SYS-CON MEDIA Authors: Liz McMillan, Elizabeth White, Pat Romanski, Gary Arora, Zakia Bouachraoui

News Feed Item

Security Solutions Discussed by Industry Leaders in Interviews With HP, ImageWare Systems, T-Systems and CyberLock

RYE BROOK, NY -- (Marketwired) -- 09/10/13 -- ImageWare Systems, Inc. (OTCQB: IWSY) and Deutsche Telecom (OTCQX: DTEGY)

HP Enterprise Services

Mr. Steve Lazerowich, Director, Cybersecurity Solutioning, HP Enterprise Services, U.S. Public Sector, told us, "Today, there is simply no way to provide 100% protection. As events have recently shown, it's not just the bad guys on the outside trying to gain access to your information; organizations must also be mindful of the insider threat. The best approach is defense in depth, or in other words, a multi-layered approach to protecting systems. It starts at the outer most perimeter with firewalls and network intrusion prevention systems. Systems need to be segregated on separate network segments so that a failure in one area does not expose all systems. Servers also need their own end point protection including host intrusion detection, malware protection, data encryption and white listing technology."

For the complete interview with Steve Lazerowich, please click here. (

Please download HP's White Paper "Building Security In"

For more information: Cybersecurity for U.S. Public Sector (


ImageWare Systems

ImageWare Systems, Inc. (OTCQB: IWSY) (ImageWare), a leader in cloud-based, multi-modal biometric identity management solutions, has been awarded a $2.2 million contract by the U.S. Department of Veteran Affairs (VA) to expand its personal identity verification (PIV) credentialing capabilities.

Under the terms of the agreement, ImageWare will deliver software licenses during the third quarter of 2013, whereby the company will receive approximately $1.5 million in revenue. Additionally, ImageWare will receive service revenue valued at approximately $650,000 that will be recognized proportionally over the next year.

ImageWare's biometric identity management solution was first installed with the VA in 2007. The solution provides large-scale, agency-wide biometric identity and credential management capabilities, such as biometrically enabled PIV credentials that are in compliance with U.S. government standards. As part of the system expansion, the VA will also be adopting ImageWare's patented, hardware and algorithm independent Biometric Engine® 2.0, enabling the enrollment and management of unlimited population sizes.

"The U.S. Government has confirmed multi-modal biometric identity management as the only way to move forward as it offers a greater level of security and reliability," said Jim Miller, chairman and CEO of ImageWare. "ImageWare's proven track record of government experience executing best-of-breed patented, fully compliant biometric solutions will drive the standards for commercial adoption. We are honored to continue working with the VA and expand our services in support of their mission. As we look forward, I am confident we will introduce similar solutions to our global enterprise customers and solution provider partners."

The Biometric Engine 2.0, ImageWare's patented, backend database for CloudID™, delivers revolutionary capabilities:

  • Enrollment, identity and verification management of unlimited population sizes
  • Hardware and algorithm independent processing
  • Compatibility with all biometric products
  • Future-proof, plug-and-play flexibility
  • Product modules that can be implemented together or individually
  • License and/or subscription service offering
  • Software development kits

For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (

For more information:

IWS CloudID™:
ImageWare Systems Solutions:
ImageWare Systems Products:
For ImageWare Systems Investors:
For more information:



Mr. Ryan Skipp, T-Systems International GMBH, Portfolio & Solution Design - IT, Applications & Portfolio Architecture, told us, "T-Systems as an Outsourcer has to provide base infrastructure services which meet the cost and quality expectations that a company transitioning to outsourced services would expect -- better than they as an end-user could produce, with better quality, and lower cost! In order to achieve that, T-Systems was one of the first Outsourcers to produce a 'Cloud' platform, based on highly shared leveraged infrastructure, and with a number of pre-defined applications on top of that. Today we have enhanced that infrastructure, and wrapped the Cloud functionality into it, all the way up to self-service (to application level) for our Private Cloud clients." For the complete interview with Ryan Skipp, please click here (

For more information:, OTC symbol of parent company, Deutsche Telecom, DTEGY.



CyberLock shared with us the following product news.

The PowerPort is a compact charger for use with all rechargeable CyberKey smart keys including the RXD II, the RXD, the RCG, and the CyberKey Blue. One side of the PowerPort fits the tip of a CyberKey. The other side of the PowerPort fits any standard USB port.

The PowerPort is designed to work with off-the-shelf USB wall chargers and car chargers. However, it will also charge a CyberKey from most (but not all) USB ports on desktops or laptops. To speak with CyberLock:

"We are excited to announce the addition of the CyberAudit SP-100 Server to the CyberLock access control family. This device has been designed to simplify and accelerate the installation and maintenance of a CyberLock system.

Unified Hardware and Software Solution
The SP-100 comes preloaded with CyberAudit Professional 3.0 software.

Easy to Use
Self-configuring one-click registration and an easy-to-use browser-based interface makes for quick and easy installations.

Flexible Network Configuration
The SP-100 can be set up as a DHCP server in a private network, on a network with a static IP address, or on a network with a DNS server.

Access from Any Operating System
Like the software-only version, CyberAudit Professional 3.0 can be accessed through web browsers installed on any of the leading operating systems. No additional software to download. No ActiveX plug-ins to install.

Reliable Hardware
The hardware is based on the Next Unit of Computing (NUC) solution from Intel®."

To speak with CyberLock:

For more information about CyberLock products:
For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, CyberLock:
For CyberLock News & Events:
For the CyberLock Solutions Center:
For more information:


September 17-19, 2013

Many advancements have occurred in the landscape of cyber resilience. However, cyberspace remains a mysterious terrain. A realistic perspective on unknowns must be established to combat and ward off the myriad of risks that threaten our national and economic interests. This event will bring together defense, government and industry leaders to devote a concentrated focus on breaking down the latest in policy, information sharing, security technology and identifiable threats for a cohesive mission strategy that can be directly applied to cross-agency goals.

Contact: David Drey at [email protected] or 312-540-3000 ext. 6583


ASIS 2013

SMART. STRATEGIC. SECURE. ASIS 2013 is the key industry event for security professionals looking for real solutions to real challenges. The colocation of the (ISC)2 Security Congress ( provides enhanced education and networking. Register today! ( )

Use the SHOW PLANNER ( to search all sessions, products/services, and exhibitors.


November 19 - 21, 2013
Paris Nord Villepinte - France

CARTES Secure Connexions Event 2013 is the comprehensive event (trade show, conferences and awards) entirely dedicated to the digital security and smart technology sector and its innovations.

Integrating its full value chain, CARTES Secure Connexions 2013 is the only event enabling global synergies at a human and technological level, ideal for business deals and partnerships.

For more information about CARTES Paris, November 19-20-21, 2013


13th Cloud Expo / 4th Big Data Expo / 2nd SDN Expo, November 4-7, 2013

Two unstoppable enterprise IT trends, Cloud Computing and Big Data, will converge in Silicon Valley at 13th Cloud Expo / 4th Big Data Expo / 2nd SDN Expo -- being held November 4-7, 2013, at the Santa Clara Convention Center in Santa Clara, CA.

As at every Cloud Expo, we are offering in Silicon Valley a vast selection of technical and strategic breakout sessions, General Sessions, Industry Keynotes, our signature discussion "Power Panels" and a bustling Expo floor complete with two busy Demo Theaters so that as a delegate you can kick the tires of solutions and offerings, and discuss one-on-one with all the leading Cloud and Big Data players what they are offering and how to make use of it in your particular situation.

The high-energy event is a must-attend for senior technologists from CEOs on down -- including CIOs, CTOs, directors of infrastructure, VPs of technology, IT directors and managers, network and storage managers, network engineers, enterprise architects, and communications and networking specialists.

Contact: Carmen Gonzalez, P: (201) 802-3021 | F: (201) 782-9601, Email: [email protected]


CSFF 2013
21-22 October 2013

The 3rd Annual CSFF offers you exclusive access to the information you need from the industry experts you need to meet.

CSFF is your most comprehensive and definitive source of cyber security information, bringing together industry leaders, advisors, investors and government officials. Through a carefully structured programme of keynote presentations, panel discussions, interviews and networking opportunities, you will gain the insight needed to drive greater revenue and grow your business.

What you will learn:

This conference will debate, discuss and deliver answers to the key challenges facing you, equipping you with guidance and contacts to drive your business ahead.

  • Where do business opportunities really exist?
  • How can you raise your profile and make your business more attractive to large organizations?
  • What is the investment climate for 2013 and beyond?
  • Are there new ways of raising finance?
  • Which government departments really matter and how to gain access to them?
  • How are organizations gaining ground through collaborative partnerships?
  • Where are the next key markets and strategies for gaining entry?
  • What are the emerging cyber security threats looming on the horizon and how to tackle them?


November 20-21, 2013
Javits Center North, NY,NY

ISC East is the Northeast's Local Connection to the World of Security. Join us November 20-21, 2013 at the Javits Center North in New York, NY.

Your registration gets you:

Direct access to technical reps from more than 200 brands -- review the latest products, technologies & services to stay ahead of what's new in Security.
Free business seminars designed to help you increase revenue and reduce costs -- high quality, commercial-free information and insight into the most relevant new products, technologies and business strategies you need to know about in today's evolving security market to stay ahead of your competition.

Drinks & networking on the exhibit floor -- a casual environment to join your colleagues and peers for collaborating, sharing ideas, and good, old fashioned socializing.

Local expertise from association leaders in NY, NJ, CT and PA -- meet and chat with leaders of your local chapters from the security industry.

ISC East is sponsored by the Security Industry Association. Register to attend today:


The Conference on Mobile & Smart Device Security
November 19-21, 2013
Renaissance Boston Waterfront Hotel, Boston, MA

Mobile computing has changed the IT and data security landscape. Device adoption has mushroomed, network access is almost universally available and BYOD is the new normal. Understanding the risks to data and corporate information and planning for sustainable ways to manage those risks is critical. There are new attack models in the next-gen mobile paradigm, but there are also new protection models. The Conference on Mobile & Smart Device Security brings together organizations that have adopted innovative security technologies and programs while still leveraging the power of mobile. You will learn best practices from front-line practitioners and the latest solutions to help you implement effective data protection in our mobile world. Contact: Dina Dvinov at [email protected]

Annual CSA Congress
December 4-5, 2013
Orlando, Florida

The CSA Congress is the industry's premier gathering for IT security professionals and executives who must further educate themselves on the rapidly evolving subject of cloud security. In addition to offering best practices and practical solutions for remaining secure in the cloud, CSA Congress will focus on emerging areas of growth and concern in cloud security, including standardization, transparency of controls, mobile computing, Big Data in the cloud and innovation.

Contact: Dina Dvinov at [email protected]



Are you a physical security integrator looking to save time and money? If so, your search is over! Visit PSA Security Network at ASIS 2013 (September 24-27) in booth #3644! With industry-leading sales support, fresh inventory, access to the best training in the industry, a continuously growing vendor selection, and highly competitive pricing, there is no reason to buy elsewhere. PSA provides exceptional education offerings and convenient purchasing, and we will never sell to the end user.

Are you an end user looking for qualified integrators? Then look no further, PSA Security Network's integrators are certified and highly trained, they have access to the best products and leverage the PSA network through best practices workshops and numerous networking events.

Are you interested in setting up a meeting with a PSA Security Network team member to learn more about what we can do for you? Click here ( to make an appointment today!


Gain Exclusive Insights at Securing New Ground® (SNG™)

On Nov. 5-6, 2013, SIA will host SNG™ at the Sheraton New York Times Square Hotel, New York, NY, where security industry leaders will convene for the top executive conference of the year. SNG™ provides attendees with access to inside information not available anywhere else as well as unparalleled networking opportunities for a competitive edge.

If you are a top executive in the security industry, you cannot afford to miss SNG™! Register to attend now (

Join Brad Brekke, Vice President of Target, at the Security 500 Conference in NYC

The Security Industry Association (SIA) and Security magazine are proud to present Brad Brekke, vice president of assets protection for Target Corp., as the keynote speaker for the Security 500 networking and management conference at the Sheraton Times Square Hotel in New York City on Nov. 5, 2013.

Brekke will share insights into his team's efforts to mitigate physical and operational risks across a large and renowned retail company. His department of several thousand assets protection professionals is responsible for protecting team members and guests, the global supply chain, financial products, information security and the company's reputation.

The Security 500 Conference is a one-day program designed for security leaders responsible for supporting an organization's risk management and resilience security strategies. Security 500 attendees share strategies, solutions and challenges on enterprise security issues with their peers; discuss the role of security managers in overall organizational performance; and gain exclusive information from the Security 500 Benchmark Survey.

The conference is only open to qualified attendees and is free of charge. Register at the Security 500 website (


Mexico City, Mexico / December 4-5, 2013

The top Cloud Computing, SOA, Big Data and Service Technology experts and authors will be participating at the 6th International Service Technology Symposium ( in Mexico City on December 4-5, 2013. Founded by Arcitura, this is the world's largest event dedicated to Service Technology, SOA, Cloud Computing and Big Data, featuring top industry experts and authors from around the world. Also scheduled are a series of CCP and SOACP certification workshops from and

The Symposium conference series is governed by Arcitura Education, and is based on a substance-only philosophy whereby selected speaker submissions are judged primarily on their educational and informational value. Spanning two conference days, the speaker sessions are organized across the following conference tracks:

  • Cloud Computing Architecture, Brokers & Patterns
  • Big Data & Event Processing (Practices & Tools)
  • Emerging Service Technology Innovations
  • API Design & Architecture (including Mobile, Social)
  • New SOA & Service-Orientation Practices & Models
  • BPM & Adaptive Case Management
  • Service Infrastructure, SDN & Virtualization (including PaaS, IaaS)
  • Service-Enabled Enterprise Architecture
  • Governance & Management for API/SOA/Cloud
  • Real World Case Studies & Business Cases for Service Technology

Contact: [email protected]



The 12th Annual
Smart Card Alliance Government Conference
Smart Strategies for Secure Identity
Walter E. Washington Convention Center
October 15-16, 2012 * Washington, DC

The Leading Showcase for Government Projects in ID and Security

The 12th Annual Smart Card Alliance Government Conference will survey opportunities and challenges for government issuers, accreditation and testing authorities, procurement programs, and the industry to meet the government's market demands. The conference features comprehensive coverage of efforts toward strong authentication technology in government identity programs, including federal and non-federal Personal Identity Verification (PIV) credentials, developments in National Strategy for Trusted Identities in Cyberspace (NSTIC), trusted ID on the Internet and on mobile devices, developments in state and local ID, as well as evolving global standards. Presentations emphasize real-world use-cases directly from the implementers and administrators. The conference draws key decision makers from every level of government and industry. Over 800 will attend, including government and industry executives, administrators and technologists.



Contactless, e-ID, M2M and digital security technologies fuel a smart revolution for the consumers and citizens. The ecosystems behind these technologies meet at World Smart Week.

World Smart Week combines three business conferences: NFC World Congress, World e-ID Congress, M2M InnovationWorld Congress. One technical conference, Chip-To-Cloud Security Forum plus an exhibition common to these events.

Quick Facts:

  • 1700 participants to share experiences, draw new perspectives and network
  • Full ecosystems attending: technology providers, enterprises, public organizations, academics, regulators, trade associations
  • 50 exhibitors to unveil news solutions and make over 100 live demos
  • 80 press and media editors and journalists

In addition to networking and social events, World Smart Week also offers multiple specific features such as its "add-ons" (special events such as executive seminars, workshop, live demos, trainings etc.) and of course the sunny enchanting environment of the French Riviera!

NFC World Congress 2013
Business and Strategies for the NFC Market and Ecosystem
September 24-26, 2013, Contact: Lenick Perron at [email protected]

Now in its third edition, NFC World Congress gathers the full value chain of NFC services and beyond the whole "mobile proximity services" community. This all-in-one event combines a high level conference, an international exhibition and multiple "live experiences."

Over 700 participants, from start-ups to leading players, including all the vertical implementers, will be invited to address the central challenge of moving from acceptance to adoption of NFC and seize the opportunities offered by mobile proximity services.

World e-ID Congress 2013
Identity Services for Government, Mobility & Enterprise
September 25-27, 2013, Contact: Lenick Perron at [email protected]

World e-ID Congress has become in eight years a key event gathering e-ID programs managers, government officials and technology experts around world's major e-ID projects, policies trends and latest innovations.

In 2013 the conference will strengthen its key features to help the participants to succeed in their e-ID plans: exploring further the new key e-ID projects launched worldwide, highlighting best practices and concrete solutions, discussing hottest topics and market dynamics, while unveiling next generation mobile/cloud/online services.

Chip-to-Cloud Security Forum 2013
Smart Trusted Technologies & Services for the Networked Society
September 25-27, 2013, Contact: Lenick Perron at [email protected]

The need for trust and security has never been so high in our networked society. Chip-to-Cloud Security Forum 2013 will gather once again the finest expertise from R&D and Academia to address this challenge along three pillars: 1/ Embedded Security, 2/ Trusted Mobile Devices & Services and 3/ Cloud Security & Internet of Things.

The full value chain of digital security attends: researchers from Academia and Industry, technology experts, standardization bodies, government professionals... all eager to share knowledge and network. 300 high level participants are expected this year.

M2M Innovation World Congress 2013
Smart Services for Vertical Markets
September 24-26, 2013, Contact: Lenick Perron at [email protected]

M2M Innovation World Congress is fully dedicated to help both M2M Industry and Verticals to achieve the full potential of M2M services. Its high level conference gathers best practices, strategic insights and exemplary business cases for successful M2M services implementations. Three fast-rising markets will be explored in particular this year: Smart Grids, Retail and Smart Home/Smart Devices.


Please read our Terms of Use, Conditions and Disclaimers ("Terms"):

By using our website and any information located at you agree to these "Terms."


Add to Digg Bookmark with Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leadin...
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure...
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a ...
Cloud-Native thinking and Serverless Computing are now the norm in financial services, manufacturing, telco, healthcare, transportation, energy, media, entertainment, retail and other consumer industries, as well as the public sector. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that pro...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
Andrew Keys is co-founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereum.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Data center, on-premise, public-cloud, private-cloud, multi-cloud, hybrid-cloud, IoT, AI, edge, SaaS, PaaS... it's an availability, security, performance and integration nightmare even for the best of the best IT experts. Organizations realize the tremendous benefits of everything the digital transformation has to offer. Cloud adoption rates are increasing significantly, and IT budgets are morphing to follow suit. But distributing applications and infrastructure around increases risk, introdu...
DevOps has long focused on reinventing the SDLC (e.g. with CI/CD, ARA, pipeline automation etc.), while reinvention of IT Ops has lagged. However, new approaches like Site Reliability Engineering, Observability, Containerization, Operations Analytics, and ML/AI are driving a resurgence of IT Ops. In this session our expert panel will focus on how these new ideas are [putting the Ops back in DevOps orbringing modern IT Ops to DevOps].
Financial enterprises in New York City, London, Singapore, and other world financial capitals are embracing a new generation of smart, automated FinTech that eliminates many cumbersome, slow, and expensive intermediate processes from their businesses. Accordingly, attendees at the upcoming 23rd CloudEXPO, June 24-26, 2019 at Santa Clara Convention Center in Santa Clara, CA will find fresh new content in full new FinTech & Enterprise Blockchain track.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science" is responsible for guiding the technology strategy within Hitachi Vantara for IoT and Analytics. Bill brings a balanced business-technology approach that focuses on business outcomes to drive data, analytics and technology decisions that underpin an organization's digital transformation strategy. Bill has a very impressive background which includes ...
Most organizations are awash today in data and IT systems, yet they're still struggling mightily to use these invaluable assets to meet the rising demand for new digital solutions and customer experiences that drive innovation and growth. What's lacking are potent and effective ways to rapidly combine together on-premises IT and the numerous commercial clouds that the average organization has in place today into effective new business solutions. New research shows that delivering on multicloud e...
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure...
Now is the time for a truly global DX event, to bring together the leading minds from the technology world in a conversation about Digital Transformation. DX encompasses the continuing technology revolution, and is addressing society's most important issues throughout the entire $78 trillion 21st-century global economy. DXWorldEXPO® has organized these issues along 10 tracks, 22 keynotes and general sessions, and a faculty of 222 of the world's top speakers.