SecurityStockWatch
SecurityStockWatch
SecurityStockWatch



Mrs. Ulrica de-Fort Menares
Cisco



Mr. Jim Miller
Imageware



Mr. Michael Harris
Precise Biometrics



Mr. Steve Dentinger
Keyscan Access Control Systems



Mr. James McGowen
Videx



Mr. Steven K. Sprague
Wave Systems Corp.



Mr. Davin A. Roos
KYIP



Mr. Joseph E. Hauhn
ADT Security



Mr. Bill Bozeman, CPP, CHS
PSA Security


banner


banner


banner


banner


Dear Friends of SecurityStockWatch.com,

We are proud to share with you these exclusive thought leadership interviews with key security industry leaders:

Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet
Mr. Jim Miller, Chairman and CEO, ImageWare Systems
Mr. Michael Harris, Chief Technology Officer, Precise Biometrics
Mr. Steve Dentinger, Director of Marketing, Keyscan Access Control Systems
Mr. Alfredo Herrera Hernandez, Chief Executive Officer, Cognitec Systems
Mr. James McGowan, V.P. of Sales and Marketing, Videx
Mr. Steven K. Sprague, President and CEO, Wave Systems Corp.
Mr. Davin A. Roos, Principal, Keep Your IP
Mr. Joseph E. Hauhn, CTO and VP of Industry Relations, ADT Security Services North America, Chairman - Security Industry Association
Mr. Bill Bozeman, President and CEO, PSA Security Network


To feature your company's solutions in our thought leadership interviews…. Please contact
Amanda at Amanda@SecurityStockWatch.com

Cisco
Mrs. Ulrica de-Fort Menares, Director of Product Management for Cisco Medianet, told us, "An intelligent network must become more application-savvy. It must have the ability to determine the importance of a session based on its business value, and treat the session accordingly, end to end. One of the key medianet characteristics is its ability to become media-aware. Imagine this: The network can discover the type of endpoint and automatically configure the switch port for that type of device. This ability to plug and play any endpoint in the network is an example of tight integration between an intelligent network and an endpoint."

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Cisco_UFM.html

For more information: www.cisco.com/go/medianet
http://blogs.cisco.com/category/video

Cisco recently announced Video Surveillance Manager 7.0, the industry's first solution built from the ground-up and certified to run in Cisco's virtualized Unified Computing System (UCS) environments. These new solutions now make it possible for customers in healthcare, public sector and retail to move beyond traditional basic safety and security surveillance deployments and use video to transform the way they run their businesses through hyper-scalability and ease of configuration. For more information: http://newsroom.cisco.com/release/1007056

Intel

Mr. Jim Miller, Chairman and CEO, ImageWare Systems, said, "Los Angeles World Airport is the flagship deployment for our next generation biometric identity management and advanced credentialing platform. When this solution is fully implemented-which we expect by Q4 2012-it will not only deliver a state of the art biometric-based airport credentialing solution, but will also ensure that the Los Angeles World Airports can adapt this credentialing solution to meet developing needs and evolving technology capabilities, thus "Future Proofing" their investment for the long term. Our BE 2.0 platform allows our clients to treat biometrics as a "plug-and-play" model while safeguarding the underlying data. Our recent selection in Ecuador to provide biometric credentials for the country's seaports is a replication of this implementation in the Spanish language."

ImageWare Systems, Inc. ( OTCQB : IWSY ) ("IWS"), a leader in multimodal biometric security solutions, also recently introduced IWS CloudID, its next-generation cloud-ready suite of identity solutions.

IWS CloudID is a modular, service-orientated architecture-based software platform that allows the rapid development and deployment of highly secure, yet flexible identity solutions, from the creation and management of secure credentials, including IDs, passports, driver's licenses, smart cards, and access control credentials, to integrated mug shots, fingerprint livescan, and investigative capabilities. CloudID was designed to adapt to evolving customer requirements and emerging market demands, thereby delivering a "future proof" identity management solution.

The IWS CloudID Product Suite consists of three independent, yet tightly integrated software layers which include client and server software modules that can be selected and configured to create customized solutions and reusable identity frameworks. These layers are the IWS CloudID Server Platform, IWS CloudID Business Services and IWS CloudID Applications.

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_IMW.html

For more information: www.iwsinc.com

Precise Biometrics
Mr. Michael Harris, Chief Technology Officer, Precise Biometrics, said, "We have secured our position as the leading provider for Match-on-Card within national identity cards and the deployment of desktop readers for government logical access. As enterprises, such as this leading automobile manufacturer, are now migrating from desktops to mobile, we are ready to support them with our Tactivo product line. Using Tactivo enables the BYOD (Bring Your Own Device) initiative to become a reality as it fully supports the same security infrastructures deployed across desktops around the world. We are truly bridging the gap between corporate and enterprise IT security rules and the ease of use the user community expects."

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Precise_Biometrics.html
For more information: www.PreciseBiometrics.com , http://precisebiometrics.com/tactivo-goverment-ad?tp=2746
Gemalto

Mr. Steve Dentinger, Director of Sales and Marketing, Keyscan Access Control Systems, told us, "Many end-users are guarding their capital expenditures and with staffing levels at an all time low employers are seeking ways to optimize staff productivity and stay focused on the core competencies of the business. Centrally Managed Access Control addresses may of the concerns of business owners today; they don't need an access control administrator, they don't need an onsite computer, they don't need to manage/maintain the access control database, they don't need to perform software updates, all this and if they desire, they can lock/unlock doors, run reports, add or delete access permissions all via an internet connection using their smartphone, iPad, or laptop without any special software.

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_Keyscan.html

For more information: www.Keyscan.ca
Gemalto

Cognitec Introduces Ground-Breaking Video Analytics Product Based on Premier Face Recognition Technology

Cognitec recently announced that the highly advanced version of Cognitec Systems’ video screening product FaceVACS-VideoScan now employs leading-edge face detection technology to analyze the count, flow, demographics and behavior of people visible in video streams. Cognitec will exhibit the new technology, which can support security and operations management simultaneously, at ASIS International in Philadelphia, the Biometrics Consortium Conference in Tampa, and Biometrics in London.

Surpassing traditional video surveillance systems, FaceVACS-VideoScan detects and extracts people’s faces in live video streams or video footage and uses anonymous facial analysis to count individuals, generate demographical information, track people movement in time and space, detect frequent visitors and crowds, and much more.

For example, operators can receive an alarm if too many people gather in a specific area and measure waiting times to direct traffic. The analysis of traffic patterns and demographical statistics can provide businesses with precise visitor data to make interior design, advertising placement, staffing and other operational decisions.

Since the technology can analyze a face for gender, age and ethnicity as people approach a camera, it can trigger the display of a targeted message on a digital sign or other advertising/message devices.

The product also applies Cognitec’s premier face recognition technology to compare faces to image databases and instantly find known individuals. Businesses and organizations can detect and prevent unwanted behavior in much faster and more efficient ways, as operators can track individuals online, or receive alerts on mobile devices to act within the immediate vicinity of a suspect.

On the other hand, FaceVACS-VideoScan can identify authorized individuals or high-ranking customers in real time. Positive authentication can prompt access to restricted areas or alert personnel to provide special treatment.

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_COGNITEC_AHH.html
For more information: www.cognitec.com
Cognitec Company Video: http://www.cognitec-systems.de/fileadmin/cognitec/media/Mediaclips/Cognitec_Streaming.wmv
Cognitec Company Brochure: http://www.cognitec-systems.de/fileadmin/cognitec/media/company/Cognitec-Brochure.pdf

Videx

Videx CyberLock

There are many creative ways clients utilize the innovative CyberLock access control system. In the following application, a leading mine operator in Africa has implemented the CyberLock system to manage access to a variety of items ranging from high value tools to dangerous explosives. One of the contributing factors that made the client choose CyberLock is its ability to remotely manage access, without the need for power or wiring. On a daily basis the physical layout of the mine is constantly evolving as efforts to uncover the desired resources are implemented. This ever-changing topography and underground environment made a traditional, wired access control solution impossible. CyberLock, on the other hand, was able to seamlessly replace all of the mechanical locks throughout the mine. Videx Awards

The mining supervisory staff has been allocated CyberKeys with associated schedules and permissions dictated by their role in the organization. Web Authorizer Communicators were chosen because they require entry of a PIN code before the key can be reauthorized, which further increased security. In addition, since the Authorizer Hub saves permissions and audit trail information locally, operations can continue even during the fairly common occurrence of a network outage. Through the Dual Key Custody feature built into the CyberLock system, the mine can ensure that the on-site explosives can only be accessed under dual supervision. This feature forces both a supervisory and a transport team lead to present an authorized key before explosives can be retrieved. This ability to provide access control in such a changing and challenging environment has made CyberLock an invaluable part of this mining operation.

For the complete interview with Mr. James McGowan, V.P. of Sales and Marketing, Videx:
www.securitystockwatch.com/Interviews/in_Boardroom_VIDEX.html
For CyberLock News & Events:
www.cyberlock.com/news_events.html
For the CyberLock Solutions Center:
www.cyberlock.com/solutions_center.html
For more information:
http://www.cyberlock.com

WAVE
Wave CEO Steven Sprague recently said, “"We view Windows 8, which utilizes industry standard hardware to deliver a range of convenient and secure new features, as a validation of the benefits of Trusted Computing and Wave's solutions. Wave is uniquely positioned to support Windows 8 deployments via server-based or cloud management solutions, as well as to deliver a range of Windows 8 capabilities to enterprise customers running Windows 7 and earlier versions. Though Trusted Computing is based on industry-standard hardware used to protect your identity, the powerful user benefits are ease of use, ease of connection, and ease of access to the critical data that you need to do your job; it just works. Further, by building these capabilities on top of Trusted Computing hardware now being deployed across PCs, tablets and mobile devices via Windows 8, governments, enterprises, and even individuals, are able to benefit and manage all of their devices using one solution."

"As the mobile security space continues to expand -- especially with the rising use of consumer smartphones in the enterprise, in mobile commerce and for sensitive applications -- Wave has taken a leadership role in promoting the adoption of hardware-based industry standards for greater security. Last quarter, Wave announced its inclusion in the influential ARM TrustZone Ready Program, whose partners have pledged to help chipset vendors design and integrate Trusted Computing hardware features in the chipsets they are building today.

"We are making great progress with scrambls to address security issues posed by the rising use of Cloud storage services in the enterpr ise as well as the evolution of social media into a tool increasingly used by businesses for the dissemination of critical information. We see strong interest within the corporate environment for solutions that enable the safe sharing of files and communications over the Internet and social media."
For more information: www.wave.com/buzz/pr

For Wave Webcasts and Presentations: www.wave.com/news/webcasts.asp
For the Wave blog: http://blog.wave.com/
For our exclusive interview with Mr. Steven Sprague, CEO and President of Wave Systems: www.securitystockwatch.com/Interviews/Conversation_WAVE_trusted.html
See Wave's "White Paper" Network Security: How to Defend an Infinitely Expanding Frontier: http://www.wave.com/collateral/03-000273_TPM-SED_whitepaper.pdf
For more information: www.wave.com NASDAQ: WAVX
JYIP

Mr. Davin A. Roos, Principal, Keep Your IP, said, "Our solution compliments the growth burst of Internet base alarm systems by allowing an IP alarm panel to be programmed with an IPv4 address that is controlled and owned by the alarm dealer. Today the only way for an alarm dealer to implement an IPv4 address is by having the Central Station supply it and that gives the control to the Central Station and not the alarm dealer (good for the CS but not for the Dealer). "

For the complete interview: www.securitystockwatch.com/Interviews/in_Boardroom_KYIP.html

For more information: www.KeepYourIP.com

KYIP


Mr. Joseph E. Hauhn, Chief Technology Officer and Vice President of Industry Relations, ADT Security Services North America, Chairman - Security Industry Association, told us, "2011 was a year of significant change and progress for the organization. The first annual Security Week was held in New York City in November and included the Securing New Ground conference - the first since SIA acquired SNG.

SIA Standards released Roadmap 2.0, a revised standards strategy that focuses on harmonization of industry standardization and specification initiatives. SIA Research launched the SNG Business Intelligence Service, an online portal providing SIA members and others with financial information on the Security Sector.

The Government Relations department made a significant impact by working to exempt manufacturers from proposed energy-efficiency legislation, which was signed by President Obama in January 2010. The legislation exempts electronic security companies from the Energy Independence and Security Act (EISA) of 2007. SIA was able to engage and convince the Department of Energy (DOE) and energy conservation stakeholders to provide an exemption from meeting a misguided energy efficiency requirement, ultimately resulting in considerable savings for SIA members."

For the complete interview: http://www.securitystockwatch.com/Interviews/in_Boardroom_SIA_JH.html
For more information about the Security Industry Association: http://www.siaonline.org

PSA

PSA Security Network’s Business Solutions Business Solutions is a suite of value-added products, services and programs that help security professionals be more competitive in the marketplace. In the coming months, PSA President and CEO Bill Bozeman Bill Bozeman will discuss a Business Solution in detail. By sharing these offerings Security Integrators, Manufacturers and even End-Users can learn ways to make their businesses more competitive. This month the focus falls on Integrator Support, LLC.

Q: What is Integrator Support’s main focus?

Bill Bozeman: Integrator support’s main focus is providing its clients with the latest security solutions at competitive prices, supported by highly-trained systems integrators and operators. With the latest security technology, Professional Security Management Solutions reduce costs and more effectively protect people and property from harm. Integrator Support comprises security experts that are qualified to handle security-related incidents, reporting and system management, which allows clients to focus on their core business.

For security systems integrators, the advantages of becoming an Integrator Support Dealer include: continuous contact with customers for a strong, service-based relationship; the ability to differentiate from the competition by offering new, cutting-edge services; a complete dealer program for promoting the solutions, training staff and packaging equipment; and finally, the associated recurring monthly revenue.

Q: What types of managed services are included with Integrator Support?

Bill Bozeman: Integrator Support’s Professional Security Management Solutions include: Professional Video Monitoring (by which alarms are managed in real time and the premises are monitored through surveillance video, making early detection and quick response a reality), and Cloud Access Control, as well as Mobile Video Monitoring, (which offer an online portal for system management, reporting and monitoring and virtualizes resources, location and connectivity, saving customers valuable time and overhead).

Q: How can Integrator Support help companies better their business?

Bill Bozeman: With PSA partner, Integrator Support LLC, programs and services you can build a company that increases in value and becomes a desirable acquisition target. PSA Education offers a variety of training programs on RMR generation as well as on the services and technologies that drives it. Integrator Support LLC delivers fast, portable, mobile, user friendly, effective, and easily managed solutions in a format that provides important data, quickly.

Q: Where do I go to find more information or to start using Business Solutions?

Bill Bozeman: To learn more about Integrator Support or any of the PSA Business Solutions programs, schedule a webinar demonstration, or get signed up, simply visit www.buyPSA.com/Solutions , call 303-450-3461, or email Solutions@PSASecurity.com. Additionally, all of PSA's trusted providers of Business Solutions will be at PSA-TEC 2013, exhibiting on Wednesday, May 8, 2013. For the most up-to-date information on this event, visit http://www.psaTEC.com

For more information: http://www.buypsa.com/Education/PSA-TEC
For our interview with Bill Bozeman: http://www.securitystockwatch.com/Interviews/in_Boardroom_PSA.html
For more PSA Security Network News: http://blog.buypsa.com/category/press-releases
For more information about PSA Security Network: http://www.buypsa.com/

Please contact me with any questions or comments. Thank you for your support!

You may opt-out of our list at any time for any reason.

Regards,

Andreea Samoilescu
Andreea@SecurityStockWatch.com
www.SecurityStockWatch.com
3 Rye Ridge Plaza
Rye Brook, NY 10573
914-690-9351, fax 914-690-1170

Please read our Please read our Terms of Use, Conditions and Disclaimer (“Terms”):
www.securitystockwatch.com/Main/Terms_of_Use.html
.
By using our website, newsletter and any information located at www.securitystockwatch.com you agree to these “Terms”.Nothing herein constitutes a solicitation or recommendation for the purchase or sale of any securities or other investments.Cisco, ImageWare Systems, Intel, Pelco, Precise Biometrics, and Wave Systems are advertisers. © Copyright 2012. All Rights Reserved.

setstats