Swimlane Achieves Integration With McAfee® ePolicy Orchestrator® Through The McAfee Security Innovation Alliance
LOUISVILLE, Colo., Dec. 7, 2017 -- Swimlane, a leader in Security Automation and Orchestration (SAO), announced today that it has achieved technical integration of its SAO platform with McAfee ePolicy Orchestrator (ePO™) technology, enabling customers to deploy more robust security solutions and better protect their assets from ever-evolving cyber threats.
As a member of the McAfee Security Innovation Alliance, Swimlane plays a critical role in the program's mission to accelerate the development of interoperable security products and simplify product integration within complex customer environments, delivering joint customers better value and more protection against the growing threat landscape. With this integration, Swimlane and McAfee address a rising industry need to shorten response times from security events and more easily remediate compromised systems, leading to a simplified Threat Defense Lifecycle.
"Swimlane streamlines operational efficiency, lowers incident response times, and improves security by integrating with best-of-breed solutions like McAfee ePO," said Cody Cornell, CEO and founder of Swimlane. "Through integration with McAfee ePO, Swimlane and McAfee now provide our joint customers with highly automated incident response and interoperability with other security platforms. By automating the workflow and response, Swimlane and McAfee joint customers can now respond faster and more consistently to a broad range of advanced attacks that are targeting their endpoints."
Swimlane helps organizations get the most out of existing resources by automating time-intensive, manual processes and operational workflows in real time. An API-first architecture, extensive out-of-the-box integrations and pre-packaged templates allow organizations to quickly enable orchestration across their entire security infrastructure. Swimlane delivers powerful analytics, real-time dashboards and key performance reporting to maximize the incident response capabilities of over-burdened and understaffed security operations teams.
With the integration of McAfee ePO technology, customers can now automatically initiate incident response workflows to address alarms. Importing configuration data from the McAfee ePO database into Swimlane delivers consolidated event details tied to potential endpoint attacks. This data can be correlated against additional event details pulled from multiple platforms for rapid investigation and triage. Swimlane can also apply tags from the McAfee ePO console to specific endpoints for immediate policy enforcement to help facilitate faster incident response and a greater return on investment from the entire security infrastructure.
"We're pleased to see Swimlane complete McAfee compatibility testing with ePO to meet multiple use cases that will help joint customers address threats faster and more efficiently," said D.J. Long, head of McAfee Security Innovation Alliance. "With this integration, joint customers will reap the benefits of reduced operational costs, greater protection and improved compliance."
Swimlane was founded to deliver innovative and practical security solutions to organizations struggling with alert fatigue, vendor proliferation and chronic staffing shortages. Swimlane is at the forefront of the growing market for security automation and orchestration solutions that automate and organize security processes in repeatable ways to get the most out of available resources and accelerate incident response.
Swimlane and the Swimlane logo are trademarks of Swimlane LLC in the United States and other countries.
McAfee, ePolicy Orchestrator, ePO and the McAfee logo are trademarks of McAfee, LLC in the United States and other countries. Other names and brands may be claimed as the property of others.
McAfee technologies' features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Learn more at www.mcafee.com. No computer system can be absolutely secure. Cost reduction scenarios described are intended as examples of how a given McAfee product, in the specified circumstances and configurations, may affect future costs and provide cost savings. Circumstances and results will vary. McAfee does not guarantee any cost reduction.
Process Hollowing is a technique first introduced years ago by attackers to thwart the mitigation capabilities of security products. However, most of today's solutions are able to detect and prevent such notorious attacks. In this talk, we will present a new technique, dubbed Process Doppelgänging, which has similar advantages but is much harder to detect - let alone prevent. Moreover, we will expose inherent limitations in the implementations of modern AV/NGAV scanning engines.
Most modern evasion techniques rely on complex memory manipulation in order to avoid AV/NGAV scan engines. Instead, we wanted to take advantage of the implementation of the Windows loader, and abuse it to load our code, while keeping it away from the prying eyes of security products. Moreover, the code will never be saved to any file on disk, making it invisible to most recording tools such as modern EDRs.
Doppelgänging works by utilizing two key distinct features together to mask the loading of a modified executable. By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.
Today, ThoughtWorks, a global software development and digital transformation consultancy, is proud to name three new members to its Board of Directors: Jane Chwick, William G. Parrett and Dr. Anita Sands.
This announcement comes as ThoughtWorks is approaching 25 years of revolutionizing software design and delivery, while advocating for positive social change. The three new members, with their variety of experience across multiple industries, strengthen ThoughtWorks leadership as the company continues down the path of double digit growth.
“Each individual brings a unique perspective to our board,” said Guo Xiao, Chief Executive Officer, ThoughtWorks. “Jane Chwick’s proven record creating and implementing high-value, long term strategic initiatives will benefit our next phase of growth. Bill Parrett’s global business experience is a perfect fit for the increase in cross border collaboration clients are demanding and our global footprint. And Dr. Sands, with her extensive experience driving technology innovation and organizational change, will provide great insights into how we can become better change agents for our clients in their strategic transformations. I have great confidence that under their guidance, ThoughtWorks will become the partner of choice for enterprise organizations grappling with complex digital transformations.”
About the Members of the Board
Ms. Chwick was a partner at Goldman Sachs where she had a 30-year career in technology, most recently as Co-Chief Operating Officer of the technology division. In this role, she was responsible for financial and business planning, setting the technical strategy and management of an 8,000-person organization within the firm. Ms. Chwick was also the Co-founder and Co-CEO of Trewtec, Inc., providing Corporate Directors, CEOs and Chief Technology Officers with vital information they need to improve their oversight of a company's technology function. Ms. Chwick currently serves as a director of Voya Financial, a financial, retirement, investment and insurance company; People’s United Bank, the largest regional bank Headquartered in New England; and MarketAxess, the leading fixed income electronic trading platform for institutional investors and dealers.
William G. Parrett
Mr. Parrett is a former Senior Partner of Deloitte & Touche USA LLP, a public accounting firm. Mr. Parrett retired in 2007. From 2003 to 2007, he served as the Chief Executive Officer of Deloitte Touche Tohmatsu (DTT). Prior to serving as Chief Executive Officer of DTT, he was Managing Partner of Deloitte & Touche USA since 1999. Mr. Parrett joined Deloitte in 1967 and served in a series of roles of increasing responsibility. Mr. Parrett currently serves as a director of The Blackstone Group L.P., an investment and advisory firm; Thermo Fisher Scientific Inc., a provider of analytical and laboratory instruments and products; Conduent Corporation, a business process services company. Additionally, Mr. Parrett is Past Chairman of United Way of America and of the United States Council for International Business.
Dr. Anita Sands
A Fulbright and O'Reilly Scholar, Dr. Sands began her banking career in 2004, handling derivatives analysis at Canadian Imperial Bank of Commerce, Canada's fifth largest general bank. She then joined the even larger Royal Bank of Canada and was the youngest-ever Senior Vice President at the Royal Bank of Canada as the Head of Innovation & Process Design. After moving to New York City to work as Head of Transformation for Global Technology and Operations at Citigroup, she joined UBS Wealth Management, where at the age of 33, she was appointed Chief Operating Officer responsible for technology, operations and corporate services. Currently, Dr. Sands is on the board of directors of three public companies including Symantec Corporation, a member of the F500, and the world’s leader in Cyber-Security; Service Now, an enterprise SaaS service management company; and Pure Storage, a leading innovator in the enterprise storage space. She is also an active investor and serves on the advisory board of Grand Central Tech—a leading New York-based technology incubator - as well as the Dean’s Advisory Board at Heinz College, CMU. She is a member of the Advisory Board at DocuSign and Accompany, as well as a member of the Digital Advisory Board at Box.
We are a software company and a community of passionate, purpose-led individuals. We think disruptively to deliver technology to address our clients' toughest challenges, all while seeking to revolutionize the IT industry and create positive social change.
SAN FRANCISCO, Dec. 7, 2017 -- Preempt, a leader in adaptive threat prevention that helps enterprises eliminate security breaches and internal threats, today announced the expansion of its product suite with the introduction of the Preempt Platform. According to Verizon's 2017 DBIR, 25 percent of breaches involved internal actors and 81 percent of hacking-related breaches were aided by stolen or weak passwords. The Preempt Platform helps security teams who are struggling to balance the threat of cyberattacks, breaches and internal threats without disrupting business or overloading analysts with false positives. The Preempt Platform can progressively adapt based on situation and context and automatically challenge anomalous behavior and resolve false positives in real-time.
Preempt continuously tracks the identity, behavior and risk of every enterprise user and adapts responses based on risk. Real-time insights are paired with business-appropriate responses that can adapt as situations change. Anomalous or risky behaviors can be challenged or redirected without disrupting user productivity. If risks increase, the solution can challenge users to verify their identity, reduce user privileges, force password changes, or ultimately block based on customizable policies.
By allowing security to adapt in real time, organizations can quickly solve a variety of security challenges such as being able to automatically respond in real-time to anomalous or risky behavior, proactively add secure access control, manage and protect privileged and service accounts and resolve risk and weaknesses before they are exploited by attackers. This flexibility opens up a variety of use-cases and also allows organizations to leverage existing security solutions in new ways.
"To securely enable digital business initiatives in a world of advanced, targeted attacks, security and risk management leaders must adopt a continuous adaptive risk and trust assessment strategic approach to allow real-time, risk and trust-based decision making with adaptive responses," wrote Neil MacDonald, VP Distinguished Analyst at Gartner, and Felix Gaehtgens, Research Director at Gartner, in the report, Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats. The CARTA approach is fundamental to how the Preempt Platform is architected.
"Detection only solutions today are not enough. We needed a proactive solution to help us get ahead of threats. Preempt's approach of being able to adapt and automatically prevent threats based on identity, behavior and risk has provided tremendous value" said Grant Sewell, Head of Global Information Security at Scotts Miracle-Gro. "The ease of deployment and extensibility of its platform also helps enable us as we move to more cloud based applications and infrastructure."
At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a policy engine. These capabilities help to power the platform for delivering a scalable set of applications that help customers to prevent threats and support broad set of use cases. The applications include:
- Behavioral Firewall: real-time, automated and situational threat prevention and enforcement. Its goal is to detect, challenge and respond to threats and risky behavior without getting a security analyst involved.
- Any App: allows organizations to easily expand secure authentication to any on-premise or cloud application without additional development. Any App is vendor neutral and can complement and extend a typical MFA deployment from a variety of vendors.
- Insights: provides instant visibility into security posture enabling security teams to resolve risks and weaknesses before they are exploited. Insights can quickly find privileged accounts, use of shared accounts, use of unmanaged devices, weak or exposed passwords, or passwords that never expire.
- Threat Hunter: allows security analysts to proactively search raw events, detect and identify security events or further investigate reported events. It can also be used to find and eliminate threats such as administrative account lockouts, privilege escalation and failed logins.
Designed with an extensible architecture and centralized management, the Preempt Platform easily integrates with other security solutions to gain deeper context for threat detection and gain more threat enforcement options for stopping threats. No endpoint software agents are required, and installation is typically completed in a few hours, providing significant value on day one and increasing value over time for high impact and a low total cost of ownership.
To learn more about the Preempt Platform, visit: https://www.preempt.com/product/.
Source: Gartner, "Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats," Neil MacDonald, Felix Gaehtgens, 22 May 2017.
About Preempt Preempt protects organizations by eliminating insider threats and security breaches. Threats are not black or white and the Preempt Platform is the only solution that delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk. This ensures that both security threats and risky employee activities are responded to with the right level of security at the right time. The platform easily scales to provide comprehensive identity based protection across organizations of any size. The company is headquartered in San Francisco, CA. Learn more about us at www.preempt.com.
New Report: Cyberattacks on Businesses Increased 23 Percent as 'New Mafia' Hits the Digital Streets in 2017
SANTA CLARA, Calif., Dec. 7, 2017 -- Malwarebytes™, the leading advanced malware prevention and remediation solution, today unveiled a report on the new age of organized cybercrime. It describes how this 'New Mafia' is accelerating the volume of attacks, sophistication and malice, which have increased 23 percent in 2017 versus 2016.
The New Mafia: Gangs and Vigilantes – A Guide to Cybercrime for CEOs, demystifies cybersecurity by drawing parallels between today's criminals and the Mafia gangs of the 1930s. This new generation of cybercriminals increasingly resembles traditional Mafia organizations, not just in their professional coordination, but their willingness to intimidate and paralyze victims. Malwarebytes' data confirms the capacity of these fast-maturing gangs to inflict greater damage on businesses.
- The average monthly volume of attacks in 2017 is up 23 percent versus 2016.
- Ransomware attacks in 2017 through October, have surpassed total figures for 2016 by 62 percent. In addition, there was an almost 2,000 percent increase in ransomware detections since 2015—rising to hundreds of thousands of detections in September 2017 from less than 16,000 in September 2015.
- Ransomware detections increased more than three-fold from 90,351 in January to 333,871 in October.
"The 'New Mafia', identified by our report, is characterized by the emergence of four distinct groups of cybercriminals: traditional gangs, state-sponsored attackers, ideological hackers and hackers-for-hire," said Marcin Kleczynski, CEO of Malwarebytes. "Through greater vigilance and a comprehensive understanding of the cybercrime landscape, businesses can support the efforts of legislators and law enforcement, while also taking action into their own hands."
The growth of cybercrime and a lack of clarity over how best to tackle it – particularly within the context of policing – is having a profound impact on victim confidence. Those affected by cybercrime are often embarrassed, resulting in a reluctance to speak out. This is true for consumers and businesses alike and can have dangerous ramifications as firms bury their heads in the sand instead of being open and working to reduce future incidents. The report suggests that the answer lies in engaging and educating the C-suite so that CEOs are as likely as IT departments to both recognize the signs of an attack and be able to respond appropriately.
"CEOs will soon have little choice but to elevate cybercrime from a technology issue to a business-critical consideration," said Kleczynski. "The most damaging cyberattacks to businesses are the ones that go undetected for long stretches of time. In spite of high-profile occurrences over the last year, this report shows that many business executives may still have some knowledge gaps to fill."
The report also looks at the future of cybercrime and the implications of the ongoing melding of our physical and digital worlds. It argues that the Internet of Things (IoT) will enable crime to come full circle, potentially enabling someone to be physically executed by digitally hacking their internet-enabled pacemaker. Thus, it suggests that our understanding of, and legislation against, cybersecurity must drastically improve. If we can imagine a pacemaker being hacked or an autonomous getaway car used in a robbery, we should be able to legislate against it.
Malwarebytes' analysis shows that, in spite of acknowledging the severe reputational and financial risks of cybercrime, many business leaders are largely underestimating their vulnerability to such attacks. The report concludes the potential for businesses and consumers to fight back by acting as 'vigilantes' through greater collective awareness, knowledge sharing and proactive defenses. This includes a shift from shaming businesses who have been hacked and instead engaging with them. Only then can we learn from one another how to tackle this rampant issue.
The complete The New Mafia: Gangs and Vigilantes – A Guide to Cybercrime for CEOs guide features original data and insight taken from a global panel of experts from a variety of disciplines including PwC, Leeds University, University of Sussex, the Centre for Cyber Victim Counselling in India and the University of North Carolina. To view the full report, visit https://go.malwarebytes.com/Cybercrime_NewMafia_PR.html.
Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. Malwarebytes completely replaces antivirus solutions to remove the personal obstacles and business interruptions caused by modern cybersecurity threats. More than 10,000 businesses and millions of people trust Malwarebytes innovative machine-learning solutions and global team of researchers to identify emerging threats and to prevent and eradicate malware that antiquated security solutions miss and leave behind. For more information, please visit us at http://www.malwarebytes.com/.
Malwarebytes founder and CEO Marcin Kleczynski started the company to create the best disinfection and protection solutions to combat the world's most harmful Internet threats. Marcin was recently named "CEO of the Year" in the Global Excellence awards and has been named to the Forbes 30 Under 30 Rising Stars of Enterprise Technology list and the Silicon Valley Business Journal's 40 Under 40 award, adding those to an Ernst & Young Entrepreneur of the Year Award.
NEW YORK, Dec. 7, 2017 -- Dashlane, the award-winning password manager, and one of the world's most trusted digital security companies, today announced its second annual list of the "Worst Password Offenders." The rankings highlight the high-profile people and organizations that suffered the most significant password-related blunders of 2017.
While the violators on this list vary, they all showcase that common password mistakes can cause great embarrassment and economic loss, and that the aftermath of a breach can often be prevented. Most people make the same simple errors that these offenders made, such as using weak passwords or reusing passwords for multiple accounts. And, now that Equifax has exposed the data of nearly 150 million people, using a unique password for every account has become the duty of every person and business using the Internet.
Learn how to prevent common hacks here: http://blog.dashlane.com/year-of-the-hack
Dashlane's "Worst Password Offenders" of 2017, in order of rank:
1. Donald Trump: The President tops this year's list of offenders, and for good reason. As a person who has continually lamented the cybersecurity woes of his opponents, and trumpeted his own, his leadership in this area leaves much to be desired.
For starters, a January investigation by UK outlet Channel 4 News exposed that many of the top staff members Trump handpicked, including multiple cabinet secretaries, senior policy directors – even cybersecurity advisor Rudy Giuliani – were reusing unsecure, simple passwords. These passwords were used across multiple websites, as well as for their personal email accounts, and were believed to have been part of a slew of breaches that occurred between 2012 and 2016.
This revelation is not to be taken lightly, and signals that a president who touts his cybersecurity prowess may have added numerous cyber vulnerabilities to the nation's highest office. Trump also has direct connections to three of our other Top 10 offenders (Republican Party, Paul Manafort, Sean Spicer), which suggests he has never implemented proper cybersecurity protocols in any of his positions. Lastly, numerous Trump Organization websites were hacked this year, and a multitude of leading security experts questioned the security of his Twitter devices and accounts.
2. Equifax: The Equifax breaches of 2017 allowed cybercriminals to access the personal information of nearly 150 million people in the US, UK, and Canada. Pouring salt in the wound was the additional discovery by security researcher Brian Krebs that the company was using the username/password combination "admin/admin" for some of its online portals. Although the cause(s) of the breaches are still unknown, it's clear that Equifax's egregious password practices put the personal information of millions around the world at risk.
3. UK Government: A June investigation by The Times found that Russian hackers were trading thousands of passwords belonging UK government officials. Affected parties included MPs, parliamentary staff, and officials in the Foreign Office, including the head of IT. Most of the passwords were stolen from previous breaches, and because they remained unchanged after the breaches, the Russian hackers had easy access to their accounts. Perhaps the most concerning element of the report was that the most popular password for these officials was…you guessed it: "password."
In an unrelated December incident, multiple MP's Tweeted that they routinely share their passwords. They were defending a colleague they believe was falsely accused of an offense, but as security researcher Troy Hunt stated, the incident," …illustrates a fundamental lack of privacy and security education." Non-secure password sharing increases infosec risks and undoubtedly leaves these MP's, as well as Parliament, susceptible to a variety of cyber dangers.
4. Department of Defense: Defense contractor Booz Allen Hamilton left the Pentagon severely exposed by leaving critical files on a non-password protected Amazon server. Included in the exposed data were several unencrypted passwords that could have been used to access classified D.O.D. information.
5. Republican Party: One of the GOP's data analytics firms accidentally leaked the personal details of 198 million Americans – roughly the entire voting-age population. One cybersecurity expert described the leak as a "gold mine for anyone looking to target and manipulate voters." Much like the Pentagon hack, the firm was storing data on a non-password protected server.
6. Google: A wide-scale phishing attack in May compromised an unknown number of Google users' login credentials. The attack sent users to a real Google sign-in screen and captured their credentials when the user gave permission to a third-party app. Although Google swiftly resolved the issue, it highlights the password-related dangers that come with phishing attacks, as well as the need for extra vigilance by both users and companies regarding app access.
7. HBO: Your favorite Sunday night lineup provider was hit by a variety of hacks and breaches in 2017. These ranged from the leaks of episodes and stars' personal information, to the network's social media accounts getting hacked. Spoiler alert: HBO was treating cybersecurity lightly. After the litany of incidents, employees came forward with reports of terrible cybersecurity practices, including the reuse of passwords for personal and work accounts.
8. Imgur: The cause of this recent breach is still unknown, but the company admitted that at the time of the hack it was using an outdated algorithm to encrypt its users' passwords. Although it updated its encryption last year, the damage was already done as 1.7 million user passwords were potentially compromised.
9. Paul Manafort: Donald Trump's recently indicted campaign manager appears to be to a James Bond fan, as he was using 'Bond007' as his password for multiple personal accounts, including Dropbox and Adobe. The dangers of password re-use are real, and the fact that he and so many Trump associates are on this list is unsettling.
10. Sean Spicer: Remember him? The least critical incident on our list is still of note, as the former Press Secretary sent numerous Tweets of what appeared to be his very own passwords. His copying and pasting mistakes highlight the need for password managers that can automatically log you in, leaving no data stuck on the clipboard. Or podium.
Avoid Your Own Dishonorable Mention
It may seem easy to call out the unhealthy habits of public figures, but if you've found yourself committing any of the same cybersecurity sins as the offenders on our list, you are at risk too.
Here are the top three lessons to learn from the 2017 incidents:
1. Actually Use Passwords: This one seems obvious, but as our list shows, it's not always followed. Whether on a server, in an email account, or in an app, you should always secure your data with passwords as they're the first, and often only, line of defense between hackers and your personal information.
2. Use Strong Passwords: Never use passwords that are easy to guess, or that contain names, proper nouns, or things people can easily research about you. All of your passwords should be longer than eight characters and include a mix of random letters, numbers, and symbols. Use a password generator to think of them for you.
3. Never Reuse Passwords: Each and every one of your accounts needs a unique password. As our offenders underscored, the risk in password reuse is that hackers can use passwords from compromised accounts to easily access other accounts. The only protection against this is to have a different password for every account.
Password managers like Dashlane can help protect you on any device. In addition to creating unique strong passwords for all of your accounts, Dashlane ensures you're not reusing passwords for multiple accounts, alerts you when breaches occur, and lets you change your passwords automatically in one-click.
To learn more, visit dashlane.com.
Dashlane, one of the world's most trusted digital security companies, takes the pain out of passwords with its password manager and secure digital wallet app. Dashlane allows users to securely manage passwords, credit cards, IDs, and other important information via advanced encryption and local storage.
With so many devices, the line between home and work no longer exists. Thankfully, Dashlane works everywhere, for everyone. The company has helped 9 million consumers manage and secure their digital identity and enabled over $10 billion in e-commerce transactions. Dashlane Business is trusted by 7,000+ companies to create, enforce, and track effective access management, and features the only patented security architecture in the industry.
The Dashlane app is available on PC, Mac, Android, and iOS, and has won critical acclaim by top publications including The Wall Street Journal, The New York Times, and USA Today. Dashlane is free to use on your favorite device for life, and costs $39.99/year to sync between an unlimited number of devices.
Dashlane was founded by Bernard Liautaud and co-founders Alexis Fogel, Guillaume Maron and Jean Guillou. The company has offices in New York City and Paris, and has received $52.5 million in funding from TransUnion, Rho Ventures, FirstMark Capital and Bessemer Venture Partners. Learn more at Dashlane.com.
CohuHD Costar Awarded US$2.4 Million Surveillance Video Camera Contract for Major Critical Infrastructure Project in Saudi Arabia
CohuHD Costar, a Costar Technologies, Inc. company (OTC Markets Group: CSTI) announced today that it has been awarded a $2.4 million video surveillance camera contract for a major critical infrastructure project in Saudi Arabia. With the recent introduction of the RISE 4290HD series, CohuHD Costar expands the reach of its RISE series platform into long-range, day/night, thermal video surveillance applications. Working with one of the leading security solutions providers and systems integrators in the Middle East, the RISE 4290HD will provide 24/7 video surveillance for a major critical infrastructure project in Saudi Arabia. This large-scale deployment of RISE 4290HD cameras marks another important milestone for the RISE platform that requires the cameras to operate under extreme environmental conditions and at long distances.
"We're seeing increased demand for rugged cameras that can provide long-range video 24/7 in a variety of environmental conditions. The RISE 4290HD does this, and does it at a price point we believe makes it very attractive for applications such as critical infrastructure and intelligent traffic systems. We expect this project to be the first of many major security monitoring projects for the 4290HD around the world," stated Doug Means, Senior VP and GM of CohuHD Costar.
The RISE 4290HD Series dual-spectrum positioning system is the latest addition to CohuHD Costar's RISE family of products and has been awarded the 2017 GSN Airport, Seaport, Border Security Award for Best Long-Range/High-Res Camera by Government Security News. The RISE 4290HD Series combines crystal clear HD visible spectrum imaging along with standard resolution LWIR thermal night vision imaging.
The RISE 4290HD is designed to operate in harsh weather with its purged and pressurized IP67 enclosure protection to eliminate the effects of water intrusion, pollutants and corrosives. The ultra-rugged design of all CohuHD RISE products allows the company to offer a lifetime warranty against water ingress.
About Costar Technologies, Inc.
Costar Technologies, Inc. develops, designs, manufactures and distributes a range of security solution products including surveillance cameras, lenses, digital video recorders and high-speed domes. The Company also develops, designs and distributes industrial vision products to observe repetitive production and assembly lines, thereby increasing efficiency by detecting faults in the production process. Headquartered in Coppell, Texas, the Company's shares currently trade on the OTC Markets Group under the ticker symbol "CSTI". Costar was ranked 41 in a&s magazine's Security 50 for 2016. Security 50 is an annual ranking of the world's largest security manufacturers in the areas of video surveillance, access control and intruder alarms, based on financial performance.
Cautionary Statement Regarding Forward Looking Statements
This press release contains forward-looking statements, including but not limited to statements related to the demand for our products and future projects, that are subject to substantial risks and uncertainties that could cause actual performance or results to differ materially from those expressed in or suggested by the forward-looking statements. You can identify forward-looking statements by words such as "believe," "may," "estimate," "continue," "anticipate," "intend," "plan," "expect," "predict," "potential," or the negative of these terms or other comparable terminology. These forward-looking statements are based on management's current expectations but they involve risks and uncertainties. Actual results and the timing of events could differ materially from those anticipated in the forward-looking statements as a result of the risks and uncertainties.
You should not place undue reliance on any forward-looking statements. The Company assumes no obligation to update forward-looking statements to reflect actual results, changes in assumptions, or changes in other factors affecting forward-looking information, except to the extent required by applicable laws.
SOURCE Costar Technologies, Inc.
The Global Passenger Security Equipment Market Is Expected to Reach $79,042 Million in 2023, from $43,398 Million in 2016, Growing at a CAGR of 8.9% from 2017 to 2023
LONDON, Dec. 6, 2017 -- Passenger Security Equipment Market by Transport Infrastructure (Airports, Train Station, Bus Stations, and Seaports) and Type (Baggage Inspection System, Explosive Detection System, Video Surveillance, Intrusion Detection and Prevention System, Fire Safety & Detection System, People Screening Systems, and others) - Global Opportunity Analysis and Industry Forecast, 2017-2023
Download the full report: https://www.reportbuyer.com/product/5228628
The global passenger security equipment market is expected to reach $79,042 million in 2023, from $43,398 million in 2016, growing at a CAGR of 8.9% from 2017 to 2023. Passenger security refers to a technique, which helps them protect from accidentals harms, crimes, and other threats. Such procedures help the government to avoid any crimes and allow passengers to travel from one place to another without any harm. Honeywell International, Orbocomm, and L-3 Communications are some of the leading key players of the passenger security equipment market.
Increase in terror attacks on public transport infrastructures drives the passenger security equipment market growth. Further, rise in demand of biometrics technologies for identity verification by the government also fuels the market growth. However, high installation cost is anticipated to hinder the passenger security equipment market during the forecast period.
Based on type, the global passenger security equipment market is categorized into baggage inspection system, explosive detection system, video surveillance, intrusion detection and prevention system, fire safety & detection system, people screening systems, and others. The people screening systems segment dominated the global passenger security equipment market, in terms of revenue, and is expected to maintain this trend.
Honeywell International, Orbocomm, L-3 Communications, Kapsch, Siemens AG, Rapiscan Systems, Rockwell Collins, Safran Group, Raytheon Group, and Smiths Group are some of the leading key players of global passenger security equipment market.
KEY MARKET SEGMENTS
BY TRANSPORT INFRASTRUCTURE
Baggage Inspection System
Explosive Detection System
Intrusion Detection and Prevention System
Fire Safety & Detection System
People Screening Systems
Rest of Europe
Rest of Asia-Pacific
The other players in the value chain include (profiles not included in the report):
Download the full report: https://www.reportbuyer.com/product/5228628
Reportbuyer is a leading industry intelligence solution that provides all market research reports from top publishers
For more information:
Research Advisor at Reportbuyer.com
Email: [email protected]
Tel: +44 208 816 85 48