Market Sectors

block 10

<p>1</p>

Today's News

The American Waterways Operators Responds to Senate Vote Against Vessel Incidental Discharge Act

WASHINGTON, The Coast Guard Authorization Act of 2017, due to inclusion of the Vessel Incidental Discharge Act (VIDA) within the bill, failed by three votes to reach the 60 votes needed in the United States Senate to end debate and move to a vote on final passage. While the vote tally reflected bipartisan support for the Coast Guard authorization bill with VIDA included, the votes against included several senators who were previously supporters of VIDA, either in this Congress or the previous Congress: Sen. Chris Coons (D-Delaware), Sen. Mazie Hirono (D-Hawaii), Sen. Angus King (I-Maine), Sen. Edward Markey (D-Massachusetts), Sen. Brian Schatz (D-Hawaii), Sen. Jeanne Shaheen (D-New Hampshire), Sen. Mark Warner (D-Virginia), and Sen. Elizabeth Warren (D-Massachusetts).

In response to the vote, Thomas A. Allegretti, President & CEO of The American Waterways Operators, stated:

"The outcome of yesterday's vote on VIDA was a great disappointment to the men and women of the American tugboat, towboat and barge industry, who work tirelessly to support homeland security and to deliver annually over 760 million tons of vital commodities that drive our economy.

"VIDA is both critically important and thoughtfully balanced legislation. Currently, commercial vessels navigating American waters are subject to a patchwork of conflicting vessel discharge regulations issued by two federal agencies and 25 states. Our government does not require airplanes, trains or trucks to disrupt transit, switch out technologies and take on exceedingly high costs to meet a different environmental standard every time the vehicle crosses state lines. To require this of commercial vessels defies common sense and threatens the viability of maritime commerce – the most environmentally friendly mode of cargo transport – throughout the country, including in states like Delaware, Hawaii, Maine, Massachusetts, New Hampshire and Virginia.

"VIDA replaces today's unsustainable system with one under which the Coast Guard administers a single federal ballast water discharge standard, but maintains as that standard one that the EPA and National Academy of Sciences have deemed the most stringent currently available, and that can be raised over time as technology improves. The approach taken by VIDA is the reason it is supported by over 320 organizations representing U.S. and international vessel owners and operators; fishing vessel, passage vessel and charterboat operators; labor unions; marine terminals and port authorities; national business organizations; and industries that rely on maritime shipping to transport essential cargoes in domestic and international commerce. This legislation solves a serious regulatory problem while protecting the environment – a point on which at least 60 senators had agreed for many months, until yesterday.

"We remain committed to working on a bipartisan basis to see VIDA enacted into law, and we call on the Senate to resolve any outstanding issues before adjourning for Memorial Day recess. The American maritime workforce, which urgently needs the balanced, common sense regulatory relief that VIDA provides, deserves no less."

About AWO

The American Waterways Operators is the national trade association representing the tugboat, towboat and barge industry, which operates on the rivers, the Great Lakes, and along the coasts and in the harbors of the United States.  Barge transportation serves the nation as the safest, most environmentally friendly and most economical mode of freight transportation.  For more information about AWO, please visit www.americanwaterways.com.

Raytheon, Virsec establish alliance to protect government and critical infrastructure from advanced cyberattacks

DULLES, Va., April 23, 2018 -- Raytheon Company (NYSE: RTN) announced an alliance with Virsec to bring commercial cybersecurity tools to global government and critical infrastructure customers. Combined with Raytheon's decades of cybersecurity defense expertise, Virsec's patented Trusted Execution™ technology protects networks by detecting deviations in software applications caused by cyber intrusions.

 

"Critical infrastructure – from the electrical grid to transportation – is under assault, and hackers are evading conventional security defenses," said John DeSimone, vice president of Cybersecurity and Special Missions at Raytheon Intelligence, Information and Services. "Commercial tools from companies like Virsec can help bridge the gap for our global government and commercial customers and provide effective protection against the growing cyber threat."

Trusted Execution protects against attacks on critical systems that bypass conventional network security tools using advanced hacking techniques and memory exploits.  Commercially available, this technology protects memory and processes in real-time and instantly detects deviations in software applications. This deterministic process blocks attacks within milliseconds, providing precise forensics at every step.

"It's time to change the equation for security and deliver better protection for our most critical infrastructure," said Atiq Raza, CEO of Virsec. "Our philosophy is simple – rather than eternally chasing elusive threats, we need to take the guess-work out of cybersecurity and stop attacks, at the application level, in real-time."

About Virsec

Based in San Jose, California, Virsec was founded on the belief that a new model is required to counter today's advanced threats. The company is led by industry veterans who have driven one of the world's top processor teams, and created innovative technology in network security, embedded systems and real-time memory systems. The team has broad leadership experience at multiple leading cybersecurity and information technology companies, as well a long list of high-growth start-ups. More information and demos are available at www.virsec.com.

About Raytheon

Raytheon Company, with 2017 sales of $25 billion and 64,000 employees, is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. With a history of innovation spanning 96 years, Raytheon provides state-of-the-art electronics, mission systems integration, C5I™ products and services, sensing, effects, and mission support for customers in more than 80 countries. Raytheon is headquartered in Waltham, Mass. Follow us on Twitter.

Mexico strengthens border with SITA biometrics

The Federal Government of Mexico is strengthening border control by automating the entry process with the introduction of SITA’s Automated Border Control kiosks. The new kiosks will use biometric technology to capture fingerprints to verify passengers’ identities and improve national security.

Mexico iBorders kiosksSITA has rolled out 100 kiosks across three major airports. These international airports, in Mexico City, Cancun and Los Cabos, are operated by three airport companies – Aeropuerto Internacional de la Ciudad de México (AICM), Grupo Aeroportuario del Sureste (ASUR) and Grupo Aeroportuario del Pacífico (GAP). SITA is the systems integrator across the project delivering to the needs of all the Mexican authorities and the private enterprises in the various locations.

Enrique De la Madrid, Secretary General, SECTUR, the Mexican Ministry of Tourism, said: “As visitor numbers at international airports grow, the need for migration agents grows as well, but we have the technology to help us overcoming that challenge. This automation will ensure security and facilitate the arrival of visitors to the country."

Gerardo Ruiz Esparza, Secretary General, SCT, the Mexican Ministry of Communications and Transportation, said: “The installation of these kiosks represents another example of the implementation of state-of-the-art technology in Mexico, aimed at preserving the safety of people and their goods, as well as facilitating activities related to aviation. Automating the entry of domestic and foreign passengers who do not require a visa is achieved by capturing biometric data (fingerprints, photography and scanning of the passport), which quadruples the capacity of passenger attention for each migration agent."

Elbson Quadros, SITA Vice President, Latin America, said: “This is an exciting development in Mexico. The country is well known for its tourism and our automated border control kiosks will improve the experience for passengers at these key airports. As with most border management operations, making this improvement involves many government agencies working together with various airport operators. SITA is the integrator working with all parties, drawing on our decades of border automation experience with more than 40 governments worldwide, to deliver a secure and seamless passenger journey in Mexico.”

Initially, the SITA automated border control kiosks will be used to securely identify passengers as they enter the country. In time, they will facilitate the full admission process for Mexican citizens and those non-citizens who do not require a visa for entry. Arriving passengers will use the kiosks to provide standard travel information to the authorities, place their hand to be scanned for fingerprints and then once their identity is verified against the INM (National Institute of Immigration) database they will be given the all clear to enter the country.

Automating the entry process will help speed up passenger processing while maintaining high levels of security. SITA border technology enables governments to clear large numbers of passengers in record time. Travelers from up to five SITA iBorders® BorderAutomation ABCKiosks can be managed from just one immigration counter and these kiosks have been shown to reduce the time passengers spend in line by as much as 40%.

Gerardo Garcia, Commissioner to INM, the National Institute of Immigration, said: “Automation increases security and efficiency. Increased numbers of low-risk passengers are processed quickly, conveniently, and cost-effectively while we maintain the security and integrity of our border. By automating the arrival process using SITA’s world-class biometric kiosks, we will improve the speed and accuracy of checks of passengers arriving in Mexico.”

The full rollout across Mexico City, Cancun and Los Cabos International airports is now complete and the 100 SITA kiosks are expected to securely process close to eight million arrivals in the first year.

Expert Providers Deliver School Emergency Management Solution

VINELAND, N.J., April 12, 2018 -- ComTec Cloud, Division of ComTec Systems Inc., and Sonitrol Security of Delaware Valley announced today that they have standardized the design and installation of a new Education Security and Monitoring System to provide advanced security and enhanced communications for schools.

"ComTec is proud to continue our legacy of providing leading technology solutions to the educational community," said Mike Vertolli, President of ComTec Systems. ComTec Cloud Services built the iConnect-EDU platform and integrated ALERT Advanced Layered Emergency Response Tools modules for enhanced safety and communications: from automatically locking down the school and integrated emergency paging, to in-building signage, we are helping to protect our students and community."

The offering includes hardware and software to trigger an emergency response; an emergency notification system; integration with core systems including access control, Sonitrol Intrusion Detection with live audio feeds to the Sonitrol central station, the phone system, and the school public address system; and strobe lights, emergency buttons, and signage within the buildings. The emergency notification solution is integrated with a smartphone app to communicate with parents, students, and staff.

"This solution leverages the full capabilities of Sonitrol. After over 53 years in the security industry, Sonitrol has delivered services to over 12,000 schools nationally and over 400 in PA, NJ, and DE.  With the launch of our school alerting solution, we are offering an array of cutting-edge safety tools that better enable school districts to offer the best information to emergency responders, staff, parents, and students in the event of a situation," said Joe Allen, Vice-President/Owner of Sonitrol. "With 24x7 live monitoring and the active alerting system, this will give parents peace of mind."

The notification technology provides needed information on a timely basis.  With both SMS and in-app notifications, the system is a powerful way to communicate in a controlled manner.  The system allows one-way alerts, for example, a late opening message, and also enables two-way communications, for instance, the athletic staff can acknowledge that they will turn on the field lights.  Authorized users can push a message to thousands or a few individuals, and require acknowledgment or reply if necessary.

"We always wanted Cumberland County TEC to be at the forefront of technology and safety.  CCTEC was designed to represent the best technology in a next generation school.  We have done a great deal of research on the technology options for this solution.  ComTec's integrated mass notification system combined with Sonitrol's security and safety offering has delivered the community a state of the art platform that has exceeded all expectations," said Gene Mercoli, Business Administrator of Cumberland County Technology Education Center. "ComTec and Sonitrol worked well with Garrison Architects and Pennoni Associates to design the solution into our infrastructure.  This enhanced communications technology will deliver real-time information to emergency responders, staff, parents, and even students. The ability for the school to require acknowledgment to notifications will positively impact our daily activities."

To learn about this exciting solution, please join us for an interactive event with lunch on Thursday, April 26th at Flying Fish Brewing Company in Somerdale, NJ at 900 Kennedy Blvd from 1:30 PM to 4:30 PM.  RSVP with Claudia at 877-652-3060 or [email protected]

About ComTec
ComTec Systems has been delivering technology solutions since 1988 and has evolved into one of the fastest growing and most successful business telecommunications and managed cloud services providers. ComTec Systems has four divisions— ComTec Cloud Services, ComTec Consulting, ComTec USA and ComTec Financial Services. Together they provide clients with the latest technologies to address their essential business needs. More information at https://ComTecCloud.net.

About Sonitrol
Since 1964, Sonitrol Security of Delaware Valley has been the trusted name for providing security to businesses and Educational Facilities in North America, with a combination of human know-how and the latest technology.  We often catch criminals before they gain entry to our customers' facilities.  Sonitrol Security of Delaware Valley provides unique audio intrusion detection, access control, video surveillance and fire detection systems, and has assisted in over 176,000 documented apprehensions.  More information at https://sonitrolde.com.

About Cumberland County Technology Education Center

Cumberland County Technology Education Center (CCTEC) is a four-year vocational public high school located in Bridgeton, New Jersey that serves students in ninth through twelfth grades from across Cumberland County, New Jersey, operating as part of the Cumberland County Vocational School District.  More information at https://www.cumberland.tec.nj.us

Netwrix Adds Data Discovery and Classification Functionality to Netwrix Auditor

IRVINE, Calif., April 12, 2018 -- Netwrix Corporation, provider of a visibility platform for data security and risk mitigation in hybrid environments, today announced the release of Netwrix Auditor – Data Discovery and Classification Edition. The new edition provides complete visibility into where sensitive files are, what content is inside them, who can access these files and who actually uses them, so organizations can mitigate the risk of data breaches and prove the effectiveness of their security controls.

Netwrix Auditor – Data Discovery and Classification Edition was developed in partnership with Concept Searching, the global leader in semantic metadata generation. The solution empowers risk, compliance, data security officers and IT security pros to prioritize their efforts and secure data in accordance with its value or sensitivity. It enables them to mitigate the risk of PII, PHI, PCI and IP being stored outside dedicated locations and apply controls and policies consistently and accurately, so their organization can ensure both data security and regulatory compliance.

The key features include:

  • Deep insight into sensitive data
    New predefined reports provide visibility into where sensitive files are, what content is inside them, who can access the files and who actually uses them. Subscriptions automate report delivery to any stakeholders.
  • Fast and accurate search of sensitive data
    The new edition empowers you to quickly hone in on files containing very specific information —without any downtime or having to create new rules. For example, you can quickly find all personal data related to an individual in order to comply with the GDPR's "right to be forgotten."
  • Reusable index
    A unique ability to accumulate complex, multi-term metadata — not based on phrases, proximity, keywords or pre-configured taxonomies — eliminates the need to re-index the entire data repository whenever a classification rule is added or changed.
  • Predefined and custom discovery rules
    Out-of-the-box rules for identifying data protected by GDPR, PCI DSS, HIPAA and other regulations simplify the discovery process. Granular settings can be customized to find the exact data that matters to the business.
  • Statistical, concept-based analysis
    Statistical analysis of multi-word concepts ensures a better understanding of the sensitive information patterns specific to the organization and provides more relevant results than are possible by relying solely on keywords and semantic analysis.
  • Incremental indexing
    New files and changes to existing files are automatically detected and quickly indexed and classified, without full re-collection.

"One of the most significant aspects of data protection is the ability to prioritize your security efforts to ensure your business-critical data is under close surveillance. Apart from dealing with evolving cyber threats, organizations now have to ensure compliance with the GDPR and provide hard evidence that sensitive files are not overexposed and data is processed securely. Netwrix Auditor – Data Discovery and Classification Edition can help companies gain a high-level view of what's going on with their sensitive data and easily understand which data requires more attention, so they can improve the effectiveness of their security strategies and increase business value," said Steve Dickson, CEO of Netwrix.

Netwrix Auditor is a visibility platform for data security and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage.

Netwrix Auditor – Data Discovery and Classification Edition is available worldwide starting April 12, 2018. Learn more: https://www.netwrix.com/data_discovery_and_classification.html

Raytheon contracted to demonstrate Army mobile intelligence platform

STERLING, Va. -- Raytheon Company (NYSE: RTN) has been awarded a U.S. Army contract to demonstrate the company's commercially available mobile intelligence platform that will allow soldiers to quickly collect and access information on the battlefield.

This commercial laptop-based platform, called the FoXTEN, may be considered as a future mobile component of the Army's Distributed Common Ground System. DCGS is an intelligence, surveillance and reconnaissance system that enables deployed soldiers to collect, process and display intelligence information from a variety of sources and sensors. The Army is upgrading their existing DCGS system with a series of new components and capabilities, including the mobile platform.

"Our soldiers need real-time access to intelligence and surveillance data, and FoXTEN is designed to get that information to and from the most remote edges of the battlefield," said Todd Probert, vice president of Mission Support and Modernization at Raytheon Intelligence, Information and Services. "We'll be bringing our deep experience integrating the best commercial software into a system our soldiers can trust to keep them constantly aware of threats and give them the advantage they need to win on any battlefield."

Under the contract awarded by the U.S. Army Contracting Command, Raytheon will demonstrate the company's FoXTEN software product, which can be loaded onto a commercially procured laptop and easily deployed and used by soldiers operating in the field. FoXTEN quickly connects warfighters to intelligence from various sources, giving them the real time information they need to make mission decisions across all battle domains. FoXTEN, when loaded onto a laptop, is lightweight, requires little power and can operate at low-transmission speeds.

"Our system is intuitive, easy to use and only takes eight hours of training compared to the current system," said Probert. "It's also completely open, allowing the Army to integrate new capabilities from any developer. The system is designed from the ground up to be easily upgraded so our soldiers always have the best technology and intelligence in their hands."

The Army will conduct a series of operational tests of the FoXTEN software over the next year before making a final procurement decision.

Vectra Cognito Platform Now Available for the Department of Homeland Security Continuous Diagnostics and Mitigation Program

SAN JOSE, Calif., April 12, 2018 -- Vectra, the leader in automating the hunt for in-progress cyberattacks, today announced that its Cognito platform is now available under the Department of Homeland Security (DHS) Continuous Diagnostics and Mitigation (CDM) Program, enabling 66 Federal Civilian Agencies, as well as State and Local Government entities, to purchase Vectra cybersecurity products.

The CDM Program provides DHS with the capabilities and tools needed to identify cybersecurity risks on an ongoing basis, prioritize these risks based on potential impacts, and enable cybersecurity personnel to mitigate the most significant problems first.

"Vectra is committed to meeting the needs of the Federal Government to help protect its infrastructure from malicious nation-state actors and other threat actors that attempt to exploit Government IT systems and networks," said Sonia Walia, head of Federal sales at Vectra.

"Our technology uses patented artificial intelligence to identify attacker behaviors in real-time so security teams can take action before damage is done," Walia added. "We believe our industry-leading technology is one reason that Vectra Networks was named as the sole Visionary* in the 2018 Gartner Magic Quadrant for Intrusion Detection and Prevention Systems."

Congress established the CDM Program to provide adequate, risk-based, and cost-effective cybersecurity and efficiently allocate cybersecurity resources. Vectra Cognito is approved for purchase by all civilian organizations and the DoD for CDM Phase 3 DEFEND, which focuses on incident response and ongoing assessment.

The Vectra Cognito platform was approved for CDM Phase 3 DEFEND by continuously detecting attacker behaviors in real time, correlating alerts into incidents, and prioritizing the highest-risk threats. This reduces attacker dwell-time and speeds-up incident response – from cloud and data center workloads to user and internet-of-things devices – leaving attackers with nowhere to hide.

"Vectra is again proving that measurable improvement in enterprise cybersecurity is not only essential, but effective and affordable," said Jane Holl Lute, president and CEO of SICPA North America and former CEO of the Center for Internet Security (CIS).

Learn more about Vectra Cognito for the Federal market at https://vectra.ai/federal. Also download the 2018 RSA Conference Edition of the Attacker Behavior Industry Report at https://info.vectra.ai/2018-abir. To schedule a meeting with top Vectra executives at the RSA Conference, visit https://info.vectra.ai/rsa-2018-engage-with-vectra.

*Gartner, "Magic Quadrant for Intrusion Detection and Prevention Systems," Craig Lawson, Claudio Neiva, 10 January 2018.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Vectra 
Vectra® is transforming cybersecurity with AI. Its Cognito platform automates cyberattack detection and response from data center and cloud workloads to user and IoT devices. Cognito correlates threats, prioritizes hosts based on risk and provides rich context to empower response with existing security systems, reducing security operations workload by 32X. Vectra was named the "Most Innovative Emerging Company" in the Dark Reading Best of Black Hat Awards. InformationWeek also named Vectra one of the Top 125 companies to watch in 2016. Vectra has been issued five U.S. patents with 14 additional patents pending for cybersecurity applications of machine learning and artificial intelligence. Vectra is headquartered in San Jose, Calif. and has European regional headquarters in Zurich. For more information, visit vectra.ai.

Palo Alto Networks Announces Intent to Acquire Secdo

SANTA CLARA, Calif., April 10, 2018 -- Palo Alto Networks® (NYSE: PANW), the next-generation security company, today announced that it has entered into a definitive agreement to acquire Israel-based Secdo. The acquisition brings sophisticated endpoint detection and response, or EDR, capabilities – including unique data collection and visualization – to Palo Alto Networks Traps™ advanced endpoint protection and the Application Framework in order to enhance their ability to rapidly detect and stop even the stealthiest attacks

Secdo's team of elite engineers will complement the deep security expertise and innovation inside the Palo Alto Networks research and development organization. The company's thread-level approach to data collection and visualization goes far beyond traditional EDR methods, which only collect general event data, hamstringing security operations teams as they try to reconstruct each step of an attack and distinguish malicious activity from normal. Once integrated with Traps and the Palo Alto Networks platform, this rich data will feed into the Logging Service and give applications running in the Palo Alto Networks Application Framework greater precision to visualize, detect and stop cyberattacks.

"We believe security operations teams need the most advanced and consistent approach to endpoint security. With Secdo's EDR capabilities as part of our platform, we will accelerate our ability to detect and prevent successful cyberattacks across the cloud, endpoint, and network."  —  Mark McLaughlin, chairman and CEO of Palo Alto Networks

"We are delighted to join the Palo Alto Networks team. We founded Secdo to dramatically increase visibility for security operations teams to reduce the time it takes to detect and respond to an alert. The combined capabilities of Secdo and Palo Alto Networks will provide customers the capabilities they need to swiftly and accurately detect and respond to cyberattacks."  — Shai Morag, co-founder and CEO of Secdo

The acquisition is expected to close during Palo Alto Networks fiscal third quarter, subject to satisfaction of customary closing conditions. Terms of the acquisition were not disclosed.

About Secdo
Secdo combines Next-generation Endpoint Detection and Response with Security Automation to provide the only purpose-built solution that force multiplies the productivity of security operations teams' day-to-day, allowing them to get ahead and be proactive in defense. Secdo makes this possible with a patented technology that uses assisted learning combined with the only thread-level visibility to automatically investigate and respond to every alert from any security technology, increasing ROI of current technology investments, resolving staff shortage issues and providing quantifiable risk reduction by cutting the security alert triage, response and remediation process down to seconds.

About Palo Alto Networks

Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organizations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com.

Palo Alto Networks, Traps and the Palo Alto Networks logo are trademarks of Palo Alto Networks, Inc. in the United States and in jurisdictions throughout the world. All other trademarks, trade names or service marks used or mentioned herein belong to their respective owners.

Waratek to Demo Lightweight Application Patching Agent at RSA

DUBLIN and ATLANTA, April 10, 2018 -- Waratek, the virtualization-based application security company, announced today the company will be demonstrating Waratek Patch at RSA 2018. Waratek Patch is a tool for Java and .NET applications that applies virtual patches for long-term and newly discovered vulnerabilities.

Waratek Patch is a lightweight agent that allows security and development teams to easily create and apply custom patches based on scanning tools. Regular updates from Oracle, Microsoft, Apache and other software developers can also be instantly deployed using functional-equivalent "virtual" patches that operate just like a physical binary without delay and the risk of breaking an application

With Waratek Patch, organizations can quickly and easily improve compliance with company, industry and government regulations such as the GDPR and New York Department of Financial Services by reducing the time to apply required critical patch updates.  

Cybersecurity breaches in the month of April are stark reminders of the need for organizations to secure vulnerabilities in their networks. Under Armour, Panera Bread, Delta Air Lines, retailers Best Buy, Sears, Saks Fifth Avenue, Saks Off Fifth, and Lord & Taylor stores are among companies reporting successful cyberattacks resulting in the loss of valuable customer data. The scale of these security breaches highlights the importance of detecting software flaws and patching vulnerable software before attackers have the chance to take advantage of a flaw.

Waratek Patch is one of three solutions in Waratek's Runtime Application Security Platform. Waratek Secure offers highly accurate "always-on" protection against the OWASP Top Ten, SANS Top 25 and other known attacks with no code changes. Waratek Enterprise combines the features of Patch and Secure, and adds the ability to virtually upgrade applications built on out of support Java applications without source code changes.

Waratek will be demonstrating their products at RSA at booth #4341 in the North Hall of the Moscone Center in San Francisco, CA.

For more information on Waratek please visit https://www.waratek.com/

About Waratek

Waratek is a pioneer in the next generation of application security solutions.  Using patented technology, Waratek makes it easy for security teams to instantly patch known flaws, virtually upgrade out-of-support Java applications, and protecting against known and unknown attacks – all without time consuming and expensive code changes or unacceptable performance overhead.

Waratek is one of CSO Online's Best Security Software solutions of 2017, a winner of the RSA Innovation Sandbox Award, and more than a dozen other awards and recognitions.

Waratek is based in Dublin, Ireland and Atlanta, Georgia. For more information visit https://www.waratek.com/

Media Contact
Mike Gallo for Waratek
Lumina Communications
(212) 239-8594
[email protected]

 

SOURCE Waratek

Related Links

http://www.waratek.com

Hikvision North America Unveils New Websites Designed for Partners

LOS ANGELES, April 10, 2018 -- Hikvision USA Inc. and Hikvision Canada Inc., a top provider of artificial intelligence, machine learning, robotics and other emerging technologies, and the leading supplier of video surveillance products and solutions, today announced the launch of new websites for Hikvision USA Inc., Hikvision Canada Inc., and a French language website for Canada.

Managed by the Hikvision North America marketing team, the new websites were developed on a dynamic content management system and feature a responsive design optimized for mobile devices. The mobile element enhances the user experience for all, and will be particularly useful to techs in the field.

"Our integrator, A&E, distributor, and other partners told us they wanted a website that's fast, easy to navigate, and optimized for mobile devices," said Alex Asnovich, Head of Marketing, Hikvision North America. "Hikvision listened, and the new websites are designed with our partners in mind."

A complete overhaul of the user interface, improved navigation, and taxonomy in the new websites make it easier for Hikvision partners to find the Hikvision resource they're looking for. All North American websites are quickly updated with the latest products and resources.

Powered by Amazon Web Services, the Hikvision sites have faster page load times, and one consistent user interface for all customers, offering up-to-date tools and resources. External portals and logins have been eliminated. Hikvision HDPs, A&Es, and distributors can now create user accounts and log in to our website for exclusive access to privileged information.

To keep up with the latest Hikvision news, follow us on Twitter @HikvisionUSAinc and @HikvisionCanada

About Hikvision:

Hikvision is a leading provider of artificial intelligence, machine learning, robotics and other emerging technologies, and is the world's largest video surveillance manufacturer. Featuring an extensive and highly skilled R&D workforce, Hikvision manufactures a full suite of comprehensive products and solutions for a broad range of vertical markets. Beyond security, Hikvision products provide important data and business intelligence for end users, which can be used to enable greater commercial success and more efficient operations. Committed to the utmost quality and safety of its products, Hikvision encourages partners to take advantage of the many cybersecurity resources Hikvision offers, including the Hikvision Security Center.

SOURCE Hikvision USA Inc.

Pages

 

Recent Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...