News Feed Item

Mr. Ramesh Kesanupalli - Founding Member FIDO Alliance, Mr. Michael Day - IBM, Mr. Jim Miller - CEO ImageWare Systems, Mr. George Romas - HP, and StrikeForce Are Featured in SecuritySolutionsWatch.com Thought Leadership Interviews

RYE BROOK, NY -- (Marketwired) -- 08/05/14 -- ImageWare Systems, Inc. (OTCQB: IWSY) and StrikeForce Technologies, Inc. (OTCQB: SFOR)

FIDO Alliance

Mr. Ramesh Kesanupalli, Founder of Nok Nok Labs, Founding Member, FIDO Alliance, told us, "Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We're at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.

For the complete interview: www.securitysolutionswatch.com/Interviews/in_Boardroom_NokNok_Ramesh.html

About The FIDO Alliance
The FIDO (Fast IDentity Online) Alliance, www.fidoalliance.org, was formed in July 2012 to address the lack of interoperability among strong authentication technologies, and remedy the problems users face with creating and remembering multiple usernames and passwords. The Alliance plans to change the nature of authentication by developing standards-based specifications for simpler, stronger authentication that define an open, scalable, interoperable set of mechanisms that reduce reliance on passwords. FIDO authentication is stronger, private, and easier to use when authenticating to online services.


HP Enterprise Services

Mr. George Romas, Technical Director, Cybersecurity Solutions Group, HP Enterprise Services, U.S. Public Sector, told us, "IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities. An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smart phone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house. "

For the complete interview with George Romas: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_HP_Romas2.html

For more information on these topics:

HP blog post, "The Internet of (Secure) Things - Embedding Security in the IoT."

HAVEn and Autonomy - designed to help enterprises leverage all your relevant Big Data, to make more informed decisions.

Risk Management and Compliance for US Public Sector
Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497)
Public Sector Services and Solutions (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1131347)


ImageWare Systems

ImageWare Systems, Inc. (OTCQB: IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, was selected to implement a multi-modal biometric driver license system for the State of Baja California, Mexico.

The contract was awarded by the Funciones Ocupacionales Insha, S.A. de C.V., the prime contractor on the project. For ImageWare, the contract is valued at more than $1.0 million and its software will help generate more than one million licenses over the next three years. ImageWare will receive one time license fees for its software upon delivery and ongoing payments for its professional services and maintenance as delivered.

ImageWare will help to deploy the system at governmental offices in the largest cities in the state, including Tijuana, Mexicali, Tecate and Rosarito, as well as implement mobile stations through the state. The project will begin in the third quarter of 2014.

"As security needs become more complex and demanding, our customers increasingly appreciate the unique power and flexibility of our patented cloud-based, multi-modal biometric solutions," said Jim Miller, ImageWare's chairman and CEO. "Our proven track record of providing state-of-the-art biometric solutions for government agencies was a key factor in winning this award."

The multi-modal biometric driver license system will be based on ImageWare's CloudID™ modular software platform that supports the rapid development and deployment of highly secure, yet flexible identity management solutions for the creation of credentials, including IDs, passports, driver's licenses, smart cards and access control credentials. IWS CloudID is designed to deliver a "future proof" identity management solution, allowing unlimited population sizes and stations, as well as adding additional biometric modalities and incorporating new biometric devices.

The company's IWS QuickApps™ will provide the user interfaces to register applicants, validate identities and print and encode cards. Both IWS CloudID and IWS QuickApps are driven by ImageWare's patented, multi-modal Biometric Engine® 2.0, and the system can be integrated with the government's existing biometric identification and verifications processes. Security for the system will be managed by ImageWare's Desktop Security System, with the use of multifactor authentication, data encryption and a secured log of all actions by the user.

About ImageWare Systems, Inc.

ImageWare Systems, Inc. (OTCQB: IWSY) is a leading developer of mobile and cloud-based identity management solutions, providing biometric, secure credential and law enforcement technologies. Scalable for worldwide deployment, ImageWare's biometric product line includes a multi-biometric engine that is hardware and algorithm independent, enabling the enrollment and management of unlimited population sizes. ImageWare's identification products are used to manage and issue secure credentials, including national IDs, passports, driver's licenses, smart cards and access control credentials. ImageWare's digital booking products provide law enforcement with integrated mug shot, fingerprint livescan and investigative capabilities. ImageWare is headquartered in San Diego, CA, with offices in Portland, OR, Washington, D.C., and Ottawa, Ontario. For more information on ImageWare Systems, Inc., please visit www.iwsinc.com

For the complete Press Release: http://iwsinc.com/iwsy-awarded-1m-multi-modal-biometric-contract/

For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO, please click here (http://www.securitystockwatch.com/Interviews/in_Boardroom_ImageWare.html)

For more information:
ImageWare Systems Solutions: http://iwsinc.com/solutions/
ImageWare Systems Products: http://iwsinc.com/products/
ImageWare Systems Investors: http://iwsinc.com/about-iws/investors/
Partners: http://iwsinc.com/partners/
For more information: www.iwsinc.com



Mr. Michael D. Day, IBM Distinguished Engineer, Virtualization and Linux, said, "None of the security issues associated with networked computing have gone away with Cloud Operating Systems. In many ways we are more vulnerable than ever to breaches being escalated. The Trusted Platform Module is a partial solution which can validate the boot chain of a compute node. (Verify the platform has come up without a root kit). The TPM is well supported by Linux and by the KVM hypervisor, but not widely used, although it should be. As bad as the security issues are with data center computing, they are much worse with the IoT right now, primarily because that set of products has evolved in a disconnected state and has not been exposed to attack in the same way our data processing infrastructure has been for decades."

For the complete interview: www.securitysolutionswatch.com/Interviews/in_Boardroom_IBM_MichaelDay.html


StrikeForce Technologies

StrikeForce Technologies, Inc. (OTCQB: SFOR), a company that specializes in Cyber Security solutions for the prevention of Identity Theft and Data Breaches, recently announced that ProtectID® now supports Microsoft Office 365.

"We are very pleased that our ProtectID Two-Factor Authentication Platform will NOW protect Microsoft Office 365," says Mark L. Kay, CEO of StrikeForce. "ProtectID will secure Office applications via integration into Active Directory Federation Services (ADFS). A number of our current and pilot clients are looking for this capability and many others are moving in this direction. According to Microsoft, SharePoint is used by 78% of Fortune 500 companies."

Active Directory Federation Services is the component within Microsoft® Windows Server™ that provides web Single Sign-On (SSO) technologies through federation using standard authentication mechanisms such as Security Assertion Markup Language (SAML) and Kerberos. Microsoft applications secured by ProtectID now include:

  • Office365
  • SharePoint
  • Azure cloud services
  • Exchange Online
  • Lync communications services

Microsoft Office 365 gives SMB's and all sized companies the opportunity to access advanced IT services and solutions without the need to manage programmers in house -- or even have any IT expertise. Employees can gain anywhere access to the programs they use on their office PC -- such as Word, PowerPoint, Outlook, and Excel. This ensures they can work more effectively when away from their desk, using a laptop, tablet or smartphone.

"Authentication is required more now than ever with Microsoft Office 365's increasingly wide low cost access to your enterprise's secured applications. The ProtectID Authentication Platform is a solution that provides the greatest number of authentication methods, options and patents to protect you and your company," says Mr. Kay.

For the complete interview with Mark L. Kay, StrikeForceTechnologies, Chairman and CEO, please click here (http://www.securitystockwatch.com/Interviews/in_Boardroom_StrikeForce.html)

For more information about:
ProtectID® (http://strikeforcetech.com/protectid/protectID_overview.aspx)
GuardedID® (http://strikeforcetech.com/guardedid/guardedid.aspx)
MobileTrust® (http://strikeforcetech.com/mobilesecurity/mobilesec.aspx)
www.strikeforcetech.com; (OTCQB: SFOR)
Please read our Terms Of Use, Conditions, and Disclaimer



ASIS International 60th Annual Seminar and Exhibits
September 29-October 2, 2014
Atlanta, Georgia

Join us in Atlanta, Georgia, September 29-October 2, 2014 for the ASIS International 60th Annual Seminar and Exhibits--the world's most influential security event.

Program highlights include:

  • 250 education sessions spanning all security disciplines and industry sectors
  • Security products and services from 600+ leading solutions providers
  • Unmatched peer-to-peer networking opportunities
  • Colocated event: (ISC)² Security Congress.


The New York City Cyber Security Summit
Thursday, September 18th
The Hilton New York -- New York City

REGISTER NOW with promo code SECURITYSOLUTIONSWATCH to access your 50% OFF Full Conference Passes.

The Cyber Security Summit, an executive conference series sponsored by The Wall Street Journal, is to be held on September 18th in New York City. The Cyber Security Summit brings together the nation's leading solution providers and renowned information security experts for Senior Executives to discover the latest products, services and strategies necessary for enterprise cyber defense. In today's digital world, every organization needs an effective cyber security plan to protect their business, employees and customers from emerging threats. Join us this September and learn how to best protect highly vulnerable business applications and intellectual property.

Speaker presentations will cover: The Insider Threat / Human Element, Social Computing, Mobile Security & BYOD, Cyber Supply Chain Security, Threats Facing Banks & Financial Institutions and more!

To view a full list of participating sponsors & speakers visit: CyberSummitUSA.com

Keep your organization at the forefront of cyber security and most importantly, secure!


LinuxCon Europe
Congress Centre Düsseldorf
Düsseldorf, Germany
October 13 - 15, 2014

LinuxCon Europe is the conference for all matters Linux, bringing together developers, sysadmins and architects to learn and collaborate on the latest technical issues facing the Linux and IT operations ecosystems. Launched in 2009, LinuxCon has quickly become known for offering top speaking talent, a cross-section of the leading players in the Linux community, innovative and timely content, a wide variety of opportunities for attendee collaboration and a place for smaller groups to co-locate for topic-specific mini-summits and workgroups.


US/Canada Border Conference
Cobo Center, Detroit, MI
September 16-17, 2014

Beyond the Border 2.0

Event Description:

The US/Canada Border Conference will bring together local, state, provincial and federal agencies, as well as business organizations, in a central location convenient to both nations, to advance the "Beyond the Border" Action Plan between the United States and Canada.

Government and industry leaders share their knowledge and thoughts at a conference designed to enlighten, inform and educate the audience on the complex challenges outlined in the bi-lateral plan. The program advances the mission by providing a forum that helps foster collaboration while gaining a better understanding of the political, infrastructure and technological needs in the combat against current and future security threats, while improving the efficient flow of legal cross-border activity

Sponsors will attend all keynotes, panel sessions and food functions and have the unique opportunity to meet face-to-face with border security leadership from both the US and Canada.

Contact: John Moriarty, [email protected], 203-822-7953



Chip-to-Cloud Security Forum
Advances in Securing Embedded, Mobile & Cloud Services and Ecosystems
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France

Chip-to-Cloud Security Forum provides an independent collaboration and information-sharing platform dedicated to advance end-to-end digital security. Created from the former e-Smart and Smart Mobility conferences, its wide-ranging technical conference covers four key themes: embedded security, security & mobility, M2M & IoT security and secure cloud applications. The full digital security value chain will attend, with 300 expected attendees from Academia and Industry. Part of World Smart Week (1700 participants), the Forum offers great networking and forward-thinking opportunities with the attendees of the three co-located conferences dedicated to contactless/mobile, e-ID and M2M services and also includes a 50-booth exhibition. Visit us online at www.chip-to-cloud.com

M2M Innovation World Congress
Smart Services for Vertical Markets
Conference & Exhibition Sept. 22-24, 2014 - Marseille Provence, France

M2M Innovation World Congress invites all the M2M stakeholders to shift from a technology-driven to a business- and user-centric approach. Focused on emerging business models, technologies and best practices, this conference & exhibition gives its participants new inspirations to innovate and setup business while meeting prominent figures both from M2M industry and verticals. The conference will explore in particular M2M innovations in Smart Grids, Smart Cities, Retail and Consumer Electronics. Held in conjunction with the three other smart devices-related conferences and 50-booth exhibition forming World Smart Week, the Congress provides its 300 attendees rich opportunities to network, share knowledge and develop business with 1700 participants overall. Visit us online: www.m2minnovationworldcongress.com

NFC World Congress
Mobile Proximity: Innovation, Services & Business
Conference & Exhibition September 22-24, 2014 - Marseille Provence, France

Now in its 4th edition, NFC World Congress explores the emerging ways to interact with the digital world through NFC and related mobile proximity technologies.

From start-ups to leading IT/mobile players and implementers from verticals, its conference gathers 600 participants from 60 countries eager to advance mobile proximity business in all its applications. Within World Smart Week, the Congress benefits from synergies of contents with three co-located conferences and a 50-booth joint exhibition. 1700 participants overall will converge at this global meeting of contactless/mobile, e-ID, M2M and digital security industries. Visit the Congress online: http://www.nfcworldcongress.com

World e-ID Congress
Identity services for Government, Mobility & Enterprise
Conference Sept. 23-25 & Exhibition Sept. 22-24, 2014 - Marseille Provence, France

Since 2004 World e-ID gathers e-ID programs managers, government officials and technology experts around world's most inspiring large scale rollouts and latest innovations. Over 400 delegates from 60 countries are expected in 2014. Among the conference highlights: mobile ID advances, emerging countries and EU projects' latest results, cyber-security policies, e-ID for banking... Its 50-booth exhibition, featuring e-ID solutions leaders, will add knowledge sharing and networking opportunities with the mobile/contactless, M2M and digital security professionals attending World Smart Week (1700 participants overall). Visit the Congress online: http://worlde-idcongress.com


Please read our Terms of Use, Conditions and Disclaimers ("Terms"): http://www.securitysolutionswatch.com/Main/Terms_of_Use.html.

By using our website and any information located at www.SecuritySolutionsWatch.com you agree to these "Terms."


More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
operations aren’t merging to become one discipline. Nor is operations simply going away. Rather, DevOps is leading software development and operations – together with other practices such as security – to collaborate and coexist with less overhead and conflict than in the past. In his session at @DevOpsSummit at 19th Cloud Expo, Gordon Haff, Red Hat Technology Evangelist, will discuss what modern operational practices look like in a world in which applications are more loosely coupled, are deve...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It doe...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...