AUSTIN, Texas, Dec. 14, 2017 -- ESO Solutions, Inc., and Innovative Communications, LLC, (InnoComm) have announced a new partnership to market TrackEMS®, a system that notifies hospitals of incoming critical patients in real time, as an ESO product offering, officials with the two companies said.
"With TrackEMS, paramedics and EMTs no longer need to interrupt patient care to give a radio report to the hospital about incoming patients," said Allen Johnson, Vice President and General Manager of Analytics and Health Data Exchange at ESO. According to Johnson, TrackEMS allows delivery of critical patient information from the field directly to the hospital ED and cath lab. "This is a natural extension to EHR that saves time in both the prehospital setting and hospitals, as well as ensuring that information about critical EMS patients is available throughout the hospital," he said.
TrackEMS will integrate with ESO's industry-leading advanced ePCR, ESO Electronic Health Record (EHR), allowing EMTs and paramedics to enter data once and have it available in the prehospital and hospital electronic patient records.
Based in Charlottesville, VA, Innovative Communications, LLC, was founded in 2014 with a vision to develop a communication tool for EMS to simplify the way meaningful data gets from the incident site to the hospital. "We are thrilled to be part of the ESO team," said InnoComm President and CEO Ed Cusick. "ESO's reputation for quality and innovation, plus its rapid growth in the fire and EMS markets, make it a natural partner for TrackEMS."
Learn more about TrackEMS here or by calling 866-766-9471.
TrackEMS® is a trademark of Innovative Communications, LLC, used under license by ESO Solutions.
About ESO Solutions
ESO Solutions, Inc., is dedicated to improving community health and safety through the power of data. Since its founding in 2004, the company has been a pioneer in electronic patient care records (ePCR) software for emergency medical services, fire departments and ambulance services. Today, ESO serves more than 13,000 agencies throughout the U.S. The company's healthcare, public safety and technology experts deliver the most innovative software and data solutions on the market, including the industry-leading ESO Electronic Health Record (EHR); ESO Health Data Exchange (HDE), the first-of-its-kind healthcare interoperability platform; record management system (RMS) for fire departments; and ambulance revenue recovery/billing software. ESO is also playing a leading role in helping EMS provider organizations across the nation successfully transition to NEMSIS Version 3 and new state standards for electronic patient care reporting.
ESO will bring focused sessions that support the needs of EMS, fire departments and hospital customers to Wave 2018, its annual user group and industry conference, February 1-2, 2018, in Austin, TX.
ESO is headquartered in Austin, Texas. For more information, visit www.esosolutions.com.
SOURCE ESO Solutions, Inc.
In 2016 almost 1.1 billion identities were stolen globally. This number is up dramatically from a reported 563.8 million identities stolen in 2015. In addition, the same Symantec Internet Security Threat Report placed the United States at the top of the list for both the number of breaches by country (1,023) and the number of identities stolen by country.
New York State’s Division of Financial Security and other government entities around the globe have been monitoring this increased cybercriminal threat and determining means to help protect the private information of individuals as well as the information technology systems of regulated organizations.
New York State’s Division of Financial Security released new cybersecurity requirements (23 NYCRR 500), directly affecting the way that financial data is managed going forward. Applicable to financial services companies operating in New York State, these regulations declare that, on an annual basis, financial firms are required to prepare and submit a Certification of Compliance with the NY DFS Cybersecurity Regulations to the superintendent, commencing on February 15, 2018.
The scope of this legislation describes measures related to: cybersecurity programs and policy, personnel, resources and training, penetration testing and assessments, audit trails, access privileges, application security, third parties, NPI (Non Public Information) encryption, data retention, incident response and notification.
Among other requirements, this regulation dictates that companies declare any cyberattack to the superintendent within 72 hours. In the past, many companies chose to not disclose information related to these hacking exposures because much of their cost stems from damage to brand reputation and the necessary steps required to rebuild the trust of their clients post-attack.
Similar to the NY DFS proposal, the Federal Reserve Board (FSD), the Office of the Comptroller of the Currency (OCC), and the FDIC issued an advance notice of proposed rulemaking (ANPR) on enhanced cyber risk management and resilience standards for large banking organizations. Additionally, the states of Vermont and Colorado have released laws pertaining to cybersecurity and the improved protection and monitoring of data.
Two technologies specifically called out in the new NYS DFS Cybersecurity requirements, Multi-factor Authentication (MFA) and Risk Based Authentication (RBA), are key methods of complying with regulation and defending against attacks.
Multi-factor authentication is defined as using at least two factors to authenticate a person, generally a combination of:
- “Something I Have” — this could be a hardware token, a mobile soft token, etc.
- “Something I Know” — like a PIN code, a password, and
- “Something I Am” — such as a fingerprint or face recognition.
With MFA, the two factors are fully independent from each other (i.e. the failure of one factor would not compromise the other one).
Risk based authentication is the capacity to detect anomalies or changes in the normal use patterns of a person as part of the authentication process, require additional verification if an anomaly is detected to avoid any breach.
It is more efficient to avoid hacking and cyber-attacks in the first place by focusing attention on the security of the applications being accessed, both externally and internally. To learn more about these regulations and how similar standards will impact you, visit www.hidglobal.com/iam.
Kelvin Hughes leads the way in detection for security and surveillance applications. Utilising its SharpEye™ solid state X-Band radar, paired with the latest in multi-role camera mounts, provides versatile and flexible detection and identification systems.
Compact, powerful printer delivers crisp, secure access cards to Symmetry users
August 14, 2017, Torrance, CA – AMAG Technology, a security solution provider specializing in access control, video management, policy-based identity solutions and visitor management, is proud to announce that Matica Technologies is a new member of the Symmetry Preferred Partner Program. Matica’s EDIsecure XID8300 Retransfer ID Card Printer integrates with AMAG’s latest Symmetry™ Access Control software to provide Symmetry users with an affordable, high quality printer to print access cards. AMAG Technology and Matica Technologies cooperatively tested and approved this integration.
“We are proud about this new partnership with AMAG Technology,” said Ricard Ferrer, Head of Global Marketing for Matica Technologies Group. “Built from our industry proven and extremely reliable XID retransfer engine, the XID8300 offers a solution to the most challenging card projects. The certification and integration with Symmetry, the leading access control and video management platform, is a recognition which expands opportunities for both parties.”
“The integration between Symmetry and Matica card printers provides a high quality, versatile solution for security teams to print their own cards onsite,” said AMAG Technology, Vice President of Products and Partner Program, Dave Ella. “It prints at 300 and 600dpi which allows Symmetry customers to print complex fine lines and patterns for increased visual security and improved corporate identity.”
With its compact size, the printer delivers the right combination of reliability, performance and affordability for printing durable and secure cards. The Matica XID8300 prints on a variety of card materials including long-lasting, durable non-PVC cards such as ABS, PET, and Polycarbonate. The printer can be equipped with a number of encoding options such as magnetic encoding, contact and contactless chip encoding to provide Symmetry Access Control users with several choices.
Its 300dpi resolution printing achieves offset printing quality, even on uneven surface of smart cards. Diverse security features such as dye-sublimation UV ink ribbon for invisible security printing, IPSEC for encrypted data transfer through networks, and security erase of black data on used supplies, help to secure the environment and cards from counterfeiting and to avoid misuse of personal information.
Matica Technologies manufactures and markets solutions to issue financial cards, ID cards and passports for secure ID and secure payments applications.
For more information about the Symmetry Access Control integration with the Matica EDIsecure XID8300 card printer, contact your Regional Sales Manager, call 310.518.2380 or visit www.amag.com.
About AMAG Technology
AMAG Technology’s Symmetry™ Security Management Solutions are deployed across a wide variety of market segments from commercial to government, education, healthcare, banking, transportation, utilities, plus many more. Headquartered in Torrance, California with sales and support located throughout the Americas, EMEA, APAC and LATAM, AMAG provides customers with industry leading unified security solutions. AMAG Technology is part of G4S plc, the world’s leading global integrated security company which has operations on six continents and 585,000 employees. As the industry leader, AMAG focuses on delivering the latest technology to meet market needs. Its next generation of Symmetry security solutions help organizations operationalize their business to mitigate risk, meet compliance requirements and save money.
About Matica Technologies Group
Matica Technologies Group is a fast-growing and innovative global company with a strong international network. Matica develops, manufactures and markets solutions to issue financial cards, ID cards and passports for secure ID and secure payments applications. The company offers a comprehensive hardware and software product portfolio, from centralized systems and mailers to ID printers, laser desktop systems and instant issuance solutions.
The Group is worldwide represented with offices in Italy, Germany, France, Singapore, China, the US, the UAE, and India.
For further information, visit our website under www.maticatech.com.
GSN is pleased to announce that the 2017 Airport, Seaport, Border Security Awards Program is now open for nominations, with many new categories. And Chuck Brooks, who was recently named Cybersecurity Marketer of the Year, will once again serving as Lead Judge.
Entry categories for 2017 include Access Control and Identification, Detection Solutions, Communications, Surveillance Solutions, Airport/Aviation technologies, Maritime/Port Security and Underwater Vehicles, Border Security and Government Excellence awards.
In addition, the Program has been expanded by GSN to include a section on Cybersecurity categories, which is based on the enormous increase of Cyber attacks around the globe, which even made their way into the recent U.S. Presidential Election.
“Recently I had the opportunity to read two very disturbing articles on the subject of Cybersecurity,” said CEO Adrian Courtenay, Courtenay. “One was about the vulnerability of Maritime and Port Security, by the Brookings Institution, and the other, published in the current edition of Aviation Cyber Security Market Forecast.
Both of these sources made the same point:
According to the Brookings Institution article, more than 95 percent of U.S. trade is handled by U.S. seaports. “The U.S. may be a leader in e-commerce,” the article pointed out, but “it very much remains a maritime nation… Indeed, almost 50 percent of the U.S. Military’s operations in Afghanistan and Iraq shipped through a single U.S. Port… The awareness on cybersecurity needs in the Maritime Sector is currently low to non-existent. And of the $2.6 billion allocated to the U.S. Port Grant Program, less than six million has been awarded for security projections.”
“Cyber security is a necessity for the aviation industry moving toward the next decade,” says the Aviation Cyber Security Market Forecast. “The threat posed by Cyber criminals is credible and very real, and without necessary steps being taken to protect critical infrastructure, it is inevitable that a damaging attack could be made on aircraft, in seaports and on other critical infrastructure with disastrous implications. Aviation regulatory bodies and national governments are frequently becoming more vocal as to the vulnerability of the aviation industry. A widespread adoption of advanced protection systems need to occur across the aviation industry.”
“There is more information available on the need for enhanced Cybersecurity inside the program,” said Courtenay. “Our hope is that the Cyber Wizards will link up with the Airport and Seaport Wizards to make sure that our homeland and those of other freedom-loving countries will be safe and secure.”
“Varian’s Imaging Components business has a 50 plus year history of dedication to the imaging industry.”
—Sunny Sanyal, Senior Vice President and President, Imaging Components
IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
American Leadership and Policy Foundation to co-host Texas Grid Security Summit to address emerging threat to national security
KANSAS CITY, Mo. – The American Leadership and Policy Foundation has been invited by Texas senator Bob Hall to co-host the first ever Texas Grid Security Summit April 28 and 29 at the Texas State Capitol building in Austin, Texas.
Experts from around the nation, including Dr. Peter Vincent Pry, Executive Director of the Task Force on National and Homeland Security and Director of the U.S. Nuclear Strategy Forum, former CIA director R. James Woolsey, ALPF chairman, David Stuckenberg, and ALPF fellow Herschel Campbell and many others will address critical security concerns from high-impact threats that could cause a nationwide critical infrastructure collapse for a month or more.
This summit will address the Texas electric grid’s vulnerability to electromagnetic pulse (EMP), geomagnetic solar storms and cyber attacks as well as discuss emergency preparedness and emerging protective technologies. It will also highlight current and future state and federal legislative EMP protection and electric grid security efforts.
This threat, while not new, has received more attention in recent years due to the complex and devastating Fukushima disaster as well as evidence nations such as Iran and North Korea attempting to obtain capabilities to execute an EMP attack on the U.S.
Stuckenberg and Campbell recently published a research paper entitledElectromagnetic Pulse and Space Weather and the Strategic Threat to America’s Nuclear Power Stations that addresses this issue and calls for America’s leaders to address this growing threat, something Sen. Hall has taken a significant step to do with this summit. Details about the summit can be found here.
All parties at the summit will be available for interviews. Also, there will be a special press space for media during all events.
The ALPF receives its funding and research ideas from individual citizens and does not accept government or special interest funding. More information about the ALPF’s mission, research and fellows can be found atwww.alpf.org.
MONTRÉAL, March 30th, 2016 - Genetec Inc. (“Genetec”), a leading provider of open-architecture, unified IP security solutions today announced a new subscription model for its flagship unified security platform, Genetec™ Security Center. Security Center Subscription introduces new flexible ownership and payment options that allow customers to get access to Security Center on a 'pay-as-you-go' basis.
Subscribing customers receive the same local, on-premises version of Security Center and pay for it on a monthly or annual basis, as opposed to purchasing the entire system upfront. When purchasing on subscription, customers also benefit from the Genetec online support resources and qualified support professionals by phone or through live chat, as well as access to Security Center Cloud services with risk-free trials included in the price. Security Center Subscription is available immediately through the new Genetec self-service portal.
A recent Gartner Inc. industry report noted that by †2020, more than 80% of software vendors will change their business model from traditional license and maintenance to subscription, regardless of whether the software resides on-premises or in the cloud. Along with the flexibility and affordability of a subscription model, the Gartner report finds that the value of short-term predictability trumps long-term costs, particularly when the ease of adding or relinquishing licenses is included in the picture. The subscription model also moves the purchases from capital expenditure (CAPEX) to operational expenditure (OPEX). This enables customers who are looking to upgrade their systems to Security Center to do so from operational budgets allocated to their older, less capable security software.
"In the past few years, companies like Adobe, IBM, Oracle, Netflix and many other software companies have adopted flexible buying models with impressive success, offered as Technology-as-a-Service (XaaS) via the cloud, or as a traditional on-premises installation with monthly-or-annual renewals,” said Andrew Elvish, Vice President of Product Management and Marketing at Genetec. “Genetec is leading the way in the physical security industry by offering customers an alternative ownership option for our successful video surveillance platform. Not only will customers enjoy the same fully-featured version of Security Center, but they will do so with lower upfront expenditures, predicable recurring costs, and access to the latest releases and Genetec support resources, at no additional charge,” added Elvish.
Introducing Security Center Compact
As part of its new subscription model, Genetec is introducing Security Center Compact, a new entry-level edition of Security Center. Only available through subscription, Security Center Compact will be showcased for the first time at ISC West on booth #26 057. This new edition of Security Center supports up to 25 cameras and provides an easy, “no training required” option for customers with basic video management requirements. A good fit for smaller sites, Security Center Compact systems can also be linked to larger systems through the Genetec™ Federation™ feature, allowing for centralized monitoring as seen with citywide surveillance and multi-site businesses or campuses. The Compact edition features all of the camera integrations available in the enterprise edition of the software, so customers can choose the vendors they want to work with and design a system that suits their business.
In addition to providing smaller-site video surveillance, Security Center Compact offers a clear path as an organization's security needs evolve over time; Security Center Compact users can simply update their subscription and purchase a higher edition of Security Center as their system grows, avoiding the need to install and/or re-deploy new system software.
If the FBI doesn’t tell Apple how they hacked the San Bernardino iPhone, they’re putting lives at risk
Following public outcry about the dangers of government-mandated backdoors, the FBI backed down and opened the San Bernardino shooter’s iPhone without Apple’s help. If they really care about public safety, they must disclose the vulnerability they used to Apple to prevent criminals, hackers, and terrorists from exploiting the same security flaw and using it to do harm.
Encryption protects our hospitals, airports, power plants, and water treatment facilities. Sensitive information about critical infrastructure is stored on phones, computers, and in the cloud. The only thing preventing it from falling into the wrong hands is strong security technology.
Security experts agree that when a government agency discovers a security flaw that it can exploit for surveillance purposes, the best thing to do is to disclose that flaw to the company so that it can fix it for future products. That’s because vulnerabilities are never just used by law enforcement. Time and time again, security flaws that were created or hoarded by agencies like the FBI and NSA have been used by criminal hackers and foreign governments to carry out attacks.
Even the White House agrees, and has created a program specifically for the government to share vulnerabilities in cases exactly like this. But so far, the FBI is dodging the question, and won’t say whether they’ll do the right thing here.
The FBI claimed to the court at least 19 times that there was no way they could unlock the iPhone of the San Bernardino shooter without forcing Apple to build a government backdoor into their operating system. They maintained this repeatedly. Under oath. But the consensus among security experts is that this was never true; the FBI misled the court and the public in pursuit of a dangerous precedent.
Now that they’ve opened the iPhone in question, the mainstream media is already speculating as to how they did it. And it goes without saying that hackers, other governments, and those wishing to exploit this security flaw to do harm to the public are already hard at work trying to figure it out. Worse, the FBI has a terrible track record of protecting it’s own data. Just recently they leaked personal information about more than 20,000 FBI agents. They’re clearly not capable of keeping this exploit from falling into the wrong hands.
The only responsible thing for the FBI to do to protect all of our safety and security is to disclose the method they used to Apple so they can fix it and make sure it can’t be used to carry out future attacks.