Security Experts Discuss Solutions "In The Boardroom" On AMAG (GFS), Cisco, Cyberinc, Dell EMC (DVMT), Extenua, ImageWare (IWSY), Infilux, NetWatcher, StrikeForce (SFOR), VOTI DETECTION™

Rye Brook, New York, UNITED STATES

NEW YORK, Dec. 07, 2017 (GLOBE NEWSWIRE) --

Thank You For Joining Us "In The Boardroom" On SecuritySolutionsWatch.Com

Kurt Takahashi, President, AMAG Technology - A G4S Company
Marc Blackmer, Cisco, Product Marketing Manager, Industry Solutions, Security Business Group
Samir Shah, CEO, Cyberinc
Ken Mills, General Manager, Dell EMC, Surveillance and Security
Graham Porter, Business Development Director EMEA, Dell EMC, Surveillance and Security
Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security
Steve Visconti, President & CEO, Extenua
Jim Miller, ImageWare Systems, Chairman and CEO
Jeffrey Liu, Ph.D., CEO & President, INFILUX 
Scott B. Suhy, CEO, Netwatcher
Mark L. Kay, Chairman and CEO, StrikeForce Technologies
Rory Olson, President & Chief Executive Officer, VOTI DETECTION™

• AMAG Technology - A G4S Company, Kurt Takahashi, President

Kurt Takahashi, President of AMAG, said, “At first glance, access control systems may appear straightforward: built simply to lock and unlock a door. But delve deeper, and the administration of granting approval becomes extremely labor-intensive, and timely, in nature. Email traffic between security teams and site managers or business owners becomes overwhelming, as requests for approvals must be granted and access taken away manually, and precious time is wasted generating reports. While this in itself is problematic, it also leads to a rise in third-party compliance regulations. In the US, these can include everything from the Health Insurance Portability and Accountability Act for the healthcare sector to the North American Electric Reliability Corporation's Critical Infrastructure Protection standards for utilities. So, how do you efficiently manage the way that physical identities are requesting approval, and ensure that it is carried out correctly?"

For our complete interview with Kurt Takahashi, President, AMAG Technology - A G4S Company, please click here or here:

In other recent AMAG news:

Pelco and AMAG Join Forces to Provide Integrated Surveillance and Access Control Solution
LifeSafety Power Announces Enhanced Partnership with AMAG Technology
LSP’s FlexPower® ACLASS™ Unified Power System for AMAG controllers combine power, lock and access control functionality in a single design.

• Cisco, Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group
   Cisco Blog

Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group, Cisco, shared with us, “We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“  For our complete interview with Marc Blackmer please click here or here:

• Cyberinc, CEO, Samir Shah

Samir Shah, CEO, Cyberinc, said, “Browsers are our window to the World Wide Web, as we access various types of browsers on a variety of smart devices, umpteen times a day. The ubiquitous web browser - the strategically important application on corporate desktops, ironically, is also the only application on the desktop that regularly downloads and executes code from both trusted and untrusted networks. To borrow an analogy from airport security, the browser, by default, does not ‘scan’ or ‘frisk’ the code that enters and executes on the endpoint. As a result, browsers which keep the business connected to the global economy, have also become the preferred channel for cybercriminals to snake their way into our devices & systems.

Cyber hackers are exploiting the inherent vulnerabilities associated with browser code and plug-ins to launch devious cyber attacks, impacting business continuity and revenues, along with eroding consumer trust and loyalty. Multiple vulnerabilities detected across popular browsers such as Google Chrome, Thunderbird, SeaMonkey and Mozilla Firefox by cyber sleuths in India, all highlight security issues within the browser. A recent advisory issued by the Computer Emergency Response Team of India (CERT-IN) has listed key browser vulnerabilities: of how browsers could be exploited by a remote attacker to bypass certain security restrictions, disclose potentially sensitive information, gain escalated privileges, execute arbitrary code and cause denial of service condition on the affected system."

For our complete interview with Samir Shah please click here or

In other recent Cyberinc news:
Cyberinc launches IAMobile™ App for One Identity’s Identity Manager
BPT Introduces Cyberinc’s ISLA® Web Malware Isolation System in Indonesia: to help prevent Web-borne Malware Attacks
Cyberinc included in “Cool Vendor” list by Gartner in Endpoint, Mobile, Network and Gateway Security, 2017
Cyberinc powers expansion of Isla® into global markets: Signs partnership with Hewlett Packard Enterprise (HPE)

• Dell EMC, Graham Porter, Business Development Director EMEA, Surveillance and Security

“The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase image resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it." For our complete interview with Graham Porter please click here or here:


Interview With Ken Mills, Dell EMC, General Manager, IoT, Surveillance and Security

Interview With Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security

Learn here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here:!solution_portfolio

For Dell EMC Partner Validations, please click here or here:!partner_validations

Please click here for the Dell EMC VIGILARE BLOG - Surveillance and Public Safety Emerging Trends
or click here:

• Extenua, President and CEO, Steve Visconti

Steve Visconti, President and CEO, Extenua, told us, “A number of Fortune 500 companies have already started to leverage the advantages of Extenua’s dynamic product suite: IBM, Kaiser Permanente, Motorola, Shell, True Value...even the NCAA, just to name a few.  Extenua’s award winning SilverSHielD SFTP for Windows is now available as an AMI service on Amazon AWS Marketplace.  Use the industry’s most awarded SFTP SSH software to securely and safely transfer your data to your Amazon cloud service.

More details here: /

Let us tell you how we can help mitigate Equifax type breaches and address all of your cybersecurity concerns with our cutting-edge solutions. Please visit us at“

For our complete interview with Steve Visconti please click here or

• ImageWare Systems, Chairman and CEO, Jim Miller

ImageWare Systems Joins IBM Security App Exchange Community

ImageWare Systems, Inc. (ImageWare or IWS), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, today announced that GoVerifyID for IBM Security Access Manager (ISAM) is now available on the IBM Security App Exchange.

GoVerifyID seamlessly integrates with IBM identity and access management technology to provide a flexible, end-to-end, multi-modal, biometric security solution for all ISAM authentication processes.  ImageWare’s GoVerifyID, combined with ISAM, allows users to swipe a fingerprint, take a selfie, speak a passphrase, show their palm, or enter a PIN on their mobile devices to authenticate for any ISAM managed resource. The enterprise-ready integration package deploys automatically into existing ISAM environments and has been validated by IBM Security.

This new integration is freely available to the security community through IBM Security App Exchange, a marketplace where developers across the industry can share applications based on IBM Security technologies. As identity-related attacks persist as a leading cause of major security breaches, collaborative development amongst the security community will help organizations adapt quickly and speed innovation in the fight against cybercrime.

GoVerifyID integrates with IBM Security Access Manager, which helps companies provide secure and simplified access to web, mobile, and cloud technologies through a single integrated platform. This new integration allows ImageWare and IBM customers to replace or augment passwords with biometrics to provide an improved user experience, increased user identity trust, and greater security.  By eliminating passwords or providing biometric multi-factor authentication (MFA), the risk of a data breach is reduced.

“The major data breaches in the headlines over the past few months remind us of the severe business consequences of such incidents. The ImageWare GoVerifyID product mitigates the risk of these devastating thefts that can bankrupt a company and cause untold pain for their partners and customers,” said Jim Miller, Chairman and CEO of ImageWare. “We are excited to have placed our GoVerifyID for ISAM solution on the IBM Security App Exchange to make it readily available to existing IBM customers.  We look forward to helping enterprises quickly and easily deploy this integration to provide the ultimate in security and ease of use for their ISAM environments.”

In other recent news…
ImageWare Systems and Secure Channels to Provide First Biometrically Protected Entertainment Security Operations Center. More here:

For our complete interview with Jim Miller please click here or here: 

For more information:
About ImageWare Systems (
ImageWare Systems Markets (
ImageWare Systems Products (
ImageWare Systems News (
ImageWare Systems Investors (

ImageWare Systems Partners (
ImageWare Systems Resources (
ImageWare Systems Patent Portfolio  (

TwitterLinkedInYouTube and Facebook.

•  INFILUX, CEO & President, Jeffrey Liu, Ph.D.

Jeffrey Liu, Ph.D., CEO & President, INFILUX, told us, “The 36-month warranty is definitely over the industry standard. Most of our competitors provide 24-month warranty. We provide an extra 12-month warranty because we are confident about the reliability of our products. It also helps us to stand out in a saturated market, which offers a great deal of similar products. Being able to offer this type of guarantee helps ease the consumer's mind, when purchasing a high-consideration product. In addition to our industry-best, 36-month warranty, our price is really competitive comparing to other similar 4mp setups in the market. Also, as mentioned, Infilux provides life-time technical support and customer service."

For our complete interview with Jeffrey Liu, please click here or here:

• NetWatcher, CEO, Scott B. Suhy

Scott Suhy, Chief Executive Officer, NetWatcher, shared with us, “What should YOU have learned from some of the larger breaches of 2017 (InterContinental Hotels Group, Arby’s, Verifone, Saks Fifth Avenue, UNC Health Care, Chipotle, Brooks Brothers, DocuSign, Kmart, Blue Cross Blue Shield / Anthem, Equifax, U.S. Securities and Exchange Commission, Deloitte, Sonic, Whole Foods Market, Hyatt Hotels and of course Uber)?

2 things!

1. It is necessary to continuously monitor your users, network activity and assets for vulnerabilities, malware and bad behavior (users using risky/vulnerable software, sending information over the internet in clear text, clicking on phishing links etc.) is absolutely necessary because firewalls and traditional anti-virus software is not enough.

2. It's absolutely necessary to have policies (example: Logical Access Policy, Encryption Poliy etc. and procedures (Incident Response Plans, Disaster Recovery Plans etc.) in place. This is why the HIPAA Security Rule, the GLBA Safeguards Rule, PCI-DSS, NY State's new 23 NYCRR 500, DFAR 254.204-7012 / NIST 800-171 all call out the need for both monitoring and policy/procedure.

Up to now monitoring has been way too expensive for the Small and Medium Enterprise market. Not anymore! Get”

For our complete interview with Scott Suhy please click here or here: 

• StrikeForce, Chairman and CEO, Mark Kay
Mark Kay, Chairman and CEO, StrikeForce told us, “StrikeForce has been studying the bitcoin market and we see that our products can definitely add great value to this new market (stopping Ransomware and Authentication) and we are looking into participating in some way in this new Blockchain Market.“

For our complete interview with Mark Kay please click here or here:

• VOTI DETECTION™, President & Chief Executive Officer, Rory Olson

Rory Olson, President & Chief Executive Officer, VOTI DETECTION™, told us, “Las Vegas was a terrible tragedy and does trigger additional discussion on security, especially for protection of people and saving lives. There is no doubt in my mind more screening in public and private physical entrances and exits will be required and mandated. Other countries, enterprises and communities outside North America are already taking the step to enhance their security. In many regions of Europe, Africa and the Middle East, hotels, public facilities such as shopping malls, museums, sports venues, concert halls, etc., have x-ray scanners deployed. Asia is following and I expect North America will not be too far behind. As more awareness is given to the role of x-ray scanners in these domains, AI and analytics will play a key role in the automation and predictive detection of threats to all." More

For our complete interview with Rory Olson, please click here or here:

In recent news:
- VOTI Detection™ receives 2017 Top 30 Technology Innovations Award from Security Sales & Integration
- VOTI Detection™ named one of Canada’s Companies-to-Watch in the 2017 DeloitteTechnology Fast 50™ Awards Is Proud To Be A Sponsor Of These Important Upcoming Events

Imperial Capital
14th Annual Security Investor Conference (SIC)
December 6-7, 2017 at the InterContinental New York Barclay.

Imperial Capital is pleased to announce the 14th Annual Security Investor Conference (SIC)  on December 6-7, 2017 at the InterContinental New York Barclay. SIC is the premier industry gathering connecting the leading security focused companies with an audience of key investors and business leaders. This conference provides investors access to senior management teams while they present their positioning and strategic growth plans to deliver the latest compelling security solutions across the Global Consumer, Enterprise and Government Markets. Whether you specialize in cutting edge technologies or more traditional security systems and services, SIC is a fundamental networking event that consistently attracts top management from leading security companies.

IoT Evolution Expo
January 22-25, 2018

Through a series of conference tracks, workshops, keynotes and general sessions, you will hear about Enterprise IoT adoption, implementation and the enormous impact these technologies will have on driving operational efficiencies and increasing revenue.

JAN 31- FEB 1, 2018   /   DEMO DAY: FEBRUARY 2, 2018
Henry B. Gonzalez Convention Center
San Antonio, TX USA

Clarion Events can trace its roots back to 1947 and takes great pride in being one of the oldest independent event organisers in the UK.  More recently the firm has developed an international portfolio of brands and now has interests in a number of global vertical industries. Clarion organises leading events which provide industry leaders, government officials and technical experts with a forum to share ideas, conduct business, develop partnerships, network and access export and growth markets. While the core of the portfolio comprises of military systems and related technologies, it is continually evolving to suit the needs of defence and security bodies in the fight against terrorism, policing humanitarian missions and emergency response and critical national infrastructure planning. CLICK HERE to learn more about our portfolio of Defense & Security events around the world.

TEC 2018
March 12-16, 2018
Sheraton Downtown Denver
Denver, CO

TEC, presented by PSA Security Network, is the premier education and networking event for all professional systems integrators. TEC features industry leading education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.

TEC 2018 will be held at the Sheraton Downtown Denver in Denver, CO on March 12-16, 2018. The education program will deliver sessions focused on emerging technologies, critical issues in the industry, and tool development to augment attendees’ knowledge base needed to continue to drive the industry forward. Sessions will be selected that serve a variety of disciplines including business management, sales and marketing, HR and recruiting, project management and operations, and installation and service.

Joint 2018 Payments Summit / ICMA Expo and U.S. Payments Forum Meeting
March 26-29, 2018
Omni Orlando Resort at ChampionsGate, Championsgate, FL

LAAD Security 2018
São Paulo, Brasil
April 10-12, 2018

The LAAD Security brings together decision makers from across Latin America active in areas related to Public Security and Corporate. LAAD Security is an international security fair in Latin America and has the institutional support of the main Public Security Councils and Councils in Brazil. Institutional support of the Ministry of Justice and the Brazilian Public Security structure, Support of the most representative associations and media of the defense and security sector. The event counts on the expressive participation of the industrial production chain - national and international - of all safety links: in 2016 there were over 100 exhibiting brands from 12 countries.

Airport Show
Dicec, Dubai
7-9 May 2018

The 18th edition of Airport Show will welcome 7,500 aviation professionals and key decision-makers, see the latest innovations and industry players under one roof and reach new markets. Each year, Airport Show attracts thousands of aviation professionals who look for airport and aviation-related products and services to enhance their business opportunities.

Cyber Investing Summit
Tuesday, May 15th, 2018 in New York City.

The Third Annual Cyber Investing Summit is an all-day conference exploring the investment opportunities available in the rapidly growing cyber security sector. The Summit differs from traditional product centered conferences by focusing primarily on the financial side of the cyber security industry. Panels will explore investment strategies, market forecasts, merger and acquisition potential, fallout from high profile security breaches, funding for startups, and more. Attendees include technology analysts, CISOs from large financial institutions, institutional and retail investors, cyber security innovators, venture capitalists, private equity managers, publicly traded cyber security companies, startups, and government experts. The Cyber Investing Summit will take place Tuesday, May 15th, 2018 in New York City. Additional information can be found at

Securing Federal Identity 2018
June 5-6, 2018
Almas Conference Center
1315 K Street, NW, Washington, District of Columbia 20005

Washington, DC
June 11-12, 2018

"The transportation industry is rapidly digitizing, leading to greater risks and potential impacts from cyber and physical events. Understanding how to better safeguard operations and protect critical networks and infrastructure from damage is paramount, and opportunities like TSSX18 that bring the industry together for training and solutions are welcomed by SANS.” 
Doug Wylie, Director, Industrials & Infrastructure Portfolio, SANS Institute

ESX 2018 Registration Now Available
June 19-22 in Nashville, TN

ESX is the premier gathering place for professionals who are passionate about the business of electronic security and life safety. To open the event to even more industry professionals, ESX is launching registration with budgeting season in mind.

"It takes people to drive profits," says George De Marco, ESX Chairman. "At a time when market competition has never been fiercer, it's important to invest in your people — to fuel their development. Launching registration early allows business owners and management to plan for ESX, while in budgeting mode. I urge you to think hard about professional development programming for you and your team — I'm confident there's no other event that can deliver the same impact to your business."

About features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco SecurityDell EMCHP CybersecurityGemaltoHID GlobalImageWareSiemens Security and SONY Security, just to name a few.

What's YOUR cybersecurity, physical security, mobility, payments, safety or "smart" solution?
We invite you to please join us "In The Boardroom", more details here, or here:

Please click here for our Media Kit (

Please click here or here:  for additional details about our offerings.




Contact Data