Questions? +1 (202) 335-3939 Login
Trusted News Since 1995
A service for IT industry professionals · Thursday, March 28, 2024 · 699,475,316 Articles · 3+ Million Readers

Thought Leaders From AMAG, Carbon Black, Cyberinc, Dell EMC, Fujitsu, ImageWare Systems, Identiv and VOTI DETECTION™

AMAG WEBINAR SERIES

www.Cyberinc.com - An Aurionpro Company

Dell EMC - Protecting what matters to make the world safer

IDENTIV Connects and Protects: People. Places. Things.

ImageWare Systems - www.IWSINC.com - Securing The Future

Join Us "In The Boardroom" On SecuritySolutionsWatch.com To Discuss Security Threats and Proven Solutions

We are honored to have these outstanding security experts join us "In The Boardroom" to discuss security threats and state-of-the-art, cutting-edge, proven solutions, that help keep us safe !”
— Martin Eli, Publisher

NEW YORK, NY, UNITED STATES, June 22, 2018 /EINPresswire.com/ -- Identiv (NASDAQ: INVE) / ImageWare Systems (OTCQB: IWSY)

Thank you for joining us "In The Boardroom"...

*************************************************************************************

Kurt Takahashi, President, AMAG Technology - A G4S Company
www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html

In recent news:

Tagmaster Joins Amag Technology's Symmetry Preferred Partner Program
http://www.amag.com/en/company/news/2018/06/04/tagmaster

AMAG Technology, a leading security solution provider specializing in access control, video management, policy-based identity solutions, visitor management and incident and case management, welcomes TagMaster as its newest member of the Symmetry Preferred Partner Program. TagMaster’s XT 1 and XT Mini long-range readers integrate with AMAG’s Symmetry™ Access Control software. AMAG Technology and TagMaster cooperatively tested and approved this integration.
“We welcome TagMaster into the Symmetry Preferred Partner Program and look forward to a long, mutually beneficial partnership. Joint customers will benefit from the Symmetry Access Control and TagMaster Long-Range reader integration when controlling vehicle access is critical to having a secure environment.” Jason Schimpf, Vice President, Products and Partner Programs

Don’t miss the AMAG Webinar Series, July 17 @ 10 am PDT: http://www.amag.com/en/resources/trade-shows-and-events

***********************************************************************************
Tom Kellermann, Chief Cybersecurity Officer, Carbon Black, told us,
www.securitysolutionswatch.com/Interviews/in_Boardroom_CarbonBlack_Kellermann.html

"Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids.”

***********************************************************************************

Samir Shah, CEO, Cyberinc
www.securitysolutionswatch.com/Interviews/in_Boardroom_Shah_Cyberinc.html

In recent news:

Cyberinc joins HPE Complete Program… Elevated Partner status empowers HPE Customers to acquire Cyberinc’s cybersecurity solution directly.
(https://cyberinc.com/news/cyberinc-joins-hpe-complete-program/)

Cyberinc a leader in isolation based cybersecurity, helping businesses actively reduce attack surface and protect themselves against web malware, announced that it has joined Hewlett Packard Enterprise’s HPE Complete Program. Businesses worldwide and specifically, HPE’s customers can acquire Isla directly from HPE and its global reseller network.

Cyberinc’s Isla is a ground breaking cybersecurity solution that helps leaders in Information Security, IT and Risk Management eliminate the biggest threat vector they face today: web-based malware attacks. Isla isolates all web malware outside the corporate network and protects emails, documents, and web against malware based attacks, truly securing the network and improving IT productivity. HPE Complete program offers a one-stop solution for purchasing best-in-class cybersecurity products. Cyberinc’s Isla comes prevalidated for performance, and interoperability with other HPE hardware already present within an enterprise.

Romi Randhawa, Chief Strategy Officer, Cyberinc, said, “Hewlett Packard Enterprise (HPE) is an established leader across all key hardware segments in the data center including security. With this agreement, we are deepening HPE’s stack to provide security solutions on their cutting edge next generation products. With Cyberinc’s Isla now available as part of the HPE stack, customers can truly enjoy the benefit of a truly secure network, while reducing the attack surface against web-based malware attacks.”

Related Links:
Isla: https://cyberinc.com/isla/
HPE Complete Cyberinc Product Page:
https://www.hpe.com/us/en/product-catalog/storage/storage/pip.hpe-complete-cyberinc-solution.1010836954.html
HPE Complete Cyberinc Quick Specs:
https://h20195.www2.hpe.com/v2/GetDocument.aspx?docname=a00043976enw

***********************************************************************************

Graham Porter, Dell EMC, Business Development Director EMEA, Surveillance and Security
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Porter_DeLLEMC.html

"We are seeing changes driven by mutations in the nature of terrorist threats and these have created needs for Critical Infrastructure property owners and operators to align their protection and safety regimes with advice received from two main sources - the Police and liability insurers/re-assurance organisations.

In Europe, we are seeing the movement from asset protection in transportation venues toward the need to protect un-checked crowds in areas such as Check-in areas of airports, luggage drop-off zones and assembly points around terminal buildings. The reasons are clear - historically, the security effort was aimed toward stopping criminal damage against airplanes and airport machinery on the part of the transport operators, and to stop theft and fraud in the cases of in-terminal retailers.

The need to identify persons of interest approaching and moving around airport and transportation facilities has become a priority need sought after by operators increasingly since the attacks at Zavantem, Belgium which was a terrorist crime perpetrated against crowds of innocent airport travelers in an area PRIOR to the areas where passengers passed through security equipment and search areas.

Historically, protecting planes and stopping luggage theft was a priority - and now the effort is expanded toward increasing the safety of the airplane travelers and luggage owners instead.

New European data and privacy laws effective from May 2018 (GDPR) have caused IT and data managers to review their policies and practices effectively in order to ensure the rights of any citizen to 'disappear' is balanced with the security requirement which has always been placed on Operators to know who is using their facility and to ensure they secure their crowded spaces. There is no doubt an increase in the cost of providing the safe traveler environment and the cost is seen usually as either an Airport Levy or local tax - which is seen as making transportation facility access more costly to travelers."

**********************************************************************************
Jason Bradlee, Head Of Security, Fujitsu Americas
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Fujitsu_Bradlee.html

“Our co-creation approach is strategic and ensures we develop the right partnerships and expertise that will enable us to deliver transformational outcomes. We select our partners carefully using this methodology. Organizations are adopting various types of authentication to achieve the right mix of security, privacy and a differentiated user experience. Our partnership with ImageWare allows us to expand our Identity and Access Management offerings to provide our customers with more multi-factor authentication technologies."

***********************************************************************************

Steven Humphreys, Chief Executive Officer, Identiv
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Identiv_Humphreys.html

NASDAQ: INVE
https://finance.yahoo.com/quote/inve?ltr=1

"I think we’re all familiar with the convenience of the digital world — the world where Netflix knows what you want to watch next and Amazon knows what you're going to buy next. Identiv’s vision is to bring the benefits of the digital world to the physical world. We have a variety of products and go-to-market strategies that are putting us in a leading position to deliver those benefits. We see a major market opportunity as the physical world goes online, and we want to be the leading platform to get there. That's a big statement to make for a small company, but as you pointed out with those metrics, we’re in a great position to do just that."

***********************************************************************************************

Jim Miller, Chairman and CEO of ImageWare Systems
www.securitysolutionswatch.com/Interviews/in_Boardroom_ImageWare.html

OTCQB: IWSY
https://finance.yahoo.com/quote/IWSY?ql=1&p=IWSY

Jim Miller, Chairman and CEO of ImageWare Systems said, “Revenues in the quarter continued to reflect primarily our legacy business. However, we did see initial orders from several of our sales partners. Thus far in 2018 we have seen our first sales, although modest, under that model from our partners CDW, Fujitsu, Extenua and Avatier. While we have limited direct visibility on when sales projects will actually close, we do know that every project is making progress and our partners have given us good reason to believe that several will close in the second quarter,” Miller concluded.

Recently Announced Significant Events
 In April ImageWare received a $730,000 order from an existing customer for additional licenses of its Biometric Engine® identification software.

 In January, the company brought on board David Somerville as Sr. Vice President of Sales and Marketing to help the company to navigate the expected increase in worldwide sales activity. Mr. Somerville has over 20 years of high-level experience in the sales and support of security software."

***********************************************************************************

Rory Olson, President and CEO, VOTI Detection™
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Olson_Voti.html

In recent news:

VOTI Detection™, a leading detection company employing breakthrough 3D Perspective technology to deliver enhanced threat detection, announced that the Transportation Security Administration (TSA) has granted the VOTI XR3D-6D X-ray scanner acceptance onto the “Approved” section of the Air Cargo Security Technology List (ACSTL). The product was previously qualified by Transport Canada in 2017.

“Acceptance by the TSA is a significant milestone and an acknowledgement of our company’s collective effort and innovation within the security industry,” said Rory Olson, President and CEO of VOTI Detection. “We look forward to offering the industry’s cargo carriers the superior technology of our XR3D-6D systems to secure air cargo globally. We are continuing to pursue approvals of VOTI Detection’s comprehensive security scanner product portfolio by the TSA.”

By providing patent pending 3D Perspective™ and associated enabling technologies to operators, VOTI Detection™ scanners deliver remarkably sharp and more revealing images than traditional X-ray screening technology as well as threat alerts, material classification, dual energy imaging, the ability to manipulate and enhance images and more.

***********************************************************************************

SecuritySolutionsWatch.com Is Proud To Be A Sponsor Of These Important Upcoming Events
M A R K - Y O U R - C A L E N D A R !!!

***********************************************************************************

GSX
Ron Rosenbaum, Chief Global Marketing and Business Development Officer, ASIS International, Joins Us "In The Boardroom" To talk About The Rebranding To GSX
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_ASIS_Rosenbaum.html

**********************************************************************************

SDW 2018
25-27 June, 2018 - QEII Centre, London, UK
www.sdwexpo.com

***********************************************************************************

2ND ANNUAL FINTECH WEEK: NEW YORK 2018
July 31st - August 2nd, 2018
Times Square: New York, NY
https://newyork.fintechweek.com

**********************************************************************************

5th World Machine Learning and Deep Learning Congress
August 30-31, 2018 Dubai, UAE
https://machinelearning.conferenceseries.com

**********************************************************************************

Cyber Security is still a major concern for many European governments. Cybercrime is at an all time high and with many leading European cities becoming “Smart Cities” this is creating new opportunities for criminals to attack city computer systems and infrastructures.

Our 6th annual Cyber Intelligence Europe conference and exhibition will be taking place in Amsterdam on the 4th - 6th September 2018. The Netherlands has been attacked in recent years by cyber criminals. In January 2018 the national tax office and banks experienced a DDoS attack on their websites. They were also hit by the Ransomware attack in 2017 that targeted many European computer systems.

Cyber Intelligence Europe will provide in-depth presentations from leading government officials who create the cyber security strategies and policies for their nation. You will also hear case studies of successful threat intelligence work that stopped cybercrimes before they took place.

Now in it’s 6th year Cyber Intelligence Europe is the perfect opportunity to understand the challenges European governments face when dealing with cybercrimes on their infrastructures. Our event will also provide attendees with an insight into future threats that are predicted due to the constant development of IoT and Smart Cities.

For more information regarding this international event please contact us at
events@intelligence-sec.com or +44 (0)1582 346 706.

http://www.intelligence-sec.com
http://www.intelligence-sec.com/events/cyber-intelligence-europe-2018
http://www.intelligence-sec.com/events/cyber-intelligence-asia-2019

***********************************************************************************

Connect Security World
Embedding Trust in IoT Systems and Connected Hardware
Conference & Exhibition - Sept. 25-27, 2017– Marseille Provence, France
http://www.connectsecurityworld.com

***********************************************************************************

COUNTER-TERROR ASIA CONFERENCE (CTAC)
December 4-5, 2018
Marina Bay Sands, Singapore
http://counterterrorasia.com

###################################################################################

About SecuritySolutionsWatch.com
www.SecuritySolutionsWatch.com features thought leadership interviews about IT, IoT and security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about solutions from leading global brands such as: 3M, AMAG Technology - A G4S Company, ASSA ABLOY, Cisco Security, Cyberinc, Dell EMC, HP Cybersecurity, Fujitsu, Gemalto, HID Global, IBM, ImageWare, Intel, SAP, Siemens Security, Stanley Security, SONY Security, Unisys, and Yahoo, just to name a few.

What's YOUR authentication, cybersecurity, physical security, mobility, or "smart" solution?
What's YOUR Blockchain or FinTech solution?
We invite you to please join us "In The Boardroom" at www.SecuritySolutionsWatch.com.

For a quick tour to see exactly how your brand will be featured, please contact Ali Eng on our publishing team via
email: ALE@SecuritySolutionsWatch.com, or phone: 1+914.690.9351 .

LinkedIn: https://www.linkedin.com/in/ali-eng-a8a41015b/

For more details, please click here: www.SecuritySolutionsWatch.com/Main/Jan2018.pdf
And for our Media Kit, please click here: www.SecuritySolutionsWatch.com/MediaKit.html

****************************************************************************************************************

It's FREE...our monthly newsletter with thought leadership content from leading security experts.
Please click here: www.SecuritySolutionsWatch.com/newsletters/newsletter_2018_06.html
And please visit us on Twitter here: www.twitter.com/SecStockWatch

****************************************************************************************************************

THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE: www.SecuritySolutionsWatch.com/Main/Terms_of_Use.html

****************************************************************************************************************

Martin Eli, Publisher
SecuritySolutionsWatch.com
1+914.690.9351
email us here

Powered by EIN Presswire


EIN Presswire does not exercise editorial control over third-party content provided, uploaded, published, or distributed by users of EIN Presswire. We are a distributor, not a publisher, of 3rd party content. Such content may contain the views, opinions, statements, offers, and other material of the respective users, suppliers, participants, or authors.

Submit your press release