|By PR Newswire||
|January 8, 2013 07:01 AM EST||
RA'ANANA, Israel, January 8, 2013 /PRNewswire/ --
NICE Systems (NASDAQ: NICE) today announced that NICE Situator has been named the Best Physical Security Information Management (PSIM) Solution as part of the 2012 Government Security News (GSN) Homeland Security Awards. The GSN Awards acknowledge the outstanding achievements of security vendors and government agencies at the federal, state and municipal levels.
Denver Regional Transportation District (RTD), a NICE customer, was also recognized by GSN with an award for the Most Notable Railroad/Mass Transit Security Program.
NICE Situator was chosen as the Best PSIM Solution by a panel of judges based on Situator's successful deployments, advanced analytics, and deep vertical market expertise. NICE's submission also pointed to the security, safety and operational value for the customer and to the fact that NICE Situator goes much further than other PSIM solutions by moving beyond integration to address the entire incident lifecycle. This helps security operations better manage, predict, and prevent events, and make continuous improvements.
"The winners' plaques went to an exceptional group of companies and government agencies," said Jacob Goodwin, Editor-in-Chief of Government Security News (GSN) Magazine. "Among entrants in the PSIM category, NICE was selected as the best by our objective judging panel for technological innovation, providing increased efficiency, and its view to future organizational requirements."
"This is a real honor, and one more indication of our leadership in the security, safety and operations market," said Yaron Tchwella, Security President and EVP Business Operations at NICE. "I am also proud that Denver RTD was recognized because it shows how a world-class transit system with a vast, open infrastructure can benefit from using NICE security solutions."
The GSN award is the most recent in a series of announcements recognizing the unique value of NICE Situator. This includes NICE's ranking as a Tier 1 PSIM Company by Frost & Sullivan and as a PSIM world market leader in IMS's latest report.
NICE's Security solutions help organizations capture, analyze and leverage big data to anticipate, manage and mitigate security and safety risks, improve operations, and make the world a safer place. The NICE security, intelligence and cyber offerings provide valuable insights that enable enterprises and governments to take the best action at the right time by correlating structured and unstructured data from multiple sensors and channels, detecting irregular patterns, and recognizing trends. NICE Security solutions are used by thousands of customers worldwide, including transportation systems, critical infrastructure, city centers, banks, enterprises and government agencies.
About NICE Systems
NICE (NASDAQ: NICE) is the worldwide leader of software solutions that deliver strategic insights by capturing and analyzing mass quantities of structured and unstructured data in real time from multiple sources, including phone calls, mobile apps, emails, chat, social media, and video. NICE's solutions enable organizations to take the Next-Best-Action to improve customer experience and business results, ensure compliance, fight financial crime, and safeguard people and assets. NICE solutions are used by over 25,000 organizations in more than 150 countries, including over 80 of the Fortune 100 companies. http://www.nice.com.
Trademark Note: NICE and the NICE logo are trademarks or registered trademarks of NICE Systems. All other marks are trademarks of their respective owners. For a full list of NICE Systems' marks, please see: http://www.nice.com/nice-trademarks.
This press release contains forward-looking statements as that term is defined in the Private Securities Litigation Reform Act of 1995. Such forward-looking statements, including the statements by Messer Tchwella, are based on the current expectations of the management of NICE-Systems Ltd. (the Company) only, and are subject to a number of risks and uncertainties that could cause the actual results or performance of the Company to differ materially from those described herein, including but not limited to the impact of the global economic environment on the Company's customer base (particularly financial services firms) and the resulting uncertainties; changes in technology and market requirements; decline in demand for the Company's products; inability to timely develop and introduce new technologies, products and applications; difficulties or delays in absorbing and integrating acquired operations, products, technologies and personnel; loss of market share; pressure on pricing resulting from competition; and inability to maintain certain marketing and distribution arrangements. For a more detailed description of the risk factors and uncertainties affecting the company, refer to the Company's reports filed from time to time with the Securities and Exchange Commission, including the Company's Annual Report on Form 20-F. The forward-looking statements contained in this press release are made as of the date of this press release, and the Company undertakes no obligation to update or revise them, except as required by law.
Corporate Media Contact
Erik Snider, +1-877-245-7448, [email protected]
Marty Cohen, +1-212-574-3635, [email protected], ET
Anat Earon-Heilborn +972-9-775-3798, [email protected], CET
SOURCE NICE Systems Ltd.
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 4, 2016 09:30 AM EDT Reads: 422
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
May. 4, 2016 08:15 AM EDT Reads: 980
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 4, 2016 08:00 AM EDT Reads: 1,299
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 4, 2016 08:00 AM EDT Reads: 1,271
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 4, 2016 08:00 AM EDT Reads: 1,242
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
May. 4, 2016 08:00 AM EDT Reads: 1,167
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 4, 2016 07:45 AM EDT Reads: 1,180
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 4, 2016 07:30 AM EDT Reads: 402
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 4, 2016 07:00 AM EDT Reads: 1,041
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 4, 2016 07:00 AM EDT Reads: 827
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 4, 2016 06:00 AM EDT Reads: 1,247
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 4, 2016 05:30 AM EDT Reads: 410
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 4, 2016 04:45 AM EDT Reads: 1,338
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
May. 4, 2016 12:45 AM EDT Reads: 1,187
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 3, 2016 10:00 PM EDT Reads: 1,368