NEW YORK, Aug. 15, 2017 (GLOBE NEWSWIRE) --
Thank You For Joining Us "In The Boardroom" On SecuritySolutionsWatch.Com
Kurt Takahashi, President, AMAG Technology - A G4S Company
Marc Blackmer, Cisco, Product Marketing Manager, Industry Solutions, Security Business Group
Samir Shah, CEO, Cyberinc
Ken Mills, General Manager, Dell EMC, Surveillance and Security
Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security
Steve Visconti, President & CEO, Extenua
Jim Miller, ImageWare Systems, Chairman and CEO
Scott B. Suhy, CEO, Netwatcher
*****
- AMAG Technology - A G4S Company, Kurt Takahashi, President
www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html
www.AMAG.com
AMAG Technology’s Symmetry™ Security Management Solutions are deployed across a wide variety of market segments from commercial to government, education, healthcare, banking, transportation, utilities, plus many more. Headquartered in Torrance, California with sales and support located throughout the Americas, EMEA, APAC and LATAM, AMAG provides customers with industry leading unified security solutions. AMAG Technology is part of G4S plc, the world’s leading global integrated security company which has operations on six continents and 585,000 employees. As the industry leader, AMAG focuses on delivering the latest technology to meet market needs. Its next generation of Symmetry security solutions help organizations operationalize their business to mitigate risk, meet compliance requirements and save money.
For our complete interview with Kurt Takahashi, President, AMAG Technology - A G4S Company, please click here or here: www.securitysolutionswatch.com/Interviews/in_Boardroom_AMAG_Takahashi.html
In recent news:
AMAG Technology Welcomes Matica Technologies to the Symmetry Preferred Partner Program
http://www.amag.com/en/Company/News/2017/08/14/Matica
Telaeris Joins AMAG Technology's Symmetry Preferred Partner Program
http://www.amag.com/en/Company/News/2017/08/07/Telaeris
Nortech Joins Amag Technology's Symmetry Preferred Partner Program
http://www.amag.com/en/Company/News/2017/06/20/Nortech
*****
- Cisco, Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Cisco_Blackmer.html
Cisco Blog
Marc Blackmer, Product Marketing Manager, Industry Solutions, Security Business Group, Cisco, shared with us, “We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“ More
*****
- Cyberinc, CEO, Samir Shah
www.securitysolutionswatch.com/Interviews/in_Boardroom_Shah_Cyberinc.html
www.Cyberinc.com
Samir Shah, CEO, Cyberinc, told us, "Isla represents an entirely new approach to cyber security. Until now security solutions have always been based on detecting “bad things” and blocking them from running. Anti-Virus tries to detect “bad files”, Web Filters try to detect “bad websites”, the list goes on and on. Isla takes a different approach to the problem. Instead of detecting “bad” things, Isla simply isolates ALL web content in a specialized environment located outside of an organization's sensitive network. Since ALL content is isolated no attacks can ever “slip through the cracks” and compromise the user. This is a simple, yet powerful approach. Since organizations vary so widely, Isla is offered in a number of ways to suit each potential customer's needs. Isla can be deployed as an appliance directly at a customer's office, it can be deployed in a customer's existing cloud data centers or it can be delivered as a pure Cloud service by a Cyberinc Isla Cloud Service partner. More "
In recent news:
https://cyberinc.com/news/bpt-introduces-cyberinc-isla-web-malware-isolation-system-in-indonesia/
Cyberinc included in “Cool Vendor” list by Gartner in Endpoint, Mobile, Network and Gateway Security, 2017
https://cyberinc.com/news/cyberinc-included-in-gartner-cool-vendor-list-2017/
Cyberinc powers expansion of Isla® into global markets: Signs partnership with Hewlett Packard Enterprise (HPE)
https://cyberinc.com/news/cyberinc-signs-partnership-with-hewlett-packard-enterprise/
*****
- Dell EMC, Director Sales & Marketing Americas, Surveillance and Security, Nicholas Thermenos
http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Thermenos_DeLLEMC.html
https://www.emc.com/storage/video-surveillance-storage.htm
Nicholas Thermenos, Dell EMC, Director Sales & Marketing Americas, Surveillance and Security, told us, “Video Surveillance is going through a fast-paced digital transformation from low cost, decentralized data repositories to true Enterprise Class, centralized infrastructure requirements. The increase in IP cameras, retention times, and the assurance that data will be available when needed, is moving customers to find new ways to retain, store and access video surveillance data. Business leaders are beginning to recognize that there are valuable insights to be gained from the vast amount of data that is being collected. Customers, particular business leaders, are looking to capitalize on the data contained in these video images. Both of these trends are changing the landscape of storing and accessing video.”
“Dell EMC is in the position to provide the broadest portfolio of leading technologies to address any and all of our customers’ needs. From the edge to the cloud Dell EMC has proven architectures to provide almost any solution required. With Isilon our customers can build centralized data and analytics data lakes scaling to over 50PB and with incredible management efficiency. Our servers and SAN arrays can scale to handle smaller or decentralized environments and we can leverage cloud tiers for long-term archive requirements. We can connect this with a wide array of network switches to provide and complete end-to-end solution, and we are unique in that aspect.” More
- Dell EMC, General Manager, Surveillance and Security, Ken Mills
www.securitysolutionswatch.com/Interviews/in_Boardroom_KenMills_GeneralManager_DeLLEMC.html
https://www.emc.com/storage/video-surveillance-storage.htm
Ken Mills, Dell EMC, General Manager, Surveillance and Security, told us, “It is an exciting time to be at Dell EMC right now. Dell Technologies is now #1 In Everything, All in 1 Place and we are bringing this world-class portfolio to the surveillance market. Never before, have our customers and partners been able to modernize their surveillance infrastructure with an end-to-end portfolio like we have at Dell EMC. We are leveraging the same industry-recognized surveillance lab to expand our validated solutions to include the entire Dell EMC portfolio. This is a huge step forward for the industry where for the first time, our customers and partners can purchase with confidence all of their surveillance infrastructure needs from one place - Dell EMC.”
“Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe.” More
FOR MORE INFORMATION:
Learn here about Dell EMC Surveillance Solutions and the Solutions Portfolio here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!solution_portfolio
For Dell EMC Partner Validations, please click here or here: https://www.emc.com/storage/video-surveillance-storage.htm#!partner_validations
Please click here for the Dell EMC VIGILARE BLOG - Surveillance and Public Safety Emerging Trends
or click here: http://vigilareblog.emc.com/
*****
- Extenua, President and CEO, Steve Visconti
www.securitysolutionswatch.com/Interviews/in_Boardroom_Extenua_Visconti.html
www.Extenua.com
Extenua has released a most timely white paper…
This free white paper discusses the challenges of keeping ransomware (Cryptolocker, WannaCry, and the like) out of the corporate data storage, whether it is local, in the cloud or hybrid.
CLOUD2DRIVE-PROTECTED ONLINE STORAGE IS IMPERVIOUS TO RANSOMWARE BY USING SILVERSHIELD
“Ransomware is a type of malware that restricts access to the infected computer system, and demands that the user pay a ransom to the malware operators to remove the restriction. Probably the most famous ransomware, even though not the only one, is Cryptolocker, and it’s certainly something you don’t want to deal with. Regardless of the strenuous efforts put in place by Antivirus developers, the rate of infection is astonishing, and these days it’s becoming even worse with an unprecedented outbreak of infection. To make things even worse, ransomware can also access all the shared folders on your NAS/SAN, so if you backup to a network drive your backups will be compromised too. The ransomware goals include, in fact, preventing you from being able to restore your old (healthy) data from a backup.”
“Even in case your systems are infected by a ransomware,
you will simply be able to format your computer,
reinstall your operating system,
and restore all your data from an always-healthy backup.”
Download the complete White Paper (in PDF format)
http://dl.extenua.com/no-ransomware.pdf
*****
- ImageWare Systems, Chairman and CEO, Jim Miller
www.securitysolutionswatch.com/Interviews/in_Boardroom_ImageWare.html
www.iwsinc.com
ImageWare Systems, Inc. (ImageWare or IWS) (IWSY), a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has issued financial results for the second quarter ended June 30, 2017, as well as a corporate update to highlight the company’s progress since its last quarterly update on May 10, 2017.
Operational Highlights
- Expanded agreement with Fujitsu to support mobile devices and actively market the GoVerifyID suite of products in Europe, Middle East, India, Africa and the Americas.
- Entered a resell agreement with Info X Distribution, a global distributor of storage and networking solutions, to market and sell the GoVerifyID Enterprise Suite.
- Recognized by CIO Applications as one of the “Top 25 Cyber Security Companies for 2017.”
- Finalized the integration of biometric identity management and credentialing software into five Alaskan airports.
Management Commentary
“Our second quarter was highlighted by several partnership developments,” said Jim Miller, ImageWare’s chairman and CEO. “In addition to expanding Fujitsu’s biometric security portfolio to support mobile devices, we entered into a reseller agreement with Info X Distribution for our GoVerifyID Enterprise Suite and SaaS solutions, and also completed the integration of our identity management and credentialing software into five Alaskan airports. In May, we were honored to be recognized by CIO Applications as one of the ‘Top 25 Cyber Security Companies for 2017,’ further validating our strong positioning and brand awareness in the marketplace.” More
Jim Miller, Chairman and CEO, ImageWare Systems, OTCQB: IWSY, told us, “With data breaches happening every day and causing damage to your brand, tangible economic loss, and termination of employment for executive management charged with oversight, enhancing security without compromising user experience is a priority for today’s organizations. Multi-modal biometrics for user authentication handles this requirement and that’s what ImageWare does. We have invested substantial time and effort into making the implementation of biometric security simple, quick, and cost-efficient. Being a pioneer in biometrics, with several decades of experience, ImageWare has built its brand through deployments in law enforcement applications, later migrating to secure biometric credentialing, and more recently, to authentication in the cloud using smart mobile devices. At the heart of all of our product offerings is the patented IWS Biometric Engine® (BE), which provides an ultra-scalable, real-time, multi-modal biometric enrollment and matching database specifically built for biometrics. The BE supports a dozen different biometric modalities today and adding new modalities is simple and straight forward. As we say, “we secure your future,” meaning that we not only satisfy your current security requirements, but we also secure your investment as new biometric technology becomes available. We treat biometrics as “plug and play,” so you can take advantage of new advancements with no loss to your current investment.” More
For more information:
About ImageWare Systems (https://iwsinc.com/about)
ImageWare Systems Markets (https://iwsinc.com/solutions)
ImageWare Systems Products (https://iwsinc.com/products)
ImageWare Systems News (https://iwsinc.com/category/news)
ImageWare Systems Investors (https://iwsinc.com/about/investors)
ImageWare Systems Partners (https://iwsinc.com/partners)
ImageWare Systems Resources (https://iwsinc.com/resources)
ImageWare Systems Patent Portfolio (https://iwsinc.com/about/intellectual-property/)
*****
- NetWatcher, CEO, Scott B. Suhy
www.securitysolutionswatch.com/Interviews/in_Boardroom_Netwatcher_Suhy.html
www.NetWatcher.com
Scott Suhy, CEO, NetWatcher, told us, "There is a giant opportunity here for MSPs at the moment. If you look at each vertical by employee size and count up the number of companies that fit into each just in the USA the numbers are staggering All of these organizations are moving to a more advanced security footprint over the next several years. You also know that they will first look to their MSP partner to provide the advanced stack and if you can’t provide it, they will find a MSP that can provide the stack and manage it for them.
We built NetWatcher to enable MSPs to easily offer their own Security Monitoring / Managed Security / Managed Detection and Response service. We designed and built NetWatcher from the ground up for SMBs and MSPs. We built the service to be easy to install, easy to use for SMB/MSP IT professionals (not hard to find security analysts–although, analysts tend to love it too) and affordable. MSPs will also find the multi-tenant single pane of glass user interface where they can manage all their customers — and the ConnectWise integration very valuable.” More
*****
SecuritySolutionsWatch.com Is Proud To Be A Sponsor Of These Important Upcoming Events
MARK YOUR CALENDAR!
*****
Cyber Intelligence Europe 2017
Bucharest, Romania
5th September 2017 - 7th September 2017
http://www.intelligence-sec.com/events/cyber-intelligence-europe-2017
Cyber Intelligence Europe will take place in Bucharest, Romania and provide in-depth case studies of recent threats and attacks faced to government infrastructures. Many governments are increasing their focus on developing strong cyber defence strategies against possible attacks. With this in mind, our 5th annual Cyber Intelligence Europe conference and exhibition will bring together leading public sector officials who will discuss their cyber security plans, strategies and current capabilities. For more information regarding this international event please contact us at events@intelligence-sec.com or +44 (0)1582 346 706.
*****
Cyber Security Summit: New York
Friday, September 15, 2017 | 7:45AM to 6:00PM | Grand Hyatt New York
https://cybersummitusa.com/2017-newyork/
*****
The World Leading Defence & Security Event
ExCeL, Royal Victoria Dock, 1 Western Gateway, London E16 1XL
Nearest train stations: Prince Regent / Royal Victoria (DLR Line)
*****
How Technology is Shaping Border Management
The US/Canada Border Conference brings together border security leadership from the U.S. and Canada to provide an educational experience designed to help advance your agency’s mission. The conference is developed by former border security officials who understand the educational needs of today’s border security professionals.
This two-day event, focused on advancing the Beyond the Border Action Plan, is strategically located in Detroit, Michigan, near several of the busiest shared ports between the United States and Canada. The “Beyond the Border” initiative outlines a vision for perimeter security and economic competitiveness whereby the U.S. and Canada work in partnerships within, at, and away from our borders to achieve enhanced security and accelerate the legitimate flow of people, goods, and services between our two countries.
The United States and Canada bilateral relationship is among the closest and most extensive in the world. Each day, $2.0 billion of cross-border trade is conducted between the U.S. and Canada. 300,000 people cross between the countries every day by all modes of transport. The two nations work cooperatively on border security, law enforcement, environmental protection and free trade on multiple levels from federal, to state and provincial, to local.
*****
Mobile World Congress Americas
September 12-14, 2017 San Francisco, Moscone Center
www.mwcamericas.com
What is Mobile World Congress Americas? In 2017 and beyond, CTIA Super Mobility Week will become GSMA Mobile World Congress Americas, in partnership with CTIA. MWC Americas will debut September 12-14, 2017 in San Francisco at the Moscone Center and will be the premier mobile industry event for the Americas, with representation from North, Central and South America. Mobile World Congress Americas will consist of a conference program featuring C-level speakers and leading industry experts, the industry’s biggest names, with a focus on complementing mobile operators with broad communications ecosystem leaders. The Mobile World Congress Americas will also feature an exhibition showcasing cutting-edge mobile technologies, products and services that will showcase industry-leading exhibitors with a strong focus on Silicon Valley, innovation, gaming and virtual reality. With a regulatory and public policy program, partner events and free seminar, MWC Americas 2017 will build on the successful CTIA policy education sessions and the GSMA ministerial programs to drive global policy discussion and debate.
*****
Latin American Utility Week 2017 | Sep 19-21, 2017 | São Paulo-SP | www.latin-american-utility-week.com
*****
World e-ID and Cybersecurity
Digital Identity & Data Protection for Citizens & Businesses
Conference & Exhibition - Sept. 25-27, 2017 – Marseille Provence, France
www.worlde-idandcybersecurity.com
Now in its 13th edition, World e-ID and Cybersecurity explores the latest secure identification technologies, their implementation and the related online trust challenges. Over 2.5 days, 400 project managers, government reps and technology experts will join in to learn, share visions with counterparts worldwide and foster cooperation for successful secure Identity & Cybersecurity implementations.
From printed documents to the identity of connected objects, the agenda will deliver a clear vision of secure identification as boundaries are blurring between physical and online ID, between private and public sector cybersecurity, between citizen and consumer online trust. Within Smart Security Week, additional learning, networking and innovation discovery events are also part of the agenda: exhibition & demos, workshops & tutorials, awards ceremony… along with multiple bridges with the co-located conferences addressing identity for development, IoT security, cyberthreat intelligence and risk management.
*****
Identity World
Individual Recognition for Global Development
Conference & Exhibition - Sept. 25-27, 2017 – Marseille Provence, France
www.identity-world.com
IDENTITY WORLD is the new conference on how trusted technologies address the state of the individual identity and its contribution to global development. An estimated 1.5 billion people do not have an official, government issued and recognized document as proof of their legal identity. The majority of these people live in Asia and Africa and a disproportionate number are women and children.
IDENTITY WORLD has set out to address this identity gap through the collective lens of our cultures, experiences, understanding and resources. Complementing its sister World e-ID and Cybersecurity conference till now, both the intensity of discussion and diversity of subject matter has lent itself to become in 2017 a separate space in the realm of public discourse.
Over 2.5 days, 40 speakers will address thoroughly the strategic framework stakes along key themes including: Statelessness & Inclusion • Civil Registration and Vital Statistics • Public & Private Sector Cooperation • Digital Identity, Democracy & Peace.
Thought leadership insights will be illustrated by case studies of large-scale implementations (identity, e-vote, healthcare, welfare payments…) as well as industry and technology perspectives. Multiple panel discussions are scheduled to ensure maximum interactivity.
*****
Connect Security World
Embedding Trust in IoT Systems and Connected Hardware
Conference & Exhibition - Sept. 25-27, 2017– Marseille Provence, France
http://www.connectsecurityworld.com
As IoT solutions are transitioning from hype to real deployments, the “Internet of insecure things” threat is gaining ground. To address unlimited risks, threats and vulnerabilities surrounding IoT, a new generation of connected devices and services is required, with better security and privacy by design. In its 6th edition, Connect Security World invites both digital security experts and IoT developers to discuss and define a true end-to-end security, from sensors to Cloud, from design and development to deployment.
Key 2017 themes include:
– Embedding Security in billion devices: SW/HW approaches
– New IoT networks security: LPWAN, 4G/5G…
– Cost of security: Time to market vs secure design
– IoT security regulation: industry and governments role
Joining Connect Security World offers the opportunity to meet and exchange with 350+ professionals: experts from security research and industry, associations, standards bodies as well as IoT stakeholders from manufacturing to digital services. Within Smart Security Week www.smartsecurityweek.com , they will benefit from additional synergies of contents and networking opportunities.
*****
ASIS 2017
ASIS International 63rd Annual Seminar and Exhibits
25-28 September 2017
Dallas, Texas
https://securityexpo.asisonline.org
Continuing A Legacy of Excellence….For more than six decades, ASIS Annual Seminar and Exhibits (ASIS 2017) has been the premier event for security professionals worldwide, providing industry-leading education, countless business connections, and the latest products and services. ASIS 2017 will offer attendees the opportunity to:
CONNECT with 550+ solutions providers showcasing the latest industry innovations and services
NETWORK with 22,000+ security professionals for collaborative learning and solutions for enterprise business and public sector security leaders
JOIN industry leaders accelerating the future of the security profession
*****
Structure Security
Newsweek Events and Structure Events
September 26-27, 2017
South San Francisco Conference Center - 255 S Airport Blvd, South San Francisco, CA 94080
www.structuresecurity.com
Structure Security 2017 will highlight the best practices that security professionals are using to protect some of the world's largest companies and institutions, and examine the future of security products, services, as well as the threats that want to take them down.
On 26-27 September, in the South San Francisco Conference Center, Newsweek and Structure Events will bring together over 500 attendees and 40 plus speakers, from the FBI to UBER, for cutting edge discussions and workshops about latest industry trends.
*****
Infosecurity North America
October 4-5, 2017
John B. Hynes Veterans Memorial Convention Center, Boston
www.infosecuritynorthamerica.com
Infosecurity North America is an exciting new launch event from Infosecurity Group. Infosecurity Group run 7 market-leading information security events around the globe and have over 22 years of experience connecting everyone and everything you need to know about information security.
Infosecurity North America will bring this wealth of global experience and knowledge to Boston in October 2017 in the form of an innovative SMART event, offering digital tools to help visitors and exhibitors make the most out of their time.
*****
CYBER SECURITY CHICAGO
18-19 October 2017
McCormick Place, Chicago
https://www.cybersecurity-chicago.com/
Cyber Security Chicago offers invaluable security insight for both IT managers & security specialists. Hear from cyber securities finest on how you can build stronger defenses against cyber-attacks & how to recover if your systems are breached. Cyber Security Chicago allows you access to a wealth of insight and solutions to help you protect your employees, organization and country from criminal gangs and cyber terrorism. Learn from industry experts at thought-provoking seminars and discover solutions on all facets of cyber security and risk mitigation, from perimeter firewalls to the latest threat intelligence solutions.
*****
Money20/20
The Venetian, Las Vegas
October 22-25, 2017
www.money2020.com
info@money2020.com
Money20/20 US is the world’s most important event covering payments and financial services innovation for connected commerce at the intersection of mobile, retail, marketing services, data and technology. With 11,000+ attendees from 4,500 Companies and 85 Countries, including 1,700+ CEOs and 400+ speakers, expected at our 2017 US event, Money20/20 is critical to realizing the vision of disruptive ways in which consumers and businesses manage, spend and borrow money. Money20/20 US will be held in Las Vegas, October 22-25, 2017.
*****
*****
Wednesday, November 8, 2017 | 7:45AM to 6:00PM | The Westin Copley Place, Boston
https://cybersummitusa.com/2017-boston/
*****
Border Management & Technologies Summit Asia 2017
Kuala Lumpur, Malaysia
November 7, 2017
Asian nations are continuing to develop their borders and create the most efficient immigration processes at airports. Many of the regions border security agencies are working hard to improve security on their borders from illegal migration to cross-border organised crimes. Airports in the region are improving passenger experiences to make immigration processes as smooth and hassle free as possible. Read More >>
To take part in our international event either as a speaker, sponsor, exhibitor or as a delegate please contact us at events@intelligence-sec.com or call us on +44 (0)1582 346 706
*****
Cyber Security Summit: Los Angeles
Wednesday, November 29, 2017 | 7:45AM to 6:00PM | The Beverly Hilton
https://cybersummitusa.com/2017-losangeles/
*****
LAAD Security 2018 | Apr 10-12, 2018 | São Paulo-SP| www.laadsecurity.com.br
LAAD Defence & Security 2019 | Apr 02-05, 2019 | Rio de Janeiro-RJ | www.laadexpo.com.br
****
About SecuritySolutionsWatch.com
SecuritySolutionsWatch.com features thought leadership interviews about security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about security solutions from leading global brands such as: Cisco Security, Dell EMC, HP Cybersecurity, Gemalto, HID Global, ImageWare, Siemens Security and SONY Security, just to name a few.
What's YOUR cybersecurity, physical security, mobility, payments, safety or "smart" solution?
We invite you to please join us "In The Boardroom", more details here, or here: http://www.securitysolutionswatch.com/Main/ThoughtLeadershipOpportunity_July2017.pdf
Please click here for our Media Kit (http://www.securitysolutionswatch.com/MediaKit.html)
Please click here or here: http://www.securitysolutionswatch.com/Main/170502%20RATE_CARD-4.pdf for additional details about our offerings.
*****
FOR MORE CONTENT ABOUT SECURITY THREATS AND SOLUTIONS...
...PLEASE CLICK HERE FOR OUR MONTHLY NEWLETTER
(http://securitysolutionswatch.com/newsletters/newsletter_2017_06.html)
And
PLEASE VISIT US ON TWITTER HERE: https://twitter.com/SecStockWatch
*****
THIS PRESS RELEASE, AND ALL ADVERTISING, CONTENT AND ALL OTHER MATERIAL AND INFORMATION WHICH APPEARS ON SECURITYSOLUTIONSWATCH.COM AND/OR SECURITYSTOCKWATCH.COM, ONLINE AND/OR IN PRINT, IS SUBJECT TO OUR TERMS OF USE, CONDITIONS, AND DISCLAIMER HERE:www.securitysolutionswatch.com/Main/Terms_of_Use.html.