NEW YORK, June 07, 2017 (GLOBE NEWSWIRE) —
Dell Technologies, ImageWare Systems.
Kurt Takahashi, President, AMAG Technology – A G4S Company
Samir Shah, CEO, Cyberinc
Ken Mills, General Manager, Dell EMC, Surveillance and Security
Steve Visconti, President & CEO, Extenua
Jim Miller, ImageWare Systems, Chairman and CEO
Scott B. Suhy, CEO, NetWatcher
Amag Technology Delivers Powerful Unified Solution For Small Businesses
Symmetry Security Appliance provides access control and video management in one
“Access control leader AMAG Technology, recently announced the release of a new security appliance designed specifically for smaller businesses that need security management. Introducing the Symmetry Security Appliance, a powerful all in one security device that delivers access control and video management together.
Designed for fast and simple deployments, the appliance supports up to 8 cameras and 16 card readers. It comes pre-installed with Symmetry Business Access Control software, Symmetry CompleteView ONE video, and Symmetry CompleteView video integration software.
Measuring only four inches square, the appliance is quick and easy to install, and an affordable choice for organizations that require access control and video. It includes a dedicated Solid State Disk (SSD), which provides extremely fast load times for its Operating System and Applications, along with a high capacity, 2TB Hard Disk Drive (HDD) for reliable video recording. It also provides support for multiple High Definition displays to fully leverage the latest video display technology.”
In other recent news:
Samir Shah, CEO, Cyberinc, told us, “Isla represents an entirely new approach to cyber security. Until now security solutions have always been based on detecting “bad things” and blocking them from running. Anti-Virus tries to detect “bad files,” Web Filters try to detect “bad websites,” the list goes on and on. Isla takes a different approach to the problem. Instead of detecting “bad” things, Isla simply isolates ALL web content in a specialized environment located outside of an organizations sensitive network. Since ALL content is isolated no attacks can ever “slip through the cracks” and compromise the user. This is a simple, yet powerful approach. Since organizations vary so widely, Isla is offered in a number of ways to suit each potential customer’s needs. Isla can be deployed as an appliance directly at a customer’s office, it can be deployed in a customer’s existing cloud data centers or it can be delivered as a pure Cloud service by a Cyberinc Isla Cloud Service partner.”
In recent news:
Cyberinc partners with Sohonet to deliver Isla® Cloud Malware Isolation to defeat advanced cyber attacks
Cyberinc partners with OvationData to launch Isla® Cloud Malware Isolation to defeat advanced cyber attacks in UK
Interchange partners with Cyberinc to shut down cyber threats
“It is an exciting time to be at Dell EMC right now. Dell Technologies is now #1 In Everything, All in 1 Place and we are bringing this world-class portfolio to the surveillance market. Never before, have our customers and partners been able to modernize their surveillance infrastructure with an end-to-end portfolio like we have a Dell EMC. We are leveraging the same industry-recognized surveillance lab to expand our validated solutions to include the entire Dell EMC portfolio This is a huge step forward for the industry where for the first time, our customers and partners can purchase with confidence all of their surveillance infrastructure needs from one place – Dell EMC.”
“Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe.”
Learn more here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!solution_portfolio
And for Dell EMC Partner Validations, please click here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!partner_validations
Extenua has just released a most timely white paper…
This free white paper discusses the challenges of keeping ransomware (Cryptolocker, WannaCry, and the like) out of the corporate data storage, whether it is local, in the cloud or hybrid.
CLOUD2DRIVE-PROTECTED ONLINE STORAGE IS IMPERVIOUS TO RANSOMWARE BY USING SILVERSHIELD
“Ransomware is a type of malware that restricts access to the infected computer system, and demands that the user pay a ransom to the malware operators to remove the restriction. Probably the most famous ransomware, even though not the only one, is Cryptolocker, and it’s certainly something you don’t want to deal with. Regardless of the strenuous efforts put in place by Antivirus developers, the rate of infection is astonishing, and these days it’s becoming even worse with an unprecedented outbreak of infection. To make things even worse, ransomware can also access all the shared folders on your NAS/SAN, so if you backup to a network drive your backups will be compromised too. The ransomware goals include, in fact, preventing you from being able to restore your old (healthy) data from a backup.”
ImageWare Systems Issues Corporate Update
“During the first quarter, we continued to focus on integrating our patented Biometric Engine® into the cloud and mobile markets, principally via our GoVerifyID® product for enterprise and consumer use, while also expanding into non-government sectors such as commercial, consumer and healthcare,” said Jim Miller, ImageWare’s chairman and CEO.
“Due to our business strategy relying on long-term engagements with large organizations, results from these initiatives continue to take time to materialize from a revenue perspective. We remain encouraged by the continued strong demand we are receiving behind the scenes and we anticipate further positive developments in strategic partnerships during the first half of 2017.
“In addition to strong market demand, in March, Frost & Sullivan recognized ImageWare with the 2017 New Product Innovation Award for our GoVerifyID enterprise suite. Each year, Frost & Sullivan identifies companies that have successfully introduced new and innovative products into their markets, with emphasis on product quality and customer value. We believe this award further validates our technology and our strategy to bring our solution to market.
“Subsequent to the end of the quarter, ImageWare was selected to provide biometric identity management and credentialing software to five Alaskan airports with delivery expected to commence in the second quarter of this year. This represents the third agreement in which an airport has entrusted our multi-modal biometric authentication software to confirm the identity and background of their employees.”
Scott Suhy, CEO, NetWatcher, told us,”On May 12th, 2017 the WanaCry (or WCry, WannaCry, WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) ransomware was unleashed and caused over 75,000 attacks in 99 countries.”
How Does the WanaCry Ransomware Work?
The Ransomware initially entered organizations via a phishing email message and then exploited a vulnerability (MS17-010) in Windows to spread within a network locking down computers and asking victims to pay $300 via Bitcoin. The Windows vulnerability was leaked as part of the NSA Shadow Brokers hack and Microsoft soon after released a patch however many computers were not yet updated at the time of the attack.
What Should I do? What do NetWatcher Customers do?
Customer’s first need to ensure they are not vulnerable to the attack: NetWatcher Managed Detection & Response customers leverage a built-in vulnerability scanner that periodically scans their environment for vulnerabilities. If the customer was vulnerable to the new ransomware they would have seen the vulnerability titled “SMBv1 Unspecified Remote Code Execution (Shadow Brokers)” show up in their reports as a high severity issue and warned that they needed to patch the Windows asset.
PLEASE VISIT OUR NEW PARTNER…
IIoT World, a minority woman owned business
IIoT World™ is the first Global Digital Publication dedicated 100% to Industrial Internet of Things/Industry 4.0.
Our mission is to help create a culture of innovation and connect the SMARTS:
industrial technology, manufacturing, sensors and CXO decision makers.
Our associates are handpicked with one characteristic in mind:
digital transformation DNA and draw from the insights, hands on experience of the world’s best
newsrooms & industrial enterprises to deliver content and coverage across a wide range of industry categories.
IIoT World™ combines journalistic coverage with data analysis to expose the stories,
players, trends and innovations that shape the IIoT. Subscribe: news.iiot-world.com
IFSEC International gives you exclusive hands-on access to over 10,000 security solutions,
live product demonstrations, and networking with over 27,000 security professionals.
Covering every aspect of security, from access control and video surveillance
to smart buildings, cyber, border control and so much more,
visiting IFSEC International
is the perfect way to keep up to date, protect your business and enhance your career in the security industry.
SecuritySolutionsWatch.com features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco Security, Dell EMC, HP Cybersecurity, Gemalto, HID Global, ImageWare, Siemens Security and SONY Security, just to name a few.
What’s YOUR cybersecurity, physical security, mobility, payments, safety or “smart” solution?
We invite you to please join us “In The Boardroom,” more details here: http://www.securitysolutionswatch.com/Main/ThoughtLeadershipOpportunity.pdf
Please click here for our Media Kit (http://www.securitysolutionswatch.com/MediaKit.html)
Please click here or here: http://www.securitysolutionswatch.com/Main/170502%20RATE_CARD-4.pdf for additional details about our offerings.
FOR MORE CONTENT ABOUT SECURITY THREATS AND SOLUTIONS…
…PLEASE CLICK HERE FOR OUR MONTHLY NEWSLETTER
PLEASE VISIT US ON TWITTER HERE: https://twitter.com/SecStockWatch
CONTACT: Contact: Deborah Gilbert President [email protected]