April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Company News

Precise BioMatch Mobile integrated in smartphone from South Korean vendor

February 22 - Precise Biometrics’ product for fingerprint recognition in mobile devices, Precise BioMatch™ Mobile, has through cooperation with Fingerprint Cards (FPC) been integrated in a new smartphone from a South Korean vendor.

The integration will generate royalty revenue starting from the first quarter 2016. Royalty revenues are based on the number of sensors FPC delivers to the mobile phone manufacturer and cannot be forecasted at this point.
”We are very pleased that this South Korean vendor has chosen to switch algorithm solution from a local supplier to Precise BioMatch Mobile. It is a sign of strength of our technology and confirms that we offer the best performance for fingerprint recognition. Precise Biometrics fingerprint software is now integrated in products from 30 vendors and has become the preferred choice to ensure a superior user experience and secure identity verification on mobile devices”, says Håkan Persson, CEO of Precise Biometrics.

Precise BioMatch Mobile is the industry leading algorithm solution for convenient and secure fingerprint recognition on smartphones and tablets. The unique and patented hybrid algorithm solution is optimized for small fingerprint sensors and platforms with limited processing power and memory space. Precise BioMatch Mobile offers fast, accurate, and secure verification of user’s identity, creating a convenient user experience when unlocking mobile devices or authenticating to services.

Precise Biometrics is a market-leading provider of solutions that prove people's identities through smart cards and fingerprint recognition. The company´s products can be used for ID, enterprise and bank cards as well as access to mobile solutions, computers and networks. Precise Biometrics serves business and government organizations throughout the world and its products are licensed to close to 160 million users. 

ICAO and ACI to enhance cooperation on airport security

Dr. Fang Liu, ICAO and Angela Gittens, ACI 

Montreal, February 29 - ICAO and Airports Council International (ACI) have announced a new agreement aimed at reinforcing cooperation on airport security.

The new Memorandum of Understanding (MOU) will see the UN aviation agency working more closely with ACI towards the objectives of ACI’s Airport Excellence (APEX) in Security programme, including working together to deliver security reviews, technical assistance, programmes for airport personnel training and the enhancement of regional partnerships.

“This new agreement establishes a framework for cooperation which will help to improve airport security worldwide,” explained ICAO’s Secretary General, Dr. Fang Liu. “ICAO very much appreciates ACI’s proactive leadership on all aspects of effective airport operation, and by improving our cooperation we can better ensure that international airports remain suitably secure and efficient, and have the necessary tools for driving increased economic development and global connectivity.”

The APEX in Security programme is designed to help airports identify and address security vulnerabilities through a peer review process that offers advice on best practices and identification of areas for improvement. The ultimate aim of the programme is to promote more secure airport operations worldwide.

“I would like to thank Dr. Liu and ICAO for their unwavering support of APEX,” said ACI World Director General Angela Gittens. “ACI and ICAO are fully aligned in our belief that a sustainable, successful aviation industry is built upon a foundation of safety and security. With this signing we lay the groundwork to further strengthen that foundation.

Industrial Networks launches rail automation drone

Since 2005, Industrial Networks (INet) has transformed the rail industry for shippers and provided tools to automate the complete process of rail and truck shipping. INet’s stationary and mobile Automated Equipment Identification (AEI) readers provide pivotal rail and truck shipment management for control over in-plant operations. This automation reduces the occurrence of errors and improves overall productivity for shippers across North America.

In late 2015, INet applied for exemption to Section 333 of the FFA Reform Act in the railcar inspection and inventory market space and began testing a new drone AEI reader, the INet Rail Automation Drone (IRAD1), which will change the face of railyard automation once again. It’s a bold plan that requires safety testing and FAA approvals, but will give rail shippers a greater amount of flexibility in their railyards. The IRAD1 will be capable of fully autonomous scanning of the railyard for inventory and inspection of a railcar. Built into the drone is an elaborate collision detection and avoidance system to help avoid objects in the flight path and reinforce safety. Research shows these sophisticated systems are highly effective. This tool gives the IRAD1 the ability to be a completely autonomous AEI scanner. This will lead to faster data collection and help the business reduce workforce requirements.

INet’s current collection of AEI-scanning tools includes stationary and handheld readers and automates data collection in the field. This is critical in alleviating manual data entry errors and expediting the turnaround of railcars within a facility. The addition of the IRAD1 to INet’s arsenal of AEI-scanning tools helps the customer create a work environment that is specific for their business.

“Advancement in drone technology has allowed Industrial Networks to explore what we feel is the future of rail automation,” said Jimmy Finster, president of Industrial Networks. “We are continuously researching new and innovative ways to help our customers improve their operations and streamline their daily processes.”

CACI tests innovative drone detection system at Atlantic City airport

Steve Bittenbender

Defense contractor CACI made headlines late last year when it unveiled a system that detected and tracked unmanned aircraft that ventured into protected airspace. Now, the company has announced the completion of a proof-of-concept pilot for the technology.

CACI deployed its SkyTracker system at Atlantic City International Airport for a one-week test earlier this year, marking the first time ever such a system was deployed at a commercial airport. Engineers from the Department of Homeland Security, the Federal Aviation Administration and the University of Maryland helped evaluate the project, in which more than 140 tests were conducted, and will help compile a report that’s due this summer.

“SkyTracker successfully identified, detected and tracked (unmanned aircraft) in flight, and precisely located drone ground operators, all without interfering with airport ground operations,” said CACI COO John Mengucci, who also serves as president for the company’s operations in the United States. “We are very proud to partner with the FAA and DHS to help ensure national airspace safety from the escalating UAS threat.”

As the number of people owning drones has increased, so too have the number of incidents where the unmanned crafts have been flying in restricted areas. Authorities have charged operators who crashed their drones into large buildings and sports stadiums.

Drones are even encroaching upon airports at an alarming rate. In 2014, pilots reported 238 instances where a drone flew in the vicinity of an airplane approaching an airport to the Federal Aviation Administration. In June and July of 2015, there were 275 such reports.

Now, the FAA says they receive at least 100 reports from pilots every month. That’s why the administration was willing to partner with CACI on the proof-of-concept demonstration.

“The explosive growth of the unmanned aircraft industry makes evaluating detection technologies an urgent priority,” said Marke “Hoot” Gibson, a senior advisor to the FAA on UAS Integration. “This research is totally aimed at keeping our skies safe, which is our number one mission.”

It’s also why the FAA brought in DHS officials as well. The two agencies finalized an agreement late last year to collaborate on ways of protecting the skies from those who seek to use drones for criminal or terroristic purposes.

"Working with the FAA, the DHS Science and Technology Directorate is proud to provide our expertise in testing and simulation of technologies to better address the safety and security challenges posed by unmanned aerial systems,” said DHS Deputy Under Secretary for Science and Technology Robert Griffin.

Company officials say SkyTracker can be used to protect other assets, such as government buildings, stadiums and military bases as it provides 24/7 monitoring in any type of weather. Besides identifying the location of the drone, the system also allows operators to pinpoint the whereabouts of the drone operator, without interfering with other communications and electronics systems.

Beyond the pilot project in Atlantic City, CACI also showcased the SkyTracker system at the Armed Forces Communications and Electronics Association West Conference and Expo in San Diego in mid-February. The AFCEA conference brings together active-duty military personnel, government officials and industry contractors to demonstrate products and discuss trends and issues primarily affecting the Navy.

DB Networks adds real-time compromised credential identification capabilities to DBN-6300 and Layer 7 database sensor products

San Francisco, February 29 - RSA Conference 2016, Booth No. 607 South Hall -- DB Networks®, a leader in database cybersecurity, today announced industry-first capabilities to non-intrusively identify compromised credentials in real-time by uniquely applying machine learning and behavioral analysis to every database communication. This powerful new feature is now available in its DBN-6300 and Layer 7 Database Sensor products.

Many high profile database breaches have resulted from the abuse of legitimate logon credentials. Identifying these apparent "insider threats" requires a new approach. Those who were once considered trustworthy may have lost their credentials to an attacker and are now posing an insider threat. This is why identifying compromised credentials in real-time has proven elusive until now. The situation has changed, and so must the mechanisms to mitigate the risk.

Rather than inherently trusting specific clients, servers or users, the new approach identifies normal business flows and evaluates the risk and business context of any deviation. Doing this accurately and in real-time requires deep protocol analysis on large amounts of database communications to detect when an entity demonstrates a new behavior – indicative of an attacker using stolen credentials.

The cyber criminals' primary goal is to obtain privileged logon to gain access to sensitive and valuable data. Once the attacker has obtained the proper credentials they can pose as the privileged insider and breach the databases. At that point they can access sensitive assets and setup a channel to exfiltrate an entire data set to an off-site server.

"Databases are the organizations 'crown jewels' and compromised database credentials are essentially the 'keys to the kingdom' for attackers," said DB Networks' Chairman and CEO Brett Helm. "Through the unique application of machine learning and behavioral analysis, DB Networks is now able to immediately identify stolen credentials so that a data breach can be stopped in its tracks."

Once a compromised credential is identified it's critical to understand the scope of the incident. DB Networks assists security professionals with a security search tool to enable them to easily investigate any suspicious activity in the database tier. This powerful capability is extremely useful to understand the scope of activity that resulted from compromised credential.

For a personal demonstration of DB Networks' products and the opportunity to meet with members of the team, visit the company at the RSA Conference 2016 -- front row booth #607 South Hall at the Moscone Center in San Francisco from Feb. 29 - March 3. Or see DB Networks at the HIMSS 16 Conference & Exhibition -- booth #9908-13 at the Venetian Palazzo Sands Expo Center in Las Vegas from Feb. 29 - March 4.

About DB Networks®

DB Networks innovates database cybersecurity products. Its customers include the world's largest financial institutions, healthcare providers, manufacturers, and governments. DB Networks technology non-intrusively assesses database infrastructures through deep protocol extraction, machine learning, and behavioral analysis. Customers gain insights by discovering all active databases, identifying tables being accessed, and the specific applications accessing the databases. In addition, analyzing application database access that deviates from the model of normal application behavior immediately identifies database attacks. DB Networks is a privately held company headquartered in San Diego, Calif.

PSI names Jerry Ambrosh chief business development officer

Arlington, VA, February 29 - Planned Systems International, Inc. (PSI), a leading provider of information technology (IT) solutions and services for the federal government, announced the appointment of Jerry Ambrosh as Chief Business Development Officer. 

Ambrosh will be responsible for building a pipeline of opportunities, researching and qualifying new business targets, and establishing long-term partnerships across all federal departments and agencies. 

Prior to joining PSI, Ambrosh spent nearly two decades establishing rapid growth in Commercial and Federal Healthcare IT sectors, serving as Executive VP and VP for several companies focused on delivering Healthcare IT solutions to the Defense Health Agency and Department of Veteran Affairs. Ambrosh has an impeccable record of generating high percentage growths through building trusted relationships with his customers and partners.       

“Jerry brings solid healthcare experience and a stellar record of success to PSI,” said CEO, Terry Lin. “He is a tremendous asset to the PSI team, and will be instrumental in driving growth and market expansion of the solutions our Government customers expect from us.”

About Planned Systems International, Inc.

Founded in 1988, PSI is a CMMI-DEV Level 3, CMMI-SVC Level 3, ISO® 9001:2008, ISO®/IEC 20000-1:2005, ISO® 27001:2005, and ISO® 14001:2004-certified enterprise IT solutions and management consulting services provider specializing in Health IT and Data Integration & Analyses. PSI has a stellar record of past performance and award-winning experience, and core capabilities in the following areas:  Requirements Gathering & Design; Enterprise Architecture & Design; Software Development & Maintenance; Systems Integration; Testing Services; Web & SharePoint Development; Cloud Computing; E-Learning - Instructional Design & Delivery; Service Delivery & Customer Care; Medical Modeling & Simulation; Big Data Analytics & Business Intelligence; Mobility Systems; Theatre Systems Support, and Advisory & Assistance Services.

The company has earned a solid reputation for applying state-of-the-art technologies and the industry's most successful methodologies to support business solutions for the Defense Health Agency (DHA), Veterans Affairs (VA), U.S. Air Force, U.S. Army, Department of Homeland Security (DHS), Department of Health and Human Services (DHHS), Corporation for National and Community Services (CNCS), U.S. Department of Agriculture (USDA), and many other Government clients.

NICE Actimize and Matrix-Exzac Announce a Professional Services Partnership to Meet Growing Demand for Regulatory Compliance Solutions

Joe Friscia, NICE Actimize

New York, NY, February 29 - NICE Actimize, a NICE Systems business and the largest and broadest provider of a single financial crime, risk and compliance software platform for the financial services industry, and Matrix-Exzac, a leading global provider of financial crime prevention and compliance solutions and services, have announced a professional services partnership that will expand the geographical reach of NICE Actimize’s financial crime solutions, including anti-money laundering, enterprise fraud, enterprise risk case management and financial markets compliance solutions.

Matrix-Exzac has more than ten years’ experience in delivering NICE Actimize compliance solutions to financial institutions. By extending this relationship, the partnership provides expanded options for NICE Actimize clients seeking to address global challenges in managing regulatory compliance requirements. The partnership extends a range of expert professional services to new and existing NICE Actimize clients and broadens available support to include full implementation lifecycle support and comprehensive managed services.

“NICE Actimize and Matrix-Exzac have enjoyed a long-term relationship which we look forward to moving to the next level, bringing even greater managed services and delivery options to our global customers,” says Joe Friscia, President, NICE Actimize. “This partnership further enables us to increase our market presence, while providing an even greater level of service to our growing customer base around the world.”

“Since its inception ten years ago, Matrix-Exzac has been implementing NICE Actimize solutions, delivering more than 100 successful projects during that time,” says Renan Levy, CEO, Matrix-Exzac. “This partnership deepens the scope of benefits we can provide to financial institutions worldwide in their quest to efficiently reduce the impact of financial crime on both their institutions and the customers they serve.”

Matrix-Exzac currently implements out-of-the-box NICE Actimize solutions and configures them to meet the unique technological and regulatory requirements for each customer. Matrix-Exzac also incorporates the customer-side elements of the program, including data analysis, data quality assurances, model validation, optimization of customer tests and more, to ensure that each system is well-matched to each institution’s needs.

About Matrix-Exzac:

Matrix-Exzac is a leading global provider of financial crime prevention and compliance solutions and services with a full range of solutions and services to ensure financial compliance and minimize fraud risk across multiple solution platforms. More than 50 top-tier financial institutions rely on Matrix-Exzac solutions to architect, implement and manage day-to-day operation of their compliance and fraud prevention programs. Matrix-Exzac is a division of Matrix IT Ltd, which has global presence with offices in the US, UK, Israel, Eastern Europe, China, and Hong Kong, and over 6,500 employees. Matrix-Exzac U.S. headquarters is located in Jersey City, NJ.

About NICE Actimize

NICE Actimize is the largest and broadest provider of financial crime, risk and compliance solutions for regional and global financial institutions, as well as government regulators. Consistently ranked as number one in the space, NICE Actimize experts apply innovative technology to protect institutions and safeguard consumers and investors assets by identifying financial crime, preventing fraud and providing regulatory compliance. The company provides real-time, cross-channel fraud prevention, anti-money laundering detection, and trading surveillance solutions that address such concerns as payment fraud, cybercrime, sanctions monitoring, market abuse, customer due diligence and insider trading. 

About NICE Systems

NICE Systems is the worldwide leading provider of enterprise software solutions that empower organizations to make smarter decisions based on advanced analytics of structured and unstructured data. NICE solutions help the world’s largest organizations deliver better customer service, ensure compliance, combat fraud and safeguard citizens. Over 25,000 organizations in more than 150 countries, including over 80 of the Fortune 100 companies, are using NICE solutions. 

CenturyLink secures GSA Networx contract extension

Washington, February 29 - CenturyLink, Inc. (CTL) recently secured a three-year extension of its product offerings that are available to federal government agencies via the General Services Administration (GSA)'s Networx program. 

CenturyLink's Networx Universal and Enterprise contracts were originally scheduled to expire in spring 2017. The company's Networx Universal contract has been extended through the end of March 2020 and its Networx Enterprise contract has been extended through end of May 2020. Both extensions feature a one-year base period with two one-year options.

GSA's Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. The three-year extensions of CenturyLink's contracts will give federal agencies time to transition services to GSA's Enterprise Infrastructure Services (EIS) acquisition, currently an active procurement. 

By supplying cloud and managed hosting services over its carrier-class network, CenturyLink is able to provide government agencies with the security and reliability they need to carry out their missions.  

"We're pleased that GSA has approved CenturyLink's Networx contract extensions, which will help federal agencies make a smooth transition from Networx to GSA's new EIS contract vehicle," said CenturyLink Senior Vice President and General Manager Tim Meehan, who leads the company's federal government team.

CenturyLink is ranked No. 37 on Washington Technology's 2015 Top 100 list of federal government IT contractors.

About CenturyLink

CenturyLink (CTL) is a global communications, hosting, cloud and IT services company enabling millions of customers to transform their businesses and their lives through innovative technology solutions. CenturyLink offers network and data systems management, big data analytics and IT consulting, and operates more than 55 data centers in North America, Europe and Asia. The company provides broadband, voice, video, data and managed services over a robust 250,000-route-mile U.S. fiber network and a 300,000-route-mile international transport network. 

Dashlane First Password Manager to Support FIDO U2F with YubiKey Authentication

New York and Palo Alto, CA, February 29 - Dashlane, an award-winning password manager, today announced support for the FIDO Alliance Universal Second Factor (U2F) standard, and a new partnership with Yubico that provides YubiKey U2F two-factor authentication for the Dashlane platform. Support for the FIDO standard and the YubiKey means consumers and enterprises can pair Dashlane with YubiKeys for the highest level of security and convenience.

"When combined with YubiKey, Dashlane provides a simple way to completely secure passwords that is unrivaled in the industry."

Dashlane – The First Password Manager to Implement U2F

"Dashlane has taken a strong position on security by supporting U2F and YubiKey," said Dashlane CEO Emmanuel Schalit. "Cyber-attacks and hacking are an unfortunate reality of the world we live in, and the fear of being hacked is on everyone's mind. Dashlane is proud to be part of such a groundbreaking and innovative endeavor to pioneer easy-to-use technology that protects consumers and enterprises alike."

"With U2F, the future of strong authentication is here today, based on open standards, and leveraged by easy-to-use, affordable devices like the YubiKey," said Stina Ehrensvard, CEO and Founder of Yubico. "Not only is this technology incredibly secure, but it is also incredibly simple. With the YubiKey and U2F, a user simply inserts the device into a USB port when prompted and taps the YubiKey to securely authenticate.  That's really all there is to it."

Dashlane is the first consumer product that implements U2F outside of a browser. This ability to quickly authenticate is what makes the Dashlane-YubiKey pairing so attractive to users. Once a user populates a password form with Dashlane they will be prompted to press their YubiKey to authenticate. This simple second authentication step ensures that the user, in fact, has control of their account and that malware or other malicious software is not trying to gain access.

Dashlane Power. YubiKey Convenience. U2F Security.

The FIDO (Fast Identity Online) Alliance is an industry association launched in 2013 with the aim to address password authentication problems that are systemic in the technology industry. The FIDO U2F standard is catching fire as the protocol that defines strong authentication and helps protect against modern hacker techniques prevalent in our breach-filled world.

Yubico's YubiKey is a USB hardware authentication device implementing multiple protocol support, including the new open FIDO U2F standard.  With a simple touch, the YubiKey executes a public and private key exchange, successfully authenticating the user into the Dashlane platform.

Pairing YubiKey's U2F two-factor authentication with Dashlane is simple:

  • Easy to Use – The combination can be used "out-of-the-box." This allows for instant authentication to a number of services, with no codes to re-type, and no drivers to install.
  • Strong Security – Dashlane with YubiKey and U2F two-factor authentication uses public key cryptography.  Native in-browser support protects against phishing, session hijacking, man-in-the-middle attacks, and malware compromises.
  • Guaranteed Privacy – The pairing allows users to choose, own, and control their secure online identity. Users also can opt to have multiple identities, including anonymous profiles. A U2F device generates a new pair of keys for every service, and the public key is only stored on the specific service to which it connects. With this approach, no secrets are shared among service providers.

About Dashlane

Dashlane makes identity and payments simple with its password manager and secure digital wallet app. Dashlane allows its users to securely manage passwords, credit cards, IDs, and other important information via advanced encryption and local storage.

Dashlane has helped over 4 million users manage and secure their digital identity, and has enabled over $4.5 billion in e-commerce transactions. The app is available on PC, Mac, Android, and iOS, and has won critical acclaim from top publications, including: The New York Times, The Wall Street Journal, and USA Today.

Dashlane is free to use on one device and Dashlane Premium costs $39.99/year to sync between an unlimited number of devices. Dashlane was founded by Bernard Liautaud and co-founders Alexis Fogel, Guillaume Maron, and Jean Guillou. The company has offices in New York City and Paris, and has received $30 million in funding from Rho Ventures, FirstMark Capital, and Bessemer Venture Partners.

About Yubico

Yubico sets new world standards for simple, secure login, preventing unauthorized access to computers, servers, and internet accounts.

Supporting multiple authentication and encryption protocols on all devices and platforms, YubiKeys protect access to user accounts for the world's largest enterprises with a simple touch, and with no driver or client software needed. Yubico is a leading contributor to the FIDO Universal 2nd Factor open authentication standard, and Yubico's technology is used, and loved, in more than 150 countries.

Founded in 2007, Yubico is privately held with offices in Palo Alto (California), Seattle (Washington), Stockholm (Sweden), and London (UK).  

Abine's new Blur for android beta: Mobile security for your passwords, payments and privacy

Boston, MA, February 23 - Abine, the online privacy company, today announced its new Blur password manager for Android (also available for iOS). Blur is the only password manager in the world that includes privacy protection and a digital wallet for fast, secure virtual (tokenized) e-commerce credit card payments. 

The Blur App for Android devices enables anyone to create tough-to-crack passwords, spam-free email addresses and private virtual credit cards through their default browser and even from inside their favorite mobile Apps.  For example, Samsung Galaxy owners get password management and secure wallet payments directly inside of most Android Apps such as Uber, DropBox, Facebook, Amazon, Flipboard, WhatsApp, Minecraft and many more. 

"The new capabilities of Blur for Android are critical because to secure mobile Apps and mobile shopping/commerce "m-commerce " it is important to be able to work seamlessly with the most-used Apps and mobile browsers," said Andrew Sudbury, Abine CTO.

Consumers who use the full capabilities of Blur for registering new accounts and for shopping online are virtually impervious to threats from data breaches, cyber thieves and hackers.  Blur helps people easily mask their identities using secure, unique credentials that cannot be correlated across different web sites or online activities.  With Blur, the days when identities could be stolen online and then re-used across services are a thing of the past. 

Blur's same unique capabilities that protect people's identities also protect individual privacy.  When using Blur, marketers, ad networks and other data brokers cannot easily and silently track everything consumers do online.  Online privacy is especially important for iPhone and Android users whose geolocations and identity information are intimately tied to their mobile phones. 

Blur comes in free and premium version. Blur Premium costs about $3 per month and includes a dedicated private phone number, unlimited new Masked Credit Cards and the ability to add and sync unlimited mobile devices to an account for one subscription price. 

About Abine 

Online privacy company Abine is the creator of Blur, the only password manager and digital wallet that protects passwords, payments and privacy. Abine's solutions have been trusted by over 25 million people worldwide.



Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...