Click here to close now.


News Feed Item

Mr. Ramesh Kesanupalli - Founding Member FIDO Alliance, Mr. Michael Day - IBM, Mr. Jim Miller - CEO ImageWare Systems, Mr. George Romas - HP, and StrikeForce Are Featured in Thought Leadership Interviews

RYE BROOK, NY -- (Marketwired) -- 08/05/14 -- ImageWare Systems, Inc. (OTCQB: IWSY) and StrikeForce Technologies, Inc. (OTCQB: SFOR)

FIDO Alliance

Mr. Ramesh Kesanupalli, Founder of Nok Nok Labs, Founding Member, FIDO Alliance, told us, "Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We're at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.

For the complete interview:

About The FIDO Alliance
The FIDO (Fast IDentity Online) Alliance,, was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords. The Alliance plans to change the nature of authentication by developing standards-based specifications for simpler, stronger authentication that define an open, scalable, interoperable set of mechanisms that reduce reliance on passwords. FIDO authentication is stronger, private, and easier to use when authenticating to online services.


HP Enterprise Services

Mr. George Romas, Technical Director, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector, told us, "IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities. An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smart phone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house. "

For the complete interview with George Romas:

For more information on these topics:

HP blog post, "The Internet of (Secure) Things - Embedding Security in the IoT."

HAVEn and Autonomy - designed to help enterprises leverage all your relevant Big Data, to make more informed decisions.

Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (
Public Sector Services and Solutions (


ImageWare Systems

ImageWare Systems, Inc. (OTCQB: IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, was selected to implement a multi-modal biometric driver license system for the State of Baja California, Mexico.

The contract was awarded by the Funciones Ocupacionales Insha, S.A. de C.V., the prime contractor on the project. For ImageWare, the contract is valued at more than $1.0 million and its software will help generate more than one million licenses over the next three years. ImageWare will receive one time license fees for its software upon delivery and ongoing payments for its professional services and maintenance as delivered.

ImageWare will help to deploy the system at governmental offices in the largest cities in the state, including Tijuana, Mexicali, Tecate and Rosarito, as well as implement mobile stations through the state. The project will begin in the third quarter of 2014.

"As security needs become more complex and demanding, our customers increasingly appreciate the unique power and flexibility of our patented cloud-based, multi-modal biometric solutions," said Jim Miller, ImageWare's chairman and CEO. "Our proven track record of providing state-of-the-art biometric solutions for government agencies was a key factor in winning this award."

The multi-modal biometric driver license system will be based on ImageWare's CloudID™ modular software platform that supports the rapid development and deployment of highly secure, yet flexible identity management solutions for the creation of credentials, including IDs, passports, driver's licenses, smart cards and access control credentials. IWS CloudID is designed to deliver a "future proof" identity management solution, allowing unlimited population sizes and stations, as well as adding additional biometric modalities and incorporating new biometric devices.

The company's IWS QuickApps™ will provide the user interfaces to register applicants, validate identities and print and encode cards. Both IWS CloudID and IWS QuickApps are driven by ImageWare's patented, multi-modal Biometric Engine® 2.0, and the system can be integrated with the government's existing biometric identification and verifications processes. Security for the system will be managed by ImageWare's Desktop Security System, with the use of multifactor authentication, data encryption and a secured log of all actions by the user.

About ImageWare Systems, Inc.

ImageWare Systems, Inc. (OTCQB: IWSY) is a leading developer of mobile and cloud-based identity management solutions, providing biometric, secure credential and law enforcement technologies. Scalable for worldwide deployment, ImageWare's biometric product line includes a multi-biometric engine that is hardware and algorithm independent, enabling the enrollment and management of unlimited population sizes. ImageWare's identification products are used to manage and issue secure credentials, including national IDs, passports, driver's licenses, smart cards and access control credentials. ImageWare's digital booking products provide law enforcement with integrated mug shot, fingerprint livescan and investigative capabilities. ImageWare is headquartered in San Diego, CA, with offices in Portland, OR, Washington, D.C., and Ottawa, Ontario. For more information on ImageWare Systems, Inc., please visit

For the complete Press Release:

For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (

For more information:
ImageWare Systems Solutions:
ImageWare Systems Products:
ImageWare Systems Investors:
For more information:



Mr. Michael D. Day, IBM Distinguished Engineer, Virtualization and Linux, said, "None of the security issues associated with networked computing have gone away with Cloud Operating Systems. In many ways we are more vulnerable than ever to breaches being escalated. The Trusted Platform Module is a partial solution which can validate the boot chain of a compute node. (Verify the platform has come up without a root kit). The TPM is well supported by Linux and by the KVM hypervisor, but not widely used, although it should be. As bad as the security issues are with data center computing, they are much worse with the IoT right now, primarily because that set of products has evolved in a disconnected state and has not been exposed to attack in the same way our data processing infrastructure has been for decades."

For the complete interview:


StrikeForce Technologies

StrikeForce Technologies, Inc. (OTCQB: SFOR), a company that specializes in Cyber Security solutions for the prevention of Identity Theft and Data Breaches, recently announced that ProtectID® now supports Microsoft Office 365.

"We are very pleased that our ProtectID Two-Factor Authentication Platform will NOW protect Microsoft Office 365," says Mark L. Kay, CEO of StrikeForce. "ProtectID will secure Office applications via integration into Active Directory Federation Services (ADFS). A number of our current and pilot clients are looking for this capability and many others are moving in this direction. According to Microsoft, SharePoint is used by 78% of Fortune 500 companies."

Active Directory Federation Services is the component within Microsoft® Windows Server™ that provides web Single Sign-On (SSO) technologies through federation using standard authentication mechanisms such as Security Assertion Markup Language (SAML) and Kerberos. Microsoft applications secured by ProtectID now include:

  • Office365
  • SharePoint
  • Azure cloud services
  • Exchange Online
  • Lync communications services

Microsoft Office 365 gives SMB's and all sized companies the opportunity to access advanced IT services and solutions without the need to manage programmers in house -- or even have any IT expertise. Employees can gain anywhere access to the programs they use on their office PC -- such as Word, PowerPoint, Outlook, and Excel. This ensures they can work more effectively when away from their desk, using a laptop, tablet or smartphone.

"Authentication is required more now than ever with Microsoft Office 365's increasingly wide low cost access to your enterprise's secured applications. The ProtectID Authentication Platform is a solution that provides the greatest number of authentication methods, options and patents to protect you and your company," says Mr. Kay.

For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here (

For more information about:
ProtectID® (
GuardedID® (
MobileTrust® (; (OTCQB: SFOR)
Please read our Terms Of Use, Conditions, and Disclaimer



ASIS International 60th Annual Seminar and Exhibits
September 29-October 2, 2014
Atlanta, Georgia

Join us in Atlanta, Georgia, September 29-October 2, 2014 for the ASIS International 60th Annual Seminar and Exhibits--the world's most influential security event.

Program highlights include:

  • 250 education sessions spanning all security disciplines and industry sectors
  • Security products and services from 600+ leading solutions providers
  • Unmatched peer-to-peer networking opportunities
  • Colocated event: (ISC)² Security Congress.


The New York City Cyber Security Summit
Thursday, September 18th
The Hilton New York -- New York City

REGISTER NOW with promo code SECURITYSOLUTIONSWATCH to access your 50% OFF Full Conference Passes.

The Cyber Security Summit, an executive conference series sponsored by The Wall Street Journal, is to be held on September 18th in New York City. The Cyber Security Summit brings together the nation's leading solution providers and renowned information security experts for Senior Executives to discover the latest products, services and strategies necessary for enterprise cyber defense. In today's digital world, every organization needs an effective cyber security plan to protect their business, employees and customers from emerging threats. Join us this September and learn how to best protect highly vulnerable business applications and intellectual property.

Speaker presentations will cover: The Insider Threat / Human Element, Social Computing, Mobile Security & BYOD, Cyber Supply Chain Security, Threats Facing Banks & Financial Institutions and more!

To view a full list of participating sponsors & speakers visit:

Keep your organization at the forefront of cyber security and most importantly, secure!


LinuxCon Europe
Congress Centre Düsseldorf
Düsseldorf, Germany
October 13 - 15, 2014

LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.


US/Canada Border Conference
Cobo Center, Detroit, MI
September 16-17, 2014

Beyond the Border 2.0

Event Description:

The US/Canada Border Conference will bring together local, state, provincial and federal agencies, as well as business organizations, in a central location convenient to both nations, to advance the "Beyond the Border" Action Plan between the United States and Canada.

Government and industry leaders share their knowledge and thoughts at a conference designed to enlighten, inform and educate the audience on the complex challenges outlined in the bi-lateral plan. The program advances the mission by providing a forum that helps foster collaboration while gaining a better understanding of the political, infrastructure and technological needs in the combat against current and future security threats, while improving the efficient flow of legal cross-border activity

Sponsors will attend all keynotes, panel sessions and food functions and have the unique opportunity to meet face-to-face with border security leadership from both the US and Canada.

Contact: John Moriarty, [email protected], 203-822-7953



Chip-to-Cloud Security Forum
Advances in Securing Embedded, Mobile & Cloud Services and Ecosystems
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France

Chip-to-Cloud Security Forum provides an independent collaboration and information-sharing platform dedicated to advance end-to-end digital security. Created from the former e-Smart and Smart Mobility conferences, its wide-ranging technical conference covers four key themes: embedded security, security & mobility, M2M & IoT security and secure cloud applications. The full digital security value chain will attend, with 300 expected attendees from Academia and Industry. Part of World Smart Week (1700 participants), the Forum offers great networking and forward-thinking opportunities with the attendees of the three co-located conferences dedicated to contactless/mobile, e-ID and M2M services and also includes a 50-booth exhibition. Visit us online at

M2M Innovation World Congress
Smart Services for Vertical Markets
Conference & Exhibition Sept. 22-24, 2014 - Marseille Provence, France

M2M Innovation World Congress invites all the M2M stakeholders to shift from a technology-driven to a business- and user-centric approach. Focused on emerging business models, technologies and best practices, this conference & exhibition gives its participants new inspirations to innovate and setup business while meeting prominent figures both from M2M industry and verticals. The conference will explore in particular M2M innovations in Smart Grids, Smart Cities, Retail and Consumer Electronics. Held in conjunction with the three other smart devices-related conferences and 50-booth exhibition forming World Smart Week, the Congress provides its 300 attendees rich opportunities to network, share knowledge and develop business with 1700 participants overall. Visit us online:

NFC World Congress
Mobile Proximity: Innovation, Services & Business
Conference & Exhibition September 22-24, 2014 - Marseille Provence, France

Now in its 4th edition, NFC World Congress explores the emerging ways to interact with the digital world through NFC and related mobile proximity technologies.

From start-ups to leading IT/mobile players and implementers from verticals, its conference gathers 600 participants from 60 countries eager to advance mobile proximity business in all its applications. Within World Smart Week, the Congress benefits from synergies of contents with three co-located conferences and a 50-booth joint exhibition. 1700 participants overall will converge at this global meeting of contactless/mobile, e-ID, M2M and digital security industries. Visit the Congress online:

World e-ID Congress
Identity services for Government, Mobility & Enterprise
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France

Since 2004 World e-ID gathers e-ID programs managers, government officials and technology experts around world's most inspiring large scale rollouts and latest innovations. Over 400 delegates from 60 countries are expected in 2014. Among the conference highlights: mobile ID advances, emerging countries and EU projects' latest results, cyber-security policies, e-ID for banking... Its 50-booth exhibition, featuring e-ID solutions leaders, will add knowledge sharing and networking opportunities with the mobile/contactless, M2M and digital security professionals attending World Smart Week (1700 participants overall). Visit the Congress online:


Please read our Terms of Use, Conditions and Disclaimers ("Terms"):

By using our website and any information located at you agree to these "Terms."


More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Culture is the most important ingredient of DevOps. The challenge for most organizations is defining and communicating a vision of beneficial DevOps culture for their organizations, and then facilitating the changes needed to achieve that. Often this comes down to an ability to provide true leadership. As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ab...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at, explored the value of Kibana 4 for log analysis and provided a hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He examined three use cases: IT operations, business intelligence, and security and compliance. Asaf Yigal is co-founder and VP of Product at log analytics software company In the past, he was co-founder of social-trading platform Currensee, which...
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Su...
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
In his General Session at 17th Cloud Expo, Bruce Swann, Senior Product Marketing Manager for Adobe Campaign, explored the key ingredients of cross-channel marketing in a digital world. Learn how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects).
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.