CyberSecurity, Physical Security, IoT Thought Leaders Discuss Solutions “In The Boardroom” On – AMAG, Cyberinc, Dell EMC, Extenua, ImageWare, NetWatcher

NEW YORK, June 07, 2017 (GLOBE NEWSWIRE) —

Dell Technologies, ImageWare Systems.

Thank You For Joining Us “In The Boardroom” On SecuritySolutionsWatch.Com

Kurt Takahashi, President, AMAG Technology – A G4S Company
Samir Shah, CEO, Cyberinc
Ken Mills, General Manager, Dell EMC, Surveillance and Security

Steve Visconti, President & CEO, Extenua
Jim Miller, ImageWare Systems, Chairman and CEO
Scott B. Suhy, CEO, NetWatcher


• AMAG Technology – A G4S Company, Kurt Takahashi, President

Amag Technology Delivers Powerful Unified Solution For Small Businesses
Symmetry Security Appliance provides access control and video management in one—Press-Release

“Access control leader AMAG Technology, recently announced the release of a new security appliance designed specifically for smaller businesses that need security management. Introducing the Symmetry Security Appliance, a powerful all in one security device that delivers access control and video management together.

Designed for fast and simple deployments, the appliance supports up to 8 cameras and 16 card readers. It comes pre-installed with Symmetry Business Access Control software, Symmetry CompleteView ONE video, and Symmetry CompleteView video integration software.

Measuring only four inches square, the appliance is quick and easy to install, and an affordable choice for organizations that require access control and video. It includes a dedicated Solid State Disk (SSD), which provides extremely fast load times for its Operating System and Applications, along with a high capacity, 2TB Hard Disk Drive (HDD) for reliable video recording. It also provides support for multiple High Definition displays to fully leverage the latest video display technology.”

In other recent news:

KeySync Becomes Newest Member of AMAG’s Symmetry Preferred Partner Program


 Cyberinc, CEO, Samir Shah

Samir Shah, CEO, Cyberinc, told us, “Isla represents an entirely new approach to cyber security.  Until now security solutions have always been based on detecting “bad things” and blocking them from running. Anti-Virus tries to detect “bad files,” Web Filters try to detect “bad websites,” the list goes on and on. Isla takes a different approach to the problem. Instead of detecting “bad” things, Isla simply isolates ALL web content in a specialized environment located outside of an organizations sensitive network.  Since ALL content is isolated no attacks can ever “slip through the cracks” and compromise the user. This is a simple, yet powerful approach. Since organizations vary so widely, Isla is offered in a number of ways to suit each potential customer’s needs. Isla can be deployed as an appliance directly at a customer’s office, it can be deployed in a customer’s existing cloud data centers or it can be delivered as a pure Cloud service by a Cyberinc Isla Cloud Service partner.”

In recent news:
Cyberinc partners with Sohonet to deliver Isla® Cloud Malware Isolation to defeat advanced cyber attacks
Cyberinc partners with OvationData to launch Isla® Cloud Malware Isolation to defeat advanced cyber attacks in UK
Interchange partners with Cyberinc to shut down cyber threats


• Dell EMC, General Manager, Surveillance and Security, Ken Mills

“It is an exciting time to be at Dell EMC right now. Dell Technologies is now #1 In Everything, All in 1 Place and we are bringing this world-class portfolio to the surveillance market.  Never before, have our customers and partners been able to modernize their surveillance infrastructure with an end-to-end portfolio like we have a Dell EMC. We are leveraging the same industry-recognized surveillance lab to expand our validated solutions to include the entire Dell EMC portfolio This is a huge step forward for the industry where for the first time, our customers and partners can purchase with confidence all of their surveillance infrastructure needs from one place – Dell EMC.”

Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe.”

Learn more here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here:!solution_portfolio

And for Dell EMC Partner Validations, please click here or here:!partner_validations


• Extenua, President and CEO, Steve Visconti

Extenua has just released a most timely white paper…

This free white paper discusses the challenges of keeping ransomware (Cryptolocker, WannaCry, and the like) out of the corporate data storage, whether it is local, in the cloud or hybrid.


“Ransomware is a type of malware that restricts access to the infected computer system, and demands that the user pay a ransom to the malware operators to remove the restriction. Probably the most famous ransomware, even though not the only one, is Cryptolocker, and it’s certainly something you don’t want to deal with. Regardless of the strenuous efforts put in place by Antivirus developers, the rate of infection is astonishing, and these days it’s becoming even worse with an unprecedented outbreak of infection. To make things even worse, ransomware can also access all the shared folders on your NAS/SAN, so if you backup to a network drive your backups will be compromised too. The ransomware goals include, in fact, preventing you from being able to restore your old (healthy) data from a backup.”

“Even in case your systems are infected by a ransomware,
you will simply be able to format your computer,
reinstall your operating system,
and restore all your data from an always-healthy backup.”

Download the complete White Paper (in PDF format)


• ImageWare Systems, Chairman and CEO, Jim Miller

ImageWare Systems Partners with Info X Distribution to Bring Multi-Modal Biometrics to Storage Networking Solutions

CIO Applications Names ImageWare as a Top 25 Cyber Security Company

ImageWare Systems Issues Corporate Update

“During the first quarter, we continued to focus on integrating our patented Biometric Engine® into the cloud and mobile markets, principally via our GoVerifyID® product for enterprise and consumer use, while also expanding into non-government sectors such as commercial, consumer and healthcare,” said Jim Miller, ImageWare’s chairman and CEO.

“Due to our business strategy relying on long-term engagements with large organizations, results from these initiatives continue to take time to materialize from a revenue perspective. We remain encouraged by the continued strong demand we are receiving behind the scenes and we anticipate further positive developments in strategic partnerships during the first half of 2017. 

“In addition to strong market demand, in March, Frost & Sullivan recognized ImageWare with the 2017 New Product Innovation Award for our GoVerifyID enterprise suite. Each year, Frost & Sullivan identifies companies that have successfully introduced new and innovative products into their markets, with emphasis on product quality and customer value. We believe this award further validates our technology and our strategy to bring our solution to market.

“Subsequent to the end of the quarter, ImageWare was selected to provide biometric identity management and credentialing software to five Alaskan airports with delivery expected to commence in the second quarter of this year. This represents the third agreement in which an airport has entrusted our multi-modal biometric authentication software to confirm the identity and background of their employees.”


• NetWatcher, CEO, Scott B. Suhy

Scott Suhy, CEO, NetWatcher, told us,”On May 12th, 2017 the WanaCry (or WCry, WannaCry, WannaCrypt, WanaCrypt0r 2.0, Wanna Decryptor) ransomware was unleashed and caused over 75,000 attacks in 99 countries.”

How Does the WanaCry Ransomware Work?

The Ransomware initially entered organizations via a phishing email message and then exploited a vulnerability (MS17-010) in Windows to spread within a network locking down computers and asking victims to pay $300 via Bitcoin.  The Windows vulnerability was leaked as part of the NSA Shadow Brokers hack and Microsoft soon after released a patch however many computers were not yet updated at the time of the attack.

What Should I do?  What do NetWatcher Customers do?

Customer’s first need to ensure they are not vulnerable to the attack: NetWatcher Managed Detection & Response customers leverage a built-in vulnerability scanner that periodically scans their environment for vulnerabilities.  If the customer was vulnerable to the new ransomware they would have seen the vulnerability titled “SMBv1 Unspecified Remote Code Execution (Shadow Brokers)” show up in their reports as a high severity issue and warned that they needed to patch the Windows asset.


IIoT World, 
 a minority woman owned business

IIoT World™  is the first Global Digital Publication dedicated 100% to Industrial Internet of Things/Industry 4.0.

Our mission is to help create a culture of innovation and connect the SMARTS:
industrial technology, manufacturing, sensors and CXO decision makers.

Our associates are handpicked with one characteristic in mind:
digital transformation DNA and draw from the insights, hands on experience of the world’s best
newsrooms & industrial enterprises to deliver content and coverage across a wide range of industry categories.

IIoT World™ combines journalistic coverage with data analysis to expose the stories,
players, trends and innovations that shape the IIoT.  Subscribe:

***** Is Proud To Be A Sponsor Of These Important Upcoming Events


JUNE 13 – 14, 2017


20-22 June 2017
ExCel London

IFSEC International gives you exclusive hands-on access to over 10,000 security solutions,
live product demonstrations, and networking with over 27,000 security professionals.
Covering every aspect of security, from access control and video surveillance
to smart buildings, cyber, border control and so much more,
visiting IFSEC International
is the perfect way to keep up to date, protect your business and enhance your career in the security industry.

26-28 June 2017


Cyber Security Summit: D.C. Metro
Thursday, June 29, 2017   |   7:45AM to 6:00PM   |   The Ritz-Carlton, Tysons Corner

Congress: 4-6 July 2017
Exhibition: 5-7 July 2017

The CyberSecurity International Symposium
July 10-11, 2017


IoT Evolution Expo
July 17-20, 2017
Caesars Palace
Las Vegas, Nevada

ASIS 2017
ASIS International 63rd Annual Seminar and Exhibits
25-28 September 2017
Dallas, Texas


About features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco SecurityDell EMCHP CybersecurityGemaltoHID GlobalImageWareSiemens Security and SONY Security, just to name a few.

What’s YOUR cybersecurity, physical security, mobility, payments, safety or “smart” solution?
We invite you to please join us “In The Boardroom,” more details here:

Please click here for our Media Kit (
Please click here or here:  for additional details about our offerings.





CONTACT: Contact:
Deborah Gilbert
[email protected]

Leave a Reply

Your email address will not be published. Required fields are marked *