NEW YORK, July 20, 2017 (GLOBE NEWSWIRE) --
Kurt Takahashi, President, AMAG Technology - A G4S Company
Marc Blackmer, Cisco, Product Marketing Manager, Industry Solutions, Security Business Group
Samir Shah, CEO, Cyberinc
Ken Mills, General Manager, Dell EMC, Surveillance and Security
Steve Visconti, President & CEO, Extenua
Jim Miller, ImageWare Systems, Chairman and CEO
Scott B. Suhy, CEO, Netwatcher
AMAG Technology’s Symmetry™ Security Management Solutions are deployed across a wide variety of market segments from commercial to government, education, healthcare, banking, transportation, utilities, plus many more. Headquartered in Torrance, California with sales and support located throughout the Americas, EMEA, APAC and LATAM, AMAG provides customers with industry leading unified security solutions. AMAG Technology is part of G4S plc, the world’s leading global integrated security company which has operations on six continents and 585,000 employees. As the industry leader, AMAG focuses on delivering the latest technology to meet market needs. Its next generation of Symmetry security solutions help organizations operationalize their business to mitigate risk, meet compliance requirements and save money.
For our complete interview with Kurt Takahashi, President, AMAG Technology - A G4S Company, please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html
In recent news:
Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group, Cisco, shared with us, “We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“ More
Samir Shah, CEO, Cyberinc, told us, "Isla represents an entirely new approach to cyber security. Until now security solutions have always been based on detecting “bad things” and blocking them from running. Anti-Virus tries to detect “bad files”, Web Filters try to detect “bad websites”, the list goes on and on. Isla takes a different approach to the problem. Instead of detecting “bad” things, Isla simply isolates ALL web content in a specialized environment located outside of an organizations sensitive network. Since ALL content is isolated no attacks can ever “slip through the cracks” and compromise the user. This is a simple, yet powerful approach. Since organizations vary so widely, Isla is offered in a number of ways to suit each potential customers’ needs. Isla can be deployed as an appliance directly at a customers’ office, it can be deployed in a customers’ existing cloud data centers or it can be delivered as a pure Cloud service by a Cyberinc Isla Cloud Service partner. More "
In recent news:
Cyberinc, An Aurionpro Company, appoints Romi Randhawa as Chief Strategy Officer; strengthens Leadership Team
Cyberinc partners with Sohonet to deliver Isla® Cloud Malware Isolation to defeat advanced cyber attacks
Cyberinc partners with OvationData to launch Isla® Cloud Malware Isolation to defeat advanced cyber attacks in UK
Interchange partners with Cyberinc to shut down cyber threats
• Dell EMC, General Manager, Surveillance and Security, Ken Mills
Ken Mills, Dell EMC, General Manager, Surveillance and Security, told us, “It is an exciting time to be at Dell EMC right now. Dell Technologies is now #1 In Everything, All in 1 Place and we are bringing this world-class portfolio to the surveillance market. Never before, have our customers and partners been able to modernize their surveillance infrastructure with an end-to-end portfolio like we have a Dell EMC. We are leveraging the same industry-recognized surveillance lab to expand our validated solutions to include the entire Dell EMC portfolio This is a huge step forward for the industry where for the first time, our customers and partners can purchase with confidence all of their surveillance infrastructure needs from one place - Dell EMC.”
“Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe." More
FOR MORE INFORMATION:
Learn here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!solution_portfolio
For Dell EMC Partner Validations, please click here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!partner_validations
Extenua has just released a most timely white paper…
This free white paper discusses the challenges of keeping ransomware (Cryptolocker, WannaCry, and the like) out of the corporate data storage, whether it is local, in the cloud or hybrid.
CLOUD2DRIVE-PROTECTED ONLINE STORAGE IS IMPERVIOUS TO RANSOMWARE BY USING SILVERSHIELD
“Ransomware is a type of malware that restricts access to the infected computer system, and demands that the user pay a ransom to the malware operators to remove the restriction. Probably the most famous ransomware, even though not the only one, is Cryptolocker, and it’s certainly something you don’t want to deal with. Regardless of the strenuous efforts put in place by Antivirus developers, the rate of infection is astonishing, and these days it’s becoming even worse with an unprecedented outbreak of infection. To make things even worse, ransomware can also access all the shared folders on your NAS/SAN, so if you backup to a network drive your backups will be compromised too. The ransomware goals include, in fact, preventing you from being able to restore your old (healthy) data from a backup.”
Jim Miller, Chairman and CEO, ImageWare Systems, OTCQB: IWSY, told us, “With data breaches happening every day and causing damage to your brand, tangible economic loss, and termination of employment for executive management charged with oversight, enhancing security without compromising user experience is a priority for today’s organizations. Multi-modal biometrics for user authentication handles this requirement and that’s what ImageWare does. We have invested substantial time and effort into making the implementation of biometric security simple, quick, and cost-efficient. Being a pioneer in biometrics, with several decades of experience, ImageWare has built its brand through deployments in law enforcement applications, later migrating to secure biometric credentialing, and more recently, to authentication in the cloud using smart mobile devices. At the heart of all of our product offerings is the patented IWS Biometric Engine® (BE), which provides an ultra-scalable, real-time, multi-modal biometric enrollment and matching database specifically built for biometrics. The BE supports a dozen different biometric modalities today and adding new modalities is simple and straight forward. As we say, “we secure your future,” meaning that we not only satisfy your current security requirements, but we also secure your investment as new biometric technology becomes available. We treat biometrics as “plug and play,” so you can take advantage of new advancements with no loss to your current investment.” More
For more information:
About ImageWare Systems (https://iwsinc.com/about)
ImageWare Systems Markets (https://iwsinc.com/solutions)
ImageWare Systems Products (https://iwsinc.com/products)
ImageWare Systems News (https://iwsinc.com/category/news)
ImageWare Systems Investors (https://iwsinc.com/about/investors)
ImageWare Systems Partners (https://iwsinc.com/partners)
ImageWare Systems Resources (https://iwsinc.com/resources)
ImageWare Systems Patent Portfolio (https://iwsinc.com/about/intellectual-property/)
Scott Suhy, CEO, NetWatcher, told us,"On May 12th, 2017 the WanaCry (or WCry, WannaCry, WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) ransomware was unleashed and caused over 75,000 attacks in 99 countries.
How Does the WanaCry Ransomware Work?
The Ransomware initially entered organizations via a phishing email message and then exploited a vulnerability (MS17-010) in Windows to spread within a network locking down computers and asking victims to pay $300 via Bitcoin. The Windows vulnerability was leaked as part of the NSA Shadow Brokers hack and Microsoft soon after released a patch however many computers were not yet updated at the time of the attack.
What Should I do? What do NetWatcher Customers do?
Customer’s first need to ensure they are not vulnerable to the attack: NetWatcher Managed Detection & Response customers leverage a built-in vulnerability scanner that periodically scans their environment for vulnerabilities. If the customer was vulnerable to the new ransomware they would have seen the vulnerability titled “SMBv1 Unspecified Remote Code Execution (Shadow Brokers)” show up in their reports as a high severity issue and warned that they needed to patch the Windows asset.
Cyber Intelligence Europe will take place in Bucharest, Romania and provide in-depth case studies of recent threats and attacks faced to government infrastructures. Many governments are increasing their focus on developing strong cyber defence strategies against possible attacks. With this in mind, our 5th annual Cyber Intelligence Europe conference and exhibition will bring together leading public sector officials who will discuss their cyber security plans, strategies and current capabilities. For more information regarding this international event please contact us at email@example.com or +44 (0)1582 346 706.
The US/Canada Border Conference brings together border security leadership from the U.S. and Canada to provide an educational experience designed to help advance your agency’s mission. The conference is developed by former border security officials who understand the educational needs of today’s border security professionals.
This two-day event, focused on advancing the Beyond the Border Action Plan, is strategically located in Detroit, Michigan, near several of the busiest shared ports between the United States and Canada. The “Beyond the Border” initiative outlines a vision for perimeter security and economic competitiveness whereby the U.S. and Canada work in partnerships within, at, and away from our borders to achieve enhanced security and accelerate the legitimate flow of people, goods, and services between our two countries.
The United States and Canada bilateral relationship is among the closest and most extensive in the world. Each day, $2.0 billion of cross-border trade is conducted between the U.S. and Canada. 300,000 people cross between the countries every day by all modes of transport. The two nations work cooperatively on border security, law enforcement, environmental protection and free trade on multiple levels from federal, to state and provincial, to local.
Now in its 13th edition, World e-ID and Cybersecurity explores the latest secure identification technologies, their implementation and the related online trust challenges. Over 2.5 days, 400 project managers, government reps and technology experts will join in to learn, share visions with counterparts worldwide and foster cooperation for successful secure Identity & Cybersecurity implementations.
From printed documents to the identity of connected objects, the agenda will deliver a clear vision of secure identification as boundaries are blurring between physical and online ID, between private and public sector cybersecurity, between citizen and consumer online trust. Within Smart Security Week, additional learning, networking and innovation discovery events are also part of the agenda: exhibition & demos, workshops & tutorials, awards ceremony… along with multiple bridges with the co-located conferences addressing identity for development, IoT security, cyberthreat intelligence and risk management.
IDENTITY WORLD is the new conference on how trusted technologies address the state of the individual identity and its contribution to global development. An estimated 1.5 billion people do not have an official, government issued and recognized document as proof of their legal identity. The majority of these people live in Asia and Africa and a disproportionate number are women and children.
IDENTITY WORLD has set out to address this identity gap through the collective lens of our cultures, experiences, understanding and resources. Complementing its sister World e-ID and Cybersecurity conference till now, both the intensity of discussion and diversity of subject matter has lent itself to become in 2017 a separate space in the realm of public discourse.
Over 2.5 days, 40 speakers will address thoroughly the strategic framework stakes along key themes including: Statelessness & Inclusion • Civil Registration and Vital Statistics • Public & Private Sector Cooperation • Digital Identity, Democracy & Peace.
Thought leadership insights will be illustrated by case studies of large-scale implementations (identity, e-vote, healthcare, welfare payments…) as well as industry and technology perspectives. Multiple panel discussions are scheduled to ensure maximum interactivity.
As IoT solutions are transitioning from hype to real deployments, the “Internet of insecure things” threat is gaining ground. To address unlimited risks, threats and vulnerabilities surrounding IoT, a new generation of connected devices and services is required, with better security and privacy by design. In its 6th edition, Connect Security World invites both digital security experts and IoT developers to discuss and define a true end-to-end security, from sensors to Cloud, from design and development to deployment.
Key 2017 themes include:
– Embedding Security in billion devices: SW/HW approaches
– New IoT networks security: LPWAN, 4G/5G…
– Cost of security: Time to market vs secure design
– IoT security regulation: industry and governments role
Joining Connect Security World offers the opportunity to meet and exchange with 350+ professionals: experts from security research and industry, associations, standards bodies as well as IoT stakeholders from manufacturing to digital services. Within Smart Security Week www.smartsecurityweek.com , they will benefit from additional synergies of contents and networking opportunities.
Continuing A Legacy of Excellence….For more than six decades, ASIS Annual Seminar and Exhibits (ASIS 2017) has been the premier event for security professionals worldwide, providing industry-leading education, countless business connections, and the latest products and services. ASIS 2017 will offer attendees the opportunity to:
CONNECT with 550+ solutions providers showcasing the latest industry innovations and services
NETWORK with 22,000+ security professionals for collaborative learning and solutions for enterprise business and public sector security leaders
JOIN industry leaders accelerating the future of the security profession
SecuritySolutionsWatch.com features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco Security, Dell EMC, HP Cybersecurity, Gemalto, HID Global, ImageWare, Siemens Security and SONY Security, just to name a few.
What's YOUR cybersecurity, physical security, mobility, payments, safety or "smart" solution?
We invite you to please join us "In The Boardroom", more details here, or here: http://www.securitysolutionswatch.com/Main/ThoughtLeadershipOpportunity_July2017.pdf
Please click here for our Media Kit (http://www.securitysolutionswatch.com/MediaKit.html)
Please click here or here: http://www.securitysolutionswatch.com/Main/170502%20RATE_CARD-4.pdf for additional details about our offerings.
FOR MORE CONTENT ABOUT SECURITY THREATS AND SOLUTIONS...
...PLEASE CLICK HERE FOR OUR MONTHLY NEWLETTER
PLEASE VISIT US ON TWITTER HERE: https://twitter.com/SecStockWatch
Contact: Martin Eli Publisher