systems and applications, they had to first buy licenses and hardware, complete a systems set-up, hire IT staff, and start on a lengthy development and deployment project. Our work with ImageWare enables us to deliver a SaaS-based solution — or -BioID as a Service.- Now, your BioID projects can be implemented in days, not months, and you only pay for what you use, eliminating the need for large capital investments up front. This is a game-changer for security enablement.”
For the complete interview with Shawn McPherron:
*****
Mr. Ed Keegan, Director, Cybersecurity Strategies & Portfolio, U.S. Public Sector, HP Enterprise Services, told us, “CM represents a maturation of information technology. Over the past 15 to 20 years, various tools have been created to address individual problems, such as perimeter protection, endpoint protection, data loss prevention and so on. Once implemented, the tools are presumed to be doing the job. Therefore, original information assurance programs were written to ensure these tools were present — not to ensure they were integrated and operating properly. CM represents the next logical step in this process — automated, continuous auditing of the cyber environment to ensure proper configuration along with proactive monitoring for threats and vulnerabilities. This will ensure security compliance resulting in the prioritization and initiation of actions required to further secure the governments- information and systems.”
()
()
For more information:
()
()
*****
ImageWare recently announced that, “Global Payout, Inc. has signed an agreement with ImageWare Systems, Inc. (OTCQB: IWSY) (-IWS-), the leader in cloud based multi-modal biometric identity management solutions, whereby ImageWare will provide its patented GoCloudID Software as a Service (SaaS) platform, which will enable a fully-validated, feature-rich, security solution that will run on top of the Fujitsu Cloud IaaS Trusted Public S5 platform. Global Payout and ImageWare will enable secure access services for users of Global Payout-s Consolidated Payment Gateway. The MoneyTrac Consolidated Payment Gateway (CPG) provides clients with both off-the-shelf and customized payment options through a worldwide payment solutions platform tied to banks, card associations and payment processors. Working through processors and banking relationships, the CPG provides a custom, one-stop solution for access and payments to international and domestic bank accounts, debit cards and other payment systems in more than 120 countries through desktop and mobile devices.”
Multi-modal biometrics are being adopted by industries requiring limited access to restricted areas — such as in the transportation, utility, and governmental markets. The financial services and banking industry has begun adopting the technology for use in the banking, payment processing, and eCommerce sectors. By including ImageWare Systems GoCloudID with ID document capture, and biometric authentication, Global Payout is delivering the next generation method to automate and verify the “know your customer” (KYC) process.
In 2012 the United States saw more than 12 million identity fraud victims at a dollar cost of $21 billion. In fact, an identity is stolen every three seconds. “Worldwide mobile payments are expected to become a $400 billion market by 2015,” said Jim Miller, CEO of ImageWare Sytems. “We are pleased to work with Fujitsu to offer Global Payout clients worldwide, with the additional level of, and the IT security industry-s most reliable form of identity theft protection for accessing their gateway accounts through desktop and mobile devices.”
“Our MoneyTrac Consolidated Payment Gateway platform enables our multinational business clients to efficiently make payouts to their employees, contractors, and affiliates through a single management console,” says Bill Rochfort, president and executive vice president of sales and marketing, Global Payout. “Working with ImageWare Systems, our gateway solution can now offer a second level of access authentication to each individual-s electronic wallet account, reinforcing the accurate identification of the end-user.”
ImageWare-s services will be delivered for a onetime enrollment fee per new customer and a monthly subscription fee basis that will vary per customer). Services are to be delivered via Fujitsu-s global data center networks, with the Fujitsu platform providing full configured, on-demand IT infrastructure for the ImageWare CloudID SaaS.
“We are pleased to be able to provide authentication and verification over the Fujitsu Cloud IaaS Trusted Public S5 platform from ImageWare Systems to Global Payout customers around the world,” said David Berry, executive vice president, infrastructure services, Fujitsu America. “Our cloud platform addresses the needs of the enterprise, service providers and consumers by enabling the deployment of a secure, agile and reliable could-based identity management solution.”
()
IWS CloudID:
ImageWare Systems Solutions:
ImageWare Systems Products:
For ImageWare Systems Investors:
For more information:
*****
Mr. Net PayneChief Marketing Officer, March Networks, An Infinova Company, told us, “March Networks is ranked the #1 provider of enterprise digital video recorders (DVRs) in the Americas, as well as the #1 supplier of video surveillance equipment to the Americas- banking market (IHS Inc., formerly IMS Research). While our video surveillance solutions can be used in a variety of industries and applications, we focus in particular on providing the financial and retail markets with integrated solutions that help them increase profits and realize faster returns on their technology investments. We are also a leader in providing mobile video surveillance solutions to bus and light rail transit authorities.”
()
()
()
()
()
()
()
()
()
()
()
*****
Mr. Raj Samani, McAfee, EMEA CTO, told us, “Our dependency on services that are IP enabled is growing significantly and will continue to grow; from smart meters, power and water grids, train systems and every day devices such as units in cars, refrigerators and televisions. The need to correctly identify and authenticate when they connect to the Internet will be of critical importance, particularly if we consider devices related to health. In addition there is a need to ensure that they are capable of resisting cyber attack, as the impact of their unavailability could lead to serious economic effects.”
()
For more information:
*****
StrikeForce Technologies, a company that specializes in Cyber Security solutions for the prevention of Data Breaches and Cyber Theft, recently announced, “…a new partnership with , a leading IT Security Solutions provider in Lagos, Nigeria.”
“We are very excited to have FlexiP as a strategic sales partner,” says Mark L. Kay, CEO of StrikeForce. “They are a Premier IT Solutions Provider, with a special emphasis on Enterprise Cyber Security Solutions for Financial Services, the Oil & Gas Industry, Telecommunications, Manufacturing and Government Agencies. This new partnership follows our corporate strategy to build a strong global sales channel with security focused distributors that are already trusted by their numerous clients.”
“We believe that the StrikeForce suite of solutions will greatly help us extend our IT security portfolio and deliver superior value to our customers in the war against identity theft and cybercrimes,” says Rex Mafiana, CEO of FlexiP Group. “Now that we are a StrikeForce partner, we have already started the process of reaching out to our customers to discuss StrikeForce-s , their and their soon to release solutions.”
()
For more information about:
()
()
()
; (OTCBB: SFOR)
Please read our
*****
CyberLock shared with us the following product news.
The CyberKey Grand Master is more than just your average master key. The Grand Master can perform multiple functions, depending on which software solution is in use.
In the Grand Master can be programmed to perform any or all of the following:
Open locks
Program new locks
Update locks
Download lock audit trails
Create emergency keys
In the Grand Master can be programmed in one of two ways:
It can be configured to program, download, and update CyberLock cylinders and padlocks. This key configuration is ideal during the initial set up of a system. New locks can be quickly and easily added to the system simply by touching them with the Grand Master key.
It can be configured to create emergency keys and open locks. By configuring your Grand Master this way, you have a built-in contingency plan in case of emergency.
After initial setup of a system, it-s a common practice for Professional level users to reprogram their Grand Master from the -program, download, and update- mode to the -emergency key- mode. Grand Master keys that are programmed as emergency keys should be stored in a secure location that can only be accessed by authorized personnel.
For more information about CyberLock products: .
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, CyberLock:
For CyberLock News & Events:
For the CyberLock Solutions Center:
For more information:
*****
CARTES Secure Connexions Event 2013 is the comprehensive event (trade show, conferences and awards) entirely dedicated to the digital security and smart technology sector and its innovations.
Integrating its full value chain, CARTES Secure Connexions 2013 is the only event enabling global synergies at a human and technological level, ideal for business deals and partnerships.
()
*****
and the (IBIA) have launched a visionary new international conference and exhibition — — that focuses on all aspects of personal identity and the opportunities for its management in both the physical and digital worlds.
Taking place on March 17-19, 2014, in the heart of Washington, DC, will unite solutions adopters and stakeholders from the four corners of the globe and will explore the development and fusion of multiple advanced identity technologies — including biometrics, secure credentials and digital identity systems.
Contact: Janine Bill, Exhibition Sales & Sponsorship Manager at Tel No: +44 (0) 1189 843209 or by email at: .
*****
GovSec, the national event for government security, is bringing its top-notch education and security expo to the Western United States — an area that meets the challenge of protecting our nation-s borders 24 hours a day.
GovSec West is the conference and expo helping you secure the homeland. Taking a comprehensive approach to securing our nation, it addresses the need for protecting critical infrastructure from domestic and international terrorism, preparing for and responding to natural and accidental disasters, as well as building, maintaining and integrating comprehensive security architecture to protect against cybercrime, cyberterrorism and other domestic and international threats. This combination provides security professionals and first responders with the necessary insights, tools and tactics to protect their communities and our nation.
GovSec West serves the needs of government security decision makers from the military, federal civilian agencies and departments, state and local emergency response officials and law enforcement from the federal, state and local level.
*****
Imperial Capital is pleased to announce the 2013 Security Investor Conference to take place on December 11-12 at the Waldorf New York.
*****
ISC East is the Northeast-s Local Connection to the World of Security. Join us November 20-21, 2013 at the Javits Center North in New York, NY.
Your registration gets you:
Direct access to technical reps from more than 200 brands — review the latest products, technologies & services to stay ahead of what-s new in Security.
Free business seminars designed to help you increase revenue and reduce costs — high quality, commercial-free information and insight into the most relevant new products, technologies and business strategies you need to know about in today-s evolving security market to stay ahead of your competition.
Drinks & networking on the exhibit floor — a casual environment to join your colleagues and peers for collaborating, sharing ideas, and good, old fashioned socializing.
Local expertise from association leaders in NY, NJ, CT and PA — meet and chat with leaders of your local chapters from the security industry.
ISC East is sponsored by the Security Industry Association. Register to attend today:
*****
Mobile computing has changed the IT and data security landscape. Device adoption has mushroomed, network access is almost universally available and BYOD is the new normal. Understanding the risks to data and corporate information and planning for sustainable ways to manage those risks is critical. There are new attack models in the next-gen mobile paradigm, but there are also new protection models. The Conference on Mobile & Smart Device Security brings together organizations that have adopted innovative security technologies and programs while still leveraging the power of mobile. You will learn best practices from front-line practitioners and the latest solutions to help you implement effective data protection in our mobile world. Contact: Dina Dvinov at
The CSA Congress is the industry-s premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. In addition to offering best practices and practical solutions for remaining secure in the cloud, CSA Congress will focus on emerging areas of growth and concern in cloud security, including standardization, transparency of controls, mobile computing, Big Data in the cloud and innovation.
Contact: Dina Dvinov at
*****
PSA Security Network is excited to announce Dream Team, 3 new educational programs built specifically for today-s security integrator. It addresses three different areas of expertise in your operation, including: targeted training for leadership, technical training and sales optimization.
The Dream Team series of programs was developed to help support your whole team! It is about having the right people, with the right skills, knowledge and attitude to help you execute your strategic plan to achieve your business outcome objectives. These easy to manage programs allow you to track your progression, as well as your teams, from start to finish, making tracking simple and fast.
is designed to engage, motivate and unite PSA Owner Companies. This program offers you and your workforce practical approaches, tools and scripts gleaned from the world-s greatest managers. helps you to master the art of qualifying, designing and selling integrated or phased security solutions that get funded and approved. . The Security CEU Technical Certification Program offers some outstanding content from IP Video and Access Control to Networking. The opportunity to earn a credential benefits both you and your customers. This credential identifies you as a trained security professional.
—
If you would like more information about these programs and what they can do for you and your employees, please contact Barbara Shaw at or visit our page to learn more and get started today!
*****
(Security Document World) — the world-s leading document security show — focuses on ePassports, visas, driving licenses, national IDs, worker credentials, advanced border control, anti-counterfeiting, fraud detection, and much more. The event will provide a global showcase for next-generation human identity solutions, focusing on intrinsic document security and on the new cutting-edge secure infrastructure now required to produce and use these advanced documents in live situations. Plus, a special focus on Biometrics, Document Fraud Detection and Intelligent Border Control.
Contact: Janine Bill, Exhibition Sales & Sponsorship Manager at Tel No: +44 (0) 1189 843209 or by email at:
*****
On Nov. 20, the Security Industry Association (SIA) hosts () in conjunction with () in New York, N.Y.
At The Lighthouse at Chelsea Piers, SIA will present the George R. Lippert Memorial Award to Ray Dean, former vice president of key accounts for Stanley Convergent Security Solutions. Cygnus Business Media-s Security Technology Executive magazine co-hosts the event and also honors award recipients.
A portion of the proceeds benefits the Mission 500 non-profit organization, which strives to get every company in the security industry to sponsor at least one child, providing access to life-changing basics like food, clean water, healthcare and education.
()
The Security Industry Association (SIA) and ISC Events are proud to present () on Nov. 20-21, 2013, at the Javits Convention Center in New York, N.Y. Find SIA in Booth #L2!
Over two days of exposition and education opportunities, with roughly 180 exhibiting companies and more than 8,000 attendees projected, ISC East offers a vital nexus for security industry professionals in the Javits Center, a hub in midtown New York City. Catch up on exciting innovations and trends in a convenient setting with exhibitors, educators and executives all on hand. The cost of registration for ISC East is $75 in advance and $125 on site.
While at ISC East, attend The Advance, the annual meeting of SIA Membership, at the Javits Center North on Wednesday, Nov. 20. At The Advance, meet other members for breakfast at 7:45-8:30 a.m., and then a meeting and awards ceremony at 8:30-9:30 a.m.
For more information, visit .
*****
The top Cloud Computing, SOA, Big Data and Service Technology experts and authors will be participating at the 6th International Service Technology Symposium () in Mexico City on December 4-5, 2013. Founded by Arcitura, this is the world-s largest event dedicated to Service Technology, SOA, Cloud Computing and Big Data, featuring top industry experts and authors from around the world. Also scheduled are a series of CCP and SOACP certification workshops from SOASchool.com and CloudSchool.com.
The Symposium conference series is governed by Arcitura Education, and is based on a substance-only philosophy whereby selected speaker submissions are judged primarily on their educational and informational value. Spanning two conference days, the speaker sessions are organized across the following conference tracks:
Cloud Computing Architecture, Brokers & Patterns
Big Data & Event Processing (Practices & Tools)
Emerging Service Technology Innovations
API Design & Architecture (including Mobile, Social)
New SOA & Service-Orientation Practices & Models
BPM & Adaptive Case Management
Service Infrastructure, SDN & Virtualization (including PaaS, IaaS)
Service-Enabled Enterprise Architecture
Governance & Management for API/SOA/Cloud
Real World Case Studies & Business Cases for Service Technology
Contact:
*****
Please read our Terms of Use, Conditions and Disclaimers (“Terms”): .
By using our website and any information located at you agree to these “Terms.”
****
You must be logged in to post a comment Login