Technology Sectors

Market Sectors

<div style="text-align:center"> <p>"Mass Notification Profiles"</p> <p>Ideas and strategies<br><br /> from leading vendors</p> <p>Prepared exclusively<br><br /> for GSN Magazine<br><br /> by:</p> <p><a href="">LRAD Corporation</a></p> <p><a href="">Desktop Alert</a></p> <p>Available in Print or Online</p> </div>

Today's News

API Technologies’ SST™ Enters into Agreement with pureLiFi to Deliver LiFi TEMPEST and Secure Solutions

API Technologies Corp. (API), a leader in high performance RF/microwave signal conditioning and electromagnetic spectrum management solutions, has entered into an agreement through its UK-based Secure Systems & Technologies (SST™) business with pureLiFi to deliver to the TEMPEST and Secure marketplace an array of LiFi products, certified to TEMPEST SDIP 27/2 and, where communications are classified SECRET or above, Secure SDIP 29 standards.

Under the agreement, API Technologies’ SST business will collaborate with pureLiFi to design, develop and manufacture TEMPEST and Secure certified LiFi products and will be the first to deliver TEMPEST or Secure configurations utilizing pureLiFi’s LiFi technology. These solutions will utilize pureLiFi proprietary technology to form wireless connectivity that delivers high speed, bi-directional and mobile data communication via the light spectrum. These LiFi enabled IT solutions are designed for use in government office communications or secure mobile deployment and mission critical computing applications requiring uninterrupted, secure transmission of data, plus the flexibility and mobility of a wireless network configuration.

Through SST’s in-house manufacturing capability to produce TEMPEST and Secure Communications certified products, SST and pureLiFi will jointly introduce the increased security benefits of this leading edge technology to the communications market. The LiFi solution secures the communications signal within a physical space, which protects it from hacking or signal interference attempts from devices outside the solution’s area of illumination. In addition, LiFi solutions utilize the light spectrum, which has more than 1,000 times more bandwidth than the RF spectrum used by traditional Wi-Fi technologies.

“API Technologies’ SST business is known for its expertise in developing and manufacturing trusted IT solutions that enable the secure transmission of sensitive data and protection from covert surveillance and eavesdropping threats,” said Mark Sawyer, Product Line Manager, SST. “This exciting agreement with pureLiFi extends our technology breadth to create next-generation TEMPEST and Secure products utilizing pureLiFi wireless communications solutions for our customers.”

“pureLiFi are world leaders in providing LiFi solutions that offer inherently secure, intrinsically safe mobile communications through light. API Technologies is a world class company and a natural fit for an innovative partnership. This agreement will allow us to deliver the highest quality of ground-breaking TEMPEST and Secure LiFi products to the market.” said pureLiFi’s Harald Buchardt, CCO, pureLiFi.

To learn more about API Technologies’ SST TEMPEST, rugged, military EMC, encryption and communications security equipment for military and government organizations throughout the world, visit

About API Technologies Corp.

API Technologies is an innovative designer and manufacturer of high performance systems, subsystems, modules, and components for technically demanding RF, microwave, millimeterwave, electromagnetic, power, and security applications. A high-reliability technology pioneer with over 70 years of heritage, API Technologies products are used by global defense, industrial, and commercial customers in the areas of commercial aerospace, wireless communications, medical, oil and gas, electronic warfare, unmanned systems, C4ISR, missile defense, harsh environments, satellites, and space. Learn more about API Technologies and our products at

About SST

SST is part of the Secure Systems and Information Assurance (SSIA) group of API Technologies, which provides security and information assurance products for government, defense, and commercial customers worldwide. Products from the SSIA group are marketed under the brand names SST™, EMCON™, and ION Networks™ brands. Learn more about our networking and security solutions at

About pureLiFi

pureLiFi seeks to resolve the global struggle for diminishing wireless capacity resulting in the Spectrum Crunch. We are developing and delivering technology for secure, reliable, high-speed communication networks that seamlessly integrate data and lighting utility infrastructures and significantly reduce energy consumption. Learn more at

Multiple Senstar Systems Installed to Protect Major US Airport

Senstar is pleased to announce it has delivered the perfect perimeter intrusion detection (PIDS) solution to protect the perimeter of one of North America’s largest cargo airports. Due to the facility’s unique perimeter security requirements, Senstar combined multiple technologies to form a comprehensive system that effectively protects the airport and keeps the nuisance alarm rate (NAR) low.

“With a busy road running along one side of the airport’s five-mile perimeter, and people using the airport’s fence to lean on while waiting at bus stops, a fence-mounted solution alone would have been an NAR nightmare,” said Nancy Marshall, Senstar’s Executive Director of Business Development. “By combining multiple technologies, we created a system in which a single alarm is not enough to trigger a response, but, if multiple alarms are received, the threat is deemed to be real and a response is initiated.”

Working with A&E firm Faith Group LLC and installer Standard Electric, the multi-layer intrusion detection system has been up and running for several months and the airport is very pleased with the results.

“It was an excellent experience,” said the airport’s project lead. “Standard Electric was very confident in the (Senstar) products. They told us to ‘Relax. We are going to do this right and you’re going to be extremely satisfied.’ And we are.”

To read a case study about the project, click here.

About Senstar Corporation
Senstar has been safeguarding people, places and property with the world’s largest portfolio of perimeter intrusion detection sensors for over 35 years. Now combined with world-class video management systems and analytics (formerly Aimetis), Senstar offers a comprehensive suite of proven technologies that work together to reduce complexity, improve performance and unify support.  Twitter: @SenstarCorp

Direct-to-orbit connectivity enables IoT accessibility for remote locations

CHICAGO -- Boeing [NYSE: BA] announced its investment in Adelaide, Australia-based Myriota, an Internet of Things (IoT) startup seeking to revolutionize satellite communications by providing low-cost access to high-value data in remote locations.  

Myriota developed technology enabling two-way communications between ground-based micro-transmitters and low Earth orbit (LEO) nanosatellites to securely share data over narrow bandwidths. This direct-to-orbit platform enables applications across the logistics, defense, utilities, agricultural, environmental and maritime industries, where IoT connectivity via traditional means is extremely challenging and expensive.

Boeing HorizonX Ventures' investment in Myriota is its first in a company outside of the U.S. and its 10th since Boeing HorizonX was launched in April 2017.

"Part of the mission of Boeing HorizonX is to pursue and accelerate innovations coming out of startups around the world. By investing in Myriota, we are proud to support Australia's startup ecosystem and growing space industry," said Steve Nordlund, vice president of Boeing HorizonX. "Myriota's technology influences how we think about space-based communications and connectivity in remote locations."

Founded in 2015, Myriota builds on the work of its founders with the University of South Australia's Institute for Telecommunications Research. The company's direct-to-orbit technology enables massive-scale, low-cost communications for IoT devices anywhere on Earth.

"We formed Myriota to solve a major connectivity problem: hundreds of millions of devices that need to communicate but don't have cost-effective, battery-friendly networks to do so," said Myriota CEO Alex Grant. "The scale of this investment, with strong domestic venture capital leadership and strategic participation by global investors is significant for Myriota, and our vision to deliver IoT connectivity for everyone, everywhere."

Boeing HorizonX Ventures participated in this US$15 million Series A funding round led by Australian firms Blue Sky Venture Capital and Main Sequence Ventures, which manages the Commonwealth Scientific and Industrial Research Organisation (CSIRO) Innovation Fund. Other investors include Right Click Capital and Singtel Innov8.

For Boeing in Australia, Myriota is the latest example of the company's continued investment in Australian technology that spans internal R&D, suppliers and partners, and universities. So far this year, Boeing announced a set of space-related R&D projects with CSIRO and the launch in Queensland of the company's largest autonomous systems development program outside of the U.S. In South Australia, Myriota joins Boeing's expanding presence in Adelaide, which Boeing announced last year in addition to an AU$500,000 (US$383,000) investment over five years in the Adelaide-based Techstars global accelerator program to support local startups.

The Boeing HorizonX Ventures investment portfolio is made up of companies specializing in technologies for aerospace and manufacturing innovations, including autonomous systems, energy storage, advanced materials, augmented reality systems and software, machine learning and hybrid-electric propulsion. Boeing HorizonX also seeks unique business opportunities and non-traditional partnerships for the company's aerospace technology using disruptive innovations and business strategies.

Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners and defense, space and security systems. A top U.S. exporter, the company supports airlines and U.S. and allied government customers in 150 countries.

With more than 3,000 employees, Boeing in Australia has a broad portfolio of aerospace capabilities across the country, including advanced manufacturing of commercial aircraft components, complex defence systems design and production, research and development, training and sustainment services, and unmanned systems.


Researchers used patterned stimulation of neural activity to facilitate encoding of episodic memories for military personnel suffering from the effects of brain injury or illness

DARPA launched the Restoring Active Memory (RAM) program in November 2013 with the goal of developing a fully implantable, closed-loop neural interface capable of restoring normal memory function to military personnel suffering from the effects of brain injury or illness. Just over four years later, the program is returning remarkable results. Today, RAM researchers at Wake Forest Baptist Medical Center and the University of Southern California published in the Journal of Neural Engineering that they have demonstrated the first successful implementation in humans of a proof-of-concept system for restoring memory function by facilitating memory encoding using the patient’s own neural codes. Volunteers in the study demonstrated up to 37 percent improvement in short-term, working memory over baseline levels.

“DARPA’s cumulative investments in neurotechnology over the past two decades have brought us to an extremely exciting point today where we’re testing tangible technologies that have the potential to alleviate some of the worst effects of brain injury and illness,” said Justin Sanchez, the director of DARPA’s Biological Technologies Office and the program manager for RAM.

RAM researchers focused on episodic memory, which includes information a person need only remember for brief periods, such as where a car is parked, what was served for dinner on a previous evening, or when he or she last took medication. Episodic memory loss is the most common type of memory loss in people with brain injury or Alzheimer’s disease.

To improve episodic memory, the RAM team limited its study to the hippocampus, a region of the brain that is central to memory formation. The hippocampus includes sub-regions called CA3 and CA1 that function together to support memory encoding and retrieval. When the brain registers new information to be encoded as a memory, neurons in the CA3 region fire, marking the input of information into the hippocampus, which triggers a subsequent sequence of neural activity in the CA1 region, marking the output from the hippocampus.

Working with neurosurgical patient volunteers who were being treated for epilepsy—a condition that often causes memory loss—the RAM researchers used surgically implanted electrodes to record neuronal activity in the volunteers’ CA3 and CA1 regions as the volunteers performed a visual memory test. The study participants were shown a simple image such as a color block and then, after a brief delay during which the screen was blank, were asked to identify the initial image out of four or five others shown on the screen.

By analyzing the recordings associated with correct responses, the researchers were able to construct what’s known as a multi-input multi-output (MIMO) nonlinear, mathematical, spatiotemporal model that predicted the transformation of neuronal firing patterns in the CA3 region into neuronal firing patterns in the CA1 region during successful memory formation. The “codes” that the model produced did not directly reference specific memories, but instead correlated to the CA1 firing patterns that occur when CA3 encodes information properly, thus correcting for any naturally occurring errors in transformation between CA3 and CA1 firing. When during subsequent image-recall tests the researchers used patterned, spatiotemporal electrical stimulation of CA1 to play back MIMO-based codes—derived from real-time neuronal activity recorded in CA3—the volunteers showed an average of 37 percent improvement in episodic memory performance over baseline.

To explore whether MIMO-predicted stimulation patterns would have a similar effect on long-term memory, the researchers adapted the image-recall test. In this second iteration, the volunteers were shown a highly distinctive photographic image, followed by a short delay, and then asked to identify the first photo out of four or five others on screen. Again, the researchers recorded neural activity and delivered MIMO-derived CA1 stimulation for a subset of images.

After another, longer delay of up to 75 minutes, the volunteers were shown sets of three images at a time, including the original image and new photos, and asked to identify the original photo. When stimulated with the correct spatiotemporal codes, the volunteers showed a 35 percent improvement in memory on average over baseline.

Notably, the stimulation did not replace normal CA1 activity in the volunteers’ brains, but supplemented it, giving a boost to natural memory function. According to researchers, stimulation delivered via the MIMO-based model was effective in activating a pattern of neuronal firing that corresponded to correct memory performance—a marked improvement over control trials conducted without stimulation.

The new results from the Wake Forest and USC RAM investigators follow a recent announcement made in February by a DARPA-funded team led by the University of Pennsylvania. The Penn research team developed a closed-loop recording and stimulation system that evaluates brain state and delivers efficacious electrical stimulation only when the system predicts poor memory performance. Using a memory task in which participants recalled lists of words, the researchers demonstrated a 15-percent improvement in overall memory function.

“We’re closing in on our goal of an implantable, closed-loop memory prosthesis,” Sanchez said. “The RAM program continues to achieve and integrate amazing breakthroughs in neuroscience, artificial intelligence, and neural interface device development for clinical use, which makes me confident DARPA can ultimately deliver our Service members and veterans powerful technologies for countering memory loss.”

Image Caption: DARPA-funded researchers at Wake Forest Baptist Medical Center and the University of Southern California have demonstrated the first successful implementation in humans of a proof-of-concept system for restoring memory function by facilitating memory encoding using the patient’s own neural codes. The stimulation did not replace normal activity in the volunteers’ brains, but supplemented it, giving a boost to natural memory function. Using the RAM technology, volunteers in the study demonstrated up to 37 percent improvement in short-term, working memory over baseline levels. (DARPA image courtesy of Wake Forest Baptist Medical Center)

# # #

Fort Myers Police Department chooses NC4 Street Smart® to help fight crime

EL SEGUNDO, CA – March 29, 2018 – NC4®, a leader in revolutionizing safety and security and an innovator in law enforcement technology, announced today that the Fort Myers Police Department (FMPD), with a strength of 206 sworn officers, has chosen NC4 Street Smart® to help in their fight against crime. With the installation of Street Smart, the officers of the FMPD will be equipped with the sophisticated technology and critical resources they need to reduce crime and contribute to the safety of the community.

The FMPD protects a population of over 77,000 residents and is the county seat and commercial center of Lee County, Florida. Street Smart will help the department provide safety and security to its residents by providing a daily-use crime-fighting solution that arms police officers with critical real- time data, while patrolling their community.

This solution will allow the department to stay apprised of activities and to collaborate using situation- based bulletins, secure blogs, and case management tools that optimize the sharing of crime-related information in order to pinpoint crimes, patterns, and incidents.

“Community partnership is vital to our efforts to reduce and solve crime. We continue to engage community stakeholders and our law enforcement partners in our efforts to reduce crime and to bring justice to victims and their family members,” said Derrick Diggs, Chief of the Fort Myers Police Department. “Our community will benefit from our partnership with NC4 and this technology, when deployed, will give our officers real-time data that is crucial to preventing and solving crime.”

NC4 Street Smart will help the FMPD streamline their efforts across the department by providing officers with continuously updated crime maps, bulletins, and the ability to share relevant information quickly, maximizing policing effectiveness. This will help lead to more accurate and timely arrests and increased safety for officers and citizens. The cities that have been using Street Smart report double-digit reductions in crime and decreases from the time of an incident to the time of arrest.

“We are excited that another agency in Florida will be using Street Smart to fight crime,” said Rob Wolf, Vice President, NC4 Public Safety. “This solution will help officers in Fort Myers provide more effective and efficient law enforcement services to its residents.”

About NC4

NC4 delivers safety and security solutions for both business and government organizations. We revolutionize how organizations and communities collect, manage, share and disseminate information to reduce cyber threats, fight crime, mitigate risks, and manage incidents. NC4 also provides cyber threat sharing solutions both through secure collaboration services and recently (via Soltra Edge), through automated, structured, and standardized (STIX/TAXII) mechanisms.

NC4 solutions are used by private sector companies involved in financial services, high-tech, insurance, manufacturing, aerospace and defense, oil and gas, pharmaceuticals and healthcare, as well as other industries. In the public sector, NC4 solutions are used by federal, state and local agencies in homeland security, emergency management, and law enforcement disciplines.

NC4 takes a comprehensive and integrated approach to safety and security by providing: cyber threat exchanges that drive the development of a sharing culture and circles of trust; global security and travel intelligence, analysis, traveler tracking, and relevant real time threat alerting to mitigate enterprise risks and a common operating picture for fighting crime and managing emergencies.

For information about NC4, visit or call toll-free, 1-877-624-4999. ###

FCC Seeks Comment on Multimedia Content in Wireless Emergency Alerts

By this Public Notice, the Public Safety and Homeland Security Bureau (Bureau) of the Federal Communications Commission (Commission) invites interested parties to update the record on the feasibility of including multimedia content in Wireless Emergency Alert (WEA) messages.

Currently, the Commission’s rules do not specify technical requirements for enabling multimedia content in WEA alert messages. In the 2016 WEA Report and Order and Further Notice of Proposed Rulemaking (WEA R&O and FNPRM), the Commission recognized that additional standards development remains necessary. Accordingly, the Commission sought comment regarding the establishment of an appropriate regulatory framework and timeframe for incorporating multimedia capability into WEA alert messages. Numerous stakeholders responded to that request.

Since the release of the WEA R&O and FNPRM, the Commission has taken measures to strengthen WEA as a tool for emergency managers to communicate with the public. For example, the Commission revised its rules to ensure that emergency managers can geographically target alerts to only those phones located in areas affected by an emergency. When the WEA program launched in 2012, Participating Commercial Mobile Service (CMS) Providers were generally required to send alerts to a geographic area no larger than the county or counties affected by the emergency situation. As of November 1, 2017, all Participating CMS Providers must transmit alerts to a geographic area that “best approximates” the area affected by the emergency situation, and by November 30, 2019, all Participating CMS Providers must match the target area of the alert. In addition to improving the accuracy with which WEA messages must be geo-targeted, the Commission has taken action to improve emergency managers’ ability to deliver more effective content in WEA messages. For example, as of November 1, 2017, nationwide Participating CMS Providers must support the inclusion of embedded references (i.e., URLs and phone numbers) in WEA messages. By May 1, 2019, Participating CMS Providers also must support longer WEA alerts (with the maximum Alert Message length increasing from 90 to 360 characters for 4G LTE and future networks) and the transmission of Spanish-language alert messages. Also as of May 1, 2019, authorized State and local alert initiators will be able to conduct “end-to-end” WEA tests that can be received by members of their communities, in order to assess how WEA is working within their jurisdictions.
The Commission continues to consider the WEA FNPRM’s proposal regarding multimedia alerting, and the Bureau requests that interested commenters refresh the record with any new information or arguments. Commenters should address the technical feasibility for requiring multimedia content in WEA messages, including the current state of multimedia testing and standards development. Commenters should also address with particularity the potential costs and benefits to public safety and Participating CMS Providers for supporting the inclusion of multimedia content in WEA messages, given the other changes to WEA that are currently ongoing.

Link to Public Notice:

Identiv Launches iOS Smart Card Reader Designed for OtterBox uniVERSE Case System and Apple iPhone and iPad

Fremont Calif. — Identiv, Inc. (NASDAQ: INVE) today announced its partnership with OtterBox® and collaborative iAuthenticate™ 2.0 OtterBox, Identiv’s iOS smart card reader designed for OtterBox uniVERSE™ Case System and Apple® iPhone® and iPad®.

Identiv’s iAuthenticate 2.0 OtterBox smart card reader, built for the OtterBox uniVERSE Case System, provides an extra layer of security in a world increasingly more reliant on accessing corporate resources through mobile devices. iAuthenticate 2.0 is designed to work with all OtterBox uniVERSE Case Systems for Apple iPhone and iPad. The reader supports standard ISO 7816 smart cards in addition to ones issued by the U.S. government, including PIV and CAC. iAuthenticate 2.0 is compatible with middleware applications for user authentication, digital signature, encryption/decryption, and secure access to web-based email, portals, and collaboration sites authenticated to CAC, PIV, or other approved smart cards. Customers have the option of purchasing iAuthenticate 2.0 bundled with the popular Sub Rosa® app from Thursby Software Systems, Inc. or can buy the middleware application of their choice separately.

“The uniVERSE Case System is designed to seamlessly protect your investment in mobile technology and enhance work productivity,” said Jim Myers, OtterBox Vice President of Commercial Sales. “The collaboration between Identiv and OtterBox has brought ruggedized, trusted protection for devices together with strong user authentication and security of data, confidential information, and IP. iAuthenticate 2.0 OtterBox enables the secure access of corporate resources, including email, files, and data, protecting everyone from individual users to government agencies.”

The OtterBox uniVERSE Case System is a mobile accessories platform featuring an accent plate on the back that slides out to reveal a rail mounting system. Identiv’s iAuthenticate 2.0 OtterBox slides into the uniVERSE mount, securing the reader to the case and plugging into the lightning port. Unlike competing products, removing the module is just as easy.

“iAuthenticate 2.0 OtterBox is a testament to two innovative companies working overtime to protect their customers,” said Dr. Manfred Mueller, Identiv COO and General Manager, Smart Card Readers and Credentials. “Our module enables the use of smart cards to access the device — eliminating reliance on complex but insecure passwords — opens the mobile application market to develop apps supporting smart cards, and doubles as a desktop CCID smart card reader and can be used with Windows, macOS, and Linux machines via the micro USB port. It’s fast, it’s secure, and we’re thrilled to reveal it to the market.”

Identiv’s iAuthenticate 2.0 OtterBox is available today. Learn more, find collateral, and buy at



XL Catlin and RedSeal Launch Cyber Insurance Industry’s First Dynamic Measure of Resilience to Gauge Risk, Improve Cybersecurity and Insurance Terms

NEW YORK, March 27, 2018 XL Catlin and RedSeal today announced a new, dynamic approach to cyber insurance, which uses an objective measurement of a network’s resilience to help underwriters more thoroughly evaluate their clients’ risks over time, helps clients continue to improve their cybersecurity and potentially improve their insurance terms.

Unlike other cyber insurance risk analyses, which rely on surveys and a general understanding of the network at the time of the initial underwriting, XL Catlin’s approach offers its clients a more accurate, dynamic and helpful service.

RedSeal’s patented network modeling and risk scoring platform creates a network model from the inside out, including physical assets, as well as those in public and private cloud environments. With this insight, RedSeal calculates the Digital Resilience Score, a holistic measure of the network’s resilience, similar to a credit worthiness score. The Score evaluates the client’s network to determine:

  • How weaknesses from incorrectly configured devices and third-party software could impact the network;
  • How accessible a company’s valuable assets are to attackers; and
  • The degree to which the network – including all its devices and their connections – is understood.

More resilient networks deliver higher scores, which means they are potentially lower risks. Once an XL Catlin client installs RedSeal and gets their initial Digital Resilience Score, and again during a mid-term evaluation, XL Catlin will determine if the client’s resilience warrants improved terms.

“We see this collaboration as a win-win for all involved,” said John Coletti, chief underwriting officer, cyber and technology, XL Catlin. “We’re giving our clients the option to create a cycle of continuous improvement in their cyber security efforts. Plus, our underwriters have more in-depth information to evaluate their risk and provide the most appropriate policy terms and pricing – and our customers can use the same information to improve their resilience and lower their risk.”

“The cyber insurance industry is evolving quickly, and technology companies are working to provide useful, data-driven solutions that matter,” said Ray Rothrock, CEO and chairman of RedSeal. “RedSeal’s platform of network modeling and scoring provides unique insights and hard to find issues within digital enterprises for both XL Catlin’s underwriters and their clients, which we expect will benefit both. We’re enabling a new, collaborative era in cyber insurance and cybersecurity.”

For more information on the joint offering from XL Catlin and RedSeal visit

About XL Catlin’s Insurance Operations
XL Catlin insurance companies offer property, casualty, professional, financial lines and specialty insurance products globally. Businesses that are moving the world forward choose XL Catlin as their partner. To learn more, visit

About XL Catlin
XL Catlin is the global brand used by XL Group Ltd (NYSE:XL) insurance and reinsurance companies which provide property, casualty, professional and specialty products to industrial, commercial and professional firms, insurance companies and other enterprises throughout the world. Clients look to XL Catlin for answers to their most complex risks and to help move their world forward. To learn more, visit

About RedSeal
RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprises to be resilient to cyber events across public cloud, private cloud and physical network environments. RedSeal helps customers understand their network from the inside out – providing actionable intelligence, situational awareness and a Digital Resilience Score to help enterprises measure and improve their resilience. Government agencies and Global 2000 companies around the world rely on RedSeal to help them validate their overall security posture, accelerate investigation and improve the productivity of their security and network teams. Founded in 2004, RedSeal is headquartered in Sunnyvale, California.

HID Global Launches Risk Management Solution for Identity & Access Management with Artificial Intelligence and Machine Learning Capabilities

HID Global®, a worldwide leader in trusted identity solutions, today introduced a new cyber threat and fraud detection service that brings artificial intelligence (AI) and machine learning to identity & access management, addressing the rising incidents of cyber attacks, especially against financial institutions.  The new HID Risk Management Solution is a real-time risk profiling technology that uses data analytics to protect financial transaction systems and banking applications against cybercriminals.  HID will demonstrate the new IAM solution at the RSA Conference 2018 in San Francisco next month (HID booth #4127 North). 

The ever-changing threat landscape that makes it more challenging to secure online and mobile financial applications has created an urgent need to improve the detection of fraud and cyber attacks and accelerate the prevention of costly damage.  The new HID Risk Management Solution meets this need by combining evidence-based detection capabilities and behavioral biometrics, supported by machine learning.  This HID cyber security solution is designed to protect banks, online merchants and service providers against zero-day malware, account takeover, phishing attacks and bots, among other threats.

“The HID Risk Management Solution gives businesses and consumers a new defense against cybercrime,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management (IAM) Solutions with HID Global.  “By combining HID’s expertise in identity and access management with new capabilities in AI and machine learning, we are enabling organizations to better manage risk, protect customer data and defend against fraud, malware and data breaches. The combination of our HID Risk Management Solution and our mobile-based authentication application, HID Approve, creates a unique blend of security and user authorization.”

Adding trust to online transactions and preserving the integrity of digital business interactions, the HID Risk Management Solution is fully integrated with HID’s ActivID® Authentication Platform, which provides multi-factor authentication to protect users’ IDs, transactions, devices and accounts. 

The merging of multi-factor authentication with the new level of AI-driven, cyber threat and fraud detection is a strategic advancement that delivers risk-based, frictionless and adaptive authentication based on data intelligence.  It increases security while optimizing the user experience as seamless – without any inconvenience to consumers. 

The HID Risk Management Solution is composed of three different risk-based engines that are fully integrated together and deliver a more accurate risk score than other systems from other vendors. 

  • Threat engine – detects generic threats and tracks device IDs, identifying application integrity tampering, malware and phishing attacks.
  • Behavior engine – creates a behavioral biometric profile of the user, including keyboard, mouse and swipe behavior, page navigation and application usage.
  • Anomaly engine – monitors the details of transactions in real-time, utilizing machine learning methods to identify anomalous sessions and transactions, as well as continuous analysis of hundreds of parameters. 

The risk score that is generated from these three “engines” enables more informed decision-making about the next action, whether to approve, block or reject a transaction.  The data analytics from the IAM solution creates new value for customers. 

For more information about HID Risk Management Solution, click here.

Stay Connected with HID Global

Visit our Media Center, read our Industry Blog, and follow us on FacebookLinkedIn and Twitter.

About HID Global

HID Global powers the trusted identities of the world’s people, places and things.  We make it possible for people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identified, verified and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and over 2 billion things are connected through HID technology. We work with governments, educational institutions, hospitals, financial institutions, industrial businesses and some of the most innovative companies on the planet. Headquartered in Austin, Texas, HID Global has over 3,000 employees worldwide and operates international offices that support more than 100 countries. HID Global® is an ASSA ABLOY Group brand. For more information, visit

# # #

Wombat Security Introduces New Insider Threat Training Modules

PITTSBURGH, March 27, 2018 -- Wombat Security (Wombat), a division of Proofpoint and the leading provider of security awareness and training, has released a series of three Insider Threat interactive training modules that will allow organizations to educate employees on the potential for employees to inflict damage—either intentionally or unintentionally—through data theft, response to phishing or other activity. The series of mini modules consist of an Insider Threat Overview, a Malicious Insider Threat course and an Unintentional Insider Threat course that present real-world scenarios to end users and allows them to explore the consequences of their choices in a no-risk environment.  

"Insider threats are among the most difficult to detect for a trusting, unassuming end user. Cybercriminals are relying less on automated attacks and instead using tactics like social engineering to exploit these people inside your company," said Amy Baker, Vice President of Marketing at Wombat. "At the same time, many current or former employees may have access to a treasure trove of sensitive or valuable information and could misuse that access for personal or professional gain. To make sure organizations are protected against attacks from the inside-out, they need to turn their attention to preparing employees to avoid unintentionally putting their information at risk."

The Insider Threat Interactive Training Modules will introduce a new capability to Wombat training called "branching," where the interactive content changes based on input from end users as they are presented with real-world cybersecurity scenarios. Users are asked to make a decision, then prompted to explore the consequence of their choice in a no-risk environment.

In addition to identifying potential insider threats, including behaviors that can indicate threatening or malicious intent, the module series also contains material on spotting and circumventing unintentional insider threats. Users are able to learn through real-world examples of how employees can unknowingly inflict damage in everyday scenarios and present ways to mitigate future threats with healthy computer habits.

For more information about the Insider Threat Interactive Training Modules, visit:

About Wombat Security
Wombat Security, a division of Proofpoint, is the leading provider of information security awareness and training software to help organizations teach their employees secure behavior for enterprises. Their SaaS-based cybersecurity education solutions include an integrated platform of knowledge assessments, simulated attacks, and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. The company has been recognized by Gartner as a Leader in the Magic Quadrant for Security Awareness Computer-Based Training Vendors for four years in a row. Founded in 2008, Wombat is helping mid-market, Fortune 1000, and Global 2000 customers to strengthen their cybersecurity defenses.


SOURCE Wombat Security

Related Links



Recent Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...