April 2017 Digital Edition
March 2017 Digital Edition
Feb. 2017 Digital Edition
Nov/Dec 2016 Digital Edition
Oct 2016 Digital Edition
SAN FRANCISCO, Dec. 7, 2017 -- Preempt, a leader in adaptive threat prevention that helps enterprises eliminate security breaches and internal threats, today announced the expansion of its product suite with the introduction of the Preempt Platform. According to Verizon's 2017 DBIR, 25 percent of breaches involved internal actors and 81 percent of hacking-related breaches were aided by stolen or weak passwords. The Preempt Platform helps security teams who are struggling to balance the threat of cyberattacks, breaches and internal threats without disrupting business or overloading analysts with false positives. The Preempt Platform can progressively adapt based on situation and context and automatically challenge anomalous behavior and resolve false positives in real-time.
Preempt continuously tracks the identity, behavior and risk of every enterprise user and adapts responses based on risk. Real-time insights are paired with business-appropriate responses that can adapt as situations change. Anomalous or risky behaviors can be challenged or redirected without disrupting user productivity. If risks increase, the solution can challenge users to verify their identity, reduce user privileges, force password changes, or ultimately block based on customizable policies.
By allowing security to adapt in real time, organizations can quickly solve a variety of security challenges such as being able to automatically respond in real-time to anomalous or risky behavior, proactively add secure access control, manage and protect privileged and service accounts and resolve risk and weaknesses before they are exploited by attackers. This flexibility opens up a variety of use-cases and also allows organizations to leverage existing security solutions in new ways.
"To securely enable digital business initiatives in a world of advanced, targeted attacks, security and risk management leaders must adopt a continuous adaptive risk and trust assessment strategic approach to allow real-time, risk and trust-based decision making with adaptive responses," wrote Neil MacDonald, VP Distinguished Analyst at Gartner, and Felix Gaehtgens, Research Director at Gartner, in the report, Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats. The CARTA approach is fundamental to how the Preempt Platform is architected.
"Detection only solutions today are not enough. We needed a proactive solution to help us get ahead of threats. Preempt's approach of being able to adapt and automatically prevent threats based on identity, behavior and risk has provided tremendous value" said Grant Sewell, Head of Global Information Security at Scotts Miracle-Gro. "The ease of deployment and extensibility of its platform also helps enable us as we move to more cloud based applications and infrastructure."
At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a policy engine. These capabilities help to power the platform for delivering a scalable set of applications that help customers to prevent threats and support broad set of use cases. The applications include:
- Behavioral Firewall: real-time, automated and situational threat prevention and enforcement. Its goal is to detect, challenge and respond to threats and risky behavior without getting a security analyst involved.
- Any App: allows organizations to easily expand secure authentication to any on-premise or cloud application without additional development. Any App is vendor neutral and can complement and extend a typical MFA deployment from a variety of vendors.
- Insights: provides instant visibility into security posture enabling security teams to resolve risks and weaknesses before they are exploited. Insights can quickly find privileged accounts, use of shared accounts, use of unmanaged devices, weak or exposed passwords, or passwords that never expire.
- Threat Hunter: allows security analysts to proactively search raw events, detect and identify security events or further investigate reported events. It can also be used to find and eliminate threats such as administrative account lockouts, privilege escalation and failed logins.
Designed with an extensible architecture and centralized management, the Preempt Platform easily integrates with other security solutions to gain deeper context for threat detection and gain more threat enforcement options for stopping threats. No endpoint software agents are required, and installation is typically completed in a few hours, providing significant value on day one and increasing value over time for high impact and a low total cost of ownership.
To learn more about the Preempt Platform, visit: https://www.preempt.com/product/.
Source: Gartner, "Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats," Neil MacDonald, Felix Gaehtgens, 22 May 2017.
About Preempt Preempt protects organizations by eliminating insider threats and security breaches. Threats are not black or white and the Preempt Platform is the only solution that delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com.
Cook County Official Joins Cyber, DHS and National Security Leaders to Unveil First-Ever "Voting Infrastructure Security Plan"
, -- Today, DEFCON – the world's largest, longest running hacker conference – joined forces with the of Public Policy to host an event on cybersecurity and U.S. elections infrastructure. The event featured a panel of leaders from the cyber industry, the U.S. Department of Homeland Security (DHS), and the national security community. It also featured the release of an "Election Security Plan" authored by Noah Praetz, Director of Elections with the Clerk's Office.
Mr. Praetz's Election Security Plan represented the first-of-its-kind to be put forth by a local official since news broke that attempted to infiltrate voting networks in at least 21 U.S. states during the 2016 election. The plan outlines several strategies for stakeholders to better defend, detect, and recover from cyber threats aimed at voting equipment, systems, networks and databases. Specifically, it describes "a challenging, comprehensive, yet achievable list of actions" for both federal leaders to support the more than 9,000 voting jurisdictions around the country, as well as the responsibilities of state and local officials.
"This is a critical time when Americans need to be reassured that their vote is secure – and I am proud that my election administration colleagues at the state and local level are the ones serving valiantly on the front lines," said Praetz, underscoring the need for local action backed by federal support. "Like good servants, these officials will tell you they can continue to hold the line. But they need to be fortified by resources from the federal government, and they need guidance in terms of what line they even can hold."
Today's event comes at a time when leaders are increasingly referring to election security as a national security priority. In early 2017, the U.S. Department of Homeland Security designated elections as a critical infrastructure subsector, giving the federal government more authority to take action. from the DHS's Office of Cyber Security and Communications participated in the event, highlighting DHS's current role with the Elections Security Task Force. Less attention has been placed, however, on the perspectives of state and local officials.
"Recently, we've seen a groundswell of bipartisan national security and cyber leaders uniting to frame the problem and highlight what or other nefarious actors could do to our democracy," said Jake Braun, a cybersecurity lecturer at and DEFCON Voting Village representative who emceed the event. "Now its encouraging to see state and local leaders like Mr. Praetz – and many others who helped influence his plan – coming together to offer solutions. With the full funding and resources to do their job, there's no question they can better secure our democracy for 2018 and beyond."
The event, which was held at the historic International House on campus, represented the third in a series of high-profile events hosted by DEFCON to build awareness around cyber vulnerabilities facing our democracy. Earlier this year, in response to cyberattacks in 2016, DEFCON hosted a "Voting Village" demonstration at its annual conference in Vegas. The Village assembled 25+ pieces of election equipment – including voting machines and pollbooks still widely used in U.S. elections today – and made them accessible to 1000+ hackers who were encouraged to test the technology and expose cyber vulnerabilities for educational purposes.
A full report on the Voting Village's findings is available online.
New Report: Cyberattacks on Businesses Increased 23 Percent as 'New Mafia' Hits the Digital Streets in 2017
SANTA CLARA, Calif., Dec. 7, 2017 -- Malwarebytes™, the leading advanced malware prevention and remediation solution, today unveiled a report on the new age of organized cybercrime. It describes how this 'New Mafia' is accelerating the volume of attacks, sophistication and malice, which have increased 23 percent in 2017 versus 2016.
The New Mafia: Gangs and Vigilantes – A Guide to Cybercrime for CEOs, demystifies cybersecurity by drawing parallels between today's criminals and the Mafia gangs of the 1930s. This new generation of cybercriminals increasingly resembles traditional Mafia organizations, not just in their professional coordination, but their willingness to intimidate and paralyze victims. Malwarebytes' data confirms the capacity of these fast-maturing gangs to inflict greater damage on businesses.
- The average monthly volume of attacks in 2017 is up 23 percent versus 2016.
- Ransomware attacks in 2017 through October, have surpassed total figures for 2016 by 62 percent. In addition, there was an almost 2,000 percent increase in ransomware detections since 2015—rising to hundreds of thousands of detections in September 2017 from less than 16,000 in September 2015.
- Ransomware detections increased more than three-fold from 90,351 in January to 333,871 in October.
"The 'New Mafia', identified by our report, is characterized by the emergence of four distinct groups of cybercriminals: traditional gangs, state-sponsored attackers, ideological hackers and hackers-for-hire," said Marcin Kleczynski, CEO of Malwarebytes. "Through greater vigilance and a comprehensive understanding of the cybercrime landscape, businesses can support the efforts of legislators and law enforcement, while also taking action into their own hands."
The growth of cybercrime and a lack of clarity over how best to tackle it – particularly within the context of policing – is having a profound impact on victim confidence. Those affected by cybercrime are often embarrassed, resulting in a reluctance to speak out. This is true for consumers and businesses alike and can have dangerous ramifications as firms bury their heads in the sand instead of being open and working to reduce future incidents. The report suggests that the answer lies in engaging and educating the C-suite so that CEOs are as likely as IT departments to both recognize the signs of an attack and be able to respond appropriately.
"CEOs will soon have little choice but to elevate cybercrime from a technology issue to a business-critical consideration," said Kleczynski. "The most damaging cyberattacks to businesses are the ones that go undetected for long stretches of time. In spite of high-profile occurrences over the last year, this report shows that many business executives may still have some knowledge gaps to fill."
The report also looks at the future of cybercrime and the implications of the ongoing melding of our physical and digital worlds. It argues that the Internet of Things (IoT) will enable crime to come full circle, potentially enabling someone to be physically executed by digitally hacking their internet-enabled pacemaker. Thus, it suggests that our understanding of, and legislation against, cybersecurity must drastically improve. If we can imagine a pacemaker being hacked or an autonomous getaway car used in a robbery, we should be able to legislate against it.
Malwarebytes' analysis shows that, in spite of acknowledging the severe reputational and financial risks of cybercrime, many business leaders are largely underestimating their vulnerability to such attacks. The report concludes the potential for businesses and consumers to fight back by acting as 'vigilantes' through greater collective awareness, knowledge sharing and proactive defenses. This includes a shift from shaming businesses who have been hacked and instead engaging with them. Only then can we learn from one another how to tackle this rampant issue.
The complete The New Mafia: Gangs and Vigilantes – A Guide to Cybercrime for CEOs guide features original data and insight taken from a global panel of experts from a variety of disciplines including PwC, Leeds University, University of Sussex, the Centre for Cyber Victim Counselling in India and the University of North Carolina. To view the full report, visit https://go.malwarebytes.com/Cybercrime_NewMafia_PR.html.
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus solutions to remove the personal obstacles and business interruptions caused by modern cybersecurity threats. More than 10,000 businesses and millions of people trust Malwarebytes innovative machine-learning solutions and global team of researchers to identify emerging threats and to prevent and eradicate malware that antiquated security solutions miss and leave behind. For more information, please visit us at http://www.malwarebytes.com/.
Malwarebytes founder and CEO Marcin Kleczynski started the company to create the best disinfection and protection solutions to combat the world's most harmful Internet threats. Marcin was recently named "CEO of the Year" in the Global Excellence awards and has been named to the Forbes 30 Under 30 Rising Stars of Enterprise Technology list and the Silicon Valley Business Journal's 40 Under 40 award, adding those to an Ernst & Young Entrepreneur of the Year Award.
NEW YORK, Dec. 7, 2017 -- Dashlane, the award-winning password manager, and one of the world's most trusted digital security companies, today announced its second annual list of the "Worst Password Offenders." The rankings highlight the high-profile people and organizations that suffered the most significant password-related blunders of 2017.
While the violators on this list vary, they all showcase that common password mistakes can cause great embarrassment and economic loss, and that the aftermath of a breach can often be prevented. Most people make the same simple errors that these offenders made, such as using weak passwords or reusing passwords for multiple accounts. And, now that Equifax has exposed the data of nearly 150 million people, using a unique password for every account has become the duty of every person and business using the Internet.
Learn how to prevent common hacks here: http://blog.dashlane.com/year-of-the-hack
Dashlane's "Worst Password Offenders" of 2017, in order of rank:
1. Donald Trump: The President tops this year's list of offenders, and for good reason. As a person who has continually lamented the cybersecurity woes of his opponents, and trumpeted his own, his leadership in this area leaves much to be desired.
For starters, a January investigation by UK outlet Channel 4 News exposed that many of the top staff members Trump handpicked, including multiple cabinet secretaries, senior policy directors – even cybersecurity advisor Rudy Giuliani – were reusing unsecure, simple passwords. These passwords were used across multiple websites, as well as for their personal email accounts, and were believed to have been part of a slew of breaches that occurred between 2012 and 2016.
This revelation is not to be taken lightly, and signals that a president who touts his cybersecurity prowess may have added numerous cyber vulnerabilities to the nation's highest office. Trump also has direct connections to three of our other Top 10 offenders (Republican Party, Paul Manafort, Sean Spicer), which suggests he has never implemented proper cybersecurity protocols in any of his positions. Lastly, numerous Trump Organization websites were hacked this year, and a multitude of leading security experts questioned the security of his Twitter devices and accounts.
2. Equifax: The Equifax breaches of 2017 allowed cybercriminals to access the personal information of nearly 150 million people in the US, UK, and Canada. Pouring salt in the wound was the additional discovery by security researcher Brian Krebs that the company was using the username/password combination "admin/admin" for some of its online portals. Although the cause(s) of the breaches are still unknown, it's clear that Equifax's egregious password practices put the personal information of millions around the world at risk.
3. UK Government: A June investigation by The Times found that Russian hackers were trading thousands of passwords belonging UK government officials. Affected parties included MPs, parliamentary staff, and officials in the Foreign Office, including the head of IT. Most of the passwords were stolen from previous breaches, and because they remained unchanged after the breaches, the Russian hackers had easy access to their accounts. Perhaps the most concerning element of the report was that the most popular password for these officials was…you guessed it: "password."
In an unrelated December incident, multiple MP's Tweeted that they routinely share their passwords. They were defending a colleague they believe was falsely accused of an offense, but as security researcher Troy Hunt stated, the incident," …illustrates a fundamental lack of privacy and security education." Non-secure password sharing increases infosec risks and undoubtedly leaves these MP's, as well as Parliament, susceptible to a variety of cyber dangers.
4. Department of Defense: Defense contractor Booz Allen Hamilton left the Pentagon severely exposed by leaving critical files on a non-password protected Amazon server. Included in the exposed data were several unencrypted passwords that could have been used to access classified D.O.D. information.
5. Republican Party: One of the GOP's data analytics firms accidentally leaked the personal details of 198 million Americans – roughly the entire voting-age population. One cybersecurity expert described the leak as a "gold mine for anyone looking to target and manipulate voters." Much like the Pentagon hack, the firm was storing data on a non-password protected server.
6. Google: A wide-scale phishing attack in May compromised an unknown number of Google users' login credentials. The attack sent users to a real Google sign-in screen and captured their credentials when the user gave permission to a third-party app. Although Google swiftly resolved the issue, it highlights the password-related dangers that come with phishing attacks, as well as the need for extra vigilance by both users and companies regarding app access.
7. HBO: Your favorite Sunday night lineup provider was hit by a variety of hacks and breaches in 2017. These ranged from the leaks of episodes and stars' personal information, to the network's social media accounts getting hacked. Spoiler alert: HBO was treating cybersecurity lightly. After the litany of incidents, employees came forward with reports of terrible cybersecurity practices, including the reuse of passwords for personal and work accounts.
8. Imgur: The cause of this recent breach is still unknown, but the company admitted that at the time of the hack it was using an outdated algorithm to encrypt its users' passwords. Although it updated its encryption last year, the damage was already done as 1.7 million user passwords were potentially compromised.
9. Paul Manafort: Donald Trump's recently indicted campaign manager appears to be to a James Bond fan, as he was using 'Bond007' as his password for multiple personal accounts, including Dropbox and Adobe. The dangers of password re-use are real, and the fact that he and so many Trump associates are on this list is unsettling.
10. Sean Spicer: Remember him? The least critical incident on our list is still of note, as the former Press Secretary sent numerous Tweets of what appeared to be his very own passwords. His copying and pasting mistakes highlight the need for password managers that can automatically log you in, leaving no data stuck on the clipboard. Or podium.
Avoid Your Own Dishonorable Mention
It may seem easy to call out the unhealthy habits of public figures, but if you've found yourself committing any of the same cybersecurity sins as the offenders on our list, you are at risk too.
Here are the top three lessons to learn from the 2017 incidents:
1. Actually Use Passwords: This one seems obvious, but as our list shows, it's not always followed. Whether on a server, in an email account, or in an app, you should always secure your data with passwords as they're the first, and often only, line of defense between hackers and your personal information.
2. Use Strong Passwords: Never use passwords that are easy to guess, or that contain names, proper nouns, or things people can easily research about you. All of your passwords should be longer than eight characters and include a mix of random letters, numbers, and symbols. Use a password generator to think of them for you.
3. Never Reuse Passwords: Each and every one of your accounts needs a unique password. As our offenders underscored, the risk in password reuse is that hackers can use passwords from compromised accounts to easily access other accounts. The only protection against this is to have a different password for every account.
Password managers like Dashlane can help protect you on any device. In addition to creating unique strong passwords for all of your accounts, Dashlane ensures you're not reusing passwords for multiple accounts, alerts you when breaches occur, and lets you change your passwords automatically in one-click.
To learn more, visit dashlane.com.
Dashlane, one of the world's most trusted digital security companies, takes the pain out of passwords with its password manager and secure digital wallet app. Dashlane allows users to securely manage passwords, credit cards, IDs, and other important information via advanced encryption and local storage.
With so many devices, the line between home and work no longer exists. Thankfully, Dashlane works everywhere, for everyone. The company has helped 9 million consumers manage and secure their digital identity and enabled over $10 billion in e-commerce transactions. Dashlane Business is trusted by 7,000+ companies to create, enforce, and track effective access management, and features the only patented security architecture in the industry.
The Dashlane app is available on PC, Mac, Android, and iOS, and has won critical acclaim by top publications including The Wall Street Journal, The New York Times, and USA Today. Dashlane is free to use on your favorite device for life, and costs $39.99/year to sync between an unlimited number of devices.
Dashlane was founded by Bernard Liautaud and co-founders Alexis Fogel, Guillaume Maron and Jean Guillou. The company has offices in New York City and Paris, and has received $52.5 million in funding from TransUnion, Rho Ventures, FirstMark Capital and Bessemer Venture Partners. Learn more at Dashlane.com.
CohuHD Costar Awarded US$2.4 Million Surveillance Video Camera Contract for Major Critical Infrastructure Project in Saudi Arabia
CohuHD Costar, a Costar Technologies, Inc. company (OTC Markets Group: CSTI) announced today that it has been awarded a $2.4 million video surveillance camera contract for a major critical infrastructure project in Saudi Arabia. With the recent introduction of the RISE 4290HD series, CohuHD Costar expands the reach of its RISE series platform into long-range, day/night, thermal video surveillance applications. Working with one of the leading security solutions providers and systems integrators in the Middle East, the RISE 4290HD will provide 24/7 video surveillance for a major critical infrastructure project in Saudi Arabia. This large-scale deployment of RISE 4290HD cameras marks another important milestone for the RISE platform that requires the cameras to operate under extreme environmental conditions and at long distances.
"We're seeing increased demand for rugged cameras that can provide long-range video 24/7 in a variety of environmental conditions. The RISE 4290HD does this, and does it at a price point we believe makes it very attractive for applications such as critical infrastructure and intelligent traffic systems. We expect this project to be the first of many major security monitoring projects for the 4290HD around the world," stated Doug Means, Senior VP and GM of CohuHD Costar.
The RISE 4290HD Series dual-spectrum positioning system is the latest addition to CohuHD Costar's RISE family of products and has been awarded the 2017 GSN Airport, Seaport, Border Security Award for Best Long-Range/High-Res Camera by Government Security News. The RISE 4290HD Series combines crystal clear HD visible spectrum imaging along with standard resolution LWIR thermal night vision imaging.
The RISE 4290HD is designed to operate in harsh weather with its purged and pressurized IP67 enclosure protection to eliminate the effects of water intrusion, pollutants and corrosives. The ultra-rugged design of all CohuHD RISE products allows the company to offer a lifetime warranty against water ingress.
About Costar Technologies, Inc.
Costar Technologies, Inc. develops, designs, manufactures and distributes a range of security solution products including surveillance cameras, lenses, digital video recorders and high-speed domes. The Company also develops, designs and distributes industrial vision products to observe repetitive production and assembly lines, thereby increasing efficiency by detecting faults in the production process. Headquartered in Coppell, Texas, the Company's shares currently trade on the OTC Markets Group under the ticker symbol "CSTI". Costar was ranked 41 in a&s magazine's Security 50 for 2016. Security 50 is an annual ranking of the world's largest security manufacturers in the areas of video surveillance, access control and intruder alarms, based on financial performance.
Cautionary Statement Regarding Forward Looking Statements
This press release contains forward-looking statements, including but not limited to statements related to the demand for our products and future projects, that are subject to substantial risks and uncertainties that could cause actual performance or results to differ materially from those expressed in or suggested by the forward-looking statements. You can identify forward-looking statements by words such as "believe," "may," "estimate," "continue," "anticipate," "intend," "plan," "expect," "predict," "potential," or the negative of these terms or other comparable terminology. These forward-looking statements are based on management's current expectations but they involve risks and uncertainties. Actual results and the timing of events could differ materially from those anticipated in the forward-looking statements as a result of the risks and uncertainties.
You should not place undue reliance on any forward-looking statements. The Company assumes no obligation to update forward-looking statements to reflect actual results, changes in assumptions, or changes in other factors affecting forward-looking information, except to the extent required by applicable laws.
SOURCE Costar Technologies, Inc.
The Global Passenger Security Equipment Market Is Expected to Reach $79,042 Million in 2023, from $43,398 Million in 2016, Growing at a CAGR of 8.9% from 2017 to 2023
LONDON, Dec. 6, 2017 -- Passenger Security Equipment Market by Transport Infrastructure (Airports, Train Station, Bus Stations, and Seaports) and Type (Baggage Inspection System, Explosive Detection System, Video Surveillance, Intrusion Detection and Prevention System, Fire Safety & Detection System, People Screening Systems, and others) - Global Opportunity Analysis and Industry Forecast, 2017-2023
Download the full report: https://www.reportbuyer.com/product/5228628
The global passenger security equipment market is expected to reach $79,042 million in 2023, from $43,398 million in 2016, growing at a CAGR of 8.9% from 2017 to 2023. Passenger security refers to a technique, which helps them protect from accidentals harms, crimes, and other threats. Such procedures help the government to avoid any crimes and allow passengers to travel from one place to another without any harm. Honeywell International, Orbocomm, and L-3 Communications are some of the leading key players of the passenger security equipment market.
Increase in terror attacks on public transport infrastructures drives the passenger security equipment market growth. Further, rise in demand of biometrics technologies for identity verification by the government also fuels the market growth. However, high installation cost is anticipated to hinder the passenger security equipment market during the forecast period.
Based on type, the global passenger security equipment market is categorized into baggage inspection system, explosive detection system, video surveillance, intrusion detection and prevention system, fire safety & detection system, people screening systems, and others. The people screening systems segment dominated the global passenger security equipment market, in terms of revenue, and is expected to maintain this trend.
Honeywell International, Orbocomm, L-3 Communications, Kapsch, Siemens AG, Rapiscan Systems, Rockwell Collins, Safran Group, Raytheon Group, and Smiths Group are some of the leading key players of global passenger security equipment market.
KEY MARKET SEGMENTS
BY TRANSPORT INFRASTRUCTURE
Baggage Inspection System
Explosive Detection System
Intrusion Detection and Prevention System
Fire Safety & Detection System
People Screening Systems
Rest of Europe
Rest of Asia-Pacific
The other players in the value chain include (profiles not included in the report):
Download the full report: https://www.reportbuyer.com/product/5228628
Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers
For more information:
Research Advisor at Reportbuyer.com
Email: [email protected]
Tel: +44 208 816 85 48
Elbit Systems Ltd. (NASDAQ: ESLT and TASE: ESLT) ("Elbit Systems") announced today that it was selected by the Israeli Ministry of Defense (IMOD) to provide and operate flight simulators for the upgraded C-130H and C-130J transport aircraft of the Israeli Air Force (IAF). The contract value will be in an amount of $74 million dollars for a thirteen-year period which includes a set up phase of approximately three years and a ten-year operating period.
Elbit Systems will set up and operate the IAF upgraded C-130H and C-130J training center, providing two inter-connected flight simulators that enable both single and squadron training and a ground crews simulator that enables high fidelity training of aircraft maintenance procedures.
Yoram Shmuely, General Manager of Elbit Systems Aerospace Division, commented: "We are proud to have been selected by the IMOD, especially since it comes on the heels of the successful completion of the upgrade program of the IAF's C-130H aircraft fleet. This is yet another example of Elbit Systems' technological and operational leadership in the training and simulation field and attests to the growing demand in many countries for all-inclusive interconnected simulation platforms, that enhance the quality of training while reducing flight hours".
About Elbit Systems
Elbit Systems Ltd. is an international high technology company engaged in a wide range of defense, homeland security and commercial programs throughout the world. The Company, which includes Elbit Systems and its subsidiaries, operates in the areas of aerospace, land and naval systems, command, control, communications, computers, intelligence surveillance and reconnaissance ("C4ISR"), unmanned aircraft systems, advanced electro-optics, electro-optic space systems, EW suites, signal intelligence systems, data links and communications systems, radios and cyber-based systems. The Company also focuses on the upgrading of existing platforms, developing new technologies for defense, homeland security and commercial applications and providing a range of support services, including training and simulation systems.
For additional information, visit: www.elbitsystems.com , follow us on Twitter or visit our official Youtube Channel
This press release contains forward-looking statements (within the meaning of Section 27A of the Securities Act of 1933, as amended and Section 21E of the Securities Exchange Act of 1934, as amended) regarding Elbit Systems Ltd. and/or its subsidiaries (collectively the Company), to the extent such statements do not relate to historical or current fact. Forward-looking statements are based on management's expectations, estimates, projections and assumptions. Forward-looking statements are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995, as amended. These statements are not guarantees of future performance and involve certain risks and uncertainties, which are difficult to predict. Therefore, actual future results, performance and trends may differ materially from these forward-looking statements due to a variety of factors, including, without limitation: scope and length of customer contracts; governmental regulations and approvals; changes in governmental budgeting priorities; general market, political and economic conditions in the countries in which the Company operates or sells, including Israel and the United States among others; differences in anticipated and actual program performance, including the ability to perform under long-term fixed-price contracts; and the outcome of legal and/or regulatory proceedings. The factors listed above are not all-inclusive, and further information is contained in Elbit Systems Ltd.'s latest annual report on Form 20-F, which is on file with the U.S. Securities and Exchange Commission. All forward-looking statements speak only as of the date of this release. The Company does not undertake to update its forward-looking statements.
Elbit Systems Ltd., its logo, brand, product, service and process names appearing in this Press Release are the trademarks or service marks of Elbit Systems Ltd. or its affiliated companies. All other brand, product, service and process names appearing are the trademarks of their respective holders. Reference to or use of a product, service or process other than those of Elbit Systems Ltd. does not imply recommendation, approval, affiliation or sponsorship of that product, service or process by Elbit Systems Ltd. Nothing contained herein shall be construed as conferring by implication, estoppel or otherwise any license or right under any patent, copyright, trademark or other intellectual property right of Elbit Systems Ltd. or any third party, except as expressly granted herein.
Raytheon and Pivotal to accelerate cloud migration and speed software development for the Federal Government
SAN FRANCISCO, Dec. 5, 2017 -- Raytheon Company (NYSE: RTN) and Pivotal Software, Inc., today announced that Raytheon has joined the Pivotal Ready Partner Program to assist the Department of Defense to develop software capabilities to more rapidly bring new technology to the military. The agreement establishes an important relationship that will help the DoD migrate legacy applications to the cloud and accelerate software development and delivery timelines.
"This partnership marks the end of 'business as usual' for defense contractors," said Todd Probert, vice president of mission support and modernization at Raytheon Intelligence, Information and Services. "The software enabled battlefield of the future demands new tools for the modern warfighter. Raytheon's deep mission knowledge and expertise in systems and software combined with Pivotal's innovative processes, tools and speed will change the way our military harnesses the power of technology."
Pivotal Cloud Foundry brings a software-led digital transformation to its customers. Through its cloud-native platform, Pivotal has helped hundreds of commercial customers, and recently the DoD, modernize their legacy systems, significantly improving delivery time and generating millions in cost savings.
"Today we are seeing government organizations embrace software as a strategic asset to rapidly respond to change, and Pivotal is helping enable that shift," said Nick Cayou, vice president, global alliances at Pivotal. "Since moving at startup speed is on the minds of every government organization, the collaboration between Pivotal and Raytheon will help customers drastically improve cycle time and go from idea to production software in days and weeks, not months and years."
About Pivotal Software, Inc. Pivotal's cloud-native platform drives software innovation for many of the world's most admired brands. With millions of developers in communities around the world, Pivotal technology touches billions of users every day. After shaping the software development culture of Silicon Valley's most valuable companies for over a decade, today Pivotal leads a global technology movement transforming how the world builds software.
About Raytheon Raytheon Company, with 2016 sales of $24 billion and 63,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 95 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Massachusetts. Follow us on Twitter.