TMCnet News

Las Vegas & Equifax Attacks - Security Thought Leaders Discuss Solutions "In The Boardroom". AMAG (GFS), Cisco, Cyberinc, Dell EMC (DVMT), Extenua, ImageWare (IWSY), NetWatcher
[October 16, 2017]

Las Vegas & Equifax Attacks - Security Thought Leaders Discuss Solutions "In The Boardroom". AMAG (GFS), Cisco, Cyberinc, Dell EMC (DVMT), Extenua, ImageWare (IWSY), NetWatcher


NEW YORK, Oct. 16, 2017 (GLOBE NEWSWIRE) --

Security Investor Conference 2017
Security Investor Conference 2017


Thank You For Joining Us "In The Boardroom" On SecuritySolutionsWatch.Com

Kurt Takahashi, President, AMAG Technology - A G4S Company
Marc Blackmer, Cisco, Product Marketing Manager, Industry Solutions, Security Business Group
Samir Shah, CEO, Cyberinc
Ken Mills, General Manager, Dell EMC, Surveillance and Security
Graham Porter, Business Development Director EMEA, Dell EMC, Surveillance and Security
Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security
Steve Visconti, President & CEO, Extenua
Jim Miller, ImageWare Systems, Chairman and CEO
Scott B. Suhy, CEO, Netwatcher
Sanjib Kalita, Chief Marketing Officer, Money2020

*****

• AMAG Technology - A G4S Company, Kurt Takahashi, President 
   www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html  
   www.AMAG.com

AMAG Technology Previews Next Generation Symmetry M4000 Door Controller

AMAG Technology, a leading access control, video management, identity and visitor management solution provider, previews the Symmetry™ M4000 Intelligent Controller. The new controller, the first available in a full range of controllers, is the next generation Symmetry panel to the Symmetry M2150 Controller. The powerful, flexible and reliable M4000 employs the Linux operating system, providing a flexible platform for future functionality enhancements.

The M4000 provides distributed intelligence for Symmetry Security Management Systems which can be used for simple applications to enterprise-wide deployments. The controller supports four doors, 1 million credentials and 65,000 off-line transactions, which can be expanded further if required. The controllers will operate with Symmetry V9 Access Control software, which is not yet commercially available.

The M4000 supports OSDP, Wiegand and AMAG’s own MCLP reader communications, enabling organizations to install industry standard Symmetry access control software and modules and providing end users with the option to choose any card reader that fits their unique needs and requirements. 

A remote monitoring and software tool enables organizations to manage their Symmetry Security Management System from anywhere, providing flexibility and convenience.   More

For our complete interview with Kurt Takahashi, President, AMAG Technology - A G4S Company, please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html 

In recent news:

AMAG Technology Unveils New Symmetry Connect Identity Management
            http://www.amag.com/en/Company/News/2017/09/19/Symmetry-CONNECT
AMAG Technology’s Symmetryweb™ Delivers Mobile Access Control Management To Symmetry Access Control Customers
            http://www.amag.com/en/Company/News/2017/09/12/SymmetryWEB
AMAG Technology Welcomes Matica Technologies to the Symmetry Preferred Partner Program
            http://www.amag.com/en/Company/News/2017/08/14/Matica
Telaeris Joins AMAG's Technology's Symmetry Preferred Partner Program
            http://www.amag.com/en/Company/News/2017/08/07/Telaeris
Nortech Joins AMAG's Technology's Symmetry Preferred Partner Program
            http://www.amag.com/en/Company/News/2017/06/20/Nortech

*****

• Cisco, Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group 
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Cisco_Blackmer.html 
Cisco Blog

Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group, Cisco, shared with us, “We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“  For our complete interview with Marc Blackmer please click here or here:
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Cisco_Blackmer.html

*****

• Cyberinc, CEO, Samir Shah
   www.securitysolutionswatch.com/Interviews/in_Boardroom_Shah_Cyberinc.html 
   www.Cyberinc.com

Cyberinc launches IAMobile™ App for One Identity’s Identity Manager

Cyberinc, a global enterprise security leader with recognised expertise in Identity Management, today announced the launch of its IAMobileTM Application for Identity Manager. The IAMobileTM Application certified by One Identity, will help in addressing the Enterprise Mobility requirement within organisations.

IAMobileTM will help expand Identity Manager’s IT shop functionality of simplifying the process of managing user identities, access permissions and security policies, by providing a powerful and fully integrated mobile application with an unique user experience. This mobile application will enable users to govern their access, manage their approval tasks, attestation events and place product requests, anytime and anywhere from their respective mobile devices.

This App will streamline the routine requests and approvals process between users and the respective managers. The seamless connectivity and access ensured by this intuitive App will help in reducing risks associated with delayed access, and preventing security compromises through credential sharing between users.

Mike Nelsey, Managing Director, UK & Europe, Cyberinc, said, “Our colleagues at One Identity have fully endorsed the concept of mobility, convenience and security in certifying the App. We are delighted with the interest and acceptance it has garnered in the market place.”

“We are excited to work closely with One Identity towards launching the IAMobile App that is highly complementary to their solutions. We’ve created a unique user experience that addresses the core challenges of a mobile audience and the need for effective and efficient processes. Moreover, it fundamentally addresses one of the key concerns surrounding requests and approvals; that of balancing security and convenience for the mobile workforce. We will invest further to incorporate elements such as Password Management and Identity Analytics.”

“It’s encouraging to see key partners like Cyberinc taking the initiative and responding to customer needs by developing their own intellectual property around Identity Manager,” said Jackson Shaw, Senior Director of Product Management at One Identity. “Enterprise Mobility has a tendency to be a sticking point for a lot of organisations and the IAMobile Application for Identity Manager alleviates these issues, keeping users secure and productive.”  More

For our complete interview with Samir Shah please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_Shah_Cyberinc.html 

In recent news:               

BPT Introduces Cyberinc’s ISLA® Web Malware Isolation System in Indonesia: to help prevent Web-borne Malware Attacks
https://cyberinc.com/news/bpt-introduces-cyberinc-isla-web-malware-isolation-system-in-indonesia/
Cyberinc included in “Cool Vendor” list by Gartner in Endpoint, Mobile, Network and Gateway Security, 2017
https://cyberinc.com/news/cyberinc-included-in-gartner-cool-vendor-list-2017/
Cyberinc powers expansion of Isla® into global markets: Signs partnership with Hewlett Packard Enterprise (HPE)
https://cyberinc.com/news/cyberinc-signs-partnership-with-hewlett-packard-enterprise/

*****

• Dell EMC, Graham Porter, Business Development Director EMEA, Surveillance and Security
  http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Porter_DeLLEMC.html
  https://www.emc.com/storage/video-surveillance-storage.htm

“The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase imae resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it. For our complete interview with Graham Porter please click here or here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Porter_DeLLEMC.html



FOR MORE INFORMATION:

Interview With Ken Mills, Dell EMC, General Manager, IoT, Surveillance and Security
www.securitysolutionswatch.com/Interviews/in_Boardroom_KenMills_GeneralManager_DeLLEMC.html


Interview With Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Thermenos_DeLLEMC.html

Learn here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!solution_portfolio

For Dell EMC Partner Validations, please click here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!partner_validations

Please click here for the Dell EMC VIGILARE BLOG - Surveillance and Public Safety Emerging Trends
or click here: http://vigilareblog.emc.com/

*****

• Extenua, President and CEO, Steve Visconti
   www.securitysolutionswatch.com/Interviews/in_Boardroom_Extenua_Visconti.html 
   www.Extenua.com

Extenua has released a most timely white paper…

This free white paper discusses the challenges of keeping ransomware (Cryptolocker, WannaCry, and the like) out of the corporate data storage, whether it is local, in the cloud or hybrid.

CLOUD2DRIVE-PROTECTED ONLINE STORAGE IS IMPERVIOUS TO RANSOMWARE BY USING SILVERSHIELD

“Ransomware is a type of malware that restricts access to the infected computer system, and demands that the user pay a ransom to the malware operators to remove the restriction. Probably the most famous ransomware, even though not the only one, is Cryptolocker, and it’s certainly something you don’t want to deal with. Regardless of the strenuous efforts put in place by Antivirus developers, the rate of infection is astonishing, and these days it’s becoming even worse with an unprecedented outbreak of infection. To make things even worse, ransomware can also access all the shared folders on your NAS/SAN, so if you backup to a network drive your backups will be compromised too. The ransomware goals include, in fact, preventing you from being able to restore your old (healthy) data from a backup.”

“Even in case your systems are infected by a ransomware,
you will simply be able to format your computer,
reinstall your operating system,
and restore all your data from an always-healthy backup.”

Download the complete White Paper (in PDF format)

http://dl.extenua.com/no-ransomware.pdf

*****

• ImageWare Systems, Chairman and CEO, Jim Miller 
   www.securitysolutionswatch.com/Interviews/in_Boardroom_ImageWare.html 
   www.iwsinc.com

ImageWare Receives IBM PartnerWorld’s “Ready for IBM Security Intelligence” Validation

Certified integration with IWS GoVerifyID® offers ISAM users multi-modal biometric authentication with mobile devices

ImageWare Systems, Inc. (ImageWare or IWS) (OTCQB:IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, today announced it has received IBM PartnerWorld’s Ready for IBM Security Intelligence designation for its GoVerifyID Enterprise Suite. As a result, ImageWare’s GoVerifyID has been validated to integrate with IBM Security products to help better protect its customers around the world.

ImageWare’s GoVerifyID provides multi-modal biometric user authentication using mobile devices and Software-as-a-Service (SaaS). GoVerifyID, combined with IBM’s flagship access management platform, IBM Security Access Manager (ISAM), allows users to swipe a fingerprint, take a selfie, or provide a voice sample on their mobile device to authenticate for any ISAM managed resource. GoVerifyID Enterprise Suite is an end-to-end, enterprise-ready, security solution that can be seamlessly integrated into your existing ISAM authentication processes, providing a secure and user-friendly experience, while allowing you to adopt new biometric modalities as they are available.

“Flexible mobile biometric authentication, combined with secure web application access provides the ultimate in security and friendly user experience,” said IWS Chairman and CEO Jim Miller. “ISAM users can now enjoy seamless integration and instantly access all of their apps by simply taking a selfie, using a fingerprint or speaking a passphrase. And, of course, as with all IWS mobile authentication products, users can always avail themselves of the latest advancements in biometric technology if they choose to do so as our GoVerifyID products are supported by our patented IWS Biometric Engine® that allows for unparalleled flexibility, scale, and security.”

The Ready for IBM Security Intelligence alliance is designed to promote technology collaboration and integration to expand and enhance security coverage, collapse silos of information, and increase situational awareness and insights. With the PartnerWorld program and Ready for Security Intelligence validation, IBM supports collaboration with its Business Partners to enable the integration of product capabilities and improved security capabilities for mutual customers.” More

For more information:
About ImageWare Systems (https://iwsinc.com/about)  
ImageWare Systems Markets (https://iwsinc.com/solutions)  
ImageWare Systems Products (https://iwsinc.com/products)  
ImageWare Systems News (https://iwsinc.com/category/news)  
ImageWare Systems Investors (https://iwsinc.com/about/investors)  

ImageWare Systems Partners (https://iwsinc.com/partners)  
ImageWare Systems Resources (https://iwsinc.com/resources)
ImageWare Systems Patent Portfolio  https://iwsinc.com/about/intellectual-property/)

TwitterLinkedInYouTube and Facebook.

*****

• NetWatcher, CEO, Scott B. Suhy
   www.securitysolutionswatch.com/Interviews/in_Boardroom_Netwatcher_Suhy.html 
   www.NetWatcher.com

Scott Suhy, CEO, NetWatcher, told us," There is a giant opportunity here for MSPs at the moment. If you look at each vertical by employee size and count up the number of companies that fit into each just in the USA the numbers are staggering   All of these organizations are moving to a more advanced security footprint over the next several years.   You also know that they will first look to their MSP partner to provide the advanced stack and if you can’t provide it, they will find a MSP that can provide the stack and manage it for them.

We built NetWatcher to enable MSPs to easily offer their own Security Monitoring / Managed Security / Managed Detection and Response service.   We designed and built NetWatcher from the ground up for SMBs and MSPs.   We built the service to be easy to install, easy to use for SMB/MSP IT professionals (not hard to find security analysts–although, analysts tend to love it too) and affordable.  MSPs will also find the multi-tenant single pane of glass user interface where they can manage all their customers — and the ConnectWise integration very valuable.” More

*****

Money2020, Sanjib Kalita, Chief Marketing Officer
http://securitysolutionswatch.com/Interviews/in_Boardroom_Kalita_Money2020.html
www.MONEY2020.com

“Money20/20 was founded in 2012 by people running businesses in the payments industry who realized that companies, both large and small as well as across industries, were getting into payments and financial services with disruptive technologies, business models and value propositions. There wasn’t a single event that met the needs of where the industry was heading so we decided to build it.

After we created a unifying event for the community in North America, we realized that other geographies could use the catalytic and unifying energy of Money20/20.  In 2016, we launched Money20/20 Europe in Copenhagen. In 2018, Money20/20 Europe will move to Amsterdam and we’ll launch Money20/20 Asia in Singapore in March.

Our 2017 agenda will continue to address the most pressing issues from the industry and highlight some of the most interesting speakers and companies from across the globe. The 2017 exhibit hall will be an ideal place to meet companies and begin conversations regardless of whether you’re a global giant or a scrappy startup. If you’re working on defining or delivering the future of the industry, I would recommend attending the show this year.” More

*****
SecuritySolutionsWatch.com Is Proud To Be A Sponsor Of These Important Upcoming Events
MARK YOUR CALENDAR!

Imperial Capital
14th Annual Security Investor Conference (SIC)
December 6-7, 2017 at the InterContinental New York Barclay.

Imperial Capital is pleased to announce the 14th Annual Security Investor Conference (SIC)  on December 6-7, 2017 at the InterContinental New York Barclay. SIC is the premier industry gathering connecting the leading security focused companies with an audience of key investors and business leaders. This conference provides investors access to senior management teams while they present their positioning and strategic growth plans to deliver the latest compelling security solutions across the Global Consumer, Enterprise and Government Markets. Whether you specialize in cutting edge technologies or more traditional security systems and services, SIC is a fundamental networking event that consistently attracts top management from leading security companies.

*****

CYBER SECURITY CHICAGO
18-19 October 2017
McCormick Place, Chicago
https://www.cybersecurity-chicago.com/

Cyber Security Chicago offers invaluable security insight for both IT managers & security specialists. Hear from cyber securities finest on how you can build stronger defenses against cyber-attacks & how to recover if your systems are breached. Cyber Security Chicago allows you access to a wealth of insight and solutions to help you protect your employees, organization and country from criminal gangs and cyber terrorism. Learn from industry experts at thought-provoking seminars and discover solutions on all facets of cyber security and risk mitigation, from perimeter firewalls to the latest threat intelligence solutions.

*****

Money20/20
The Venetian, Las Vegas
October 22-25, 2017
www.money2020.com
[email protected]

Money20/20 US is the world’s most important event covering payments and financial services innovation for connected commerce at the intersection of mobile, retail, marketing services, data and technology. With 11,000+ attendees from 4,500 Companies and 85 Countries, including 1,700+ CEOs and 400+ speakers, expected at our 2017 US event, Money20/20 is critical to realizing the vision of disruptive ways in which consumers and businesses manage, spend and borrow money. Money20/20 US will be held in Las Vegas, October 22-25, 2017.

*****

O'Reilly Security Conference

BUILD BETTER DEFENSES

OCTOBER 29–30, 2017: TRAINING

OCTOBER 30–NOVEMBER 1, 2017: TUTORIALS & CONFERENCE

NEW YORK, NY

Build better defenses

The O’Reilly Security Conference brings together in-the-trenches security practitioners from organizations of every size, across a wide breadth of industries to share actionable insight in a supportive, hype-free environment. We'll cover interesting successes (and failures), provocative ideas, practical how-tos, proven best practices, and effective new approaches that can benefit all defenders.

Looking for new ways to fend off a targeted attack or eject persistent intruders from your environment or recover quickly and effectively from a breach? Want to integrate new technology into your environment, securely and successfully? Need to figure out how to keep your access controls (to data, network, or cloud) effective at scale—without losing your mind? Want to help your management team and BOD understand how your work is crucial to the bottom line? All of the above? There's no better place than Security.

Join us October 29–November 1 at the Hilton Midtown in New York, NY. Take a look at the schedule and start making your plans today. Need help convincing your manager? We've got you covered.

*****

Cyber Security Summit: Boston

Wednesday, November 8, 2017   |   7:45AM to 6:00PM   |   The Westin Copley Place, Boston

https://cybersummitusa.com/2017-boston/

*****

Border Management & Technologies Summit Asia 2017
Kuala Lumpur, Malaysia

November 7, 2017

Asian nations are continuing to develop their borders and create the most efficient immigration processes at airports. Many of the regions border security agencies are working hard to improve security on their borders from illegal migration to cross-border organised crimes. Airports in the region are improving passenger experiences to make immigration processes as smooth and hassle free as possible.   Read More >>

To take part in our international event either as a speaker, sponsor, exhibitor or as a delegate please contact us at [email protected] or call us on +44 (0)1582 346 706

*****

The 6th Regional Cybersecurity Summit

20th – 21st November 2017

Sheraton Hotel, Oman

*****

TRUSTECH

28-30 NOVEMBER 2017

PALAIS DES FESTIVALS CANNES

FRENCH RIVIERA

Following a brilliant first edition in Cannes last year, TRUSTECH Pay, Identify, Connect & Secure – will bring together once again the entire payments and identification ecosystem in the Palais des Festivals de Cannes, 28th to 30th November 2017.

The event was first held over thirty years ago under the name «Cartes Secure Connexions», to promote the newborn technology of smartcards. In 2016, it is re-named TRUSTECH to better reflect the way the industry and the event have evolved, and its focus on trust-based technologies.

More than ever, this event is a unique opportunity to meet the whole ecosystem and get an insight into the latest innovations in payments and identification industries.

350+ exhibitors and sponsors are expected – either to present their latest innovations on their stand or to pitch on the Innovation Stage. Among those who have already confirmed their participation: Be2bill, Dermalog, Ingenico, Matica, NBS Technologies, Next Biometrics, NXP

Semiconductors, Otto Kuennecke, Spire Payments, ST Microelectronics, Thales E-Security, Verifone, … and many more!

About COMEXPOSIUM: The COMEXPOSIUM Group, one of the world’s leading event organizers, is involved in more than 170 B2C and B2B events across 11 different sectors, including food, agriculture, fashion, security,digital, construction, high-tech, optics and transport. Comexposium hosts more than 3 million visitors and 45,000 exhibitors in 26 countries around the world. Comexposium operates across 30+ global economic growth zones,such as: Algeria, Argentina, Australia, Belgium, Brazil, Canada, China, France, Germany, India, Indonesia, Italy, Japan, Korea, Monaco, Netherlands, New Zealand, Philippines, Qatar, Russia, Singapore, Spain, Thailand,Turkey, UAE, UK, USA.

*****

Cyber Security Summit: Los Angeles

Wednesday, November 29, 2017   |   7:45AM to 6:00PM   |   The Beverly Hilton

https://cybersummitusa.com/2017-losangeles/

*****

TEC 2018
March 12-16, 2018
Sheraton Downtown Denver
Denver, CO

TEC, presented by PSA Security Network, is the premier education and networking event for all professional systems integrators. TEC features industry leading education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization.

TEC 2018 will be held at the Sheraton Downtown Denver in Denver, CO on March 12-16, 2018. The education program will deliver sessions focused on emerging technologies, critical issues in the industry, and tool development to augment attendees’ knowledge base needed to continue to drive the industry forward. Sessions will be selected that serve a variety of disciplines including business management, sales and marketing, HR and recruiting, project management and operations, and installation and service.

*****
Joint 2018 Payments Summit / ICMA Expo and U.S. Payments Forum Meeting
March 26-29, 2018
Omni Orlando Resort at ChampionsGate, Championsgate, FL

*****
LAAD Security 2018 | Apr 10-12, 2018 | São Paulo-SP| www.laadsecurity.com.br

*****
Securing Federal Identity 2018
June 5-6, 2018
Almas Conference Center
1315 K Street, NW, Washington, District of Columbia 20005

*****

LAAD Defence & Security 2019 | Apr 02-05, 2019 | Rio de Janeiro-RJ | www.laadexpo.com.br

****

About SecuritySolutionsWatch.com

SecuritySolutionsWatch.com features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco SecurityDell EMCHP CybersecurityGemaltoHID GlobalImageWareSiemens Security and SONY Security, just to name a few.

What's YOUR cybersecurity, physical security, mobility, payments, safety or "smart" solution?
We invite you to please join us "In The Boardroom", more details here, or here: http://www.securitysolutionswatch.com/Main/ThoughtLeadershipOpportunity_July2017.pdf

Please click here for our Media Kit (http://www.securitysolutionswatch.com/MediaKit.html
Please click here or here: http://www.securitysolutionswatch.com/Main/170502%20RATE_CARD-4.pdf  for additional details about our offerings.

*****

FOR MORE CONTENT ABOUT SECURITY THREATS AND SOLUTIONS...
...PLEASE 
CLICK HERE FOR OUR MONTHLY NEWLETTER 
(
http://securitysolutionswatch.com/newsletters/newsletter_2017_08.html)
 And
 PLEASE VISIT US ON TWITTER 
HEREhttps://twitter.com/SecStockWatch

*****

THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.securitysolutionswatch.com/Main/Terms_of_Use.html.

Contact:
Ali Eng
Publishing Team Leader
ALE (at) SecuritySolutionsWatch (dot) com

USA 1+914.690.9351

Primary Logo


[ Back To TMCnet.com's Homepage ]