Business, Free News Articles, Regional Events, Safety and Security Solutions

Top 5 Reasons Not to Miss CyberTexas 2019

SAN ANTONIO, Texas -- Cybersecurity leaders are set to convene at the annual CyberTexas conference, cyber job fair and Hall of Honor Induction Ceremony in San Antonio, August 20 and 21, 2019, produced by the CyberTexas Foundation.

Defend, protect, secure - three words we often use to define the state of engagement on the battlefield. But in an age of heighten cybersecurity threats, physical warfare isn't the only battle worthy of preparation. Cybersecurity has become a critical issue for all private industries, on every level of local, state and federal government, military and academia which leaves public and private institutions on the front line of defense for protecting critical infrastructure.

Texas, a state known for its big, and often, non-traditional approaches to problem solving, has been on the forefront of cybersecurity dating back to the early 1980s when computer networks were just starting to develop. In the years that followed, cities like San Antonio, Houston and Austin became leaders in building the cybersecurity ecosystem in the region, which led to not only the development of a strong cybersecurity workforce, but the creation of innovative cyber products and services, and the installation of the world-class U.S. Air Force Cyber Command at Joint Base San Antonio (JBSA).

The Lone Star state is a hotbed for network security, cyber risk mitigation and threat intelligence. It is this reality alone that opens the doors to cybersecurity events like the CyberTexas Conference. Now in its ninth year, the conference is a platform for industry thought leaders from across the state and abroad to collaborate, problem solve, retool and prepare for the next wave of cyber threats. During the two-day event, August 20th - 21st at the University of Texas at San Antonio's (UTSA) downtown campus, cyber leaders will gather to hear from speakers, learn about products and services during an exhibitor's showcase, participate in a cyber job fair hosted by Cleared Jobs, and witness the 2019 San Antonio Cyber Hall of Honor induction ceremony. However, if industry enthusiasts are still uncertain about attending this year's conference, here are five reasons not to miss CyberTexas 2019:

1 - Two is better than one

Unlike the past eight years, CyberTexas is being held in collaboration with UTSA's International Information Sharing Conference (IISC). The back-to-back events will draw hundreds of cybersecurity and information sharing leaders and offer attendees the opportunity to experience three high-impact days of networking and collaborating with cyber professionals from across the state. CyberTexas will take place on August 20th and 21st and IISC will start on August 21st and conclude on August 22nd.

2 - It's more than a cyber conference

San Antonio has nurtured the cybersecurity industry's most renowned leaders, educated thousands of cyber warriors at world-class institutions, like UTSA, trained mission-ready military cyber warriors at Air Force Cyber Command, and inspired the development of high-growth information technology companies. In recognition of these efforts, CyberTexas brings a unique opportunity for cyber professionals to learn from the expertise of the city's most recognized IT leaders.

3 - It's all about Texas

With over 40 speakers, the event will bring industry, government, military and academia leaders to the main stage, including keynote speakers: Steve Povolny, Head of Advanced Threat Research, McAfee; Joe Sanchez, Director and Executive Director, CyberTexas Foundation; Maj. Gen. Robert J. Skinner, Commander, 24th Air Force; Commander, Air Forces Cyber and Commander, Joint Force Headquarters-Cyber, JBSA-Lackland, Texas; Brig. Gen. George M. Reynolds, Vice Commander, 25th Air Force, JBSA-Lackland, Texas; Umesh Verma, Founder, Cyber Houston and CEO, BLUE LANCE and Jim Perschbach, President & CEO, Port San Antonio. This year's theme, Cybersecurity Communities Throughout Texas, illustrates the event's focus on educating attendees about Texas' growing cyber ecosystem.

4 - Network security can't wait

No matter if your interests are machine learning, cyber threat intelligence, risk mitigation, or smart cities, or if your most immediate cyber concerns are security issues regarding elections, maritime, or cloud security, the importance of preparing for the next cyber threat could be the difference between total business disruption and network resiliency. Therefore, there's no time like the present when it comes to building a better cyber defense toolbox to combat new threats.

5 - Texas' cyber communities are trailblazers

This year's CyberTexas will provide opportunities to learn about new policies and programs across the region including, Cyber Houston, UTSA National Security Collaboration Center, Cybersecurity Pathways for Texas High Schools legislative initiatives, the New Horizons Learning Center, and CyberPatriots National Youth Cyber Education program.

"Texas is more than a Lone Star State," said Victor Malloy, CyberTexas Foundation's general manager. "The people here are leaders pioneering to the north star in cyberspace. Our solution for securing our community when the next cyber incident occurs, is to build relationships from the interactions during conferences like ours that helps to reduce the level of complexity in how we manage risks."

The conference will kick-off on Tuesday, August 20 at UTSA downtown campus located at 501 W. Cesar E. Chavez Blvd., San Antonio, TX 78207. The opening plenary sessions will start at 8:45 a.m. followed by breakout sessions that will continue until 4:15 p.m. The following day activities will start at 8 a.m. and end at 12 p.m. The Hall of Honor Ceremony will take place at 5 p.m. on August 20, 2019.

To register for the speaking sessions and Hall of Honor Ceremony, visit https://www.cybertexas.org/iisc-cybertexas-combined-conference-2019/.

Discounts are offered to attendees of both the CyberTexas and IIS Conferences, InfraGard members, students, and educators. DOD civilians and military with a valid ID can attend at no charge. Space is limited. To participate, DOD civilians and military should email Victor Malloy at vmalloy@cybertexas.org.

The cyber job fair will take place from 11 a.m. - 3 p.m. on Tuesday August 20 in the Durango Building on UTSA's campus. Registration is free. Attending companies include, Abacus Technology Corporation, Accenture Federal Services, AECOM, Air Force Civilian Service, Applied Research Solutions, Def-Logix, IPSecure, Naval Information Warfare Center (NIWC) Pacific - C2E2 Department, Raytheon and USAA.

To learn more about exhibiting and sponsorship opportunities, email mjackson@cybertexas.org.

Learn more about CyberTexas at: https://www.cybertexas.org

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Defense and Military, Education and Schools, Free News Articles, Police, Fire and Rescue, Product Launches, Safety and Security Solutions

Treadstone 71 Releases Cyber Intelligence and CounterIntelligence Training Roadmap for Threat Analysts

HALF MOON BAY, Calif. -- Treadstone 71, the leading cyber and threat intelligence tradecraft company, today announced the Treadstone 71 Intelligence Roadmap. The new education program includes in-depth training along the cyber threat intelligence and counterintelligence lifecycles covering each phase in detail. Cyber Threat Intelligence professionals seeking skill enhancements, unique capabilities while adding boundless value to their organizations should take a hard look at this roadmap.

The Treadstone 71 Intelligence Roadmap focuses on two tracts:
* Certified Cyber Intelligence Professional
* Certified Cyber CounterIntelligence Professional

The program outlines a roadmap unlike any other in the cyber intelligence industry. Building on our 12th year offering cyber and threat intelligence training, Treadstone 71 now delivers two 1-year programs that include comprehensive study in the following

Certified Cyber Intelligence Professional (5 modules plus the capstone):
* Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
* Open Source Intelligence, Adversary Targeted OSINT
* Collection Management
* Structured Analytic Techniques
* Critical Thinking/Cognitive Bias
* Analytic Writing, Reporting, & Dissemination
* Capstone Skills Evaluation

This tract takes 21 days over (up to) 1 year blending in-person training with online narrative video with hands-on exercises. Students receive 164 CPE for program completion.

Certified Cyber CounterIntelligence Professional (5 modules plus capstone):
* Operational Security (OPSEC)
* Persona Development and Management
* CounterIntelligence Tools
* Persuasion, Manipulation, and Propaganda
* The Denial and Deception Lifecycle
* Influence Operations
* Capstone Skills Evaluation

This tract takes 17 days over (up to) 1 year blending in-person training with online narrative video with hands-on exercises. Students receive 136 CPE for program completion.

For cyber and threat intelligence professionals seeking full-scope lifecycle skills in intelligence and counterintelligence, this is the program for you. The roadmap is also perfect for those looking to break into the program.

The Intelligence Roadmap uses the Cyber Intelligence and CounterIntelligence Common Body of Knowledge created by Treadstone 71.

About Treadstone 71

Treadstone 71's Certified Threat Intelligence and CounterIntelligence Analyst training and the Intelligence Roadmap are the gold standard in the industry today derived from both academia, the intelligence community, and from Treadstone 71's experience in building cyber and threat intelligence programs at Fortune 500 organizations worldwide. Treadstone 71 is delivering the only complete cyber threat intelligence lifecycle management solution enabling information sharing, internal intelligence communities of interest while empowering lifecycle management with an iterative feedback loop.

More information: https://www.treadstone71.com/cyber-intelligence-training

Tags: cyber intelligence, lifecycle, counterintelligence, threat intelligence, intelligence lifecycle

*PHOTO link for media: https://www.Send2Press.com/300dpi/19-0711s2p-ts71-roadmap-300dpi.jpg
*Caption: The Treadstone 71 Intelligence Roadmap.

VIDEO (YouTube):
https://youtu.be/KXKUic0m1TQ

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Electronics, Free News Articles, Patent and Trademark, Product Launches, Safety and Security Solutions

MICROSafeX Launches Kickstarter Campaign for World’s First ‘Unhackable’ Computer

LOS ANGELES, Calif. -- MICROSafeX announces a newly patented "unhackable" security technology / computer platform and it's working to raise money through a Kickstarter campaign set to launch on June 25, 2019 (US Patent No.: 10,061,923 B1).

Pritam Nath, founder of MICROSafeX, has been issued a hardware utility patent for an Internet-connected computer that cannot be hacked in any way whatsoever.

Nath has an engineering degree in electronic hardware from UCLA and more than 35 years of experience in systems architecture, large integrated software systems and some hardware in various computers, Internet, operating systems, BIOS, device drivers, embedded systems, and more. He has designed and built a fully functioning personal computer.

"This new hardware design is very different from all other computers on the market today," Nath says.

The company is working to raise funds for what it's calling, "the world's first unhackable computer."

"Computer hacking is a huge problem and this new technology solves problems ranging from viruses and malware to computer hijacking," Nath explains.

Hacking incidents and cyber security threats continue to make media headlines and only serve to illustrate the severity of the problem. MICROSafeX's new "unhackable computer" hopes to reduce and perhaps even eliminate these issues.

Criminals will no longer be able to steal valuable and confidential information from individuals, banks, corporations, hospitals, political organizations, government agencies and more.

While there are a few software security companies that offer software-only based solutions for virus and malware removal, they do not prevent cyber-attacks. MICROSafeX's hardware technology does.

The MICROSafeX-patented, hardware-based prevention system will not allow any virus or malware into the computer. The computer prototype is estimated to be available within 12 months and will retail for $1,250.

For more information, visit: https://microsafex.com/

VIDEO (Vimeo) - "Founders Statement" -- https://vimeo.com/337264307

Patent information: https://microsafex.com/patent/

MEDIA CONTACT:
Pritam Nath
of MICROSafeX
+1-310-873-8672
info@microsafex.com

*IMAGE link for media: https://www.Send2Press.com/300dpi/19-0619s2p-microsafex-300dpi.jpg

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Defense and Military, Free News Articles, Product Launches, Safety and Security Solutions, Software

Treadstone 71 Unveils New Cyber Intelligence Lifecycle Solution

HALF MOON BAY, Calif. -- Treadstone 71, the leading cyber and threat intelligence tradecraft company, today announced the availability of a new offering: Cyber Intelligence Lifecycle. The new module will enable teams to organize their cyber threat intelligence program, publish their strategic plans, build stakeholder models, establish collection plans, rate and verify data and sources, use structured techniques, and prepare for analytic writing peer reviews.

The module drives continuous feedback loops throughout the lifecycle engaging users to follow structured methods of collection, data organization, production, analysis, and management. The Cyber Intelligence Lifecycle solution captures stakeholder needs including intelligence requirements, their prioritization, collection planning and tracking, while focusing on evidence-based intelligence analysis.

The solution enables organizations to track how they got from A to B in the lifecycle, what worked and what did not while incorporating iterative methods of analysis.

"No longer will cyber threat intelligence teams have to kluge together methods of managing the cyber threat intelligence lifecycle," said Jeff Bardin, Chief Intelligence Officer for Treadstone 71. "The ability to have continuous access to priority intelligence requirements, open source intelligence actions in various stages of collection, the development of new hypotheses based on usable data, directly input to structured analytic techniques as some of the final steps before analytic writing and review is huge."

* The module integrates and manages cyber threat intelligence lifecycle functions in a contextually focused environment that helps author intelligence advisors, situation reports, and forecasts.
* The ability to manage and track historical trends of adversaries and their campaigns with full data transparency, from your own perspective and not that of generic data feeds, minimizes cycle time while reducing overhead and operational risk.
* The cyber intelligence lifecycle module enables collectors and analysts to work together on company-specific intelligence requirements, giving collection management the ability for continuous oversight supporting relevancy and rapidly redirect collection targets as needed.
* We see this as speeding the decision making on threats helping to estimate possible next steps.

"We plan to start offering the solution in August with a full rollout by mid-October," continued Bardin. "Our training solutions enables this module providing organizations with the intelligence community skills necessary to more than adequately manage collection operations, analysis, and analytic writing. The need for this in the market is great."

* Data verification is a hidden calculation in data and threat intelligence feeds. Bayesian algorithms aid in the process, but human interaction is still a core capability that most organizations do not have.
* Skills in this area are lacking.
* The combination of Treadstone 71 training and education with the cyber intelligence lifecycle solution enables historical pattern and trend analysis while creating clear pictures of adversary tendencies.

"For a long time, we described threat intelligence as the core solution for cyber threat intelligence teams. What is missing are the core functions of intelligence that goes well beyond indicators of compromise and technical details, collected after a breach occurs," added Bardin. "We know that intelligence is for warning and prevention. We know that intelligence forecasting and estimates are the keys to prevention. Something that is missing in organizations today. We are shifting the paradigm to mature intelligence programs assisting in your digital transformation the reduces risk."

The solution is not meant to replace threat intelligence platforms but to provide an integrated series of modules that manages your intelligence program. We intend to enable the integration of strategic intelligence plans, policies, procedures, process flows, questionnaires, diagrams, presentations, reports, and briefs to managing the cyber threat intelligence lifecycle.

About Treadstone 71:

Treadstone 71's Certified Threat Intelligence and CounterIntelligence Analyst training are the gold standard in the industry today derived from both academia, the intelligence community, and from Treadstone 71's experience in building cyber and threat intelligence programs at Fortune 500 organizations worldwide. Treadstone 71 is delivering the only complete cyber threat intelligence lifecycle management solution enabling information sharing, internal intelligence communities of interest, while empowering lifecycle management with an iterative feedback loop.

More information: https://www.treadstone71.com/

MEDIA CONTACT:
Jeff Bardin
Treadstone 71
info@treadstone71.com
888.714.0071

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Electronics, Free News Articles, Safety and Security Solutions, Software

ZKTeco Face Recognition Now Available From AMAG Technology

ALPHARETTA, Ga. -- ZKTeco today announced that its OP-400 face reader has been officially certified by AMAG Technology. ZKTeco is a long-time member of AMAG's Symmetry Preferred Partner Program.

The ZKTeco OP-400 face reader uniquely interfaces directly with the Symmetry(TM) access control system without needing additional management software. For AMAG installers this means tremendous savings in both installation time and material cost when performing biometric security upgrades.

AMAG VP of Partner Programs & Education, Jason Schimpf noted, "Not only do ZKTeco face readers further improve our customers' door security, I'm especially impressed with ZKTeco's commitment to the Symmetry Preferred Partner Program. ZKTeco is our first facial biometrics partner to be certified on Symmetry v9."

Noted by ZKTeco USA CEO Larry Reed, "Our Opera Series of biometric readers include our OP-200 fingerprint reader and now our OP-400 face reader. Both readers are Symmetry-certified. Unlike our competitors who need to develop and sell expensive added biometric management software to support their readers, our affordable Opera Series of biometric readers communicate directly to the Symmetry system without needing any management software whatsoever. This translates into tremendous cost savings in both material and labor for AMAG installers and end-users."

More information: https://zktecousa.com/product/op-400/

About ZKTeco USA:

ZKTeco USA is a leading provider of fingerprint, face, finger-vein, palm-vein and RFID readers throughout the USA & Canada. Product offerings also include entrance control solutions including license plate recognition (LPR) readers, long-range UHF readers, turnstiles, walkthrough metal detectors and x-ray baggage scanners. ZKTeco USA is a subsidiary of ZKTeco, a leading global developer of security and time management solutions. ZKTeco solutions are multi-lingual and localized in over 18 different languages.

ZKTeco designs specialized products for specific markets and provides local support to all its customers. Its U.S. facility includes a large experience center and warehouse in Alpharetta, GA. ZKTeco is synonymous with technical innovation, quality, speed-to-market and reliability. For more information, please visit http://www.zktecousa.com.

Media Contact: Jennifer Sparnon, (862) 505-2101 ext 225.

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Free News Articles, Funding and Investment, Safety and Security Solutions

Command Investigations Recapitalizes to Continue Growth Trajectory

LAKE MARY, Fla. -- Command Investigations ("Command") and Monument MicroCap Partners, LLC ("Monument") announce that they have completed a recapitalization transaction that will allow Command to venture into the next aspect of its growth phase and solidify itself as the premier investigative service provider in the United States.

With an increased availability of resources and the financial backing of Monument, a nationally renowned private equity firm, Command will look to extend its presence in the Northeast United States and expand into untapped markets throughout the country.

Command's executive and core management team will attain equity positions in the company and will continue to direct daily operations. The company's well-established work product and company culture will stay intact.

"We share the same vision on Command's expansion and long-term growth, and it was crucial for us to find a partner who connected with our thought process and overall outlook," said Rich Perri and Steve Cassell, Co-founders of Command Investigations.

"Our mission has always been to provide our clients with unrivaled customer service and an impeccable work product, and those ideas will remain the cornerstone of our success. Monument has fit in seamlessly with our company culture and will be a crucial resource for us as we continue to scale our operations nationally."

Command is slated to obtain its private investigation license in New York and New Jersey by the end of 2019, with plans of adding Texas, Illinois, North Carolina and South Carolina in 2020.

Currently, Command holds PI licenses in in Florida, Georgia, California, Pennsylvania and Delaware.

About Command Investigations:

Based in Lake Mary, Florida, Command Investigations is a private investigation company that offers surveillance, medical canvasses, social media checks and other investigative services to the insurance defense community. Ranked as one of the fastest growing companies in Florida, Command is best known for its unparalleled customer service and unmatched turnaround times. With offices in Orlando, Atlanta and Los Angeles, Command offers national service with a local feel.

More information: https://gocommand.com/.

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Free News Articles, Product Launches, Safety and Security Solutions, VAR and IT Consulting

IMPACT Group Launches SecureNow, a Professional Cybersecurity Offering Businesses and Non-Profits of All Sizes Can Afford

MINNEAPOLIS, Minn. -- IMPACT Group, Inc., a recognized Twin Cities-based management consulting firm and Managed Service Provider specializing in large scale IT and supply chain strategy, project delivery, cybersecurity and enterprise program management, announced today the launch of SecureNow - professional cybersecurity your organization can afford!

According to Ginni Rometty of IBM "cybercrime, by definition, is the greatest threat to every profession, every industry, every company in the world." Insurance giant Lloyds of London has said that cyber-attacks cost businesses as much as $400B a year or more while the World Economic Forum puts that number at over $3 trillion worldwide.

And according to a recent Data Breach Investigation Report done by Verizon: "61 percent of breaches target small and medium businesses, up from the previous year's 53 percent. These cyberattacks cost small businesses anywhere between $84,000 and $148,000. And 60 percent of small businesses go out of business within six months of such an attack."

IMPACT Group, through its Technology Services Business Unit, has been helping organizations of all sizes to meet the security challenges of Twin Cities based businesses and non-profit organizations for over 25 years. Relying on its expertise as a successful Managed Service Provider, IMPACT Group is now launching SecureNow as an affordable way for organizations of all sizes to discover existing internal and external vulnerabilities in their IT environment within 5-7 days of ordering the service and to take immediate action to reduce significantly their risk level.

Having helped organizations with ransomware and other security breaches, IMPACT Group has seen firsthand the damage cyber-attacks can wreak on its victims.

IMPACT has designed SecureNow as a quick and affordable, professional-grade cybersecurity package, an alternative to other high-cost offerings available on the market.

Says Jeff O'Donnell, CEO of IMPACT Group: "Many organizations know they have to do something about cybersecurity, but they may not know where to begin and what's the quickest way to getting better security at an affordable price. There are tools and experts available but smaller organizations may not be able to afford either. SecureNow is a great way for anyone to access such tools and experts within existing budgets. I invite you to visit us at http://GetSecureNow.org and to allow us to help you protect your assets, your data, your reputation and your peace of mind."

About IMPACT Group:

IMPACT Group has been rated by Clutch as a Twin Cities Top 20 Managed Service Provider, and as a Top 20 Most Promising Project Management firm by CIO Review. IMPACT has been delivering value successfully in the past with leading Fortune 1000 companies, as well as small and medium business, churches and non-profits.

MEDIA CONTACT:
For more information contact Jeff O'Donnell at info@getsecurenow.org or call him at 651.415.2290

Twitter: @ImpactGroupMN #SecureNow #Cybersecurity #SmallBusiness #SmallBusinessSolutions

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Electronics, Free News Articles, Product Launches, Safety and Security Solutions

SecuGen to Demonstrate Apple iOS Compatibility with New Unity 20 Bluetooth Fingerprint Reader at ISC West 2019

SANTA CLARA, Calif. -- SecuGen, a world leading optical fingerprint device and technology vendor, will be demonstrating the new Unity(tm) 20 Bluetooth fingerprint reader with Apple's iOS at the ISC West 2019 in Las Vegas, the largest converged security industry trade show in the U.S.

The Unity 20 Bluetooth is the world's first elegantly designed, low cost, fully programmable Bluetooth fingerprint reader. This versatile device features SecuGen's new flagship U20-A fingerprint sensor found in the Hamster Pro 20 product family but with Bluetooth capability that allows it to securely transfer fingerprint data wirelessly to a smartphone, tablet or computer. It is sleek and small enough to be carried in your pocket as a mobile fingerprint reader or placed solidly at a workstation as a traditional desktop reader.

SecuGen's Unity 20 Bluetooth reader is now compatible with Apple's iOS mobile operating system. Apple developers can easily build fingerprint biometric applications for the iPhone and iPad that work with the Unity 20 Bluetooth. The Unity 20 Bluetooth can be used right out of the box by calling SecuGen's Fingerprint Management System (FMS) software's simple API. Alternatively, it can be custom programmed to suit the needs of the targeted user base.

Internally the product includes a complete Linux development environment, SecuGen's fingerprint capture and NIST MINEX-compliant template extraction and matching algorithms, the OpenSSL cryptography library, and a 1 GHz CPU. The Unity 20 Bluetooth can also store encrypted fingerprint templates and process them in a closed environment without ever leaving the device.

"We have never had such a strong response to a product announcement. Customers love the look and feel of the device as most of the existing Bluetooth products on the market are about as attractive as a deck of cards," stated Jeff Brown, Vice President of Sales and Marketing for SecuGen. "The Unity 20 Bluetooth reader, on the other hand, breaks the mold and is a stunning device with a slim, sleek white case, a single button and three small LEDs. Our team has been able to do this while keeping the price of the product very low. We are very, very proud of this product. Our team has done a wonderful job."

Dan Riley, Vice President of Engineering added, "Our engineering has done a great job implementing the BLE (Bluetooth Low Energy) protocol for compatibility with Apple's iOS devices. The Unity 20 Bluetooth is a breakthrough product that maintains our dedication to quality. Not only is it well engineered and versatile, the affordable Unity 20 Bluetooth fingerprint reader is also a beautiful product."

"We are relentlessly focused on the requirements of our partners around the world," stated Won Lee, CEO of SecuGen. "The Unity 20 Bluetooth is a response to a clear need that we have seen in the marketplace for biometrics and iOS compatibility. This is precisely what our partners have been asking for, and we are excited to support and help them succeed with new products that are attractive, powerful, and economical."

The Unity 20 Bluetooth fingerprint reader, like all SecuGen products, is priced for large scale deployments. The demonstration will take place in SecuGen's booth # 15136 at ISC West 2019 in the Sands Expo convention center in Las Vegas, Nevada from Wednesday, April 10 through Friday, April 12.

Learn more about the Unity 20 Bluetooth: https://secugen.com/products/unity-20-bluetooth/

About SecuGen:

SecuGen Corporation (https://secugen.com) is the world's leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security. SecuGen designs and develops FBI-certified fingerprint readers and OEM components, developer kits and software, including NIST/MINEX-compliant algorithms.

For over 20 years, SecuGen has been a driving force committed to delivering innovative, high quality, rugged, and price-performing products for a wide variety of applications such as insurance and banking, health care, point of sale, logical and physical access control, mobile devices, national ID, voter registration, SIM card authentication, fleet management, and many more.

SecuGen products are used by world-leading financial, medical, government, educational and corporate institutions and are sold through an extensive partner network of reseller partners including original equipment manufacturers, independent software vendors and system integrators in North America, Latin America, Africa, Middle East, Europe, and Asia.

SecuGen is a registered trademark of SecuGen Corp. in the United States and other countries.

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Facilities and Building Maintenance, Free News Articles, Product Launches, Safety and Security Solutions

New ZKTeco Atlas Series Panels: Fast and Simple Installations for Access Control Novices

FAIRFIELD, N.J. -- ZKTeco, a leading provider of biometric, RFID and access control solutions, brings to market its new Atlas Series access control panels. Atlas Series consists of RFID & Biometric door access control panels which have an embedded web application.

The web application eliminates the need for access control management software, thus simplifying and greatly reducing installation time, especially for novices who are new to access control.

Atlas is available in 1, 2 and 4-door panels and can support up to 84 doors. These panels are powered by POE+ and can also communicate over WiFi. Features include User Enrollment & Management, Door Control & Monitoring, Lockdown, Reporting, Maps, Anti-Passback, First-Card Opening, Multi-Card Opening, Card Design and Duress PINs and more.

User-programmable auxiliary relays can be used to control alarms, annunciators, intrusion detection panels, or additional locking devices. Atlas Series panels communicate securely over a TCP/IP network using SSL/TLS. Atlas Series panels communicate with readers via Wiegand or OSDP communication protocol. The firmware is field-upgradeable, allowing your system to stay current with the latest features and security enhancements. A feature rich mobile app for iOS and Android platform gives user the capabilities of managing their access control infrastructure from their mobile devices.

"Atlas was designed and engineered in USA to make access control installations fast & simple and at the same time offer all the features required by today's modern facilities," notes Manish Dalal, President & Founder, ZKTeco USA.

"While our ZKBioSecurity platform addresses the needs of high-end enterprise installations, presently our customers are looking for simple easy to learn access control solutions. By replacing management software with an embedded web application on the panel and additionally supporting Wi-Fi and PoE, we make it very easy for anyone to learn and install access control systems."

More information on the Atlas line: https://zktecousa.com/product-category/atlas-bio/

About ZKTeco:

ZKTeco is a leading global provider of RFID and biometric and RFID security solutions. Product offerings include Biometric & RFID access control panels & readers, Elevator Controllers, Long-range Readers, Metal Detectors, Turnstiles, Baggage X-Ray scanners and biometric smart door locks. Its solutions are multi-lingual and localized in over 18 different languages. ZKTeco designs specialized products for specific markets and provides local support to all its customers.

Its U.S. facility includes a large experience center and warehouse along with local sales and service support. ZKTeco is synonymous with technical innovation, quality, speed-to-market, and reliability.

For more information, please visit https://zktecousa.com/

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.

Business, Electronics, Free News Articles, Product Launches, Safety and Security Solutions

SecuGen to Showcase New Unity 20 Bluetooth Fingerprint Reader at the RSA Conference 2019

SANTA CLARA, Calif. -- SecuGen, a world leading optical fingerprint device and technology vendor, is pleased to announce they will be showcasing the new Unity(TM) 20 Bluetooth fingerprint reader at the RSA Conference 2019 in San Francisco in early March.

The Unity 20 Bluetooth is the world's first elegantly designed, low cost, fully programmable Bluetooth fingerprint reader. This versatile device features SecuGen's flagship U20 fingerprint sensor found in the Hamster Pro 20 product family but with Bluetooth capability that allows it to securely transfer fingerprint data wirelessly to a smartphone, tablet or PC. It is sleek and small enough to be carried in a pocket as a mobile fingerprint reader or placed solidly at a workstation and used as a traditional desktop reader.

The Unity 20 Bluetooth can be used right out of the box by calling SecuGen's Fingerprint Management System (FMS) software's simple API. Alternatively, it can be custom programmed to suit the needs of the targeted user base. It sports a complete Linux development environment, SecuGen's onboard fingerprint capture and NIST MINEX-compliant template extraction and matching algorithms, the OpenSSL cryptography library, and a 1 GHz CPU. The Unity 20 Bluetooth can also store encrypted fingerprint templates and process them in a closed environment without ever leaving the device.

"Most of the existing Bluetooth products on the market are about as attractive as a deck of cards," stated Jeff Brown, Vice President of Sales and Marketing for SecuGen. "The Unity 20 Bluetooth reader, on the other hand, breaks the mold and is a stunning device with a slim, sleek white case, a single button and three small LEDs. Our team has been able to do this while keeping the price of the product very low. We are very, very proud of this product. Our team has done a wonderful job."

Dan Riley, Vice President of Engineering added, "Once again our engineering team has heard the voices of our partners and has designed a world class product to meet their needs. The Unity 20 Bluetooth is a breakthrough product that maintains our dedication to quality. Not only is it well engineered and versatile, the affordable Unity 20 Bluetooth fingerprint reader is also a beautiful product."

"We continue to focus on the requirements of our partners around the world," stated Won Lee, CEO of SecuGen. "The Unity 20 Bluetooth is a response to a clear need that we have seen in the marketplace. This is precisely what our partners have been asking for, and we are excited to support and help them succeed with new products that are attractive, powerful, and economical."

The Unity 20 Bluetooth fingerprint reader, like all SecuGen products, is priced for large scale deployments. It will be demonstrated at SecuGen's booth #4338 at the Moscone Center in North Hall from March 4 through 7, 2019.

Learn more about the Unity 20 at: https://secugen.com/products/unity-20-bluetooth/

About SecuGen:

SecuGen Corporation is the world's leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security. SecuGen designs and develops FBI-certified fingerprint readers and OEM components, developer kits and software, including NIST/MINEX-compliant algorithms.

For over 20 years, SecuGen has been a driving force committed to delivering innovative, high quality, rugged, and price-performing products for a wide variety of applications such as insurance and banking, health care, point of sale, logical and physical access control, mobile devices, national ID, voter registration, SIM card authentication, fleet management, and many more.

SecuGen products are used by world-leading financial, medical, government, educational and corporate institutions and are sold through an extensive partner network of reseller partners including original equipment manufacturers, independent software vendors and system integrators in North America, Latin America, Africa, Middle East, Europe, and Asia.

Learn more at: https://secugen.com/

SecuGen is a registered trademark of SecuGen Corp. in the United States and other countries.

Related link:

This news story was published by the Neotrope® News Network - all rights reserved.