|By Marketwired .||
|August 5, 2014 12:01 AM EDT||
RYE BROOK, NY -- (Marketwired) -- 08/05/14 -- ImageWare Systems, Inc. (OTCQB: IWSY) and StrikeForce Technologies, Inc. (OTCQB: SFOR)
Mr. Ramesh Kesanupalli, Founder of Nok Nok Labs, Founding Member, FIDO Alliance, told us, "Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We're at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.
For the complete interview: www.securitysolutionswatch.com/Interviews/in_Boardroom_NokNok_Ramesh.html
About The FIDO Alliance
The FIDO (Fast IDentity Online) Alliance, www.fidoalliance.org, was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords. The Alliance plans to change the nature of authentication by developing standards-based specifications for simpler, stronger authentication that define an open, scalable, interoperable set of mechanisms that reduce reliance on passwords. FIDO authentication is stronger, private, and easier to use when authenticating to online services.
HP Enterprise Services
Mr. George Romas, Technical Director, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector, told us, "IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities. An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smart phone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house. "
For the complete interview with George Romas: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_Romas2.html
For more information on these topics:
HP blog post, "The Internet of (Secure) Things - Embedding Security in the IoT."
Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497)
Public Sector Services and Solutions (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1131347)
ImageWare Systems, Inc. (OTCQB: IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, was selected to implement a multi-modal biometric driver license system for the State of Baja California, Mexico.
The contract was awarded by the Funciones Ocupacionales Insha, S.A. de C.V., the prime contractor on the project. For ImageWare, the contract is valued at more than $1.0 million and its software will help generate more than one million licenses over the next three years. ImageWare will receive one time license fees for its software upon delivery and ongoing payments for its professional services and maintenance as delivered.
ImageWare will help to deploy the system at governmental offices in the largest cities in the state, including Tijuana, Mexicali, Tecate and Rosarito, as well as implement mobile stations through the state. The project will begin in the third quarter of 2014.
"As security needs become more complex and demanding, our customers increasingly appreciate the unique power and flexibility of our patented cloud-based, multi-modal biometric solutions," said Jim Miller, ImageWare's chairman and CEO. "Our proven track record of providing state-of-the-art biometric solutions for government agencies was a key factor in winning this award."
The multi-modal biometric driver license system will be based on ImageWare's CloudID modular software platform that supports the rapid development and deployment of highly secure, yet flexible identity management solutions for the creation of credentials, including IDs, passports, driver's licenses, smart cards and access control credentials. IWS CloudID is designed to deliver a "future proof" identity management solution, allowing unlimited population sizes and stations, as well as adding additional biometric modalities and incorporating new biometric devices.
The company's IWS QuickApps will provide the user interfaces to register applicants, validate identities and print and encode cards. Both IWS CloudID and IWS QuickApps are driven by ImageWare's patented, multi-modal Biometric Engine® 2.0, and the system can be integrated with the government's existing biometric identification and verifications processes. Security for the system will be managed by ImageWare's Desktop Security System, with the use of multifactor authentication, data encryption and a secured log of all actions by the user.
About ImageWare Systems, Inc.
ImageWare Systems, Inc. (OTCQB: IWSY) is a leading developer of mobile and cloud-based identity management solutions, providing biometric, secure credential and law enforcement technologies. Scalable for worldwide deployment, ImageWare's biometric product line includes a multi-biometric engine that is hardware and algorithm independent, enabling the enrollment and management of unlimited population sizes. ImageWare's identification products are used to manage and issue secure credentials, including national IDs, passports, driver's licenses, smart cards and access control credentials. ImageWare's digital booking products provide law enforcement with integrated mug shot, fingerprint livescan and investigative capabilities. ImageWare is headquartered in San Diego, CA, with offices in Portland, OR, Washington, D.C., and Ottawa, Ontario. For more information on ImageWare Systems, Inc., please visit www.iwsinc.com
For the complete Press Release: http://iwsinc.com/iwsy-awarded-1m-multi-modal-biometric-contract/
For more information:
ImageWare Systems Solutions: http://iwsinc.com/solutions/
ImageWare Systems Products: http://iwsinc.com/products/
ImageWare Systems Investors: http://iwsinc.com/about-iws/investors/
For more information: www.iwsinc.com
Mr. Michael D. Day, IBM Distinguished Engineer, Virtualization and Linux, said, "None of the security issues associated with networked computing have gone away with Cloud Operating Systems. In many ways we are more vulnerable than ever to breaches being escalated. The Trusted Platform Module is a partial solution which can validate the boot chain of a compute node. (Verify the platform has come up without a root kit). The TPM is well supported by Linux and by the KVM hypervisor, but not widely used, although it should be. As bad as the security issues are with data center computing, they are much worse with the IoT right now, primarily because that set of products has evolved in a disconnected state and has not been exposed to attack in the same way our data processing infrastructure has been for decades."
For the complete interview: www.securitysolutionswatch.com/Interviews/in_Boardroom_IBM_MichaelDay.html
StrikeForce Technologies, Inc. (OTCQB: SFOR), a company that specializes in Cyber Security solutions for the prevention of Identity Theft and Data Breaches, recently announced that ProtectID® now supports Microsoft Office 365.
"We are very pleased that our ProtectID Two-Factor Authentication Platform will NOW protect Microsoft Office 365," says Mark L. Kay, CEO of StrikeForce. "ProtectID will secure Office applications via integration into Active Directory Federation Services (ADFS). A number of our current and pilot clients are looking for this capability and many others are moving in this direction. According to Microsoft, SharePoint is used by 78% of Fortune 500 companies."
Active Directory Federation Services is the component within Microsoft® Windows Server that provides web Single Sign-On (SSO) technologies through federation using standard authentication mechanisms such as Security Assertion Markup Language (SAML) and Kerberos. Microsoft applications secured by ProtectID now include:
- Azure cloud services
- Exchange Online
- Lync communications services
Microsoft Office 365 gives SMB's and all sized companies the opportunity to access advanced IT services and solutions without the need to manage programmers in house -- or even have any IT expertise. Employees can gain anywhere access to the programs they use on their office PC -- such as Word, PowerPoint, Outlook, and Excel. This ensures they can work more effectively when away from their desk, using a laptop, tablet or smartphone.
"Authentication is required more now than ever with Microsoft Office 365's increasingly wide low cost access to your enterprise's secured applications. The ProtectID Authentication Platform is a solution that provides the greatest number of authentication methods, options and patents to protect you and your company," says Mr. Kay.
For more information about:
www.strikeforcetech.com; (OTCQB: SFOR)
ASIS International 60th Annual Seminar and Exhibits
September 29-October 2, 2014
Join us in Atlanta, Georgia, September 29-October 2, 2014 for the ASIS International 60th Annual Seminar and Exhibits--the world's most influential security event.
Program highlights include:
- 250 education sessions spanning all security disciplines and industry sectors
- Security products and services from 600+ leading solutions providers
- Unmatched peer-to-peer networking opportunities
- Colocated event: (ISC)² Security Congress.
The New York City Cyber Security Summit
Thursday, September 18th
The Hilton New York -- New York City
REGISTER NOW with promo code SECURITYSOLUTIONSWATCH to access your 50% OFF Full Conference Passes.
REGISTRATION LINK: http://cybersummitusa.com/register/
The Cyber Security Summit, an executive conference series sponsored by The Wall Street Journal, is to be held on September 18th in New York City. The Cyber Security Summit brings together the nation's leading solution providers and renowned information security experts for Senior Executives to discover the latest products, services and strategies necessary for enterprise cyber defense. In today's digital world, every organization needs an effective cyber security plan to protect their business, employees and customers from emerging threats. Join us this September and learn how to best protect highly vulnerable business applications and intellectual property.
Speaker presentations will cover: The Insider Threat / Human Element, Social Computing, Mobile Security & BYOD, Cyber Supply Chain Security, Threats Facing Banks & Financial Institutions and more!
To view a full list of participating sponsors & speakers visit: CyberSummitUSA.com
Keep your organization at the forefront of cyber security and most importantly, secure!
Congress Centre Düsseldorf
October 13 - 15, 2014
LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.
US/Canada Border Conference
Cobo Center, Detroit, MI
September 16-17, 2014
Beyond the Border 2.0
The US/Canada Border Conference will bring together local, state, provincial and federal agencies, as well as business organizations, in a central location convenient to both nations, to advance the "Beyond the Border" Action Plan between the United States and Canada.
Government and industry leaders share their knowledge and thoughts at a conference designed to enlighten, inform and educate the audience on the complex challenges outlined in the bi-lateral plan. The program advances the mission by providing a forum that helps foster collaboration while gaining a better understanding of the political, infrastructure and technological needs in the combat against current and future security threats, while improving the efficient flow of legal cross-border activity
Sponsors will attend all keynotes, panel sessions and food functions and have the unique opportunity to meet face-to-face with border security leadership from both the US and Canada.
Contact: John Moriarty, [email protected], 203-822-7953
WORLD SMART WEEK
Chip-to-Cloud Security Forum
Advances in Securing Embedded, Mobile & Cloud Services and Ecosystems
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
Chip-to-Cloud Security Forum provides an independent collaboration and information-sharing platform dedicated to advance end-to-end digital security. Created from the former e-Smart and Smart Mobility conferences, its wide-ranging technical conference covers four key themes: embedded security, security & mobility, M2M & IoT security and secure cloud applications. The full digital security value chain will attend, with 300 expected attendees from Academia and Industry. Part of World Smart Week (1700 participants), the Forum offers great networking and forward-thinking opportunities with the attendees of the three co-located conferences dedicated to contactless/mobile, e-ID and M2M services and also includes a 50-booth exhibition. Visit us online at www.chip-to-cloud.com
M2M Innovation World Congress
Smart Services for Vertical Markets
Conference & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
M2M Innovation World Congress invites all the M2M stakeholders to shift from a technology-driven to a business- and user-centric approach. Focused on emerging business models, technologies and best practices, this conference & exhibition gives its participants new inspirations to innovate and setup business while meeting prominent figures both from M2M industry and verticals. The conference will explore in particular M2M innovations in Smart Grids, Smart Cities, Retail and Consumer Electronics. Held in conjunction with the three other smart devices-related conferences and 50-booth exhibition forming World Smart Week, the Congress provides its 300 attendees rich opportunities to network, share knowledge and develop business with 1700 participants overall. Visit us online: www.m2minnovationworldcongress.com
NFC World Congress
Mobile Proximity: Innovation, Services & Business
Conference & Exhibition September 22-24, 2014 - Marseille Provence, France
Now in its 4th edition, NFC World Congress explores the emerging ways to interact with the digital world through NFC and related mobile proximity technologies.
From start-ups to leading IT/mobile players and implementers from verticals, its conference gathers 600 participants from 60 countries eager to advance mobile proximity business in all its applications. Within World Smart Week, the Congress benefits from synergies of contents with three co-located conferences and a 50-booth joint exhibition. 1700 participants overall will converge at this global meeting of contactless/mobile, e-ID, M2M and digital security industries. Visit the Congress online: http://www.nfcworldcongress.com
World e-ID Congress
Identity services for Government, Mobility & Enterprise
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France
Since 2004 World e-ID gathers e-ID programs managers, government officials and technology experts around world's most inspiring large scale rollouts and latest innovations. Over 400 delegates from 60 countries are expected in 2014. Among the conference highlights: mobile ID advances, emerging countries and EU projects' latest results, cyber-security policies, e-ID for banking... Its 50-booth exhibition, featuring e-ID solutions leaders, will add knowledge sharing and networking opportunities with the mobile/contactless, M2M and digital security professionals attending World Smart Week (1700 participants overall). Visit the Congress online: http://worlde-idcongress.com
By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."
More and more file-based and machine generated data is being created every day causing exponential data and content growth, and creating a management nightmare for IT managers. What data centers really need to cope with this growth is a purpose-built tiered archive appliance that enables users to establish a single storage target for all of their applications - an appliance that will intelligently place and move data to and between storage tiers based on user-defined policies. In her session a...
Jan. 30, 2015 09:00 AM EST Reads: 2,515
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 30, 2015 09:00 AM EST Reads: 2,729
IBM has announced software that allows people to hide or anonymize their personal information on the Web, ensuring protection from identity theft and other misuse. Developed by researchers at IBM's laboratory in Zurich, Switzerland, the software – called Identity Mixer – will enable consumers to purchase goods and services on the Internet without disclosing personal information. As consumers hand over personal details in exchange for downloading music or subscribing to online newsletters, they...
Jan. 30, 2015 09:00 AM EST Reads: 807
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
Jan. 30, 2015 09:00 AM EST Reads: 2,833
The Industrial Internet revolution is now underway, enabled by connected machines and billions of devices that communicate and collaborate. The massive amounts of Big Data requiring real-time analysis is flooding legacy IT systems and giving way to cloud environments that can handle the unpredictable workloads. Yet many barriers remain until we can fully realize the opportunities and benefits from the convergence of machines and devices with Big Data and the cloud, including interoperability, ...
Jan. 30, 2015 09:00 AM EST Reads: 2,830
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects - scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
Jan. 30, 2015 09:00 AM EST Reads: 2,754
"At Harbinger we do products as well as services. Our services are with helping companies move their products to the cloud operating systems. Some of the challenges we have seen as far as cloud adoption goes are in the cloud security space," noted Shrikant Pattathil, Executive Vice President at Harbinger Systems, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 30, 2015 09:00 AM EST Reads: 2,358
Things are being built upon cloud foundations to transform organizations. This CEO Power Panel at 15th Cloud Expo, moderated by Roger Strukhoff, Cloud Expo and @ThingsExpo conference chair, addressed the big issues involving these technologies and, more important, the results they will achieve. Rodney Rogers, chairman and CEO of Virtustream; Brendan O'Brien, co-founder of Aria Systems, Bart Copeland, president and CEO of ActiveState Software; Jim Cowie, chief scientist at Dyn; Dave Wagstaff, VP ...
Jan. 30, 2015 09:00 AM EST Reads: 2,796
"Application monitoring and intelligence can smooth the path in a DevOps environment. In a DevOps environment you see constant change. If you are trying to monitor things in a constantly changing environment, you're going to spend a lot of your job fixing your monitoring," explained Todd Rader, Solutions Architect at AppDynamics, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 30, 2015 09:00 AM EST Reads: 2,885
"Desktop as a Service is emerging as a very big trend. One of the big influencers of this – for Esri – is that we have a large user base that uses virtualization and they are looking at Desktop as a Service right now," explained John Meza, Product Engineer at Esri, in this SYS-CON.tv interview at Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Jan. 30, 2015 09:00 AM EST Reads: 2,275
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Jan. 30, 2015 09:00 AM EST Reads: 2,526
CA Technologies released a new study – “DevOps: The Worst-Kept Secret to Winning in the Application Economy” – that reveals that 82% of enterprises in Asia Pacific and Japan (APJ) already have or plan to adopt a DevOps strategy, a 12 point increase from last year’s figure of 70%. DevOps is a methodology which helps foster collaboration between the teams that create and test applications (Dev) with those that maintain them in production environments (Ops). Vanson Bourne conducted the survey with...
Jan. 30, 2015 08:56 AM EST Reads: 139
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
Jan. 30, 2015 08:45 AM EST Reads: 2,772
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distribution, versions, network setup, and other details of this environment. This "containerization" has often been nicknamed "the new virtualization." But containers are more than lightweight virtual machines. Beyond their small...
Jan. 30, 2015 08:15 AM EST Reads: 3,172
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
Jan. 30, 2015 07:45 AM EST Reads: 2,066