Breaking News:

German Public Transportation Adopts IBM Software Defined Storage to Tackle Big Data. More

Will Apple Pay Keep You Safe This Holiday Season Amid Credit Card Breaches? More

BAE Systems to acquire SilverSky to enhance commercial cyber growth strategy. More

Precise Biometrics: Smartphone with Precise BioMatch Mobile™ launched by leading vendor. More

Tennessee Police Department Selects Digital Ally's Patented VuLink Connectivity for Officers. More

Radware Receives Multi-Million Dollar Contract From National Financial Services Company for Cyber-Attack Mitigation. More

Raytheon unveils wearable computers for battlefield intelligence operations. More

China targets Apple's iCloud with hacking attack. More

Diebold Enhances ATM Design, Security -- Inside and Out. More

UTC Aerospace Systems' Cloud Cap Technology selected by Integrated Surveillance and Defense for US Navy program. More

Teledyne DALSA - Advanced Imaging Capabilities for Defense and Security. More

Gartner Ranks Check Point the Worldwide Market Share Leader in the Firewall Equipment Market. More

Unisys Strengthens Analytics Capabilities of Forward! Platform by Signing OEM and Managed-Cloud Agreements with SAP. More

De La Rue secures 10-year note printing deal with Bank of England. More

How to integrate IT security at board level after Heartbleed and Shellshock. More

Honeywell And Constellation Deliver Value And Comfort With Smart Wi-Fi Thermostats. More

ATK Awarded $65 Million in Domestic and International Defense Contracts. More

Voiceprints being harvested by the millions. More

I.D. Systems and Toyota Dealer Roll Out Wireless Vehicle Management Technology for U.S. Retailer. More

Grand View Health Renews Contract with Zix Corporation. More

CaixaBank gears up for wearables with Gemalto NFC payment technology in Spain. More

Apple Pay seen advancing mobile-payment hardware. More

AlgoSec Promises Unified Hybrid Cloud Security Management. More

Elbit Systems Critical Secure Broadband Services with the Department of Homeland Security. More

MasterCard Launches Solution to Protect Against Cyber Hacking of Banks and Processors. More

Northrop Grumman Mine Detecting Sensor System for US Navy. More

MSA Closes In on Certification of New Breathing Apparatus for Firefighters. More

Magal Security receives orders for expansions of existing homeland security installations in Israel. More

ACI Worldwide Powers Internet Banking and Loan Payments for Langley Federal Credit Union. More

Unisys to Provide IT Support Services to Army. More

CA Technologies Helps Card Issuers Combat Fraud and Increase Revenue with Next-Generation Authentication Solution. More

Tyco Integrated Security Launches Entry Into Small Business Market. More

Trend Micro and INTERPOL Collaborate to Fight Global Cybercrime. More

China approves iPhone 6 after security assurances. More

Honeywell Survey Reveals Consumers Care More About Credit And Debit Card Security Than Their Health Or Retirement Savings. More

Cloud-based New Media Terminals Installed at China's Largest High-Speed Railway Station. More

London Met Police Extending AXON Body-Worn Camera Pilot to Front Line Officers. More

Intellicheck Mobilisa Wins $300K Contract to Install Defense ID System at Fort Meade. More

SanDisk Introduces of World’s Fastest Memory Card. More

JPMorgan breached. More

StrikeForce Introduces the World’s First and Only Patented Keystroke Encryption Technology for Apple Computers. More

Are Passwords Passé? NICE Shows How Companies are Using Voice Biometrics. More

Digimarc Launches Digimarc(R) Guardian Watermarking for Publishing. More

Intellicheck Mobilisa Wins $220K Contract to Provide TWIC Readers to Port of New Orleans in Louisiana. More

LoJack and Contguard Form Cargo Container Security Alliance. More

HP to Buy Cloud Company Previously Allied With Amazon. More

ImageWare Systems GoMobile Interactive Receives Top CTIA Emerging Technology Award. More

Was iCloud breached? Celebrity hacking clouds Apple's upcoming product launch. More

Magal Launches Revolutionary New Perimeter Robot. More

BIO-key(R) Continues to Expand Footprint in the Healthcare Market. More

ImageWare Signs Three-Year Agreement With Major International Retailer to Provide Multi-Modal Biometric Identity Management on the Fujitsu Cloud. More

California to require anti-theft 'kill switches' on smartphones. More

Radware's DDoS Protection and Attack Mitigation Service Selected by Colombia National Police to Help Mitigate Cyber Attacks to Its Network. More

General Dynamics Awarded Contract to Implement Massachusetts Statewide Next-Generation 9-1-1 System. More

Lockheed Martin seeks to clean up space junk. More

UPS Stores Hit by Cyber Attack, Customer Data Compromised. More

HP Delivers Services to Help Enterprises Accelerate the Benefits of Big Data and Analytics. More

Taser Could Be In-Class Leader Following Lethal Shooting In Ferguson. More

Nuance PowerShare Network Achieves Industry-First Milestone, Sharing 3 Billion Medical Images via the Cloud. More

Smart Business Cards Transform Into USB Drives. More

NICE is Once Again the Leader in Speech Analytics. More

How to Quit Facebook, and Other Questions About Fighting Tracking. More

Financial Institutions Are Moving To The Cloud. More

Fresno Police Department Expands Body-Worn Camera Program With Purchase of 100 Cameras From TASER. More

Diebold Global Software Strategy. More

Foreign security vendors can no longer bid for Chinese government contracts. More

An Upcoming iPhone Feature From Apple Will Completely Transform How You Use Apps. More

ManTech Awarded Order for Worldwide U.S. Army Command. More

Leading North American Financial Institution Selects Sapiens DECISION. More

Why Microsoft is becoming a cloud computing competitor. More

Apple-Visa May Partner for Mobile Payments. More

Raytheon to Showcase Broad Cyber Product Portfolio. More

The Boston Globe Selects LoJack. More

HP's Luxury Smartwatch. More

Intellicheck Mobilisa Wins Contract To Provide ID Card Readers to Washington State Ferries More

Oracle Customers Plug Into the Cloud With Oracle Database 12c. More

New Infrared iPhone 5 Case Lets You See Through Walls. More

Gemalto bundles secure file sharing and access management to offer all-in-one Identity cloud solution. More

Unisys Wins Applications Managed Services Contract from Aena Navegacion Aerea. More

Microsoft and Akamai join forces in first cybersecurity-focused accelerator in Israel. More

Facebook Plan to Monitor User Web Browsing Rouses Alarm. More

U.S Department of Treasury Awards Accenture $48 Million Contract for IT. More

Garmin Enhances Connext with Wireless Cockpit Connectivity to Mobile Devices. More

BIO-key and Experian Collaborate to Offer Enhanced ID Verification. More

Nuance Unveils Dragon NaturallySpeaking 13. More

RSA Web Threat Detection Adds Enhanced Visibility & Analytics; Takes on Mobile Fraud. More

Raytheon Builds a Fleet of Decoy Robots for the U.S. Air Force. More

Versar Awarded Iraq Personal Services II Contract From U.S. Army Corps of Engineers. More

Largest New York Real Estate Development Selects AMAG Technology’s Symmetry™ Enterprise Security Management System. More

Apple and IBM Forge Global Partnership to Transform Enterprise Mobility. More

Will Home Depot, Amazon, Or Dell, Launch The 3D Printer Revolution? More

Oracle Marketing Cloud Expands the Industry's Most Comprehensive Marketing Technology Ecosystem. More

StrikeForce Adds Logical Source, Inc. as a New Distributor of Its Products. More

Trend Micro Announces Comprehensive Security Capabilities for Microsoft Office 365 Customers. More

Honeywell's Spectra Shield® Ballistic Material To Provide Ballistic Protection For Next-Generation Law Enforcement And Military Body Armor. More

Novartis Joins With Google to Develop Contact Lens to Monitor Blood Sugar. More

CVS Caremark and IBM Announce the "Technology Solutions for Smarter Health" Program. More

10 Things In Tech You Need To Know Today. More

Radware's Attack Mitigation Device Extends Common Criteria Certification Through Laboratory Testing. More

Here's A Great Explanation Of The 'Big Data' Phenom In 8 Words. More

Apple loses Siri voice recognition case in China. More

Oracle Helps dunnhumby Transform Its Global Processes via the Cloud. More

Google Cloud Storage offering 2 TB of free storage through Panzura to compete with Amazon, Microsoft. More

Oshkosh Defense’s JLTV Solution Completes “Net-Ready” Testing. More

Unisys Cited as a Leader in Independent Research Firm's Report on ITSM Implementation Services Provider. More

Security Firm Described Simulation as Real Hack. More

H-P Printers Selected by US Air Force. More

Kratos Receives $32 Million in National Security Program Awards. More

Unisys Delivers New Basic Provision Biometrics Solution to Dutch Custodial Institutions Service. More

HP Wins $147M Medicaid Contract in Delaware. More

Veterans Affairs Selects ASM Research to Modernize Electronic Health Records. More

Black & Decker recalls 108,000 routers because of shock risk. More

Three Serious Takeover Candidates in Data Security. More

CAE wins defense contracts valued at approximately $110 million. More

Security Concerns Put IBM / Lenovo x86 Server Deal In Limbo. More

Raytheon Secures a Flurry of DoD Deals. More

ImageWare Systems Awarded $1.0 Million Contract to Implement Multi-Modal Biometric Driver License System for State of Baja California. More

Google is Taking on AT&T and Preparing to Take Over Your Home. More

Glucose-Monitoring iWatch May Give Apple a Sweet Lead in Wearables. More

Oracle Agrees to Buy Micros Systems for $5.3 Billion. More

I.D. Systems Receives $500,000 Order From Railroad to Track Intermodal Containers. More

Hackers Find New Ways to Breach Computer Security More

Cyberattack on Hong Kong Vote Was Among Largest Ever More

Hackers Take Down World Cup Site in Brazil More

iHeartRadio crosses 50 million users in 3 years. More

March Networks Announces High-Performance 6700 Series Hybrid NVR Platform and Edge 4e Encoder More

IBM Builds a Cloud Ecosystem in Egypt with New Technology and Skills. More

OSI Systems announced $10 mln order from international customer to provide multiple units of its Rapiscan Eagle M60 mobile high energy X-ray cargo and vehicle inspection system. More

CA Technologies Redefines SaaS-based IT Service Management. More

StrikeForce Technologies is Awarded a Second Patent for its Keystroke Encryption Technology. More

Pentagon Awards $145 Million in Defense Contracts. More

NICE Actimize Anti-Money Laundering Poll Finds Only 48 Percent of Financial Institution Respondents Believe They Have a Strong Culture of Compliance. More

TRC Awarded Storm Hardening Contract by Public Service of New Hampshire. More

Microsoft Partners With Chinese Internet Security Company Qihoo 360. More

Fidelis XPS Extends YARA-powered Capabilities to Enhance Real-time Malware Command and Control Prevention. More

Diebold's Self-Service Solutions Drive The Family Credit Union's New 'Smart Branch'. More

ACI Worldwide Powers Online and Mobile Banking for Pearl Harbor Federal Credit Union. More

NICE Introduces New Text-to-911 Logging Solution for Next Gen Emergency Communications Worldwide. More

Honeywell Challenges Google's Nest With A New Smart Thermostat That Responds To Your Phone's Location. More

Mace Security International Reports Pepper Spray Saves Lives in Seattle School Shooting. More

Apple's New Plan for iPhones. More

Flaircomm selects Gemalto to provide secure M2M solution for car manufacturers in China. More

Facebook Buying Mobile-Data Company Pryte. More

Bitcoin: Coming Soon to an iPhone Near You. More

Intel’s thin tablet shows off smaller new chip: Look Ma, no fans! More

Lockheed Martin Defeats Raytheon to Win $915 Million Air Force Space Fence Contract. More

Northrop Grumman Wins Three Defense Contracts. More

SEC not to recommend action against IBM on cloud revenue. More

Zix CEO Breaks Down The Email Encryption Business. More

Is Facebook Getting a Little Too “Big Brother?” More

Apple Knows That Home Is Where the Smart Is. More

Zurich Insurance PLC Expands Use of Accenture’s Software to Rapidly Deploy Products and Improve Customer Service. More

SanDisk introduces storage solution for tablet, smartphone market in China. More

Law enforcement and the use of body cameras. More

LoJack names its 10 most stolen cars. More

Security Industry Fights Surveillance State with Words. More

VASCO to expand portfolio with Risk IDS acquisition. More

Apple Point-of-Sale Upgrade Signals Better Security. More

China Bans Windows 8 From Government PCs. More

Why the cloud needs to clean up its act. More

Alcatel Creates Israel Bell Labs Center to Bolster Cloud Effort. More

T-Mobile taps Walmart to sell low-cost 4G tablets with limited free service. More

IBM Shows Robust Growth In Cloud. More

Compliance Software Helps Meet Regulatory Demands. More

Relationships with IBM, Fujitsu, T-Systems and others representing just the tip of the iceberg for ImageWare. More

Cloud Growth Is a Game Changer for SanDisk. More

OSI Systems receives $15M order for cargo, vehicle inspection systems. More

Hope For Military Spending Growth Boosts Boeing and United Technologies. More

HP Launches HP Helion Portfolio of Cloud Products and Services. More

AT&T and Verizon received one government data request per minute last year. More

Gemalto's Olivier Piou on Secure Credit Card Technology. More

Microsoft Holds Business Software Market Share Lead. More

EMC buys secret chip maker DSSD. More

IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal. More

Target CEO resigns as fallout from data breach continues. More

ImageWare(R) Systems Brings IDaaS to the IBM Cloud Platform. More

AT&T, Honeywell to challenge Gogo's airborne Web business. More

General Dynamics secures $17.65 billion contract. More

Why Are IBM and Microsoft Soaring? More

Homeland Security struggles to tempt, retain cyber talent. More

Why 'Smart' Guns Won't Transform the U.S. Firearm Industry. More

Europe’s Antitrust Chief Censures Google’s Motorola Mobility. More

AOL confirms security breach; users' passwords, address books exposed. More

Aol Mail Hacked With Spoofed Accounts Sending Spam. More

Apple vs. Samsung: Smartphone rivals billions apart in value of patent feud. More

Feds consider long-term HealthCare.gov contractor. More

AT&T Goes After Google With Plans to Bring Gigabit Broadband to 21 New Cities. More

Cloud Storage Wars Could Favor the Little Guys. More

Comtech Telecom receives $3.1 mln satellite modem order from government systems integrator. More

Australia's GE Money warns customers of 'Heartbleed' bug. More

Cloud infrastructure business seen as three-horse race. More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

Fujitsu, T-Systems, and IBM are three Blue-Chip companies we have gone to market with. These large, established partners offer the support, brand name and worldwide cloud platform needed to seamlessly distribute our products. At the beginning of April, Fujitsu announced the kick-off and worldwide expansion of our partnership model with a dedicated sales team covering the Americas. Since then, Fujitsu and ImageWare have closed a three-year agreement with a major international retailer who will use the IWS CloudID® products running in the Fujitsu cloud for face, finger, iris, and voice enrollment and matching.  Additionally, Fujitsu has set up proof of concept pilots with several of their major customers, with more expected in the near future, and has kicked off sales and marketing of the partnership products in Japan and China. Our partnership with T-Systems has led to a project with Deutsche Bahn, the German national railroad, who is slated to become the first customer receiving our joint product offering. We expect more to follow and anticipate this agreement will begin producing revenues in the fourth quarter. More

security stock solutionsMr. Will Geoghegan
Cloud Architect
TPS5 Cloud & ISV Partner Solutions
Fujitsu Americas
Fujitsu ISV Cloud Program

Fujitsu has a long and demonstrated history delivering world-class solutions that enable businesses to succeed in a highly-competitive market and ever-evolving technology landscape. The Fujitsu Cloud ISV Partner Program is one more way we’re delivering exceptional value to our customers, where we focus on helping companies transform and deliver their solutions in an “as-a-service” model from our cloud. Our aim is to work closely with leading solution providers to take full advantage of not only our platform and tools, but the underlying shift in how the market consumes technology solutions today. With the Fujitsu Cloud ISV Partner Program, we offer the chance for solution providers to step into a leadership role and maximize the benefits of the latest cloud technology, including not only the transformation and delivery of their solutions as SaaS, but also for support in areas like sales, marketing, professional services, and across innovative operating and revenue models that support a “zero cost” option for the partner.  More

security stock solutionsMr. Rich Cillessen
Vice President, Enterprise Security
Siemens Industry, Inc., Building Technologies Division

One of our newest solutions is Desigo® Mass Notification, which is a fully integrated multi-modal routine and emergency communications solution. Desigo Mass Notification helps make sure your message gets through to the right people, no matter where they are or what they are doing. This is just one component of Siemens Desigo CC global workstation platform that allows our customers to unite their security, fire, building automation, and lighting controls in a single platform.  More

security stock solutionsMr. Mark VanDover
Tyco Integrated Security

TycoIS’ value begins with our people. We secure businesses by combining our commercial grade security solutions with extensive, knowledgeable expertise and local timely support.  We begin with a deep understanding of the markets that we serve due to years of on-the-job experience working with customers in neighborhoods around the country, likely including yours. As a full-service security integrator, we work to understand our customers’ specific challenges, deliver seamless integration, and provide long-term support through customer service, maintenance and monitoring. The combination of strategic implementation and individualized service helps us provide personalized solutions for customers’ current needs and the flexibility to adjust as they grow and expand. Through this approach, we’ve earned business from 80 percent of the world’s top retailers, two-thirds of the nation’s busiest airports, eight of the top 10 banking institutions, and every U.S. Federal Courthouse. We also help protect over 250,000 local businesses in hundreds of cities and towns across America like your local sports arena, your neighborhood community bank, where your children go to school, where you worship, and most likely even your favorite coffee house.  More

security stock solutionsMr. Matt Barnette
AMAG Technology

We are thrilled to be a part of the Hudson Yards project so early on in the process.  This project when finished will be the largest real estate development in Manhattan since Rockefeller Center.  Five office towers, 5,000 residences, 100 shops, 20 restaurants, and 14 acres of public space will reside over Hudson Yards, taking up six city blocks.  Symmetry will be installed in the first tower, which is being built now.   Bank of America will be installing AMAG’s Symmetry OneFacility cloud solution, SymmetryCONNECT that will tie the banks disparate security systems together.  The overlay delivers one dashboard so security personnel only have to learn one security system and use one set of data.  As the bank upgrades, it will install AMAG’s Symmetry SR Retrofit solution, saving the bank thousands of dollars on hardware. Yale University has also chosen the Symmetry SR Retrofit solution.  The three to five year project will include new installations, as well as retrofit upgrades to replace its legacy Casi Rusco security system.  Evans Hall, home to the School of Management, was the first building integrated into Yale’s new security system. The new Symmetry system will manage 120 proximity card readers and 100 cameras to serve 16 classrooms, 22 breakout rooms, three library spaces, 13 interview rooms and office space for roughly 120 faculty and 195 staff. Approximately 7,000 doors will be converted to Symmetry when the project is completed. More

security stock solutionsMs. Carmen Gonzalez
Co-founder, President & CEO, SYS-CON Media
Ulitzer, Inc., and Cloud Expo, Inc.

We have a track devoted to security and mobility issues, because it is absolutely mission-critical for enterprise IT today. C.J. Radford of Vormetric, for example, will do a deep dive on safeguarding data in the cloud, and there's nothing more mission-critical than that! This is a must-attend session for security professionals, as far as I'm concerned. Rishi Bhargava from Intel Security will take an interesting approach, asking attendees whether it's time "to think like a thief" when it comes to security. He's one of the world's leading experts and will let attendees know how to stay ahead of the bad guys. Also, James Lynn from HP will present his point of view of the future of security from one of the world's top technology vendors. And we have Arthur Hicken from Parasoft talking about security and Evelyn de Souza from Cisco addressing the critical issue of data privacy.  So we're addressing the topic in a lot of detail.  More

security stock solutionsMr. Mike Howard
Chief Security Officer

Out of necessity, you’re seeing greater collaboration between the CSO and CISO. I think there’s still more work to be done on that in the security world at large. There are still a number of companies and institutions in which the CSOs do not talk to the CISOs for any number of reasons; so that’s something that we need to continue to work on.  More

security stock solutionsMr. Nikhil Sharma
Senior Director, Cloud Solutions

This is a serious challenge leading to a lack of trust among consumers in Cloud and Cloud technologies. Part of the problem is that we are trying to Band-Aid the environment with the same old perimeter-based technologies. Key here is that our perimeters have increased many-fold or some may say have practically dissolved in today’s environment. An all-round paradigm shift is required, from technologies to processes. More

security stock solutionsMs. Diana Zavala
Director, Analytics and Data Management
HP Enterprise Services, U.S. Public Sector

Today, information is complex, available in real time and mostly unstructured. An enterprise must have the ability to analyze unstructured and structured information in order to gain deeper insights. Modernizing traditional business intelligence platforms by adding the ability to process unstructured or “human” information—social media, email, voice, video, documents, archives, etc.—provides an added layer of intelligence. In addition, an enterprise needs to consider its ability to embed analytics into business processes to streamline actions. This might entail pairing together social media information with identity access information in order to form conceptual analytics around possible insider threats or to help form a decision on maintaining security clearances. HAVEn is an acronym for our industry-leading Big Data platform.–A compilation of the Hadoop, Autonomy, Vertica and Enterprise security engines, which enable “n” (number) of applications, HP HAVEn is an open, scalable solution that provides the ability to manage, transform and analyze the full spectrum of structured, semi-structured and unstructured data  More

security stock solutionsMr. Martin Heisig
Senior Vice President
Cloud and Infrastructure Delivery

The mega trends real-time platforms, big data, cloud, enterprise mobility as well as social media continue to enable completely new business scenarios. In a tectonic shift, we witness how our most innovative customers reinvent their business models and processes by using in-memory technology, like SAP HANA. The world goes real-time across entire industries and in the private space. As head of the HANA Enterprise Cloud delivery function, I foresee that more and more companies will move to the cloud, and that we will see a leap in software, infrastructure and platform as services. Customers have existing environments and want to add Cloud solutions to that. So, the reality for most of these companies is a hybrid Cloud environment. Or they move their enterprise systems into private Clouds, for example the HANA Enterprise Cloud. Security and process integration will continue to be big issues, and this is something at which SAP excels. Whatever the strategy, CIOs have to address both agility for the business and cost. The Cloud is a major factor in this equation. More

security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs

Founding Member
Fido Alliance

Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We’re at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.  More

security stock solutionsMr. George Romas
Technical Director
Cybersecurity Solutions Group
HP Enterprise Services U.S. Public Sector

IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities. An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smart phone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house.   More

security stock solutionsMr. Michael D. Day
IBM Distinguished Engineer
Virtualization and Linux


None of the security issues associated with networked computing have gone away with Cloud Operating Systems. In many ways we are more vulnerable than ever to breaches being escalated. The Trusted Platform Module is a partial solution which can validate the boot chain of a compute node. (Verify the platform has come up without a root kit). The TPM is well supported by Linux and by the KVM hypervisor, but not widely used, although it should be. As bad as the security issues are with data center computing, they are much worse with the IoT right now, primarily because that set of products has evolved in a disconnected state and has not been exposed to attack in the same way our data processing infrastructure has been for decades.. More

security stock solutionsMr. John Felker
Director, Cyber and Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don’t simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.  More

security stock solutionsMr. James Viscardi
Vice President of Sales and Business Development
Security Systems

The Transportation Security Administration is an important customer of ours and we are very pleased to partner with Leidos to service them.  As part of this four-year contract agreement, Smiths Detection will provide highly trained field support, supplies, and parts to service X-ray units and explosives trace detection technology.  Through this contract agreement, over 400 airports will receive first-class service to ensure their checkpoint security equipment runs smoothly.  We understand that passenger safety is a high priority, as well as operational safety.  As we work to eliminate equipment downtime along with delivering the best support, our mission is to provide the best threat detection solutions available. . More

security stock solutionsMr. Rob Wigley
Director, Cybersecurity Consulting Services
HP Enterprise Services, U.S. Public Sector

Without question, adversaries have become smarter, better organized, and more persistent as they seek to cause disruptions and access intellectual property and other sensitive information. The number of cyber threats is proliferating faster than many organizations can defend. Many companies and global governments have been subjected to some very sophisticated and targeted attacks, which have had a significant impact on their mission. This includes some recent extremely high-profile breaches conducted by insiders. In order to address these threats, first and foremost an organization needs to have an effective risk management program supported by senior management, with a strong governance structure, and integrated across all business processes. As businesses look for new growth opportunities and consequently adopt new technologies, the tradeoff becomes uncertainty and risk that could affect their mission and goals. A continuous process of risk management activities should be applied to identify new risks, reassess previously identified risks, and monitor and track the effectiveness of risk mitigation plans. . More

security stock solutionsMr. Net Payne
Chief Marketing Officer
March Networks
An Infinova Company

March Networks is ranked the #1 provider of enterprise digital video recorders (DVRs) in the Americas, as well as the #1 supplier of video surveillance equipment to the Americas’ banking market (IHS Inc., formerly IMS Research).  While our video surveillance solutions can be used in a variety of industries and applications, we focus in particular on providing the financial and retail markets with integrated solutions that help them increase profits and realize faster returns on their technology investments. We are also a leader in providing mobile video surveillance solutions to bus and light rail transit authorities. . More

security stock solutionsMr. Mark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc.

Cyber Theft and data breaches are increasing at a faster pace and in the news almost every day with reports on Data Breaches (e.g. Target, Living Social, Federal Reserve, State of Maryland), Viruses stealing keystrokes (e.g. Facebook, Twitter, Gmail) and phishing attacks (fake websites - IRS, banks). Financial institutions are being sued and losing, and cybercrime statistics in our opinion, are projected to be into the trillions of dollars globally. In conjunction with this news, regulations focusing on protecting information are gathering strength with emphasis in the financial (FFIEC), healthcare (HIPPA), consumer (PCI) and now legal markets. If you then include various articles that state "...it is only a matter of time before your mobile device is hacked, if it isn't already," StrikeForce management contends that demand is increasing specifically for the types of features and capabilities that StrikeForce Technologies' patented and patent pending products deliver. All of this translates, in our estimation, into the potential for substantial sales and revenue growth in 2014 as the Company begins to exploit the mobile market and reaches its Vision of "Making the World a Safer Place." More

security stock solutionsMr. Danish Thanvi
CEO & President
Background Check Pte Ltd, Singapore

Yes it’s been a great journey so far. We started with zero clientele but with our commitment and “no-compromise on quality” attitude we turned into the largest background screening company not only in Pakistan but also emerging as one of the major service providers in the Asian region. There are lot of milestones we have achieved during the course of 7 years but to mention a few I would like to start with RiskDiscovered as the sole verifier of all the doctors, engineers, management professionals who have moved to Middle East to pursue their careers. Number of ministries and councils are longstanding client of RiskDiscovered. If we talk about corporate sector, we have achieved the target of expanding our clientele by three times in last 3 years with 100% retention ratio, which means there is no client who has been lost till now." More

security stock solutions Mr. Ryan Skipp
T-Systems International GMBH
Portfolio & Solution Design - IT

Applications & Portfolio Architecture


T-Systems as an Outsourcing & Service Provider has to provide base infrastructure services which meet the cost and quality expectations that a company transitioning to outsourced services would expect – better than they as an end-user could produce, with better quality, and lower cost!  In order to achieve that, T-Systems was one of the first Outsourcers to produce a “Cloud” platform, based on highly shared leveraged infrastructure, and with a number of pre-defined applications on top of that.  Today we have enhanced that infrastructure, and wrapped the Cloud functionality into it, all the way up to self-service (to application level) for our Private Cloud clients. . More

security stock solutions

Mr. Mark Wood
Product Manager
Cloud Security
Dell SecureWorks

Our purpose-built security platform enables us to filter, correlate and analyze more than 29 billion events across our global customer base every day. We’re also well known for our Counter Threat Unit research team, which includes some of the most experienced security experts in the industry. We use our correlation algorithms and our skilled staff to identify threat activity on customer networks as benign or hostile and to assign a level of severity to the hostile activity. The net is that if we call you, you know it’s worth your immediate attention and if we don’t, you know you can sleep easier. More

security stock solutions

Mr. Jason Waxman
General Manager
Cloud Infrastructure Group

With cloud infrastructure, servers are typically virtualized and shared across multiple lines of business or even among multiple organizations rather than dedicated to specific lines of business. When IT wants to link multiple cloud data centers together to gain efficiencies—the tools to secure this far-reaching infrastructure are still evolving. This lack of visibility – even in private clouds that are behind a company’s firewall - have people concerned because they no longer have dedicated equipment for their line of business and instead are using shared, multi-tenant resources. This is why 61% of IT that were surveyed are concerned about having less control and visibility over these shared resources, even in a private cloud. Intel and McAfee are working to address these challenges and advance security solutions for cloud services. More