Breaking News:

LifeMed ID Enters Partner Agreement With ImageWare Systems More

Crypto Mining Malware Infects Thousands of Websites More

Government websites hijacked by cryptocurrency-mining malware More

Winter Olympics Site Taken Out for 12 Hours More

Winter Olympics...cybersecurity attacks widespread More

U.S. Spies Bilked for $100,000 by Russian Peddling Trump Secrets More

DDoS Extortion and Attack Techniques More

Could This Really Replace Your Social Security Number? More

Cybercriminals Turn the Tables on Encryption to Develop New Cybersecurity Threats More

Lenovo Warns Critical Wifi Vulnerability Impacts Dozens Of Thinkpad Models More

Apple Calms Nerves After GitHub Code Leak More

Microsoft is Giving Away Free Cloud Storage More

Over 19 Million Californian Voter Records Held for Ransom Again More

81% of Cybersecurity Pros See Value in Threat Intelligence More

7 Ways to Maximize Your Security Dollars More

Does it bother you that Alexa's always listening? More

Super Bowl security - NO Philadelphia-style tailgating in Minneapolis More

Fujitsu Extends Global Biometrics-as-a-Service Platform to Australia More

Critical Infrastructure More Vulnerable Than Ever Before More

Drones that zip immediately to gunshot sites More

Criminals Move to Cash in on Cryptocurrency Gold Rush More

Bridging the smart cities security divide More

Oracle MICROS POS Vulnerability Puts 300,000 Systems at Risk More

What the Coincheck hack means for the future of blockchain security More

Microsoft to delete software that scares users into buying upgrades More

12 ways to improve security at your apartment More

Cisco: Crypto-Mining Botnets Could Make $100m Annually More

Salaries Will Increase for Cybersecurity Jobs, Survey Says More

Lenovo Fixes Hardcoded Password Flaw Impacting ThinkPad Fingerprint Scanners More

Major cyber-attack a matter of 'when', not 'if' More

Can Biometrics Solve the Authentication Problem? More

Google pulls kids games containing AdultSwine malware More

Global Levels of Fraud Reached an All-Time High in 2017 More

IoT Devices Fuel Complex DDoS Attacks More

Facebook Offers $100,000 Grants for Improving Internet Security More

VOTI DETECTION™ and SMARTWORLD Announce Strategic Alliance for Security Screening Solutions More

SamSam Ransomware Attacks Hit Healthcare Firms More

A home security camera can go a long way toward securing your peace of mind More

The 10 Most Overlooked Security Tasks More

Half of Norway’s Population May Have Been Breached More

Hacker Infects Gas Pumps with Code to Cheat Customers More

Intel Says Firmware Fixes for Spectre and Meltdown Affecting Newer Chips More

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware More

White House puts the kibosh on personal phones - personal phones will not be allowed in the West Wing More

Exciting Developments at ImageWare Systems More

DHS Admits Major Leak Affecting 247,000 Employees More

Intel, Amazon, ARM, Microsoft and others have shared patch updates More

Targeted Attacks on Industrial Sector Growing Rapidly More

KPMG to Acquire Global Identity and Access Management business of Cyberinc More

Tech Giants Address Critical CPU Vulnerabilities More

Spectre and Meltdown are massive security flaws that affect almost every PC on Earth More

Android Trojan Targets 200+ Global Financial Apps More

What You Need to Know About 2 Major Computer Flaws That May Be Leaving Your Data at Risk More

Intel Flaw: Performance Degradation Bombshell or Massive Overstatement? More

Smart Speakers Could Expose Corporate Networks More

Security Things We Should Have Learned in 2017, but Probably Didn't More

Top 7 cyber security predictions for 2018 More

Russia calls Trump's national security strategy 'imperialist' More

Hacky Holidays? Increased Cybersecurity Breaches Blast Winter Break More

Bigger Cybersecurity IPOs Possible In 2018 Amid Firewall Doubts More

Thales to Buy Security Tech Firm Gemalto for $5.7 Billion More

Gemalto Says “Oui” to $5.7bn Thales Deal More

Massive Cloud Leak Exposes Alteryx, Experian, US Census Bureau Data More

User ‘Gross Negligence’ Leaves Hundreds of Lexmark Printers Open to Attack More

This New Android Malware Can Physically Damage Your Phone More

Survey Shows Many Americans Are Cyber-Illiterate More

Kaspersky Lab Sues U.S. Government Over Software Ban More

Uber Woes Continue with Surveillance Allegations More

North Korea Attacks London Cryptocurrency Firm More

IBM Security Expands Partner Ecosystem for Multifactor Authentication More

Majority of Retailers Lack Fully-Tested Breach Response Plan More

ImageWare Systems Joins IBM Security App Exchange Community More

Security hacks will be even worse in 2018 More

Industrial Firms Slow to Adopt Cybersecurity Measures: Honeywell Report More

Connected Rental Cars Leak Personal Driver Data More

Senate Confirms New US Homeland Security Chief More

VOTI Detection™ receives 2017 Top 30 Technology Innovations Award from Security Sales & Integration More

Mobile Response to Security Alerts Allows Immediate Action Anywhere, Anytime More

ImageWare Systems and Secure Channels to Provide First Biometrically Protected Entertainment Security Operations Center More

Breached Password-Trading Site Leakbase Goes Dark More

Uber hid hack that exposed data of 57 million users, drivers More

Where is cloud computing headed? More

'Game of Thrones' alleged hacker hit with charges in US More

Amazon Launches Cloud Data Center 'Secret Region' for U.S. Intelligence Service More

Tricking voice recognition on Amazon Echo and Google Home More

Some Secure Names in Cybersecurity More

Shop safely online and on your phone More

What Walmart's E-Commerce Unit Has in Common With Microsoft's Cloud Unit More

VOTI Detection™ named one of Canada’s Companies-to-Watch in the 2017 Deloitte Technology Fast 50™ Awards More

ImageWare Systems Awarded Canadian Patents for its Multi-Modal Biometric Platform & Analysis More

Google strikes deal with start-up to offer AI medical scanning to detect cancer via its cloud More

How The iPhone Earned Its Security Record More

Amazon Adds New Encryption, Security Features to S3 More

It's Time to Change the Cybersecurity Conversation More

FBI can't get inside Texas church shooter's phone More

How to Make a Ransomware Payment - Fast More

Russia-Linked Spies Deliver Malware via DDE Attack More

7 Smart Doorbells To Watch Over Your Front Stoop More

SWIFT-related Cyber Heist on NIC Asia Bank More

Coding Error Locks Users Out of $280m in Ether More

The National-Security-Law Expert Who Blocked Trump's Travel Ban More

Fujitsu Showcases Innovative Security Technology at Money 20/20 More

Republican senator won't deny that President Trump is a national security risk More

Why Cryptojacking Is The Next Big Cybersecurity Threat More

At Oracle, It’s All About the Cloud More

Blockchain has potential to re-engineer cyber security More

BlackBerry CEO Talks Machine Learning Benefits More

US Critical Infrastructure Target of Russia-Linked Cyberattacks More

Young Adults More Likely to Fall for Phishing Scams More

Unisys to Provide Cloud Services to Support Nuclear Regulatory Commission High-Performance Computing More

Kaspersky Lab Hits Back with Global Transparency Initiative More

US Government Warns CNI Firms of Dragonfly Attacks More

VTech Asks Court to Drop Lawsuit Over Breach Affecting Millions of Kids and Parents More

Gartner predicts that 60% of digital businesses will suffer major service failures due to the inability of security teams to manage digital risk. More

VTech Asks Court to Drop Lawsuit Over Breach Affecting Millions of Kids and Parents More

Symantec Cyber Defense Platform More

Security Experts Warn of 'Breach Fatigue' After Equifax Incident More

Details on Past Data Breaches from Disqus, Bitly and Kickstarter Revealed More

Firms Unprepared for Public Disclosure of Cybersecurity Attacks, IBM Security Vice President Warns More

5 security mistakes your IT team wish you wouldn’t make More

Concert Security Expert on What Las Vegas Tragedy Means for Live-Music Industry More

Concert Security Expert on What Las Vegas Tragedy Means for Live-Music Industry More

Hybrid Bank Heists Net Millions in Cash for Criminals More

Facebook CSO: Spotting Fake News is Harder Than You Think More

Inside FireEye’s Value Proposition in the Cybersecurity Space More

NFL Players, Agents Targeted in Database Extortion Attempt More

Concert Security Expert on What Las Vegas Tragedy Means for Live-Music Industry More

Las Vegas Shooting Underscores Hotel Security Choices More

ImageWare Receives IBM PartnerWorld’s “Ready for IBM Security Intelligence” Validation More

Las Vegas Massacre Raises Questions About Hotel Security More

HP Enterprise let Russia review the Pentagon's security software More

Why BlackBerry Is Optimistic about the Cybersecurity Space More

The Deloitte Breach Was Worse Than We Thought More

Court Sides with FBI in iPhone Hacking Tool Disclosure More

Equifax failed to patch security vulnerability in March: former CEO More

Utilities Will Spend Billions On Cybersecurity As Threat Grows More

IBM: Businesses Must Innovate to Ensure High Levels of Data Protection More

Deloitte hacked, compromising its clients' emails More

Cyberinc launches IAMobile™ App for One Identity’s Identity Manager More

All the Ways Equifax Epically Bungled Its Breach Response More

Microsoft helps customers digitally transform their businesses with cloud, AI and mixed reality More

What retirees should do in wake of Equifax data breach More

UK Should Brace for Major Cyber Incident More

Passwords For 540,000 Car Tracking Devices Leaked Online More

AT&T to Uber Offer Free Services to Help Mexico Quake Response More

Ransomware Analysis Promises Bleak Future with No Recovery More

Verizon Hit by Another Amazon S3 Leak More

ImageWare Systems Secures $11 Million in New Funding More

Massive Wave of Ransom DDoS Threats Sweeps Globe More

Hackers targeted election systems in 21 states, DHS says More

Equifax: A Category 5 Cybersecurity Crisis Storm More

These Cybersecurity Stocks Are Rising On Equifax's Mass Hack More

Equifax data breach: Find out if you were one of 143 million hacked More

The Equifax Data Breach – It’s Time for a Change in Security, says Cyberinc More

Avoid charity scams exploiting Hurricanes Harvey & Irma More

Equifax finally responds to swirling concerns over consumers’ legal rights More

Best Buy Drops Kaspersky Products Amid Russia Concerns More

Security analyst encourages hyper-vigilance in aftermath of massive Equifax hack More

Equifax Breach, Affecting 45% of US Population, Raises Big Questions More

Many Questions, Few Answers For Equifax Breach Victims More

SMBs Largely Unprepared for IoT, Ransomware Attacks More

Equifax Reports 143 Million Records Breached More

Germany's Election Software Is Dangerously Hackable More

Fortinet Threat Landscape Report Reveals Poor Security Hygiene More

DDoS Attacks on the Rise Again: Akamai More

New Security, Compliance Features Added to Cisco Spark More

CovertBand Hijacks Smart Devices for Surveillance Purposes Using Sound Waves More

Trump OKs plan for independent Cyber Command More

Experts: Bots Could Herald Third Revolution in Warfare More

FakeToken Android Banking Trojan Returns as a Ride-sharing App More

Facebook Awards $100K to Researchers for Credential Spearphishing Detection Method More

Goldman Sachs just poured $45 million into a company picking up Amazon's slack in the cloud More

Cisco Acquires Observable Networks to Expand Its Cloud Security More

AT&T Seeking Debt Relief, Weighs Options for Home Security Unit More

BPT Introduces Cyberinc’s ISLA® Web Malware Isolation System in Indonesia: to help prevent Web-borne Malware Attacks More

The Army Grounds Its Dji Drones Over Security Concerns More

HBO Hackers Leak Senior Exec Emails, Demand Ransom More

Microsoft Patches Windows Search Flaw Exploited in Attacks More

Global Spam Rate Reaches Highest Level in Two Years More

BPT Introduces Cyberinc’s ISLA® Web Malware Isolation System in Indonesia: to help prevent Web-borne Malware Attacks More

Siemens to update medical scanner software to deal with security bugs More

How to Invest in Cybersecurity Stocks More

China Enforces First Action Under Developing Cyber Security Law More

Cyberinc, powers expansion of Isla® into global markets: signs partnership with Hewlett Packard Enterprise (HPE) More

Cybersecurity Threats Create Growing Risk of Destruction of Service More

IBM launches new security testing services for IoT, automotive More

Most weapons on the dark web come from US, study finds More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsRory Olson
President & Chief Executive Officer

Las Vegas was a terrible tragedy and does trigger additional discussion on security, especially for protection of people and saving lives. There is no doubt in my mind more screening in public and private physical entrances and exits will be required and mandated. Other countries, enterprises and communities outside North America are already taking the step to enhance their security. In many regions of Europe, Africa and the Middle East, hotels, public facilities such as shopping malls, museums, sports venues, concert halls, etc., have x-ray scanners deployed. Asia is following and I expect North America will not be too far behind. As more awareness is given to the role of x-ray scanners in these domains, AI and analytics will be play a key role in the automation and predictive detection of threats to all. More

security stock solutionsAndrew Hubble
Sales Director Asia Pacific and Japan
Dell EMC
Surveillance and Security

Terrorism in certain countries in Asia has certainly focused governments and enterprise to review their own safety and security methods to protect the public, staff and critical infrastructure and how to improve current practice. Convergence and collaboration of multiple Safety and Security technology combined with “Big Data” analytics are needed to leverage technology in the battle against terrorism in APJ. This provides both challenges and opportunities for Dell EMC as we can provide both thought leadership in the technology challenges while being the catalyst for all of the different technology partners that operate in this space. More

security stock solutionsFred Zhang
Online Business Manager Infilux, an Infinova Brand

Quite simply, we provide high-quality video surveillance products at a reasonable lower price. For example, we abandon the fancy box designs. We also realized that the Ethernet cables that come with some DIY kits on the market is not even used because many installers would prefer to make cables of the right length themselves. With these and other initiatives, we have lowered costs and passed these savings on to the customer without sacrificing quality. More

security stock solutionsMr. Samir Shah

Isla represents an entirely new approach to cyber security.  Until now security solutions have always been based on detecting “bad things” and blocking them from running. Anti-Virus tries to detect “bad files”, Web Filters try to detect “bad websites”, the list goes on and on. Isla takes a different approach to the problem. Instead of detecting “bad” things, Isla simply isolates ALL web content in a specialized environment located outside of an organizations sensitive network.  Since ALL content is isolated no attacks can ever “slip through the cracks” and compromise the user. This is a simple, yet powerful approach. Since organizations vary so widely, Isla is offered in a number of ways to suit each potential customers’ needs. Isla can be deployed as an appliance directly at a customers’ office, it can be deployed in a customers’ existing cloud data centers or it can be delivered as a pure Cloud service by a Cyberinc Isla Cloud Service partner. More

security stock solutionsGraham Porter
Business Development Director EMEA
Dell EMC
Surveillance and Security

The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase image resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it. More

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

With data breaches happening every day and causing damage to your brand, tangible economic loss, and termination of employment for executive management charged with oversight, enhancing security without compromising user experience is a priority for today’s organizations. Multi-modal biometrics for user authentication handles this requirement and that’s what ImageWare does. We have invested substantial time and effort into making the implementation of biometric security simple, quick, and cost-efficient.  Being a pioneer in biometrics, with several decades of experience, ImageWare has built its brand through deployments in law enforcement applications, later migrating to secure biometric credentialing, and more recently, to authentication in the cloud using smart mobile devices. At the heart of all of our product offerings is the patented IWS Biometric Engine® (BE), which provides an ultra-scalable, real-time, multi-modal biometric enrollment and matching database specifically built for biometrics. The BE supports a dozen different biometric modalities today and adding new modalities is simple and straight forward. As we say, “we secure your future,” meaning that we not only satisfy your current security requirements, but we also secure your investment as new biometric technology becomes available.  We treat biometrics as “plug and play,” so you can take advantage of new advancements with no loss to your current investment. More

security stock solutionsMr. Ken Mills
General Manager
IoT and Surveillance

Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe... More

security stock solutionsNicholas Thermenos
Director Sales & Marketing Americas
Dell EMC
Surveillance and Security

Video Surveillance is going through a fast-paced digital transformation from low cost, decentralized data repositories to true Enterprise Class, centralized infrastructure requirements.  The increase in IP cameras, retention times, and the assurance that data will be available when needed, is moving customers to find new way to retain, store and access video surveillance data. Business leaders are beginning to recognize that there are valuable insights to be gained from the vast amount of data that is being collected. Customers, particular business leaders, are looking to capitalize on the data contained in these video images.  Both of these trends are changing the landscape of storing and accessing video. More

security stock solutionsMr. Marc Blackmer
Product Marketing Manager, Industry Solutions
Security Business Group

We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“  More

security stock solutionsMr. Steve Visconti
President and CEO

Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.  It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization.  Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed.  This is precisely why an organization or enterprise must have the most secure and hardened environments possible.  Hackers and bad actors will eventually probe and eventually move on to the easier targets.  Don’t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive.  More

security stock solutionsMr. Kurt Takahashi
AMAG Technology

 AMAG Technology has a rich history of 40+ years in the access control industry. Our goal is to extend the value of our access control platform by adding new solutions such as  Symmetry GUEST and soon to be released Symmetry CONNECT, our policy-based identity management system. AMAG Technology provides access control, video management, intrusion alarm, visitor management, identity management and incident management all by a single provider. Our policy-based platform and automation engine helps companies operationalize their electronic security ecosystem.  Our highly flexible open platform enables us to add new innovative technology built by our business partners easily and timely. This helps companies simplify their operations by allowing them to utilize AMAG’s user interface to manage their complex environments.. More

security stock solutionsMr. Dave Schmitt
Solutions Architect 
IoT Vertical Solutions Group: Utilities

Utilities are especially popular, high-profile targets for attacks. According to the Cisco Security Capabilities Benchmark Study, 73% of utility IT security professionals say theyve suffered a public security breach, compared with an average of 55% in other industries. Most U.S. utilities have already undertaken substantial security measures throughout many parts of their systems. However, the nature of cyber threats and vulnerabilities keeps changing.  U.S. utilities have, for several years, been deploying IoT technology (aka Smart Grid) because it enables significant business and operational benefits: increased grid reliability, enhanced integration of renewables and other distributed energy resources, reduced operating costs, and more. However, all of this opportunity comes with the tradeoffs of increased complexity and new risks.. More

security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
Founding Member
Fido Alliance

FIDO Alliance has enjoyed significant growth in 2 years from 4 initial board members with 6 total members at inception to 27 board members with 225+ total members and representation from all cross sections of technology players, platform players, device manufactures to financial and other service providers globally. The FIDO Alliance board currently includes Alibaba Holdings(NYSE:BABA); ARM Holdings plc (LSE: ARM and NASDAQ: ARMH); Bank of America Corporation(NYSE:BAC);CrucialTec (KRX: 114120); Discover Financial Services (NYSE: DFS); EgisTec and Google (NASDAQ: GOOG). More

security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More

security stock solutionsMark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc

These three products are our basic products for which GuardedID and MobileTrust are often bundled into one license for ease of purchase. GuardedID is our keystroke encryption product that works on PC’s and MAC’s and MobileTrust, which is also keystroke encryption with its own keyboard, works on iPhones and Androids. Both provide keystroke encryption as well as other critical security capabilities. MobileTrust also works with our authentication platform, ProtectID, from a mobile device in terms of ProtectID’s One Time Password. The ProtectID® mobile product, our 4th product provided on Google Play and iPhone Store, works with our ProtectID Authentication Platform and is our Out-of-Band Authentication product that is sold to enterprises for their clients and employees. It also provides tokens, PUSH (TBD), phone, OTP, Email, and SMS and other authentications that provide Out-of-Band and In-Band solutions.. More

security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More

security stock solutionsMr. Wayne Arvidson
Vice President
Surveillance and Security Solutions

Quantum has a broad range of storage solutions for surveillance infrastructures ranging from 10’s to 10’s of thousands of cameras. For smaller scale environments, the products in our Xcellis Application Director product line offer storage servers that provide a simple-to-manage foundation. End users can scale into enterprise level storage requirements with the addition of our StorNext file system, which is a multi-tier storage platform that automatically migrates video to the most cost-efficient tiers of storage based on various policy requirements defined by the user. Security environments can utilize high-performance disk storage with QXS, file-based tape with our Scalar Libraries, or FlexTier for cloud. More