Cisco, General Dynamics C4 Systems, Keyscan, Videx, Wave Systems Discuss Security Solutions in SecurityStockWatch.com Thought Leadership Interviews

RYE BROOK, NY, Feb 16, 2012 (MARKETWIRE via COMTEX) -- CISCO

__________________________________________________________________________________________

Mr. Roy Skillicorn, Senior Director, Physical Security Business Unit, Cisco, said, "Cisco Services and our partners have a deep knowledge of both the network infrastructure, including security solutions that require use of the network, and the video application layer. We and our partners can therefore work with customers on solving questions like: How do you send video to mobile endpoints like tablets? How do you enable interoperability across protocols?"

For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_cisco_RS.html

For more information: www.cisco.com/go/physec

__________________________________________________________________________________________

GENERAL DYNAMICS CYBERSECURITY Mr. Chris Daly, Director of Business Development for Cybersecurity, General Dynamics C4 Systems told us, "We offer a broad portfolio of secure communications and computing solutions that range from satellite communications and ground systems supporting NASA to command and control systems for the battlefield. Our offerings span the gamut of custom built, assurance products for secure voice and data, such as our TACLANE(R) In-line Network Encryptors and Sectera(R) vIPer(TM) Universal Secure Phones."

For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_GDC4S.html

For more information: www.GDC4S.com

__________________________________________________________________________________________

KEYSCAN ACCESS CONTROL SYSTEMS Mr. Steve Dentinger, Director of Sales and Marketing, Keyscan Access Control Systems, told us, "Many end-users are guarding their capital expenditures and with staffing levels at an all time low employers are seeking ways to optimize staff productivity and stay focused on the core competencies of the business. Centrally Managed Access Control addresses may of the concerns of business owners today; they don't need an access control administrator, they don't need an onsite computer, they don't need to manage/maintain the access control database, they don't need to perform software updates, all this and if they desire, they can lock/unlock doors, run reports, add or delete access permissions all via an internet connection using their smartphone, iPad, or laptop without any special software."

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Keyscan.html

For more information: www.Keyscan.ca

__________________________________________________________________________________________

Videx was given the 2012 Top Product award by Building Operating Management magazine for its suite of CyberLock electromechanical lock cylinders and programmable smart keys.

CyberLock enables users to view records of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customized access privileges based on time, date, and authority level.

The Top Products Awards recognize the most popular manufacturers and suppliers of the year, as determined by building and facility executives who participated in a national survey. CyberLock was selected among 560 products that were submitted for consideration and will be featured in the magazine's January 2012 issue.

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_VIDEX.html

For more information www.cyberlock.com

__________________________________________________________________________________________

WAVE SYSTEMS CMS Products, Inc. and Wave Systems Corp. recently announced the availability of the first-ever external self-encrypting drive (SED) that meets the rigorous Opal standard. CE Secure DiskVault Wave Edition drives will ship with Wave's EMBASSY Trusted Drive Manager ( http://www.wave.com/products/tdm.asp #mangerBenefits) software for activating the drive's advanced security features.

"As businesses look to external drives for additional storage, it's important for data to be secured," said Ken Burke, President, CMS Products, Inc. "External SEDs are often used to store sensitive information, creating an even stronger need for industry-standard encryption. By encrypting the drive itself, customers can protect their data from intruders."

For more information: http://www.wave.com/news

For the Wave Blog: blog.wave.com/

For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: http://www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html

See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf

__________________________________________________________________________________________

CARTES IN North America March 5-7, 2012 in Las Vegas, Nevada

Organizations face persistent challenges of ensuring security and privacy, confirming identity, managing authorization and legitimizing business transactions in both cyber and physical worlds. At CARTES in North America, http://www.cartes-northamerica.com/ ,security and smart card authorities will present a roadmap for organizations to address these issues along with real-world strategies for managing risks from the growing prevalence of mobile applications as well as new cloud-based services.

__________________________________________________________________________________________

CLOUD EXPO NEW YORK Globally, cloud computing is on course to become $120BN market.

The surest way to get yourself and your company fully "Cloud-ready" is by attending Cloud Expo New York ( http://cloudcomputingexpo.com/ ) -- being held June 11-14, 2012, at The Javits Convention Center In New York City.

Cloud Expo New York offers a vast selection of technical and strategic Breakout Sessions, General Sessions, Industry Keynotes, our signature discussion "Power Panels" and a bustling 4-day Expo floor complete with a busy Demo Theater so that delegates can you can kick the tires of solutions and offerings.

Join your Cloud peers in June at 10th International Cloud Expo in New York, co-located with the 13th Virtualization Conference & Expo. It is the largest Cloud Computing event in the world!

__________________________________________________________________________________________

PSA Security Network PSA-TEC....May 14 - 18, 2012 in Westminster, Colorado

"For over 35 years PSA Security Network has brought you PSA-TEC. This year PSA-TEC offers you hundreds of hours of education and networking, focusing on Business Optimization, Physical Security, IT and Managed Services--all specific to the physical security community.

Join us May 14 - 18, 2012 in Westminster, Colorado and get the training you and your staff need to meet everyday challenges and succeed in the security industry.

On behalf of PSA, we look forward to seeing you in Colorado!"

Bill Bozeman, CPP, CHS President and CEO PSA Security Network

Register for PSA-TEC here: http://www.cvent.com/events/psa-tec-2012/event-summary-f2ba1ca43c004a79b01c4e2156183c39.aspx

For our interview with Mr. Bill Bozeman: http://www.securitystockwatch.com/Interviews/in_Boardroom_PSA.html

For more PSA Security Network News: http://blog.buypsa.com/category/press-releases

__________________________________________________________________________________________

Security Document World 2012 The Global Hub for Next Generation Citizen & Government ID Solutions 21-23 May 2012, Queen Elizabeth II Conference Centre, London, UK

Following the outstanding success of SDW 2011, which saw a packed exhibition floor and more than 1200 attendees, SDW 2012 will return to the Queen Elizabeth II Conference Centre, London UK on 21-23 May 2012.

The show will continue its focus on advanced security documents, border control, ePasports, eID, registered traveller and for 2012 will have a special focus on document anti-counterfeiting.

With over 85 companies on the exhibition floor, and an exciting two-day conference programme, this event is designed for government officials, company executives and technologists in the ePassport, visa, eID, driving license, registered traveller, law enforcement, digital identity, employee ID, security printing, biometric and smart card industries.

Find out more at: www.sdw2012.com

Contact: Mark Lockie at Science Media Partners, Tel: +44 1491 672381

Email: m.lockie@sciencemediapartners.com, Web Find out more at: www.sdw2012.com

____________________________________________________________________________

THE TRUSTED COMPUTING GROUP The Trusted Computing Group (TCG) Web Find out more at: www.trustedcomputinggroup.org, a worldwide open industry standards organization, will host its popular annual half-day seminar at the RSA Conference as part of the conference's Association Events schedule.

"The Paradox of Security: Is the Status Quo Acceptable?
http://rsaconference.com/events/2012/usa/agenda/monday-events.htm #tcg www.sdw2012.com , will be held Monday, Feb. 27, 10 a.m. - 2 p.m. in Esplanade Room 301-303, Moscone Center, San Francisco. The session will include a number of sessions and a boxed lunch, as well as demonstrations of widely available network security solutions, self-encrypting drives and systems protected with the Trusted Platform Module, all based on TCG specifications.

Attendees will learn more about using a hardware root of trust as an anchor for data leak and malware prevention; platform integrity; device and user identity; and network access for fixed and mobile devices used enterprise-wide.

"Chaos currently rules in the security market," notes Brian Berger, Trusted Computer Group director and marketing work group chair. "In a world where users routinely and unknowingly surrender personal information and choice, TCG and its members provide industry accepted security solutions to any platform."

__________________________________________________________________________________________

Please read our Terms of Use, Conditions and Disclaimer ("Terms"): www.gemalto.com www.securitystockwatch.com/Main/Terms_of_Use.html. By using our website and any information located at www.SecurityStockWatch.com you agree to these "Terms".

For Further Information please contact:
Deborah Gilbert, 914-690-9351
Deborah@SecurityStockWatch.com
For more information:
www.SecurityStockWatch.com