STONEGATE CAPITAL ADVISORS Voted #1 Independent Investment Advisor by Ranking Arizona

SCOTTSDALE, ARIZONA, UNITED STATES, February 14, 2019 /EINPresswire.com/ — Stonegate Capital Advisors has been voted the #1 Independent Investment Advisory firm on Ranking Arizona's "The Best of Arizona Business" list of Independent Investment Advisory Firms. The list is the result of the largest business opinion poll taken in Arizona. Rather than basing the ranking on annual revenue or business size, it is based upon the opinions of participant voters who choose companies based on quality of product service, and with whom they would recommend doing business.

"We are very honored to be recognized by Ranking Arizona for the impact we are making throughout the state", said Jameson Van Houten, CFP, and CEO of the firm. "It is truly a privilege to be recognized by our wonderful clients and the communities we serve."

Pat Lundquist
Stonegate Capital Advisors
+1 602-953-8450
email us here


Source: EIN Presswire

Perks Group Provides Speedy Methods for Members to Connect to National Deals

PerksConnect

PerksConnect

NEW YORK , NEW YORK, UNITED STATES, February 14, 2019 /EINPresswire.com/ — The Perks Program allows members to redeem discounts and savings at thousands of business locations across the country. Perks Group delivers speedy methods of connecting members to deals through a state-of-the-art user interface that allows its members to redeem savings on-the-go.

The Perks Group discount network brings together consumers, local merchants, daily deal networks, national merchants, manufacturers, and distributors into one easy-to-use and convenient program. Perks Group––creators of the Perks Program––connects their members to thousands of brand-name items, luxury products, necessities, and more at discounted rates.

Since 1988, companies across the country have turned to the Perks Group to give their employees access to one of the country’s leading affinity programs. Today, millions of members access daily-updated national and local deals through the Perks Program’s website.

Perks Group offers many traditional affinity perks but set themselves apart from competitors by giving members a sophisticated interface that is both comprehensive and highly user-friendly. In this platform, users can search by city, state, and zip code for discounts either locally or when traveling. Instead of having to rely on upcoming listings or long, outdated guides, users simply add in their location and receive a populated list of deals in their area.

This quick availability of updated savings makes accessing deals while traveling a cinch. On their smartphones, Perks Group members get all the intuitive design and deals available through their online portal in a condensed and user-friendly format. Alternatively, members can access their savings in-store at the time of purchase, through a link when shopping online, by calling an 800 number and providing a value code, or through traditional downloadable coupons.

The group offers speedy deals through the PerksCard in addition to the listings on the PerksConnect platform. Internet access allows users to sign into their hubs (on any computer, tablet, or smartphone) and redeem discounts instantly.

Because people have constant access to the internet through their smartphones, and because smartphones are so saturated into our daily lives, Perks Group through mobile is an invaluable savings resource. The mobile application cuts down the time it takes to find deals while traveling as it can be used in place of the 800-number system or the often-lengthy process of logging into a computer.

The Perks Program by Perks Group encompasses millions of members nationwide and growing, serving as one of the country’s most inclusive and far-reaching affinity programs. This wide network ensures that all members can save on thousands of items no matter where in the nation they travel.

Perks Group helps businesses grow their sales and expand their reputation by introducing their product or service to a fast-growing network of members. And the members themselves get real cash back in their pockets in no time thanks to the sophisticated Perks Program.

Bryan Powers
Web Presence, LLC
+1 7863638515
email us here


Source: EIN Presswire

SystemDomain, Chicago based firm being shortlisted as Top 10 Identity and Access Management Consulting/Services Company.

Enterprise Security Magazine has shortlisted SystemDomain Inc. as the Top 10 Identity and Access Management Consulting/Services Companies for 2019.

CHICAGO, IL, USA, February 14, 2019 /EINPresswire.com/ — SystemDomain, Inc, a Chicago based leading global information technology and consulting services company, today announced that SystemDomain has been shortlisted to be featured in the annual edition on Identity and Access Management (IAM) as a top Identity and Access Management consulting/service company.

For the past few months the selection panel at Enterprise Security Magazine has analyzed over hundreds of IAM Consulting/Services Companies and shortlisted the companies that are at the forefront of tackling challenges. To help the enterprises in selecting the companies that provide exceptional consulting/services in the realm of IAM. Enterprise Security Magazine is releasing the special annual issue, which will feature the "Top 10 Identity and Access Management Consulting/Services Companies 2019".

"It is an honor to be recognized as the Top 10 Identity and Access Management Consulting/Services Companies for 2019 by Enterprise Security Magazine",said Shubhi Garg, President, SystemDomain, Inc, "We will continue to build upon our promise to provide best-in-class solutions and services."

SystemDomain provides consulting to implement and integrate end to end Cyber Security solutions to address the cyber vulnerabilities and threats across the enterprises i.e. Information Systems, Network, Database, Physical Access, Access Control and Management, Cloud, Mobile. SystemDomain's solutions and professional services help protect the customers, shareholders and employees of the corporations in cost effective and efficient manner. SystemDomain also provides the business intelligence for proactive monitoring of Critical Cyber Assets.

Leading Cyber Security Product Companies in Identity and Access Management space have strategic partnership with SystemDomain, Inc. to implement their products to solve the business challenges in Cyber Security. The strategic partnerships allow SystemDomain to offer the products and services at very competitive pricing to our clients. Our partnership empowers with exceptional resources that distinguish our offering from the competition.

SystemDomain offers state-of-the-art solutions in Risk Management such as: Threat Detection & Response, Cyber Security Operations, Security & Behavioral Analytics, Fraud Intelligence Services, Governance Risk & Compliance, IT & Security Risk Management, Regulatory & Corporate Compliance Management, Audit Management, Business Resiliency, Third Party Governance, Public Sector Solutions.

Key award wins and industry accolades for SystemDomain:

SystemDomain had been ranked as ‘Top 20 Most promising Cyber Security Solution Provider 2017' by “Silicon India”
SystemDomain Inc. had been selected as one of Diversity Business.com’s (now OMNIKAL) OMNI500 Top Businesses for 2017.
Gold Award for 2018 as the Fastest Growing Cyber Security firm by Cyber Security Excellence Awards
Top 25 Cyber Security Companies 2018 by CIO Applications and Tech Era Magazines.
Named Among ‘Silicon 70’ by The Silicon Review Magazine 2018

About SystemDomain Inc.

SystemDomain is an IT Consulting firm based in IL with focus in Cyber Security & Risk Management, Digital, Cloud, Data Analytics and Professional Services (such as Enterprise Architecture, Database, Network Management, ERP, CRM, Cloud and Digital Transformation). SystemDomain strives to connect with their customers, clients, and partners with an unbeatable portfolio of solutions to leverage critical trends such as big data & analytics, social business and security.SDI has offshore software development and support centers for clients who are interested in cost-effective services.

Our determination for customer satisfaction and delivering the efficient & cost-effective solutions are our secrets of success.
(http://www.systemdomaininc.com)

About Enterprise Security Magazine

Enterprise Security Magazine is assisting thousands of organizations to reduce risk and complexity by bringing to light unique market trends including how security needs to be embedded within hardware and software solutions and work with each other to provide integrated mutlilayered protection. Enterprise Security Managzine follows a unique learn-from-peer approach where chief security officers and decision makers share their innovative solutions along with their industry expertise and wisdom.
(https://www.enterprisesecuritymag.com)

Media Relations
SystemDomain Inc
+1 630-922-8189
email us here


Source: EIN Presswire

5 Star Car Title Loans Scholarship Program Announcements

5 Star Car Title Loans Logo

5 Star Car Title Loans

2019 Scholarship Program – Apply Online

Education is not preparation for life; education is life itself”

— John Dewey

LOS ANGELES, CA, USA, February 14, 2019 /EINPresswire.com/ — 5 Star Car Title Loans is pleased to announce a new scholarship opportunity beginning January 10th and ending on December 1st, 2019, 11:59 PM PST. Winners will be announced by January 10th, 2020.

We’re offering a $1000 scholarship to help students with their educational costs.

Visit our scholarship program webpage for eligibility requirements, and to apply online today!

Students must meet the following conditions in order to qualify for our scholarship:
1. Must be an undergraduate student.
2. Must be enrolled in a higher education institute in the US.
3. Must complete our scholarship application and essay (400-600 word limit).

About 5 Star Car Title Loans Inc:
5 Star Car Title Loans provides title loans for all California residents!
We are a full service title loan company, meaning we will always do our best to seek a solution for each and every applicant.
We offer different range of loans between $2600-$20,000. We base our loans on the value of your car and your ability to pay back the loan as part of our credit criteria.
To learn more about how auto title loans work read our guide: How do title loans work or call us now and speak with our team!

NO PURCHASE NECESSARY TO ENTER OR WIN.OPEN TO/ENTRY DETAILS: Open to legal residents of the 50 United States and the District of Columbia who are of legal age of majority in their jurisdiction of residence (and at least 18) at the time of entry, are a current undergraduate student, and enrolled in a post-secondary educational institution located in the 50 United States or D.C. at the time of entry and at the time the scholarship is awarded. 3. Contest begins at 12:00 a.m. Pacific Time (“PT”) on January 10, 2019, and ends at 11:59 p.m. PT on December 1, 2019. All entries must be received by 11:59:59 p.m. PT on December 1, 2019 in order to be considered for the Contest. 4. PRIZE DETAILS: One (1) $1,000 Scholarship in the form of a check payable to the Winner for the purpose of helping the Winner with his or her educational costs. ARV $1,000. 5. ODDS: Odds of winning depend on number of entries. 6. ELIGIBILITY: Employees, contractors, directors, officers, and agents of 5 Star Loans, its affiliates, and members of the immediate family and household of each such employee are not eligible to enter or win. 7. Online entry only. 8. Limit one (1) entry per person. 9. Void where prohibited. 10. Participation is subject to complete terms and conditions by which all entrants are bound. Available at https://5starloans.com/scholarship-program/ 11. Entrants release all parties from all claims/liability arising from this Contest or acceptance/use of any Prize. 12. Sponsor: 5 STAR LOANS INC. d/b/a 5 STAR CAR TITLE LOANS, 2216 E Colorado Blvd, Pasadena, CA 91107.
Copyright 2017 5 STAR LOANS INC. All Rights Reserved. Printed in U.S.A.

Carmel
Gordon
+1 888-309-0994
email us here


Source: EIN Presswire

CARIBBEAN VILLA EXPERTS EXCEPTIONAL VILLAS LAUNCH SERVICE TO HELP CLIENTS FIND THEIR PERFECT VACATION SPOT

Casablanca Villa Sandy Lane Barbados

Casablanca Villa Sandy Lane Barbados

Atelier Villa Barbados

Atelier Villa Barbados

Villas in Turks and Caicos

Beach Enclave Turks and Caicos

Casa de la Luna Papagayo

Casa de la Luna Papagayo

Luxury vacation rental Maldives

Exceptional Villa Maldives

Leading villa rental experts launch expert service to match clients to their perfect property

Our high-end discerning clients are absolutely delighted with our villa matching service”

— Alexandra Baradi

NEW YORK, NEW YORK, UNITED STATES, February 14, 2019 /EINPresswire.com/ — Vacation time is precious. You work all year for a couple of relaxing weeks, and therefore it is super critical that you don’t make the wrong choice in deciding where you go and where you stay. That is why Exceptional Villas have launched an exclusive complimentary service where they help clients choose which Caribbean islands located within over 30 nations in the region, are best for them. Everyone is looking for something different in a vacation. Some clients want to relax on a perfect beach with a great book and be completely pampered. Others want to explore and see some culture and history. Many want to experience nature. Some want to be super active and play tennis, go hiking, climbing, golf, polo or spend lots of time on the water or under the water.

Computer software can perfectly match a client’s requirements when it comes to physical facilities such as the number of bedrooms and whether a property is located on the beach or not or has a swimming pool. But finding the perfect vacation rental is much more than that. It is about working out what the client’s dream vacation looks like and what is important to them. And what type of atmosphere, ambience and vibe they want. It is much more subjective and individual to each client and takes more than a computer programme to work out.

The Exceptional Villa team are highly trained and spend a lot of time with their clients working out all of these things before they propose a short list of villas and vacation rentals for their clients. Part of the training is to view and inspect every single property they represent regularly. They also guarantee that you will be speaking to a team member who has actually been to see the properties and knows them exceptionally well.

Alexandra Baradi, Owner and CEO of Exceptional Villas who are also considered to be one of the most trusted villa rental companies in the world, said: “Our high-end discerning clients are absolutely delighted with our villa matching service.” The word is spreading about this service, and we are finding a significant surge in bookings as a result. Finding the right property today can be a difficult task with all the various distribution sites available. This service takes all the pain out of searching for the perfect property for your next vacation.

ABOUT EXCEPTIONAL VILLAS

Exceptional Villas is a luxury villa rental company featuring only the best hand-picked and personally inspected properties in the world. The company has clients from all over the world. Exceptional Villas have been in the travel business for over 25 years and offer a bespoke service to their clients. This includes matching the perfect villa to each of their clients and providing a complimentary concierge service. This service includes organising all aspects of the client’s vacations such as VIP airport arrival, ground transportation, restaurant reservations, tours and excursions, water sports and pre-arrival stocking. Unlike some of their competitors, they do not provide a membership fee. Likewise, their villa experts are indeed experts. They visit every single villa and are filled with a wealth of information regarding each villa, as well as each destination. Exceptional Villas take total pride in the customised service they offer. The company has two other brands in its portfolio. Villas Barbados and Dream Ireland which are dedicated brands for Barbados and Ireland.

For more information visit http://www.exceptionalvillas.com/ or call + 353 64 66 41170 or toll-free from the US and Canada 1 800 245 5109 and UK 0845 528 4197

Alexandra Baradi
Exceptional Villas
+1 702-849-9849
email us here


Source: EIN Presswire

American Gene Technologies Signs Research Agreement with NIAID for Experimental HIV/AIDS Cure Strategy

AGT signed Research Collaboration Agreement with National Institute of Allergy and Infectious Diseases for studies on AGT’s cell and gene therapy for HIV/AIDS.

ROCKVILLE, MD, UNITED STATES, February 14, 2019 /EINPresswire.com/ — American Gene Technologies (AGT) recently signed a Research Collaboration Agreement with the National Institute of Allergy and Infectious Diseases (NIAID), part of the National Institutes of Health, for research studies on AGT’s cell and gene therapy for HIV/AIDS. AGT uses its proprietary, genetically modified, autologous cell product (AGT103-T) to reconstitute the immune response against HIV with the goal of reducing persistent viral reservoirs and achieving sustained virologic remission in infected individuals in the absence of antiretroviral therapy. Under this collaboration agreement, NIAID researchers will study the mechanism of action for AGT103-T to define its potential impacts on HIV disease.
“We are thrilled at the prospect of working with HIV experts at NIAID,” commented C. David Pauza, PhD, Chief Science Officer of AGT. “Our collaborative studies will define mechanisms of therapeutic action and give new insights into the nature of HIV reservoirs and immune-mediated viral suppression.”

Under the agreement, AGT will provide genetically modified T-cells created during the development of a cell product for clinical trials. These cell products are highly enriched for HIV-specific CD4 T cells and modified by AGT’s proprietary lentivirus vector to protect cells from HIV-mediated depletion. The collaborative studies will help to characterize these enriched cell products and define their effects on antiviral immunity.

AGT’s prior studies suggested that the enrichment of HIV-specific CD4 T cells in their AGT103-T autologous cell product can provide increased helper and effector activities capable of reducing the HIV burden and improving therapy. The new agreement will allow AGT and NIAID scientists to work together and conduct experimental studies investigating the mechanism of action for AGT103-T and its potential impacts on HIV disease.

About American Gene Technologies (AGT)

AGT is an emerging gene and cell therapeutics company with a proprietary lentiviral platform capable of broad applications including large and orphan indications, infectious disease, immuno-oncology, and monogenic disorders. AGT expects to take its patented candidate for an HIV Cure into the clinic in 2019. It has pioneered a novel immuno-oncology approach of stimulating gamma-delta (γδ) T cells to attack a variety of cancers. Six key patents in AGT’s novel immuno-oncology approach have been granted. AGT has a diverse portfolio of patent filings surrounding key tools and components in viral vectors, gene therapy, and regenerative medicine.

Website – https://www.americangene.com
LinkedIn – https://www.linkedin.com/company/american-gene-technologies-international-inc/
Twitter – https://twitter.com/americangene
Facebook – https://www.facebook.com/amerigene/
Instagram – https://www.instagram.com/americangenetechnologies/

American Gene Technologies Contacts:

C. Neil Lyons, Chief Financial Officer
Phone: (301) 337-2269
Email: info@americangene.com

Sasha Whitaker, Digital Marketing and Communications
American Gene Technologies
Phone: 301-337-2100 Email: swhitaker@americangene.com
email us here


Source: EIN Presswire

L is for Love, Loyalty & Lower Fees

MAYAR CAPITAL LAUNCHES LOWER FEE LOYALTY SHARE CLASS

LONDON, UNITED KINGDOM, February 14, 2019 /EINPresswire.com/ — The 14th of February is a day that celebrates love and loyalty. While love remains the purview of poets and artists, loyalty has long been recognised in the commercial world.

Twenty years ago, I received my first loyalty card which was for a supermarket. The innovation of loyalty cards recognises that consumers had a choice in where to shop and that loyalty should be rewarded.

Since that time, my loyalty cards have multiplied. I have three supermarket ‘loyalty’ cards and similar cards for my coffee, haircuts and even dry cleaning.

Asset managers have done very little to reward loyalty, despite the importance of long-term partnerships to investing success.

That is why today Mayar Capital is launching its Loyalty Share class. Investors who have been our partners for three years or more will be entitled to invest any additional capital in the new L Share Class and enjoy a management fee of 0.5% and a 14% performance fee.

One of our Partnership Principles is ‘Only Long-Term’ and Mayar wants to recognise and reward our partners who have exhibited the same outlook.

Thank you all for your continued loyalty and happy Valentine’s Day!

Marc Cox
Mayar Capital
+44 20 3735 5072
email us here
Visit us on social media:
Facebook
Twitter
LinkedIn


Source: EIN Presswire

PetVivo Holdings, Inc. Uplifts to OTCQB Marketplace from OTC Pink Sheets

PetVivo Holdings, Inc. (OTCQB:PETV)

MINNEAPOLIS, MN, USA, February 14, 2019 /EINPresswire.com/ — OTCQB: (PETV) PetVivo Holdings, Inc., (www.petvivo.com) an emerging companion animal biomedical company operating in the $18B veterinary market, announced today it has upgraded its trading tier on the OTC Markets to the OTCQB Venture Marketplace.

By upgrading its trading tier, PETV will have better access to a larger shareholder base and liquidity in the marketplace while removing Pinksheet-listing investor trading limitations. This move is one of several the Company is currently executing as PETV enters the commercial marketplace with its innovative and highly-differentiated veterinary osteoarthritis products.

“I view this uplift as an important step in moving the Company forward by showing investors we are ready to expand our shareholder base to institutional holders as we move towards becoming a NASDAQ-listed company.,” said Co-Chair, David Merrill.

About the OTCQB Venture Market

The OTCQB® Venture Market is for entrepreneurial and development stage U.S. and international companies. To be eligible, companies must be current in their reporting, have a minimum bid price of $0.01, may not be in bankruptcy and must undergo an annual verification and management certification process. These standards provide a strong baseline of transparency to improve the information and trading experience for investors.

About PetVivo Holdings, Inc.

PetVivo Holdings, Inc. (OTCQB: PETV) is an emerging veterinary biomedical company focused on the in-licensing and commercialization of highly innovative medical technologies for companion animal therapeutics. PetVivo is leveraging investments made in the human medical device industry to commercialize therapeutics for pets in a capital and time efficient way. A key component of this strategy is the accelerated timeline to revenues for veterinary medical devices, and the opportunity to bring products into large markets represented by currently unmet needs of our companion animals.
Forward-Looking commercial Statements:

The foregoing material may contain forward-looking statements. We caution that such statements may be subject to uncertainties and that actual results could differ materially from the forward-looking statements. Readers accordingly should not place undue reliance on these forward-looking statements, which do not reflect unknown or unanticipated events or circumstances occurring after the date of these forward-looking statements

John Lai
Petvivo Holdings, Inc.
+1 952-405-6216
email us here


Source: EIN Presswire

Robert R. Ackerman, Jr., Managing Director and Founder, Allegis Cyber, Talks About Cybersecurity Threats, Solutions

Robert R. Ackerman, Jr., Managing Director and Founder, Allegis Cyber

www.AllegisCyber.com

www.SecuritySolutionsWatch.com

And Best Practices "In The Boardroom" On SecuritySolutionsWatch.com

We are honored to have Bob Ackerman, Managing Director and Founder, Allegis Cyber, join us “In The Boardroom” to talk about cybersecurity threats, solutions and best practices.”

— Martin Eli, Publisher

NEW YORK, NEW YORK, UNITED STATES, February 14, 2019 /EINPresswire.com/ — SecuritySolutionsWatch.com: Thank you for joining us today, Bob. It’s an honor to speak with the “father of the 1st iPhone” (http://www.internethistorypodcast.com/2015/06/the-forgotten-story-of-the-iphone-released-in-1998/) . You’ve seen it all and heard it all ! Before discussing AllegisCyber in greater detail, please give us a brief overview of your background.

Bob Ackerman: I'm the founder of AllegisCyber, a seed and early-stage venture capital firm investing in cybersecurity companies. I'm also a co-founder of DataTribe, a start-up studio building successful cybersecurity companies in Maryland.

I founded Allegis Capital in 1996 after a successful career as a serial entrepreneur. In 2013, building on the firm’s historic success in cyber security investing and recognition of its effective focus on cyber, I subsequently changed its name to AllegisCyber. The firm was both the industry’s first venture firm to focus exclusively on cyber security innovation and we raised the industry’s first dedicated cyber fund in 2015.

My founding mission for AllegisCyber was to build a seed and early-stage venture firm that would combine operational expertise with entrepreneurial spirit and a focus on forging partnerships with portfolio companies to build successful, sustainable cyber technology companies.

I then co-founded DataTribe in 2015. DataTribe, based in Maryland, co-founds and grows cyber and data science technology startups, in partnership with subject matter expert engineers coming out of the U.S. intelligence community and U.S. national labs. I'm happy to state that i was recognized as Fortune 100 cybersecurity executive and also as one of “Cybersecurity’s Money Men.”

Prior to founding AllegisCyber, I was President and CEO of UniSoft Systems, a leading UNIX systems house. I was also the Founder and Chairman of InfoGear Technology Corporation, a pioneer in the original integration of web and telephony technology and the creator of the original IPhone, as you mentioned.

Outside of AllegisCyber and DataTribe, I taught New Venture Finance in the MBA program at the University of California for years. I currently co-manage my family’s Napa Valley winery—Ackerman Family Vineyards—and I'm an avid fly fisherman.

SecuritySolutionsWatch.com: One will read at Allegis Cyber that, “…we are “company builders” who think in term of “unfair competitive advantage” for entrepreneur partners (https://allegiscyber.com/our-advantage/) .
Care to elaborate?

Bob Ackerman: We are not just finance guys giving money to entrepreneurs – we build companies. We combine decades of successful entrepreneurial, operating and venture investment experience. Our team of Venture Partners are proven industry veterans, each with decades of entrepreneurial success, building some of the market’s most successful companies. Our operating playbook leverages this experience together with our market, technology and domain expertise, customer, entrepreneur and investor networks to help our entrepreneurial partners accelerate their growth, reduce start-up risk, lower overall capital requirements and improve the probability of market success.

Building a start-up company has been likened to running through a mine field, naked, in the middle of the night. The odds against success are long. Our playbook delivers a “map through the mine field” to our entrepreneurial partners, translating to an “unfair competitive advantage” in challenging, dynamic, complex and rapidly evolving market.

SecuritySolutionsWatch.com: The Allegis Cyber Portfolio (https://allegiscyber.com/portfolio-new/) is indeed quite impressive with some very well known brands and some lesser known brands. We’ve got plenty of time and plenty of ink…want to give us a brief thumbnail of each company?

Bob Ackerman:
Area 1 (https://www.area1security.com/) provides performance-based cybersecurity that blocks phishing attacks that other solutions miss.

Callsign (https://www.callsign.com/) provides real time AI-driven Identity and authentication solutions that confirms if users really are who they say they are.

CyberGRX (https://www.cybergrx.com/) is dedicated to helping organizations streamline their third-party cyber risk programs.

Dragos (https://dragos.com/) provides an industrial cyber security platform that delivers unprecedented visibility and prescriptive procedures to respond to adversaries in the industrial threat landscape.

Safeguard Cyber (https://www.safeguardcyber.com/) provides end-to-end digital risk protection. Their platform is a single solution to detect, prevent, and defend against threats in all of a customer’s digital channels.

Shape Security (https://www.shapesecurity.com/) uses artificial intelligence to defend against automated BOTnet attacks.

Source Defense (https://www.sourcedefense.com/) provides a unique solution to prevent website supply chain attacks leveraging automation and machine-learning.

Synack (https://www.synack.com/) is a human-powered security solution offering scalable continuous testing for enterprise applications and networks.

DataTribe companies:
Attila (https://attilasec.com/) mobilizes security at the edge where cyber threats matter. Their GoSilent technology was designed to protect government and enterprises from advanced cyber attacks, zero-day threats, and personal identity theft.

CyberWire (https://thecyberwire.com/) is an independent voice delivering concise, accessible, and relevant cyber security news to people all across the globe.

Dragos (https://dragos.com/) provides an industrial cyber security platform that delivers unprecedented visibility and prescriptive procedures to respond to adversaries in the industrial threat landscape.

ENVEIL (https://www.enveil.com/) uses homomorphic cryptography to secure data-in-use, including data interactions, search and analytics.

Inertial Sense (https://inertialsense.com/) provides high precision micro-navigation solutions for a world that is beginning to move on its own.

Prevailion (https://prevailion.com/) is the first business compromise intelligence platform that provides actionable notification and definitive characterization of successful compromise.

ReFirm Labs (https://www.refirmlabs.com/) is a group of IoT security experts who have developed a new method for vetting and validating firmware.

SecuritySolutionsWatch.com We’re all familiar with the headlines about
Cryptolocker – NotPetya – WannaCry: https://www.csoonline.com/article/3212260/ransomware/the-5-biggest-ransomware-attacks-of-the-last-5-years.html

Equifax: https://www.ftc.gov/equifax-data-breach

Ticketmaster: https://www.zdnet.com/article/ticketmaster-breach-was-part-of-a-larger-credit-card-skimming-effort-analysis-shows/

Uber: http://fortune.com/2018/04/12/uber-data-breach-security/

My Heritage: https://www.reuters.com/article/us-myheritage-privacy/security-breach-at-myheritage-website-leaks-details-of-over-92-million-users-idUSKCN1J1308

Orbitz;https://www.usatoday.com/story/tech/2018/03/20/800-000-orbitz-cards-compromised-breached/442277002/

and the ransomware attack on the city of Atlanta: https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html

What is your perspective, please, regarding best cyber practices that should be followed by the public and private sector in this environment?

Bob Ackerman: Timely advice about creating a worthwhile corporate cybersecurity strategy sagely starts by realizing that establishing firewalls and relying on the IT department to monitor attacks isn’t sufficient. Reactive strategies break down over time, making proactive strategies crucial.

Further, defensive strategies work only within centralized, controlled and managed-device networks – all now tottering on the edge of extinction amid the proliferation of cloud computing, the Internet of Things (IoT) and mobile technology.

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation – and I mean everybody – in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed.

It is employees, after all, who are the first – as well as the last – line of cyber defense.

Corporations need to balance technological deterrents with agile, human-centric defenses. This is instrumental because cyber technology continually evolves, which means purely technological solutions cannot keep pace. In addition, it is much tougher to play defense than offense, and attackers, unlike defenders, have patience on their side. And, too, many attackers are typically as knowledgeable as corporate cybersecurity pros and only to have to be right once to be successful, while cyber defenders have to be right all the time.

Regardless, it is best to assume that defenses will be compromised at some point – no organization is cyberattack-proof – and to train employees what to do when that happens. The sustainability of the business ultimately hinges on what every employee, internally and externally, does.

Training alone, of course, isn’t sufficient. Once it’s in place, corporations also need to create a highly tailored cybersecurity strategy.

Companies must reevaluate how their systems and networks are used and who uses them, and then implement a feedback loop. It would be wise to start with technical assessment of current areas of weakness and then follow up with a review of non-technical matters. The technical assessment helps identify vulnerabilities within the network. Policy and employee assessments help identify non-technical areas that need to be assessed. It is essential that this process be open ended and repeated regularly. Networks are dynamic. Assessments also must be.

Specific security programs then need to be implemented, plus steps to assure follow-through, such as the application of software updates and patches to help minimize vulnerabilities. Policies should also identify roles and responsibilities, including acceptable use conditions for employees, and a point person needs to be chosen to make sure these are implemented and maintained.

Employees must be taught to recognize deceptive cyber ploys and other common threats to help enable them to act as the first line of defense against cyber attacks. In addition, they should be instructed about safe password management and secure browsing practices.

Along the way, both technical and non-technical players should participate in shaping a security strategy. The technical folks ensure that the plan satisfies the needs of IT and business operations. Non-technical folks, meanwhile, are usually better at nudging employees to take corporate cybersecurity policy seriously and at monitoring employee cyber policy.

Corporations also must establish protective monitoring to prevent and deter “insider” threats, whether intentional or accidental. This provides an over-arching view of cyber activity throughout the corporation and supports a positive culture to deter bad behavior. And, of course, it helps companies combat the threat posed by insiders.

Most important of all, corporations and other organizations must build a solid and highly tailored cybersecurity foundation – i.e., a sound analysis of security capabilities from a bottom-up, device-centric perspective. The application of traditional firewalls, intrusion prevention systems and multi-factor authentication (moving beyond two factors), for example, typically needs to be tweaked or changed substantially, depending on the devices and nodes used in a corporation.

Also part of a good foundation is an appreciation of context, which is how the network interacts with particular devices, as well as the realization that corporations must play offense, as well as defense.

Regarding context, company security staffers must determine which network nodes they can control and which they can merely observe in an advantageous manner. IoT devices, for example, offer the least control. Companies with lots of these might want to consider the so-called “ring-fence” approach. This entails drawing a perimeter around devices that require access to similar resources in an effort to better monitor overall cyber behavior and react more quickly to problems.

Offense is often as important as defense because it helps instill a mindset of continuous cybersecurity improvement. Corporations should regularly challenge the quality of their cybersecurity defenses via proactive testing, commonly known as “red team, blue team exercises.” Penetration tests and threat modeling, for instance, enables a red team to challenge lower-profile attack avenues to better understand their vulnerabilities. Defense-oriented blue teams, meanwhile, can help fix the security weaknesses unearthed.

When the development and implementation of a cybersecurity strategy is completed, companies should take the trouble to gauge whether it is sufficient.

Here is an informal checklist:
Is cybersecurity policy driven from the top of the organization? A strong cyber strategy is a core corporate message, and it is driven by senior management. Remember, cyber security is about risk throughout the enterprise. IT is simply the vector.

Does cybersecurity come up at or near the start of every meaningful IT discussion? It’s much easier to implement cybersecurity early in the lifecycle, rather than as an add-on.

Is cybersecurity communicated in basic English? Every employee should understand what they need to know about cybersecurity. “Geek speak” is a no-no.

Has your company established a predictive security edge? Do you have the wherewithal to anticipate your adversary’s next move?

Does your data security system work in harmony? In other words, do your people, processes and technology work well together?

Are there ample “change agents” spread throughout the corporation? Advocates help spread the cybersecurity vision across the enterprise.

Does your corporation embrace cybersecurity? Cybersecurity is part of your cultural DNA. As such, it’s factored into all business decisions. Your organization naturally embraces good cybersecurity policies – without a second thought.
The current state of cyber security is heavily focused on defending IT infrastructure vulnerable to cyber compromise and mitigation and remediation in the event of a cyber attack. While this current focus is necessary and essential, longer term, we need to shift our focus to securing and ensuring the integrity of data, which in itself is most often the target of a cyber attack. This “data-centric” approach to cyber will lead the next wave of integrated cyber security through data science innovation.

SecuritySolutionsWatch.com: May we ask you, Bob…what does your crystal ball reveal regarding cybersecurity headlines in the coming year?

Bob Ackerman: Here is a mini dive into the top pending threats……………………………………………

For the balance of this interview with Robert Ackerman please click here: http://www.securitysolutionswatch.com/Interviews/in_Boardroom_Ackerman_AllegisCyber.html
For more information about Allegis Cyber: https://allegiscyber.com/

***********************************************************************************

M A R K – Y O U R – C A L E N D A R !!!
SecuritySolutionsWatch.com Is Proud To Be A Sponsor Of …

CYBER INVESTING SUMMIT
Thursday, May 16, 2019
Convene – Financial District
32 Old Slip, New York, NY 10005

Videos of previous CYBER INVESTING SUMMIT here:
https://www.youtube.com/channel/UCCi2WTHuC8h2nIba2jyA2Jg
https://cyberinvestingsummit.com/

*************************************************************************************
About SecuritySolutionsWatch.com

www.SecuritySolutionsWatch.com features thought leadership interviews about IT, IoT and security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about solutions from leading global brands such as: 3M, AMAG Technology – A G4S Company, ASSA ABLOY, Cisco Security, Cyberinc, Dell EMC, HP Cybersecurity, Fujitsu, Gemalto, HID Global, IBM, ImageWare, Intel, SAP, Siemens, Stanley Security, SONY, Unisys, and Yahoo, just to name a few.

What's YOUR authentication, cybersecurity, physical security, mobility, or "smart" solution?

What's YOUR Blockchain or FinTech solution?

We invite you to please join us "In The Boardroom" at www.SecuritySolutionsWatch.com.

For a quick tour to see exactly how your brand will be featured, please contact Ali Eng on our publishing team via
email: ALE@SecuritySolutionsWatch.com, or phone: 1+914.690.9351, or, LinkedIn: https://www.linkedin.com/in/ali-eng-a8a41015b/

For more details, please click here: www.SecuritySolutionsWatch.com/Main/Jan2018.pdf

And for our Media Kit, please click here: www.SecuritySolutionsWatch.com/MediaKit.html

****************************************************************************************************************
It's FREE…our monthly newsletter with thought leadership content from leading security experts.
Please click here: www.SecuritySolutionsWatch.com/newsletters/newsletter_2019_01.html
And please visit us on Twitter here: www.twitter.com/SecStockWatch

****************************************************************************************************************

All content which appears on SecuritySolutionsWatch.com and in this Press Release is subject to our disclaimer:
www.SecuritySolutionsWatch.com/Main/Terms_of_Use.html

****************************************************************************************************************

Martin Eli, Publisher
SecuritySolutionsWatch.com
+1 914-690-9351
email us here

Cyber Investing Summit 2018 Opening Remarks


Source: EIN Presswire

Federico Simonetti, CTO, Xiid says "Security was an afterthought. Sadly, it still is."

Federico Simonetti, CTO, Xiid

Xiid.com

www.SecuritySolutionsWatch.com

We are honored to have Federico Simonetti, CTO, Xiid, join us “In The Boardroom” to talk about cybersecurity threats, best practices and Xiid solutions.”

— Martin Eli, Publisher

NEW YORK CITY, NEW YORK, USA, February 14, 2019 /EINPresswire.com/ — Vint Cerf, by many considered one of the “fathers” of the Internet, has recently stated that — in summary — when the Internet was designed, security was an afterthought.

He also went on to say that security “is retrofittable into the internet”. Good. Then, why isn’t it? Why is security STILL such an afterthought?

I know, I know, many will be crying blasphemy now. How can I say that security is still neglected, when a simple Google search for the term “IT security” produces, at the time this article is being written, about 8.7 Billion results?

Ok, let me explain…

Security will stop being an afterthought, or — even worse — a “given” when every single designer and developer will bear it in mind at all times, and will realize that security is a side-expertise that every creator of every piece of the Internet must have.

This is something that the car industry has understood, maybe not from the start, but in recent times for sure. The windshield designer knows that the glass has to be shatter-resistant to avoid throwing glass shards into the driver’s and passengers’ eyes in case of accident.Tire designers have invented “run-flat” tires and heat-resistant compounds to improve safety. And then we have steering wheels that move away from the driver in case of frontal impact, distraction-free dashboards to help keep the driver’s eyes focused on the street (thus reducing distraction-related accidents), variable tension seat belts to avoid breaking your rib cage, even an emergency handle inside the trunk to pop it open in case you’ve been kidnapped and put in the trunk of your own car. Not to mention the obvious airbags, ABS, ASR, ESP, and the like…

See the pattern? A windshield design team is composed of experts in windshield design, aerodynamics, AND security. A tire design team is composed of experts in rubber compounds, hydrodynamics, static/sliding/rolling friction physics, AND security. And so on. Every statement here ends in “and security”.

Similarly, the Internet will be a truly safer place only when every designer of every piece of it will be also an expert in its security. From the team that designs actual copper cables and fiber optics, all the way up to the web and mobile app developer who’s designing the next regional cooking recipe sharing app.

And — unfortunately — the higher you go in the stack, the less security expertise you find, and the more you realize that, for too many, security is a “given”. Ask the typical app developer “how do you keep communications safe?” and their answer will probably be “oh, my app communicates with the server via HTTPS” or “I use a VPN”. That’s it. That is enough to ease their security concerns. After all, they should be focused on developing their app, right? Security should be a given, should be part of the infrastructure, should come built-in just because you use a TLS-enabled protocol or a VPN, right?

Wrong.

Even when focusing our observations only on a single market, let’s say the IAM market (because that’s where Xiid plays, so we know it well) we see the exact same pattern.

IAM stands for Identity and Access Management. And that’s what most of our competitors do: they focus on MANAGING identities and access. Maybe the market segment should have been called IAMS (Identity and Access Management and Security) to make players more aware that security must be woven into the very fabric of their Identity and Access Management solutions. Instead, the “it is what it is” mentality still pervades almost every IAM solution on the market, and what’s even worse the market accepts their security trade-offs.

Want an example? Here’s a screenshot from the knowledge base of one of Xiid’s primary competitors:
***********************************************************************************************
Active Directory integration: DMZ server ports

If you installed the AD agent on a DMZ server, you must open the following ports:

• 135/TCP RPC
• 137/UDP NetBios
• 138/UDP NetBios
• 139/TCP NetBios
• 389/TCP/UDP LDAP
• 636/TCP LDAP SSL
• 3268/TCP LDAP GC
• 3269/TCP LDAP GC SSL
• 53/TCP/UDP DNS
• 88/TCP/UDP Kerberos
• 445/TCP SMB
• 123/UDP NTP
***********************************************************************************************
In addition, you must open your DCOM RPC ports. In addition to TCP 135, Microsoft RPC (MS-RPC)
***********************************************************************************************
Inbound rules and open ports on the customer’s firewall required by a competing IAM (not Xiid)

See what I mean? If you need to reach a server/service inside your DMZ, you create inbound NAT or port-forwarding rules on your firewall. That’s how it’s been done all along, that’s considered “the way it is”. Secure enough. No one is really acknowledging that each one of those open inbound ports is a potential pathway to reach and attack the server/service to which they lead.

But it’s always been done that way. Some of the services bound to those ports have already been exploited multiple times (RPC, NetBIOS, DNS, SMB, …) yet… it is what it is… it’s always been done that way, so why change now?

Because that’s not secure! That’s why.

And that’s why we, at Xiid, have done something about it. We have created the first IAM solution that features Active
Directory integration

WITHOUT THE NEED FOR ANY INBOUND OPEN PORT ON THE CUSTOMER’S FIREWALL.

None. Zero.

In our design we always put security first. And we designed our Active Directory integration agent to work without the need for any inbound NAT nor port-forwarding rule on your firewall. There simply is no route to reach Xiid’s agent from outside the subnet it’s installed in. And

YOU CAN’T ATTACK WHAT YOU CAN’T REACH.

Yet, it works, and it provides comprehensive as well as secure Active Directory integration. It’s security innovation by design applied to the world of Identity and Access Management. It’s IAM to IAMS.

And this is just one of the many patent-pending security solutions that we have designed here at Xiid, to weave security into the very fabric of each service that so direly needs it. Feel free to contact us privately should you wish to know more about it.

Federico Simonetti is CTO, Xiid (www.Xiid.com)
Former ethical hacker (DDT)
Former professor of operating systems security at the University of Milan
Developed software for the Italian anti-terrorism and anti-pedophile police
Serial entrepreneur with several successful exits in his past
Hardcore software designer, with award-winning software titles on his resume

Learn more about Xiid here: www.Xiid.com
Read all of Federico Simonetti’s blogs here:
https://medium.com/hybrid-security-superheroes/security-was-an-afterthought-sadly-it-still-is-55e3ce1e54e6
https://medium.com/@theoriginalddt
https://medium.com/hybrid-security-superheroes

***********************************************************************************
M A R K – Y O U R – C A L E N D A R !!!
SecuritySolutionsWatch.com Is Proud To Be A Sponsor Of …

CYBER INVESTING SUMMIT
Thursday, May 16, 2019
Convene – Financial District
32 Old Slip, New York, NY 10005
Videos of previous CYBER INVESTING SUMMIT here:
https://www.youtube.com/channel/UCCi2WTHuC8h2nIba2jyA2Jg
https://cyberinvestingsummit.com/
*************************************************************************************
About SecuritySolutionsWatch.com

www.SecuritySolutionsWatch.com features thought leadership interviews about IT, IoT and security solutions. Our flagship “In The Boardroom” program, now in its 15th year, has delivered outstanding content about solutions from leading global brands such as: 3M, AMAG Technology – A G4S Company, ASSA ABLOY, Cisco Security, Cyberinc, Dell EMC, HP Cybersecurity, Fujitsu, Gemalto, HID Global, IBM, ImageWare, Intel, SAP, Siemens, Stanley Security, SONY, Unisys, and Yahoo, just to name a few.

What's YOUR authentication, cybersecurity, physical security, mobility, or "smart" solution?

What's YOUR Blockchain or FinTech solution?

We invite you to please join us "In The Boardroom" at www.SecuritySolutionsWatch.com.
For a quick tour to see exactly how your brand will be featured, please contact Ali Eng on our publishing team via
email: ALE@SecuritySolutionsWatch.com, or phone: 1+914.690.9351, or, LinkedIn: https://www.linkedin.com/in/ali-eng-a8a41015b/

For more details, please click here: www.SecuritySolutionsWatch.com/Main/Jan2018.pdf
And for our Media Kit, please click here: www.SecuritySolutionsWatch.com/MediaKit.html

****************************************************************************************************************

It's FREE…our monthly newsletter with thought leadership content from leading security experts.
Please click here: www.SecuritySolutionsWatch.com/newsletters/newsletter_2019_01.html
And please visit us on Twitter here: www.twitter.com/SecStockWatch

****************************************************************************************************************

All content which appears on SecuritySolutionsWatch.com and in this Press Release is subject to our disclaimer:
www.SecuritySolutionsWatch.com/Main/Terms_of_Use.html

****************************************************************************************************************

Martin Eli, Publisher
SecuritySolutionsWatch.com
+1 914-690-9351
email us here

Cyber Investing Summit 2018 Opening Remarks


Source: EIN Presswire