Market Sectors

block 10

<p>1</p>

Homepage

XL Catlin and RedSeal Launch Cyber Insurance Industry’s First Dynamic Measure of Resilience to Gauge Risk, Improve Cybersecurity and Insurance Terms

NEW YORK, March 27, 2018 XL Catlin and RedSeal today announced a new, dynamic approach to cyber insurance, which uses an objective measurement of a network’s resilience to help underwriters more thoroughly evaluate their clients’ risks over time, helps clients continue to improve their cybersecurity and potentially improve their insurance terms.

Unlike other cyber insurance risk analyses, which rely on surveys and a general understanding of the network at the time of the initial underwriting, XL Catlin’s approach offers its clients a more accurate, dynamic and helpful service.

RedSeal’s patented network modeling and risk scoring platform creates a network model from the inside out, including physical assets, as well as those in public and private cloud environments. With this insight, RedSeal calculates the Digital Resilience Score, a holistic measure of the network’s resilience, similar to a credit worthiness score. The Score evaluates the client’s network to determine:

  • How weaknesses from incorrectly configured devices and third-party software could impact the network;
  • How accessible a company’s valuable assets are to attackers; and
  • The degree to which the network – including all its devices and their connections – is understood.

More resilient networks deliver higher scores, which means they are potentially lower risks. Once an XL Catlin client installs RedSeal and gets their initial Digital Resilience Score, and again during a mid-term evaluation, XL Catlin will determine if the client’s resilience warrants improved terms.

“We see this collaboration as a win-win for all involved,” said John Coletti, chief underwriting officer, cyber and technology, XL Catlin. “We’re giving our clients the option to create a cycle of continuous improvement in their cyber security efforts. Plus, our underwriters have more in-depth information to evaluate their risk and provide the most appropriate policy terms and pricing – and our customers can use the same information to improve their resilience and lower their risk.”

“The cyber insurance industry is evolving quickly, and technology companies are working to provide useful, data-driven solutions that matter,” said Ray Rothrock, CEO and chairman of RedSeal. “RedSeal’s platform of network modeling and scoring provides unique insights and hard to find issues within digital enterprises for both XL Catlin’s underwriters and their clients, which we expect will benefit both. We’re enabling a new, collaborative era in cyber insurance and cybersecurity.”

For more information on the joint offering from XL Catlin and RedSeal visit www.redseal.net/solutions/cyber-insurance/clients-and-brokers.

About XL Catlin’s Insurance Operations
XL Catlin insurance companies offer property, casualty, professional, financial lines and specialty insurance products globally. Businesses that are moving the world forward choose XL Catlin as their partner. To learn more, visit xlcatlin.com.

About XL Catlin
XL Catlin is the global brand used by XL Group Ltd (NYSE:XL) insurance and reinsurance companies which provide property, casualty, professional and specialty products to industrial, commercial and professional firms, insurance companies and other enterprises throughout the world. Clients look to XL Catlin for answers to their most complex risks and to help move their world forward. To learn more, visit xlcatlin.com.

About RedSeal
RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprises to be resilient to cyber events across public cloud, private cloud and physical network environments. RedSeal helps customers understand their network from the inside out – providing actionable intelligence, situational awareness and a Digital Resilience Score to help enterprises measure and improve their resilience. Government agencies and Global 2000 companies around the world rely on RedSeal to help them validate their overall security posture, accelerate investigation and improve the productivity of their security and network teams. Founded in 2004, RedSeal is headquartered in Sunnyvale, California.

HID Global Launches Risk Management Solution for Identity & Access Management with Artificial Intelligence and Machine Learning Capabilities

HID Global®, a worldwide leader in trusted identity solutions, today introduced a new cyber threat and fraud detection service that brings artificial intelligence (AI) and machine learning to identity & access management, addressing the rising incidents of cyber attacks, especially against financial institutions.  The new HID Risk Management Solution is a real-time risk profiling technology that uses data analytics to protect financial transaction systems and banking applications against cybercriminals.  HID will demonstrate the new IAM solution at the RSA Conference 2018 in San Francisco next month (HID booth #4127 North). 

The ever-changing threat landscape that makes it more challenging to secure online and mobile financial applications has created an urgent need to improve the detection of fraud and cyber attacks and accelerate the prevention of costly damage.  The new HID Risk Management Solution meets this need by combining evidence-based detection capabilities and behavioral biometrics, supported by machine learning.  This HID cyber security solution is designed to protect banks, online merchants and service providers against zero-day malware, account takeover, phishing attacks and bots, among other threats.

“The HID Risk Management Solution gives businesses and consumers a new defense against cybercrime,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management (IAM) Solutions with HID Global.  “By combining HID’s expertise in identity and access management with new capabilities in AI and machine learning, we are enabling organizations to better manage risk, protect customer data and defend against fraud, malware and data breaches. The combination of our HID Risk Management Solution and our mobile-based authentication application, HID Approve, creates a unique blend of security and user authorization.”

Adding trust to online transactions and preserving the integrity of digital business interactions, the HID Risk Management Solution is fully integrated with HID’s ActivID® Authentication Platform, which provides multi-factor authentication to protect users’ IDs, transactions, devices and accounts. 

The merging of multi-factor authentication with the new level of AI-driven, cyber threat and fraud detection is a strategic advancement that delivers risk-based, frictionless and adaptive authentication based on data intelligence.  It increases security while optimizing the user experience as seamless – without any inconvenience to consumers. 

The HID Risk Management Solution is composed of three different risk-based engines that are fully integrated together and deliver a more accurate risk score than other systems from other vendors. 

  • Threat engine – detects generic threats and tracks device IDs, identifying application integrity tampering, malware and phishing attacks.
  • Behavior engine – creates a behavioral biometric profile of the user, including keyboard, mouse and swipe behavior, page navigation and application usage.
  • Anomaly engine – monitors the details of transactions in real-time, utilizing machine learning methods to identify anomalous sessions and transactions, as well as continuous analysis of hundreds of parameters. 

The risk score that is generated from these three “engines” enables more informed decision-making about the next action, whether to approve, block or reject a transaction.  The data analytics from the IAM solution creates new value for customers. 

For more information about HID Risk Management Solution, click here.

Stay Connected with HID Global

Visit our Media Center, read our Industry Blog, and follow us on FacebookLinkedIn and Twitter.

About HID Global

HID Global powers the trusted identities of the world’s people, places and things.  We make it possible for people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and over 2 billion things are connected through HID technology. We work with governments, educational institutions, hospitals, financial institutions, industrial businesses and some of the most innovative companies on the planet. Headquartered in Austin, Texas, HID Global has over 3,000 employees worldwide and operates international offices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand. For more information, visit www.hidglobal.com

# # #

Wombat Security Introduces New Insider Threat Training Modules

PITTSBURGH, March 27, 2018 -- Wombat Security (Wombat), a division of Proofpoint and the leading provider of security awareness and training, has released a series of three Insider Threat interactive training modules that will allow organizations to educate employees on the potential for employees to inflict damage—either intentionally or unintentionally—through data theft, response to phishing or other activity. The series of mini modules consist of an Insider Threat Overview, a Malicious Insider Threat course and an Unintentional Insider Threat course that present real-world scenarios to end users and allows them to explore the consequences of their choices in a no-risk environment.  

"Insider threats are among the most difficult to detect for a trusting, unassuming end user. Cybercriminals are relying less on automated attacks and instead using tactics like social engineering to exploit these people inside your company," said Amy Baker, Vice President of Marketing at Wombat. "At the same time, many current or former employees may have access to a treasure trove of sensitive or valuable information and could misuse that access for personal or professional gain. To make sure organizations are protected against attacks from the inside-out, they need to turn their attention to preparing employees to avoid unintentionally putting their information at risk."

The Insider Threat Interactive Training Modules will introduce a new capability to Wombat training called "branching," where the interactive content changes based on input from end users as they are presented with real-world cybersecurity scenarios. Users are asked to make a decision, then prompted to explore the consequence of their choice in a no-risk environment.

In addition to identifying potential insider threats, including behaviors that can indicate threatening or malicious intent, the module series also contains material on spotting and circumventing unintentional insider threats. Users are able to learn through real-world examples of how employees can unknowingly inflict damage in everyday scenarios and present ways to mitigate future threats with healthy computer habits.

For more information about the Insider Threat Interactive Training Modules, visit: https://www.wombatsecurity.com/training-modules/insider-threat-series

About Wombat Security
Wombat Security, a division of Proofpoint, is the leading provider of information security awareness and training software to help organizations teach their employees secure behavior for enterprises. Their SaaS-based cybersecurity education solutions include an integrated platform of knowledge assessments, simulated attacks, and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. The company has been recognized by Gartner as a Leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors for four years in a row. Founded in 2008, Wombat is helping mid-market, Fortune 1000, and Global 2000 customers to strengthen their cybersecurity defenses.

 

SOURCE Wombat Security

Related Links

https://www.wombatsecurity.com

Human-computer interaction technologies that can adapt to the state of the user

ABERDEEN PROVING GROUND, Md., March 27, 2018 -- A joint effort between the U.S. Army Research Laboratory and DCS Corporation recently won the Neurally Augmented Image Labelling Strategies, or NAILS challenge, at an international machine learning research competition in Tokyo.

Dr. Vernon Lawhern, ARL mathematical statistician and Amelia J. Solon, DCS scientist, led the joint research project. Other team members included Drs. Brent Lance, ARL and Stephen Gordon, DCS.

The team presented its paper, Deep Learning Approaches for P300 Classification in Image Triage: Applications to the NAILS Task, at the 13th National Institute of Testbeds and Community Information Access Research Conference on evaluation of information.

Teams participating in the NAILS challenge developed machine learning methods to detect – through brain activity – whether an image that a person was seeing was a task-relevant image or not. In performing the research, the researchers calibrated an in-house tool called EEGNet, which is a deep convolutional network capable of learning robust representations of specific brain responses using relatively sparse training sets. Using this approach, they trained a unique instantiation of EEGNet for each subject and subsequently obtained the highest classification performance, averaged across all subjects, of the participating teams.

"EEGNet allows researchers to train models for different neural responses using examples of those responses collected under a wide variety of conditions and from multiple individuals," Gordon said. "In this way, EEGNet provides both a 'common framework' for analyzing disparate data sets as well as a tool for extrapolating results from simplified to more complex domains."

The team participated in conference discussions focused on the state of brain computer interface technology and how it can be leveraged for information retrieval applications; future directions for the NAILS task; assessing models with IR oriented evaluation metrics, and encouraging the development of general BCI algorithms that are not calibrated per-subject or task and hold greater potential for measuring human state in complex, real-world, environments.

"This work is part of a larger research program at ARL that focuses on understanding the principles that govern the application of neuroscience-based research to complex operational settings," Lawhern said. "By competing in this competition we were able to showcase our expertise in this area to the broader scientific community. Ultimately, we are interested in using neuroscience-based approaches to develop human-computer interaction technologies that can adapt to the state of the user."

The researchers conducted the work as part of DCS's Cognition and Neuroergonomics Collaborative Technology Alliance contract with ARL. The CaN CTA is the U.S. Army's flagship basic science research and technology transition program in the neurosciences.

More information on the winning research is available on Google Scholar Citations.

DCS offers advanced technology and management solutions to Government agencies in the DoD and national security sector. The transformative ideas, commitment to quality and entrepreneurial spirit that characterize our 1,100 employee-owners allow us to ensure the success of each customer's mission and actively contribute to the well-being of the Nation. For more information, visit: https://www.dcscorp.com.

CONTACT: [email protected], 571-227-6000

SOURCE DCS Corporation

Related Links

http://www.dcscorp.com

Protest over, Raytheon to begin work on $600m contract to sustain and modernize U.S. Army strategic software systems

HUNTSVILLE, Ala. -- Raytheon Company (NYSE: RTN) is beginning work on a contract to sustain and modernize missile defense and other strategic systems operated by the U.S. Army, combatant commands and other government agencies.

The $600-million, three-year contract was first announced last June and a protest was withdrawn in February. Within the next 30-60 days Raytheon will begin accepting directions from the Army to conduct software sustainment and system engineering services for critical systems including THAAD, AN/TPY-2 radars, the Ground-Based Midcourse Defense System, the Sea-Based X-Band Radar and Upgraded Early Warning Radars.

Raytheon will use the company's expertise in commercial software practices to speed delivery of software upgrades across the supported systems to improve them without interrupting critical missions. 

"We're bringing state-of-the-art, commercial software practices, such as DevOps and Agile, to make sure the systems the Army depends on stay ahead of evolving threats," said Todd Probert, vice president of Mission Support and Modernization at Raytheon Intelligence, Information and Services.

Work will be conducted at the Systems Simulation, Software and Integration Directorate, U.S. Army Aviation and Missile Research, Development and Engineering Center at Redstone Arsenal. The contract is expected to directly employ approximately 800 people in the Huntsville, Ala., area and Raytheon will begin transitioning and or hiring experienced software and hardware engineers, program managers, and other professional services experts in the coming months.

About Raytheon
Raytheon Company, with 2017 sales of $25 billion and 64,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 96 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Mass. Follow us on Twitter.

About AMRDEC
U.S. Army Aviation and Missile Research, Development, and Engineering Center provides increased responsiveness to the nation's Warfighters through aviation and missile capabilities and life cycle engineering solutions.

Raytheon in final phase of GPS OCX software build

AURORA, Colo. -- Raytheon Company's (NYSE: RTN) GPS Next-Generation Operational Control System, known as GPS OCX, is in its final software development phase. This phase focuses on increasing automation and building controls for both L1C, a civilian GPS signal aimed at increasing international access, and M-code, a military GPS signal with better anti-jam capability.

Once complete, the team will begin integration and testing to keep the program on track for full system delivery in June 2021.

Our team has two primary goals this year," said Dave Wajsgras, president of Raytheon Intelligence, Information and Services. "We will support the U.S. Air Force's GPS III launch this fall and complete the software build for the full operational system by year's end."

GPS OCX is the enhanced ground control segment of a U.S. Air Force-led effort to modernize America's GPS system. The program is implementing 100 percent of DODI 8500.2 "Defense in Depth" information assurance standards without waivers, giving it the highest level of cybersecurity protections of any DoD space system. For protection against future cyber threats, the system's open architecture allows it to integrate new capabilities and signals as they become available.

Because GPS OCX can manage nearly twice the satellites of the current system, it will increase signal strength in hard-to-reach areas like dense cities and mountainous terrain. Also, advanced automation will free crews to focus on mission-critical tasks such as updating satellite positions more often.

To learn more about the program's progress and additional capabilities, visit us here.

Statement from Secretary Kirstjen M. Nielsen on the Confirmation of CBP Commissioner Kevin McAleenan

Today, Kevin K. McAleenan was confirmed by the United States Senate as the Commissioner of U.S. Customs and Border Protection (CBP).
 
Commissioner McAleenan has served admirably as the Acting Commissioner of CBP since January 2017. In that time as the head of the nation’s largest law enforcement agency, he has worked tirelessly to secure our border and protect national security, while also promoting economic prosperity and facilitating legal trade and travel.
 
Prior to his time as Acting Commissioner, Commissioner McAleenan served as Deputy Commissioner of CBP. In that role, he managed the day-to-day operations of the 60,000 person agency. He has also held several other leadership positions within CBP, including Acting Assistant Commissioner of CBP’s Office of Field Operations and Area Port Director of Los Angeles International Airport.
 
In 2015, Commissioner McAleenan was awarded a Presidential Rank Award for his sustained extraordinary accomplishments at CBP. In 2005, he received the Service to America Medal, Call to Service Award, for his efforts to develop and implement a comprehensive anti-terrorism strategy for border security post-September 11, 2001. Commissioner McAleenan has been a member of the U.S. Government’s Senior Executive Service since 2006. Prior to government service, he practiced law in California, and received his Juris Doctor degree from the University of Chicago Law School and a Bachelor of Arts degree from Amherst College. 
 
Please join me in congratulating Commissioner McAleenan and his family. I want to thank Kevin for his many years of dedicated service at CBP and his commitment to our nation’s security. I am proud of all he has accomplished at CBP and look forward to continuing to work with him as he drops the “Acting” title and formally takes on the role of Commissioner.

Netwrix launches new global channel program in North America

Netwrix Corporation, provider of a visibility platform for data security and risk mitigation in hybrid environments, today announced the launch of a new global channel program in North America. Ken Tripp, Director of Channel Accounts at Netwrix, will be responsible for running this program and expanding the partner network in North America.

The aim of the new partner program is to accelerate growth across all North American regions and create a proactive partner community network that addresses all industry verticals, sizes and routes to market. The new channel program includes:

  1. Acknowledgement of highly engaged partners. The new channel program will reward top performers that grow the Netwrix business. Netwrix supports highly motivated partners who represent its award-winning platform, and protects their investments as they develop new opportunities.

  2. New tools to help partners stay ahead of the competition. Netwrix provides partners with various sales and marketing enablement tools, such as a revamped partner portal and prebuilt campaigns-in-a-box, to help them run their businesses better, faster and more efficiently.

  3. Focus on all industry verticals and organization sizes. Netwrix targets both SMBs and the enterprise sector, and supports the activities of all partners, from local boutique partners that focus on certain industries to large international resellers with broad portfolios.

With almost 20 years of work in the IT industry, Ken Tripp brings substantial experience to his role at Netwrix, including channel sales and management, business development, strategic planning, and product marketing. Prior to joining Netwrix, Ken worked for AT&T and Futura International.

"Our new channel strategy aims to strengthen relationships with our partners in North America, as well as encourage more companies in the region to join our partner network. The revamped channel program enables us to acknowledge highly motivated companies and bring more value to partners by providing them with all the resources and tools they need to respond to increasing customer demand and drive successful sales."
Ken Tripp, Director of Channel Accounts at Netwrix
"One of our top priorities is to build relationships with partners in North America based on trust and healthy competition. A new, solid channel strategy is a very important step for us, since it empowers us to acknowledge our most enthusiastic partners and make doing business with Netwrix easier. We offer even more transparency into opportunities with Netwrix to help our partners track their milestones and grow their businesses. Netwrix will continue to collaborate with partners in the US and offer them continuous sales and marketing support, as well as reward top-performing companies regardless of their size or the markets they operate in."
Michael Fimin, CEO and Co-founder of Netwrix

For more information about Netwrix Partner Programs, visit: https://www.netwrix.com/netwrix_partner_program.html

Global Market Survey: 77% of Businesses Expect to Fall Victim to Email Fraud in the Next 12 Months

Global market research from Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, today reveals 82 percent of boards are concerned with email fraud and more than half (59%) consider it a top security risk—no longer just an IT issue. Yet almost a third (30%) of respondents cited a lack of executive support as a key challenge to email fraud protection deployment.

“Email fraud is highly pervasive and deceptively simple; hackers don’t need to include attachments or URLs, emails are distributed in fewer volumes, and typically impersonate people in authority for maximum impact,” said Robert Holmes, vice president of Email Security Products for Proofpoint. “These and other factors make email fraud, also known as business email compromise (BEC), extremely difficult to detect and stop with traditional security tools. Our research underscores that organizations and boardrooms have a duty to equip the entire workforce with the necessary solutions and training to protect everyone against this growing threat.”

Proofpoint’s 2018 Understanding Email Fraud Survey, asked 2,250 senior IT decision makers across the U.S., U.K., France, Germany, and Australia for their email fraud experiences from the last two years. The survey, conducted by research firm Censuswide, demonstrates that email fraud is pervasive, disruptive, and in many cases, catching businesses unprepared. Insights include:

  • 75 percent of organizations experienced at least one targeted email fraud attack, with 41 percent suffering multiple attempts in the last two years. However, some organizations are taking proactive measures to protect both their brand and their employees. More than half (57%) have implemented a user-awareness program on phishing, and 46 percent use email authentication.
  • More than 77 percent of businesses expect they will fall victim to email fraud in the next 12 months, and yet only 40 percent have full visibility into email threats. There is a disconnect between the anxiety felt by IT decision makers in relation to protecting the organization from email fraud and the buy-in from the boardroom to implement preventative methods.

  • Cyber criminals are reaching deeper into the organization beyond the C-suite.  
    Respondents deemed the Finance and Accounts Payable departments most at risk of receiving spoofed emails, with the C-level executives almost on par with the general workforce.

  • More than half (56%) of respondents who were aware of a breach in the last two years, suffered downtime and disruption, and a third (33%) experienced a loss of funds.
    Email fraud also puts employees directly at risk. Nearly one in four attacks (24%) resulted in employment termination.

“With 59 percent of organizations considering email fraud one of the top security risks to their business, it is encouraging that some are adopting techniques to protect their employees, partners, and customers. As the volume of attacks and level of sophistication employed by cybercriminals increase, organizations need to proactively shut down these tactics before the damage is done,” continued Holmes.

Proofpoint research shows email fraud has a direct impact on both employers and employees. Businesses suffer downtime and loss of revenue, and individuals could potentially lose their jobs. By implementing a multi-layered defense strategy, organizations can protect their systems from advanced data-stealing attacks and their employees by blocking, detecting, and responding to email fraud attacks.  

To download Proofpoint’s 2018 Understanding Email Fraud Survey, please visit: https://www.proofpoint.com/us/resources/white-papers/understanding-email-fraud-global-survey

And to access the infographic, please visit: https://www.proofpoint.com/us/resources/infographics/global-survey-understanding-email-fraud

 

About Proofpoint, Inc.

Proofpoint Inc. (NASDAQ: PFPT) is a leading next-generation security and compliance company that provides cloud-based solutions to protect the way people work today. Proofpoint solutions enable organizations to protect their users from advanced attacks delivered via email, social media, mobile, and cloud applications, protect the information their users create from advanced attacks and compliance risks, and respond quickly when incidents occur. More information is available at www.proofpoint.com

 

Connect with Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+

###

OSI Systems Facilitates Significant Drug Seizure In Albania

OSI Systems, Inc. (the “Company” or “OSI Systems”) (NASDAQ: OSIS) today announced that Albanian Customs and State Police, facilitated by the OSI Systems’ turnkey scanning program, seized 1,350 pounds of cocaine being smuggled into Albania. The narcotics were hidden in a false floor of a produce shipment, and were detected by Rapiscan® Systems Eagle® scanning systems operated by the Company’s S2 Albania subsidiary. Albanian State Police estimate the value of the seizure to be $220 million.

The Company’s turnkey scanning program has been deployed in multiple countries and in each case has a proven track record of benefits, including:

Significantly reducing the trafficking of contraband, including narcotics, weapons and currency

Increasing accuracy in declaration of imported and exported goods, leading to accurate payment of duties and significant fiscal benefit to sponsoring governments

Improving transparency and speed at customs checkpoints, benefiting international cargo shippers

Enhancing public safety

The Company deploys image analysts trained through a proprietary S2 University™ process to analyze scan images and alert law enforcement to specific anomalies. The programs use the Company’s proprietary CertScan® system to match scan images to identifying data such as cargo manifests, vehicle license plates and customs declarations, so that shippers pay only legally required duties at customs inspection points.

OSI’s Chief Executive Officer, Deepak Chopra, stated, “The February 27 seizure in Albania adds to the solid track record of our integrated services programs in impacting duties evasion and international trafficking of contraband, in Albania and elsewhere. We’re proud to support Albanian Customs and State Police in their continuing efforts to combat such illicit activities.”

About OSI Systems

OSI Systems is a vertically integrated designer and manufacturer of specialized electronic systems and components for critical applications in the homeland security, healthcare, defense and aerospace industries. The Company combines more than 40 years of electronics engineering and manufacturing experience with offices and production facilities in more than a dozen countries to implement a strategy of expansion into selective end product markets. For more information on OSI Systems or any of its subsidiary companies, visit www.osi-systems.com. News Filter: OSIS-G

Related news link:Albania seizes 613 kilos of Colombia cocaine, holds two

Forward-Looking Statements

This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995, Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Forward-looking statements relate to OSI Systems’ current expectations, beliefs, projections and similar expressions concerning matters that are not historical facts and are not guarantees of future performance. Forward-looking statements involve uncertainties, risks, assumptions and contingencies, many of which are outside OSI Systems’ control that may cause actual results to differ materially from those described in or implied by any forward-looking statements. All forward-looking statements are based on currently available information and speak only as of the date on which they are made. OSI Systemsassumes no obligation to update any forward-looking statement made in this press release that becomes untrue because of subsequent events, new information or otherwise, except to the extent it is required to do so in connection with its ongoing requirements under Federal securities laws. For a further discussion of factors that could cause OSI Systems’ future results to differ materially from any forward-looking statements, see the section entitled "Risk Factors" in OSI Systems’ most recently filed Annual Report on Form 10-K and other risks described therein and in documents subsequently filed by OSI Systems from time to time with the Securities and Exchange Commission.

View source version on businesswire.com: http://www.businesswire.com/news/home/20180308006451/en/

Pages

 

Recent Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...