Welcome!

API Journal Authors: Elizabeth White, Rishi Bhargava, Pat Romanski, Kevin Benedict, Anders Wallgren

News Feed Item

Cisco, CyberLock, ImageWare Systems and Wave Systems Discuss Security Solutions

RYE BROOK, NY -- (Marketwire) -- 01/30/13 -- ImageWare Systems (OTCQB: IWSY), Wave Systems (NASDAQ: WAVX)

Cisco
Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html

For more information: http://www.cisco.com/go/medianet, http://blogs.cisco.com/category/video

*****

CyberLock

CyberLock announced a new version of the CyberKey Vault 20, the CyberKey Vault 20 FX. The redesign features a sleek new look with weatherized input modules and an embedded Flex System Hub for improved performance, all offered at a new, lower price.

"The CyberKey Vault 20 FX is our most advanced key control cabinet (http://www.cyberlock.com/cyberkey-vaults.html) yet," said James McGowan, VP of Sales and Marketing at Videx. "We built on the award winning original design and added extra durability and speed to meet the needs of today's demanding end-users. We believe it will surpass market expectations."

The Vault 20 FX is an intelligent key cabinet designed to manage, program, and dispense CyberKey smart keys. The keys are stored unprogrammed and locked securely in the cabinet until an RFID card and/or PIN code is presented to the cabinet. After reading the card and/or accepting the PIN, the CyberKey Vault programs a CyberKey with the individual's permissions. Keys are programmed with access privileges for each user, detailing which electronic locks (http://www.cyberlock.com/cyberlock_cylinders.html) it can open and when. An audit record of all events is stored in both the locks and the keys. Each time a key is used at a lock, a record of the lock ID, date, and time is stored in the key, and a record of the key ID, date, and time is stored in the lock.

CyberKeys feature a unique electronic ID, preventing duplication. Although two keys can be programmed alike, each one leaves its own unique record within the system. When the key is returned to the Vault, the Vault downloads the key's audit trail, removes its permissions, and begins charging the key.

Videx offers three robust smart key vaults: CyberKey Vault 1, CyberKey Vault 20 FX, and CyberKey Vault WR. To learn more about the CyberLock line of access control (http://www.cyberlock.com/cyberlock_overview.html) products, please visit our website at www.cyberlock.com.

For more information about CyberLock products: http://www.cyberlock.com/cyberlock_products.html.

For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx: www.securitystockwatch.com/Interviews/in_Boardroom_VIDEX.html

For CyberLock News & Events: www.cyberlock.com/news_events.html

For the CyberLock Solutions Center: www.cyberlock.com/solutions_center.html

For more information: http://www.cyberlock.com

*****

ImageWare Systems

ImageWare Systems recently announced, "In addition to product development, ImageWare has been preparing for a major international deployment as the exclusive provider of biometric identity management for a prime contractor installing cargo scanning security at the Republic of Ecuador's major seaports. The initial deployment is currently scheduled to begin in the early part of 2013 at the Port of Guayaquil, the country's main seaport that handles a majority of its imports and exports. ImageWare expects to receive a fee for every port worker receiving credentials, as well as an annual management and maintenance fee, based on a percentage of the initial credentialing cost per worker. Depending upon the number of enrollees, the company expects the contract value to exceed $3.0 million over its seven year term."

"The high-end biometric secure credentialing solution we are providing for Ecuador is the same technology being deployed for the Los Angeles World Airports, which we announced earlier this year," noted Jim Miller, Chairman and CEO. "In fact, we can easily replicate this platform for virtually any port system that needs transportation worker identification cards in order to comply with the SAFE Port Act. Not only are our solutions easily deployable, for ImageWare they generally represent gross margins above 70% as well as a recurring revenue stream. Our unique patented technology has the potential to provide us strong, steady revenue growth, along with excellent forward-looking visibility."

For the complete interview with Jim Miller, ImageWare Systems, Chairman and CEO: www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html

For more information about ImageWare Systems Solutions: http://www.iwsinc.com/markets/overview and ImageWare Systems Products: http://www.iwsinc.com/products/overview2

For ImageWare Systems Investors: http://www.iwsinc.com/about-iws/investors/overview1

For more information: www.iwsinc.com, (OTCQB: IWSY)

*****

Wave Systems

Wave Systems Corp., the Trusted Computing Company, announced an expansion of its distribution channel, highlighted by strategic agreements with Infodat Technologies (http://infodatinc.com/) in India; TechSearch Corp. (http://techsearch.co.kr/_new_2012/00_main/main.php) in Korea; and Bangkok Systems & Software (http://www.bangkoksystem.com/bangkok/index.php) in Thailand. Wave is also expanding existing relationships in Singapore and other Asian-Pacific markets.

These new distribution partners are now authorized to offer their customers Wave's innovative solutions for data protection, data loss prevention, authentication, security compliance and malware protection.

"Today's cyber threats call for a unique and innovative approach, and one that builds on industry-standard hardware built directly into the endpoint. We're putting Wave's technology into the hands of top regional distributors whose relationships and trained service professionals offer a fast path to deployment," said Brian Berger, Wave's Executive Vice President of Business Development and Chief Marketing Officer. "Infodat is well-anchored in the Indian market and has earned the trust of its extensive client base. TechSearch is the trusted partner for Korea's IT industry; and Bangkok Systems & Software provides seasoned professionals on the ground in Thailand."

Under the terms of the agreements, Wave's distribution partners will offer both products and professional services. The distributors will offer Wave's EMBASSY® (http://www.wave.com/products) security software for managing hardware-based data protection and authentication, as well as the full Safend (http://www.wave.com/products) portfolio of products. Infodat Technologies has built a strong reputation in India and globally, providing technology services and business solutions for more than 16 years to help its clients innovate, automate information and optimize costs.

For complete details about these announcements: http://www.wave.com/news/
For Wave Webcasts and Presentations: http://www.wave.com/news/webcasts.asp
For the Wave Blog: http://blog.wave.com/
For Wave Solutions: http://www.wave.com/solutions
For Wave Products: http://www.wave.com/products
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf
For more information: www.wave.com (NASDAQ: WAVX)

*****

Security Industry Association
(
https://www.siaonline.org/)
SIA Ride for Education
Date: Saturday, April 13, 2013
Time: 9:00 a.m.
Location: Las Vegas Harley-Davidson
2605 S. Eastern Ave., Suite 100
Las Vegas, NV 89169
Phone: (888) 218-0744

*****

Providing Scholarships for First Responders: The 2013 SIA Ride for Education

The SIA Ride for Education will be held on Saturday, April 13, 2013. The event raises money for the SIA First Responders Scholarship, which provides awards of $1,000 to law enforcement officers and firefighters for job-related education and training -- opportunities for which funding might not otherwise be available because of budget cuts.

The ride will start at Las Vegas Harley-Davidson at 9:00 a.m. and will include visits to some of the most scenic sites in Nevada. The cost is $40 per person ($30 if riding as a passenger). Law enforcement officers, firefighters and military personnel may participate at no charge.

All registrants will receive a specially designed "2013 SIA Ride for Education" shirt. Lunch will be provided.

Participants who are not bringing their own motorcycles to the event may contact Las Vegas Harley-Davidson to reserve a bike at the special discounted rate of $125. Availability is limited, so reservations should be made as soon as possible by calling (888) 218-0744, or by visiting the store's rentals page (https://websolutions.tsd-inc.com/Harley-Davidson/frmRateQuote.aspx?PickupLoc=79315). To receive the reduced rate, mention the "SIA group" if reserving by phone, or enter "SIA group" in the Special Requests field if reserving online. We also welcome participants in sports cars and other vehicles. (The same registration rates apply.)

For more information, contact Ron Hawkins, SIA's manager of technical writing and special projects, at (301) 804-4713 or [email protected].

Sponsorships are available.
For sponsorship information contact Alain Taylor (301) 804-4711 or [email protected], or Marc Benson (301) 804-4710 or [email protected].

*****

PSA Security Network

Mr. Bill Bozeman, CPP, CHS, President/CEO, PSA Security Network, said, "PSA Security Network's Business Solutions (http://www.buypsa.com/Solutions) is a suite of value-added products, services and programs that help security professionals be more competitive in the marketplace. Each month, PSA President and CEO Bill Bozeman (http://www.buypsa.com/bbozeman) discusses a Business Solution in detail. This month we'll be focusing on Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing).

SecurityStockWatch.com: What is Security Dealer Marketing's main focus?
Bill Bozeman: Security Dealer Marketing (SDM) focuses on creating brand awareness for and educating dealers and manufacturers on how marketing tools work, from collateral production to strategy deployment, to generate more recurring monthly revenue. They focus on generating results and creating services that work specifically for the security community.

SecurityStockWatch.com: What types of managed services are included with Security Dealer Marketing?
Bill Bozeman: They can help with any marketing questions or needs, from traditional design/print services to targeted online campaigns to comprehensive marketing strategy overhaul or development. Security Dealer Marketing works with many types of semi-custom website development packages, including Search Engine Optimization (SEO), Pay-Per-Click (PPC) and Google Analytics services. They also offer marketing support for point of sale materials, logo design or redesign, email marketing, social media campaigns and press releases.

SecurityStockWatch.com: How can Security Dealer Marketing help companies better their business?
Bill Bozeman: Security Dealer Marketing can handle the logistics and details of your marketing programs, allowing you to focus on other areas of your business. With years of expertise in security marketing, they eliminate the guesswork. SDM has spent the last 15 years working with numerous large domestic brands, and they will take that experience and use it to guide your company to get greater return on investment. They work with a number of PSA integrators and partners and we've been pleased with the partnership, service and results.

SecurityStockWatch.com: Where do I go to find more information or to start using Business Solutions?
Bill Bozeman: To learn more about Security Dealer Marketing (http://www.buypsa.com/Security-Dealer-Marketing) or any of the PSA Business Solutions programs, schedule a webinar demonstration, or get signed up, simply visit www.buyPSA.com/Solutions, call 303-450-3461, or email [email protected]. Additionally, all of PSA's trusted providers of Business Solutions will be at PSA-TEC 2013 (http://www.buypsa.com/Education/PSA-TEC), exhibiting on Wednesday, May 8, 2013. For the most up-to-date information on this event, visit http://www.psaTEC.com

*****

The 6th Annual Conference
2013 Payments Summit
February 5-7 -- Grand America Hotel -- Salt Lake City
http://www.SCAPayments.com

Join the Ascent to EMV and Smart Mobile Payments
Over 500 executive delegates came together last February in Salt Lake City for Payments Summit -- the industry's leading forum for smart, secure payment technology, implementation, and markets. For 2013, we're building on that success with a larger meeting facility and an up-to-the minute conference agenda. And we're continuing our coverage of every leading transaction platform: EMV card payments, mobile payments, and transit payments. Reserve your seat now at this gathering of leading smart card practitioners, solutions developers, end users, and suppliers.

The US is the world's largest payments ecosystem and the migration to EMV -- the global transaction security standard -- has now begun in earnest. Yet, for many banks, credit unions, issuers and merchants there's still a frustrating lack of clarity. At the same time, NFC-enabled payments are starting to take shape as card networks, telecoms and handset manufacturers target the market with mobile wallet solutions. But no ubiquitous model for all merchants and issuers has emerged. Finally, transit ridership is considered by many to be the "killer app" in expanding the use of open standards-based contactless bank card and mobile payments, and major transit operators have launched pilots nationwide.

Considerable work remains to clear a path for this migration. Payments Summit is the place to consult the trailblazers and plan your own journey.

Day on the Slopes Ski Trip: February 3 -- Pre-conference Workshops: February 4. Exhibit and sponsor marketing opportunities are available: Contact Bill Rutledge at [email protected] +1 212-866-2169.

Please read our Terms of Use, Conditions and Disclaimers ("Terms"): http://www.securitystockwatch.com/Main/Terms_of_Use.html.
By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms."

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@ThingsExpo Stories
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...