Security Solutions Discussed by Industry Leaders in SecuritySolutionsWatch.com Interviews With Fujitsu, HP, ImageWare Systems, March Networks, McAfee, StrikeForce and CyberLock

RYE BROOK, NY--(Marketwired - Nov 12, 2013) - ImageWare Systems, Inc. (OTCQB: IWSY), Intel Corporation (NASDAQ: INTC) and StrikeForce Technologies, Inc. (OTCBB: SFOR)

Fujitsu North America
Fujitsu.com
(http://solutions.us.fujitsu.com/www/content/services/cloud/index.php)

Mr. Shawn McPherron, Cloud Marketing Manager, Fujitsu North America, told us, "Up until now, anytime a company wanted to embed biometric security into their systems and applications, they had to first buy licenses and hardware, complete a systems set-up, hire IT staff, and start on a lengthy development and deployment project. Our work with ImageWare enables us to deliver a SaaS-based solution -- or 'BioID as a Service.' Now, your BioID projects can be implemented in days, not months, and you only pay for what you use, eliminating the need for large capital investments up front. This is a game-changer for security enablement."

For the complete interview with Shawn McPherron: www.securitysolutionswatch.com/Interviews/in_Boardroom_Fujitsu.html

*****

HP Enterprise Services

Mr. Ed Keegan, Director, Cybersecurity Strategies & Portfolio, U.S. Public Sector, HP Enterprise Services, told us, "CM represents a maturation of information technology. Over the past 15 to 20 years, various tools have been created to address individual problems, such as perimeter protection, endpoint protection, data loss prevention and so on. Once implemented, the tools are presumed to be doing the job. Therefore, original information assurance programs were written to ensure these tools were present -- not to ensure they were integrated and operating properly. CM represents the next logical step in this process -- automated, continuous auditing of the cyber environment to ensure proper configuration along with proactive monitoring for threats and vulnerabilities. This will ensure security compliance resulting in the prioritization and initiation of actions required to further secure the governments' information and systems."

For the complete interview with Ed Keegan, please click here. (http://securitysolutionswatch.com/Interviews/in_Boardroom_HP_Keegan.html)

Please download HP's Continuous Monitoring Offering
(http://h20195.www2.hp.com/V2/getdocument.aspx?docname=4AA4-7410ENW&cc=us&lc=en)

For more information:

Continuous Monitoring for U.S. Public Sector
(http://www8.hp.com/us/en/industries/public-sector.html?compURI=1460354)

Cybersecurity for U.S. Public Sector (http://www8.hp.com/us/en/industries/public-sector.html?compURI=1087497#.UVx9sJMZauI)

*****

ImageWare Systems
www.iwsinc.com