|By Marketwired .||
|March 25, 2014 05:07 PM EDT||
PLANO, TX -- (Marketwired) -- 03/25/14 -- ISC8® Inc. (OTCBB: ISCI), a provider of intelligent Cyber security solutions and supporting technologies, announced today that Bill Joll, the Company's President and Chief Executive Officer, has resigned effective March 19, 2014, but will remain an advisor to the Company, assisting in the transition of his duties to his successor through March 31, 2014.
Succeeding Mr. Joll as President and CEO is J. Kirsten Bay, who has joined ISC8 effective March 19, 2014. Kirsten was most recently President and CEO of Attensity Group, a Big Data analytics enterprise software and services company specializing in customer experience management and corporate intelligence, where she restructured the company improving both operating revenue and margin. Prior to Attensity, Kirsten was Vice President of Commercial Business at iSIGHT Partners where she developed new product offerings for enterprise cyber intelligence programs targeted at the corporate risk management, financial forecasting, and business decision functions.
Kirsten brings to ISC8 a wealth of experience in cyber security and a proven track record of sales and profitability growth. She has extensive contacts with major enterprises in the financial and e-commerce segments, and believes in the value ISC8 brings to the cyber security space. "ISC8 is an innovative company in cyber security that has developed an important next generation product for managing the security lifecycle," said Kirsten Bay, "I look forward to leading ISC8 in becoming a formidable player in the cyber security arena."
"With ISC8's restructuring behind us, Cyber adAPT® becoming generally available at the end of this month and the pipeline starting to build, the focus going forward is on sales execution," said Simon Williams, Chairman of ISC8, "We are very lucky to have Kirsten join as CEO, and I look forward to working with her in this new phase of the Company's growth and thank Bill for his contributions to ISC8."
ISC8 is actively engaged in the development and sale of intelligent cybersecurity solutions for commercial and government environments worldwide. ISC8's cyber portfolio is aimed at detecting next-generation malware and Advanced Persistent Threats (APTs), providing real-time Big Data security analytics to identify perpetrators and preventing critical data loss. ISC8 provides hardware, software and service offerings for Malware Threat Detection. ISC8 is a global company with resources across North America and Europe, the Middle East, and Asia Pacific. For more information about ISC8 visit www.isc8.com.
ISC8 Statement under the Private Securities Litigation Reform Act
This release may contain information about future expectations, plans and prospects of ISC8's management that constitute forward-looking statements for purposes of the safe harbor provisions under the Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including, but not limited to, competitive forces, general economic, market or business conditions, the effects of any attempts to intentionally disrupt our services or network by hackers or others, changes in ISC8's technologies such that they are no longer inter-operable, failure of customers to adopt, or delays in their adoption of, ISC8 products or services discussed above, and other factors, most of which are beyond ISC8's control, as well as those discussed in the Company's Annual Report on Form 10-K, quarterly reports on Form 10-Q, and other documents periodically filed with the SEC. Except as required by law, we undertake no obligation to revise or update publicly any forward-looking statements for any reason.
For more information, please contact:
Chief Financial Officer
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Dec. 26, 2014 11:15 AM EST Reads: 2,279
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 26, 2014 11:00 AM EST Reads: 1,762
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Dec. 26, 2014 11:00 AM EST Reads: 1,984
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Dec. 26, 2014 11:00 AM EST Reads: 1,899
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
Dec. 26, 2014 11:00 AM EST Reads: 2,063
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...
Dec. 26, 2014 11:00 AM EST Reads: 2,146
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Dec. 26, 2014 10:00 AM EST Reads: 7,116
Fundamentally, SDN is still mostly about network plumbing. While plumbing may be useful to tinker with, what you can do with your plumbing is far more intriguing. A rigid interpretation of SDN confines it to Layers 2 and 3, and that's reasonable. But SDN opens opportunities for novel constructions in Layers 4 to 7 that solve real operational problems in data centers. "Data center," in fact, might become anachronistic - data is everywhere, constantly on the move, seemingly always overflowing. Net...
Dec. 26, 2014 10:00 AM EST Reads: 1,946
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Dec. 26, 2014 10:00 AM EST Reads: 1,724
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
Dec. 26, 2014 09:30 AM EST Reads: 1,726
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Dec. 26, 2014 09:00 AM EST Reads: 2,588
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
Dec. 26, 2014 09:00 AM EST Reads: 2,007
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
Dec. 26, 2014 09:00 AM EST Reads: 2,222
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Dec. 26, 2014 08:30 AM EST Reads: 2,370
The Internet of Things promises to transform businesses (and lives), but navigating the business and technical path to success can be difficult to understand. In his session at @ThingsExpo, Sean Lorenz, Technical Product Manager for Xively at LogMeIn, demonstrated how to approach creating broadly successful connected customer solutions using real world business transformation studies including New England BioLabs and more.
Dec. 26, 2014 08:15 AM EST Reads: 2,026