SYS-CON MEDIA Authors: Elizabeth White, Yeshim Deniz, Pat Romanski, Liz McMillan, William Schmarzo

News Feed Item

Security Solutions Discussed by Industry Leaders in Interviews With HP, ImageWare Systems, T-Systems and CyberLock

RYE BROOK, NY -- (Marketwired) -- 09/10/13 -- ImageWare Systems, Inc. (OTCQB: IWSY) and Deutsche Telecom (OTCQX: DTEGY)

HP Enterprise Services

Mr. Steve Lazerowich, Director, Cybersecurity Solutioning, HP Enterprise Services, U.S. Public Sector, told us, "Today, there is simply no way to provide 100% protection. As events have recently shown, it's not just the bad guys on the outside trying to gain access to your information; organizations must also be mindful of the insider threat. The best approach is defense in depth, or in other words, a multi-layered approach to protecting systems. It starts at the outer most perimeter with firewalls and network intrusion prevention systems. Systems need to be segregated on separate network segments so that a failure in one area does not expose all systems. Servers also need their own end point protection including host intrusion detection, malware protection, data encryption and white listing technology."

For the complete interview with Steve Lazerowich, please click here. (

Please download HP's White Paper "Building Security In"

For more information: Cybersecurity for U.S. Public Sector (


ImageWare Systems

ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in cloud-based, multi-modal biometric identity management solutions, has been awarded a $2.2 million contract by the U.S. Department of Veteran Affairs (VA) to expand its personal identity verification (PIV) credentialing capabilities.

Under the terms of the agreement, ImageWare will deliver software licenses during the third quarter of 2013, whereby the company will receive approximately $1.5 million in revenue. Additionally, ImageWare will receive service revenue valued at approximately $650,000 that will be recognized proportionally over the next year.

ImageWare's biometric identity management solution was first installed with the VA in 2007. The solution provides large-scale, agency-wide biometric identity and credential management capabilities, such as biometrically enabled PIV credentials that are in compliance with U.S. government standards. As part of the system expansion, the VA will also be adopting ImageWare's patented, hardware and algorithm independent Biometric Engine® 2.0, enabling the enrollment and management of unlimited population sizes.

"The U.S. Government has confirmed multi-modal biometric identity management as the only way to move forward as it offers a greater level of security and reliability," said Jim Miller, chairman and CEO of ImageWare. "ImageWare's proven track record of government experience executing best-of-breed patented, fully compliant biometric solutions will drive the standards for commercial adoption. We are honored to continue working with the VA and expand our services in support of their mission. As we look forward, I am confident we will introduce similar solutions to our global enterprise customers and solution provider partners."

The Biometric Engine 2.0, ImageWare's patented, backend database for CloudID™, delivers revolutionary capabilities:

  • Enrollment, identity and verification management of unlimited population sizes
  • Hardware and algorithm independent processing
  • Compatibility with all biometric products
  • Future-proof, plug-and-play flexibility
  • Product modules that can be implemented together or individually
  • License and/or subscription service offering
  • Software development kits

For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (

For more information:

IWS CloudID™:
ImageWare Systems Solutions:
ImageWare Systems Products:
For ImageWare Systems Investors:
For more information:



Mr. Ryan Skipp, T-Systems International GMBH, Portfolio & Solution Design - IT, Applications & Portfolio Architecture, told us, "T-Systems as an Outsourcer has to provide base infrastructure services which meet the cost and quality expectations that a company transitioning to outsourced services would expect -- better than they as an end-user could produce, with better quality, and lower cost! In order to achieve that, T-Systems was one of the first Outsourcers to produce a 'Cloud' platform, based on highly shared leveraged infrastructure, and with a number of pre-defined applications on top of that. Today we have enhanced that infrastructure, and wrapped the Cloud functionality into it, all the way up to self-service (to application level) for our Private Cloud clients." For the complete interview with Ryan Skipp, please click here (

For more information:, OTC symbol of parent company, Deutsche Telecom, DTEGY.



CyberLock shared with us the following product news.

The PowerPort is a compact charger for use with all rechargeable CyberKey smart keys including the RXD II, the RXD, the RCG, and the CyberKey Blue. One side of the PowerPort fits the tip of a CyberKey. The other side of the PowerPort fits any standard USB port.

The PowerPort is designed to work with off-the-shelf USB wall chargers and car chargers. However, it will also charge a CyberKey from most (but not all) USB ports on desktops or laptops. To speak with CyberLock:

"We are excited to announce the addition of the CyberAudit SP-100 Server to the CyberLock access control family. This device has been designed to simplify and accelerate the installation and maintenance of a CyberLock system.

Unified Hardware and Software Solution
The SP-100 comes preloaded with CyberAudit Professional 3.0 software.

Easy to Use
Self-configuring one-click registration and an easy-to-use browser-based interface makes for quick and easy installations.

Flexible Network Configuration
The SP-100 can be set up as a DHCP server in a private network, on a network with a static IP address, or on a network with a DNS server.

Access from Any Operating System
Like the software-only version, CyberAudit Professional 3.0 can be accessed through web browsers installed on any of the leading operating systems. No additional software to download. No ActiveX plug-ins to install.

Reliable Hardware
The hardware is based on the Next Unit of Computing (NUC) solution from Intel®."

To speak with CyberLock:

For more information about CyberLock products:
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, CyberLock:
For CyberLock News & Events:
For the CyberLock Solutions Center:
For more information:


September 17-19, 2013

Many advancements have occurred in the landscape of cyber resilience. However, cyberspace remains a mysterious terrain. A realistic perspective on unknowns must be established to combat and ward off the myriad of risks that threaten our national and economic interests. This event will bring together defense, government and industry leaders to devote a concentrated focus on breaking down the latest in policy, information sharing, security technology and identifiable threats for a cohesive mission strategy that can be directly applied to cross-agency goals.

Contact: David Drey at [email protected] or 312-540-3000 ext. 6583


ASIS 2013

SMART. STRATEGIC. SECURE. ASIS 2013 is the key industry event for security professionals looking for real solutions to real challenges. The colocation of the (ISC)2 Security Congress ( provides enhanced education and networking. Register today! ( )

Use the SHOW PLANNER ( to search all sessions, products/services, and exhibitors.


November 19 - 21, 2013
Paris Nord Villepinte - France

CARTES Secure Connexions Event 2013 is the comprehensive event (trade show, conferences and awards) entirely dedicated to the digital security and smart technology sector and its innovations.

Integrating its full value chain, CARTES Secure Connexions 2013 is the only event enabling global synergies at a human and technological level, ideal for business deals and partnerships.

For more information about CARTES Paris, November 19-20-21, 2013


13th Cloud Expo / 4th Big Data Expo / 2nd SDN Expo, November 4-7, 2013

Two unstoppable enterprise IT trends, Cloud Computing and Big Data, will converge in Silicon Valley at 13th Cloud Expo / 4th Big Data Expo / 2nd SDN Expo -- being held November 4-7, 2013, at the Santa Clara Convention Center in Santa Clara, CA.

As at every Cloud Expo, we are offering in Silicon Valley a vast selection of technical and strategic breakout sessions, General Sessions, Industry Keynotes, our signature discussion "Power Panels" and a bustling Expo floor complete with two busy Demo Theaters so that as a delegate you can kick the tires of solutions and offerings, and discuss one-on-one with all the leading Cloud and Big Data players what they are offering and how to make use of it in your particular situation.

The high-energy event is a must-attend for senior technologists from CEOs on down -- including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.

Contact: Carmen Gonzalez, P: (201) 802-3021 | F: (201) 782-9601, Email: [email protected]


CSFF 2013
21-22 October 2013

The 3rd Annual CSFF offers you exclusive access to the information you need from the industry experts you need to meet.

CSFF is your most comprehensive and definitive source of cyber security information, bringing together industry leaders, advisors, investors and government officials. Through a carefully structured programme of keynote presentations, panel discussions, interviews and networking opportunities, you will gain the insight needed to drive greater revenue and grow your business.

What you will learn:

This conference will debate, discuss and deliver answers to the key challenges facing you, equipping you with guidance and contacts to drive your business ahead.

  • Where do business opportunities really exist?
  • How can you raise your profile and make your business more attractive to large organizations?
  • What is the investment climate for 2013 and beyond?
  • Are there new ways of raising finance?
  • Which government departments really matter and how to gain access to them?
  • How are organizations gaining ground through collaborative partnerships?
  • Where are the next key markets and strategies for gaining entry?
  • What are the emerging cyber security threats looming on the horizon and how to tackle them?


November 20-21, 2013
Javits Center North, NY,NY

ISC East is the Northeast's Local Connection to the World of Security. Join us November 20-21, 2013 at the Javits Center North in New York, NY.

Your registration gets you:

Direct access to technical reps from more than 200 brands -- review the latest products, technologies & services to stay ahead of what's new in Security.
Free business seminars designed to help you increase revenue and reduce costs -- high quality, commercial-free information and insight into the most relevant new products, technologies and business strategies you need to know about in today's evolving security market to stay ahead of your competition.

Drinks & networking on the exhibit floor -- a casual environment to join your colleagues and peers for collaborating, sharing ideas, and good, old fashioned socializing.

Local expertise from association leaders in NY, NJ, CT and PA -- meet and chat with leaders of your local chapters from the security industry.

ISC East is sponsored by the Security Industry Association. Register to attend today:


The Conference on Mobile & Smart Device Security
November 19-21, 2013
Renaissance Boston Waterfront Hotel, Boston, MA

Mobile computing has changed the IT and data security landscape. Device adoption has mushroomed, network access is almost universally available and BYOD is the new normal. Understanding the risks to data and corporate information and planning for sustainable ways to manage those risks is critical. There are new attack models in the next-gen mobile paradigm, but there are also new protection models. The Conference on Mobile & Smart Device Security brings together organizations that have adopted innovative security technologies and programs while still leveraging the power of mobile. You will learn best practices from front-line practitioners and the latest solutions to help you implement effective data protection in our mobile world. Contact: Dina Dvinov at [email protected]

Annual CSA Congress
December 4-5, 2013
Orlando, Florida

The CSA Congress is the industry's premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. In addition to offering best practices and practical solutions for remaining secure in the cloud, CSA Congress will focus on emerging areas of growth and concern in cloud security, including standardization, transparency of controls, mobile computing, Big Data in the cloud and innovation.

Contact: Dina Dvinov at [email protected]



Are you a physical security integrator looking to save time and money? If so, your search is over! Visit PSA Security Network at ASIS 2013 (September 24-27) in booth #3644! With industry-leading sales support, fresh inventory, access to the best training in the industry, a continuously growing vendor selection, and highly competitive pricing, there is no reason to buy elsewhere. PSA provides exceptional education offerings and convenient purchasing, and we will never sell to the end user.

Are you an end user looking for qualified integrators? Then look no further, PSA Security Network's integrators are certified and highly trained, they have access to the best products and leverage the PSA network through best practices workshops and numerous networking events.

Are you interested in setting up a meeting with a PSA Security Network team member to learn more about what we can do for you? Click here ( to make an appointment today!


Gain Exclusive Insights at Securing New Ground® (SNG™)

On Nov. 5-6, 2013, SIA will host SNG™ at the Sheraton New York Times Square Hotel, New York, NY, where security industry leaders will convene for the top executive conference of the year. SNG™ provides attendees with access to inside information not available anywhere else as well as unparalleled networking opportunities for a competitive edge.

If you are a top executive in the security industry, you cannot afford to miss SNG™! Register to attend now (

Join Brad Brekke, Vice President of Target, at the Security 500 Conference in NYC

The Security Industry Association (SIA) and Security magazine are proud to present Brad Brekke, vice president of assets protection for Target Corp., as the keynote speaker for the Security 500 networking and management conference at the Sheraton Times Square Hotel in New York City on Nov. 5, 2013.

Brekke will share insights into his team's efforts to mitigate physical and operational risks across a large and renowned retail company. His department of several thousand assets protection professionals is responsible for protecting team members and guests, the global supply chain, financial products, information security and the company's reputation.

The Security 500 Conference is a one-day program designed for security leaders responsible for supporting an organization's risk management and resilience security strategies. Security 500 attendees share strategies, solutions and challenges on enterprise security issues with their peers; discuss the role of security managers in overall organizational performance; and gain exclusive information from the Security 500 Benchmark Survey.

The conference is only open to qualified attendees and is free of charge. Register at the Security 500 website (


Mexico City, Mexico / December 4-5, 2013

The top Cloud Computing, SOA, Big Data and Service Technology experts and authors will be participating at the 6th International Service Technology Symposium ( in Mexico City on December 4-5, 2013. Founded by Arcitura, this is the world's largest event dedicated to Service Technology, SOA, Cloud Computing and Big Data, featuring top industry experts and authors from around the world. Also scheduled are a series of CCP and SOACP certification workshops from and

The Symposium conference series is governed by Arcitura Education, and is based on a substance-only philosophy whereby selected speaker submissions are judged primarily on their educational and informational value. Spanning two conference days, the speaker sessions are organized across the following conference tracks:

  • Cloud Computing Architecture, Brokers & Patterns
  • Big Data & Event Processing (Practices & Tools)
  • Emerging Service Technology Innovations
  • API Design & Architecture (including Mobile, Social)
  • New SOA & Service-Orientation Practices & Models
  • BPM & Adaptive Case Management
  • Service Infrastructure, SDN & Virtualization (including PaaS, IaaS)
  • Service-Enabled Enterprise Architecture
  • Governance & Management for API/SOA/Cloud
  • Real World Case Studies & Business Cases for Service Technology

Contact: [email protected]



The 12th Annual
Smart Card Alliance Government Conference
Smart Strategies for Secure Identity
Walter E. Washington Convention Center
October 15-16, 2012 * Washington, DC

The Leading Showcase for Government Projects in ID and Security

The 12th Annual Smart Card Alliance Government Conference will survey opportunities and challenges for government issuers, accreditation and testing authorities, procurement programs, and the industry to meet the government's market demands. The conference features comprehensive coverage of efforts toward strong authentication technology in government identity programs, including federal and non-federal Personal Identity Verification (PIV) credentials, developments in National Strategy for Trusted Identities in Cyberspace (NSTIC), trusted ID on the Internet and on mobile devices, developments in state and local ID, as well as evolving global standards. Presentations emphasize real-world use-cases directly from the implementers and administrators. The conference draws key decision makers from every level of government and industry. Over 800 will attend, including government and industry executives, administrators and technologists.



Contactless, e-ID, M2M and digital security technologies fuel a smart revolution for the consumers and citizens. The ecosystems behind these technologies meet at World Smart Week.

World Smart Week combines three business conferences: NFC World Congress, World e-ID Congress, M2M InnovationWorld Congress. One technical conference, Chip-To-Cloud Security Forum plus an exhibition common to these events.

Quick Facts:

  • 1700 participants to share experiences, draw new perspectives and network
  • Full ecosystems attending: technology providers, enterprises, public organizations, academics, regulators, trade associations
  • 50 exhibitors to unveil news solutions and make over 100 live demos
  • 80 press and media editors and journalists

In addition to networking and social events, World Smart Week also offers multiple specific features such as its "add-ons" (special events such as executive seminars, workshop, live demos, trainings etc.) and of course the sunny enchanting environment of the French Riviera!

NFC World Congress 2013
Business and Strategies for the NFC Market and Ecosystem
September 24-26, 2013, Contact: Lenick Perron at [email protected]

Now in its third edition, NFC World Congress gathers the full value chain of NFC services and beyond the whole "mobile proximity services" community. This all-in-one event combines a high level conference, an international exhibition and multiple "live experiences."

Over 700 participants, from start-ups to leading players, including all the vertical implementers, will be invited to address the central challenge of moving from acceptance to adoption of NFC and seize the opportunities offered by mobile proximity services.

World e-ID Congress 2013
Identity Services for Government, Mobility & Enterprise
September 25-27, 2013, Contact: Lenick Perron at [email protected]

World e-ID Congress has become in eight years a key event gathering e-ID programs managers, government officials and technology experts around world's major e-ID projects, policies trends and latest innovations.

In 2013 the conference will strengthen its key features to help the participants to succeed in their e-ID plans: exploring further the new key e-ID projects launched worldwide, highlighting best practices and concrete solutions, discussing hottest topics and market dynamics, while unveiling next generation mobile/cloud/online services.

Chip-to-Cloud Security Forum 2013
Smart Trusted Technologies & Services for the Networked Society
September 25-27, 2013, Contact: Lenick Perron at [email protected]

The need for trust and security has never been so high in our networked society. Chip-to-Cloud Security Forum 2013 will gather once again the finest expertise from R&D and Academia to address this challenge along three pillars: 1/ Embedded Security, 2/ Trusted Mobile Devices & Services and 3/ Cloud Security & Internet of Things.

The full value chain of digital security attends: researchers from Academia and Industry, technology experts, standardization bodies, government professionals... all eager to share knowledge and network. 300 high level participants are expected this year.

M2M Innovation World Congress 2013
Smart Services for Vertical Markets
September 24-26, 2013, Contact: Lenick Perron at [email protected]

M2M Innovation World Congress is fully dedicated to help both M2M Industry and Verticals to achieve the full potential of M2M services. Its high level conference gathers best practices, strategic insights and exemplary business cases for successful M2M services implementations. Three fast-rising markets will be explored in particular this year: Smart Grids, Retail and Smart Home/Smart Devices.


Please read our Terms of Use, Conditions and Disclaimers ("Terms"):

By using our website and any information located at you agree to these "Terms."


Add to Digg Bookmark with Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Only Adobe gives everyone - from emerging artists to global brands - everything they need to design and deliver exceptional digital experiences. Adobe Systems Incorporated develops, markets, and supports computer software products and technologies. The Company's products allow users to express and use information across all print and electronic media. The Company's Digital Media segment provides tools and solutions that enable individuals, small and medium businesses and enterprises to cre...
In today's always-on world, customer expectations have changed. Competitive differentiation is delivered through rapid software innovations, the ability to respond to issues quickly and by releasing high-quality code with minimal interruptions. DevOps isn't some far off goal; it's methodologies and practices are a response to this demand. The demand to go faster. The demand for more uptime. The demand to innovate. In this keynote, we will cover the Nutanix Developer Stack. Built from the foundat...
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes. We are offering early bird savings...
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo...
ClaySys Technologies is one of the leading application platform products in the ‘No-code' or ‘Metadata Driven' software business application development space. The company was founded to create a modern technology platform that addressed the core pain points related to the traditional software application development architecture. The founding team of ClaySys Technologies come from a legacy of creating and developing line of business software applications for large enterprise clients around the ...
The benefits of automated cloud deployments for speed, reliability and security are undeniable. The cornerstone of this approach, immutable deployment, promotes the idea of continuously rolling safe, stable images instead of trying to keep up with managing a fixed pool of virtual or physical machines. In this talk, we'll explore the immutable infrastructure pattern and how to use continuous deployment and continuous integration (CI/CD) process to build and manage server images for any platfo...
DevOpsSUMMIT at CloudEXPO, to be held June 25-26, 2019 at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real results. Am...
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomp...
Automation is turning manual or repetitive IT tasks into a thing of the past-including in the datacenter. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In this session, you'll explore Nutanix APIs-from provisioning to other Day 0, Day 1 operations. Come learn about how you can easily leverage Nutanix APIs for orchestration and automation of infrastructure, VMs, networking, an...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in the whole world. Thanks to our solution you can plan, book & expense business trips in less than 5 minutes. Accordingly to your travel policy, budget limits and cashless for your employees. With our reporting, int...