Welcome!

News Feed Item

Cisco, CyberLock, ImageWare Systems and Wave Systems Discuss Security Solutions

RYE BROOK, NY -- (Marketwire) -- 01/30/13 -- ImageWare Systems (OTCQB: IWSY), Wave Systems (NASDAQ: WAVX)

Cisco
Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html

For more information: http://www.cisco.com/go/medianet, http://blogs.cisco.com/category/video

*****

CyberLock

CyberLock announced a new version of the CyberKey Vault 20, the CyberKey Vault 20 FX. The redesign features a sleek new look with weatherized input modules and an embedded Flex System Hub for improved performance, all offered at a new, lower price.

"The CyberKey Vault 20 FX is our most advanced key control cabinet (http://www.cyberlock.com/cyberkey-vaults.html) yet," said James McGowan, VP of Sales and Marketing at Videx. "We built on the award winning original design and added extra durability and speed to meet the needs of today's demanding end-users. We believe it will surpass market expectations."

The Vault 20 FX is an intelligent key cabinet designed to manage, program, and dispense CyberKey smart keys. The keys are stored unprogrammed and locked securely in the cabinet until an RFID card and/or PIN code is presented to the cabinet. After reading the card and/or accepting the PIN, the CyberKey Vault programs a CyberKey with the individual's permissions. Keys are programmed with access privileges for each user, detailing which electronic locks (http://www.cyberlock.com/cyberlock_cylinders.html) it can open and when. An audit record of all events is stored in both the locks and the keys. Each time a key is used at a lock, a record of the lock ID, date, and time is stored in the key, and a record of the key ID, date, and time is stored in the lock.

CyberKeys feature a unique electronic ID, preventing duplication. Although two keys can be programmed alike, each one leaves its own unique record within the system. When the key is returned to the Vault, the Vault downloads the key's audit trail, removes its permissions, and begins charging the key.

Videx offers three robust smart key vaults: CyberKey Vault 1, CyberKey Vault 20 FX, and CyberKey Vault WR. To learn more about the CyberLock line of access control (http://www.cyberlock.com/cyberlock_overview.html) products, please visit our website at www.cyberlock.com.

For more information about CyberLock products: http://www.cyberlock.com/cyberlock_products.html.

For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx: www.securitystockwatch.com/Interviews/in_Boardroom_VIDEX.html

For CyberLock News & Events: www.cyberlock.com/news_events.html

For the CyberLock Solutions Center: www.cyberlock.com/solutions_center.html

For more information: http://www.cyberlock.com

*****

ImageWare Systems

ImageWare Systems recently announced, "In addition to product development, ImageWare has been preparing for a major international deployment as the exclusive provider of biometric identity management for a prime contractor installing cargo scanning security at the Republic of Ecuador's major seaports. The initial deployment is currently scheduled to begin in the early part of 2013 at the Port of Guayaquil, the country's main seaport that handles a majority of its imports and exports. ImageWare expects to receive a fee for every port worker receiving credentials, as well as an annual management and maintenance fee, based on a percentage of the initial credentialing cost per worker. Depending upon the number of enrollees, the company expects the contract value to exceed $3.0 million over its seven year term."

"The high-end biometric secure credentialing solution we are providing for Ecuador is the same technology being deployed for the Los Angeles World Airports, which we announced earlier this year," noted Jim Miller, Chairman and CEO. "In fact, we can easily replicate this platform for virtually any port system that needs transportation worker identification cards in order to comply with the SAFE Port Act. Not only are our solutions easily deployable, for ImageWare they generally represent gross margins above 70% as well as a recurring revenue stream. Our unique patented technology has the potential to provide us strong, steady revenue growth, along with excellent forward-looking visibility."

For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO: www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html

For more information about ImageWare Systems Solutions: http://www.iwsinc.com/markets/overview and ImageWare Systems Products: http://www.iwsinc.com/products/overview2

For ImageWare Systems Investors: http://www.iwsinc.com/about-iws/investors/overview1

For more information: www.iwsinc.com, (OTCQB: IWSY)

*****

Wave Systems

Wave Systems Corp., the Trusted Computing Company, announced an expansion of its distribution channel, highlighted by strategic agreements with Infodat Technologies (http://infodatinc.com/) in India; TechSearch Corp. (http://techsearch.co.kr/_new_2012/00_main/main.php) in Korea; and Bangkok Systems & Software (http://www.bangkoksystem.com/bangkok/index.php) in Thailand. Wave is also expanding existing relationships in Singapore and other Asian-Pacific markets.

These new distribution partners are now authorized to offer their customers Wave's innovative solutions for data protection, data loss prevention, authentication, security compliance and malware protection.

"Today's cyber threats call for a unique and innovative approach, and one that builds on industry-standard hardware built directly into the endpoint. We're putting Wave's technology into the hands of top regional distributors whose relationships and trained service professionals offer a fast path to deployment," said Brian Berger, Wave's Executive Vice President of Business Development and Chief Marketing Officer. "Infodat is well-anchored in the Indian market and has earned the trust of its extensive client base. TechSearch is the trusted partner for Korea's IT industry; and Bangkok Systems & Software provides seasoned professionals on the ground in Thailand."

Under the terms of the agreements, Wave's distribution partners will offer both products and professional services. The distributors will offer Wave's EMBASSY® (http://www.wave.com/products) security software for managing hardware-based data protection and authentication, as well as the full Safend (http://www.wave.com/products) portfolio of products. Infodat Technologies has built a strong reputation in India and globally, providing technology services and business solutions for more than 16 years to help its clients innovate, automate information and optimize costs.

For complete details about these announcements: http://www.wave.com/news/
For Wave Webcasts and Presentations: http://www.wave.com/news/webcasts.asp
For the Wave Blog: http://blog.wave.com/
For Wave Solutions: http://www.wave.com/solutions
For Wave Products: http://www.wave.com/products
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf
For more information: www.wave.com (NASDAQ: WAVX)

*****

Security Industry Association
(
https://www.siaonline.org/)
SIA Ride for Education
Date: Saturday, April 13, 2013
Time: 9:00 a.m.
Location: Las Vegas Harley-Davidson
2605 S. Eastern Ave., Suite 100
Las Vegas, NV 89169
Phone: (888) 218-0744

*****

Providing Scholarships for First Responders: The 2013 SIA Ride for Education

The SIA Ride for Education will be held on Saturday, April 13, 2013. The event raises money for the SIA First Responders Scholarship, which provides awards of $1,000 to law enforcement officers and firefighters for job-related education and training -- opportunities for which funding might not otherwise be available because of budget cuts.

The ride will start at Las Vegas Harley-Davidson at 9:00 a.m. and will include visits to some of the most scenic sites in Nevada. The cost is $40 per person ($30 if riding as a passenger). Law enforcement officers, firefighters and military personnel may participate at no charge.

All registrants will receive a specially designed "2013 SIA Ride for Education" shirt. Lunch will be provided.

Participants who are not bringing their own motorcycles to the event may contact Las Vegas Harley-Davidson to reserve a bike at the special discounted rate of $125. Availability is limited, so reservations should be made as soon as possible by calling (888) 218-0744, or by visiting the store's rentals page (https://websolutions.tsd-inc.com/Harley-Davidson/frmRateQuote.aspx?PickupLoc=79315). To receive the reduced rate, mention the "SIA group" if reserving by phone, or enter "SIA group" in the Special Requests field if reserving online. We also welcome participants in sports cars and other vehicles. (The same registration rates apply.)

For more information, contact Ron Hawkins, SIA's manager of technical writing and special projects, at (301) 804-4713 or [email protected].

Sponsorships are available.
For sponsorship information contact Alain Taylor (301) 804-4711 or [email protected], or Marc Benson (301) 804-4710 or [email protected].

*****

PSA Security Network

Mr. Bill Bozeman, CPP, CHS, President/CEO, PSA Security Network, said, "PSA Security Network's Business Solutions (http://www.buypsa.com/Solutions) is a suite of value-added products, services and programs that help security professionals be more competitive in the marketplace. Each month, PSA President and CEO Bill Bozeman (http://www.buypsa.com/bbozeman) discusses a Business Solution in detail. This month we'll be focusing on Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing).

SecurityStockWatch.com: What is Security Dealer Marketing's main focus?
Bill Bozeman: Security Dealer Marketing (SDM) focuses on creating brand awareness for and educating dealers and manufacturers on how marketing tools work, from collateral production to strategy deployment, to generate more recurring monthly revenue. They focus on generating results and creating services that work specifically for the security community.

SecurityStockWatch.com: What types of managed services are included with Security Dealer Marketing?
Bill Bozeman: They can help with any marketing questions or needs, from traditional design/print services to targeted online campaigns to comprehensive marketing strategy overhaul or development. Security Dealer Marketing works with many types of semi-custom website development packages, including Search Engine Optimization (SEO), Pay-Per-Click (PPC) and Google Analytics services. They also offer marketing support for point of sale materials, logo design or redesign, email marketing, social media campaigns and press releases.

SecurityStockWatch.com: How can Security Dealer Marketing help companies better their business?
Bill Bozeman: Security Dealer Marketing can handle the logistics and details of your marketing programs, allowing you to focus on other areas of your business. With years of expertise in security marketing, they eliminate the guesswork. SDM has spent the last 15 years working with numerous large domestic brands, and they will take that experience and use it to guide your company to get greater return on investment. They work with a number of PSA integrators and partners and we've been pleased with the partnership, service and results.

SecurityStockWatch.com: Where do I go to find more information or to start using Business Solutions?
Bill Bozeman: To learn more about Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing) or any of the PSA Business Solutions programs, schedule a webinar demonstration, or get signed up, simply visit www.buyPSA.com/Solutions, call 303-450-3461, or email [email protected]. Additionally, all of PSA's trusted providers of Business Solutions will be at PSA-TEC 2013 (http://www.buypsa.com/Education/PSA-TEC), exhibiting on Wednesday, May 8, 2013. For the most up-to-date information on this event, visit http://www.psaTEC.com

*****

The 6th Annual Conference
2013 Payments Summit
February 5-7 -- Grand America Hotel -- Salt Lake City
http://www.SCAPayments.com

Join the Ascent to EMV and Smart Mobile Payments
Over 500 executive delegates came together last February in Salt Lake City for Payments Summit -- the industry's leading forum for smart, secure payment technology, implementation, and markets. For 2013, we're building on that success with a larger meeting facility and an up-to-the minute conference agenda. And we're continuing our coverage of every leading transaction platform: EMV card payments, mobile payments, and transit payments. Reserve your seat now at this gathering of leading smart card practitioners, solutions developers, end users, and suppliers.

The US is the world's largest payments ecosystem and the migration to EMV -- the global transaction security standard -- has now begun in earnest. Yet, for many banks, credit unions, issuers and merchants there's still a frustrating lack of clarity. At the same time, NFC-enabled payments are starting to take shape as card networks, telecoms and handset manufacturers target the market with mobile wallet solutions. But no ubiquitous model for all merchants and issuers has emerged. Finally, transit ridership is considered by many to be the "killer app" in expanding the use of open standards-based contactless bank card and mobile payments, and major transit operators have launched pilots nationwide.

Considerable work remains to clear a path for this migration. Payments Summit is the place to consult the trailblazers and plan your own journey.

Day on the Slopes Ski Trip: February 3 -- Pre-conference Workshops: February 4. Exhibit and sponsor marketing opportunities are available: Contact Bill Rutledge at [email protected] +1 212-866-2169.

Please read our Terms of Use, Conditions and Disclaimers ("Terms"): http://www.securitystockwatch.com/Main/Terms_of_Use.html.
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms."

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mistakes high" is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Le...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Dhiraj Sehgal works in Delphix's product and solution organization. His focus has been DevOps, DataOps, private cloud and datacenters customers, technologies and products. He has wealth of experience in cloud focused and virtualized technologies ranging from compute, networking to storage. He has spoken at Cloud Expo for last 3 years now in New York and Santa Clara.
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and innovate at scale. Cloud and cognitive technologies can help them leverage hidden data in SAP/ERP systems to fuel their businesses to accelerate digital transformation success.
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.