device

CSSI Introduces Device Lifecycle Management Program

CSSI Technologies now offers CSSI Device Lifecycle Management™ for Android mobile devices

We are experiencing a major technology shift as companies replace aging Windows Mobile devices with new handhelds running the Android OS. We find companies struggling to keep pace with Android’s rapid pace of change, thus we created CSSI Device Lifecycle Management™. — Joe Tosolt, President

LEWISBURG, Pa. (PRWEB) February 14, 2020
CSSI Technologies, Inc., a mobile technology firm based in Lewisburg, PA, announces a new service offering which solves the problems companies face in managing growing fleets of Android mobile devices. With CSSI Device Lifecycle Management™, customers avoid the pain and disruption of keeping their Android devices current.
“Today we are experiencing a major technology shift as companies replace aging Windows Mobile devices with new handhelds running the Android OS. Companies accustomed to less frequent Windows updates find that they are unprepared to handle Android’s rapid pace of change,” said company president Joe Tosolt. “As companies fall behind, they become increasingly susceptible to security risks. We created CSSI Device Lifecycle Management™ to solve this problem – companies can utilize CSSI’s superior skills in mobile device management (MDM) and Android mobile to keep their fleets up to date.”
CSSI Device Lifecycle Management™ includes 3 key support components:
1) CSSI works behind the scenes to stage Android updates on either an annual or more frequent basis.
2) “White Glove” provisioning — CSSI sets up devices prior to arrival at the customer site so that handhelds are ready to go right out of the box. Further, when devices are sent out for warranty repair, CSSI restages devices so that they return to the customer correctly configured.
3) CSSI provides technical support for day-to-day device questions and problems.
“Beyond the security benefits of staying current with Android, we believe that customers will find tremendous value in the white glove provisioning included with this service,” said Tosolt. “Companies will be able to immediately deploy devices to the operating environment without having to wait for IT resources to come available.”
This service is of high value to any company with Android handhelds and limited time or expertise in Android and mobile device management. For questions about CSSI Device Lifecycle Management™, visit the information page online or contact CSSI Technologies.
About CSSI Technologies, Inc.CSSI Technologies, Inc. (https://cssi.com/) boosts business productivity with the smart integration of auto ID, mobile computing, and business software. CSSI offers a complementary range of services which include: Barcoding and Mobility Solutions, Custom Software Development, and sales & support for Microsoft Dynamics GP. From headquarters in Lewisburg, PA, CSSI supports customers across the US.
CSSI Technologies, Inc., 145 North 15th Street, Lewisburg, PA 17837(570) 524-4424http://www.cssi.com

Share article on social media or email:

Intrinsic ID to demonstrate ‘EZ’ Device-to-Cloud Security and FPGA Protection with PUF Technology at RSA and Embedded World

RSA and Embedded World attract audiences of world-class technologists who feel pressure to protect the IoT from hackers. They are great forums for showing how our PUF technology, with QuiddiKey and BroadKey as the bedrock, create unclonable identities to combat these threats.– Pim Tuyls, CEO

SUNNYVALE, Calif. (PRWEB) February 12, 2020
Intrinsic ID, the world’s leading provider of PUF-based digital authentication technology for Internet of Things security and embedded applications, today announced it will exhibit at the RSA Conference February 24-27 in San Francisco and Embedded World February 25-27 in Nuremberg, Germany. Intrinsic ID will highlight how devices can be connected securely to the cloud in a simple, “EZ,” way without the need for hardware changes. Additional demonstrations will show creation of a root of trust on Xilinx FPGAs to prevent cloning and protect sensitive information.
“RSA and Embedded World attract audiences of world-class technologists who feel pressure to protect the Internet of Things from hackers attempting to exploit an expanding attack surface,” said Pim Tuyls, Intrinsic ID CEO. “They are great forums for demonstrating that Intrinsic ID understands these pressures and showing how our PUF — physical unclonable function — technology, with QuiddiKey and BroadKey as the bedrock, create unclonable identities to combat these threats. And can do so in an easy, or ‘EZ,’ way.”
QuiddiKey is an IP block for secure root key generation and management for integration into chips. BroadKey is a software package for secure root key generation and management based on a hardware PUF. It is broadly applicable on any smart device even when already deployed in the field. Both products deliver IoT security by enabling device manufacturers to secure their products via an internally generated, unique identity without the need for adding a costly, security-dedicated silicon. They both utilize Intrinsic ID’s patented SRAM Physical Unclonable Function (PUF) technology.
Examples of applications which utilize Intrinsic ID security:
Key storage and key vault in high-security and mass-volume devices
Secure cloud connectivity
Preventing reverse engineering of IP and software
Combatting counterfeiting and cloning
Securing FPGAs
Intrinsic ID will also present “Intrinsic ID: Securing the IoT in Today’s Smarter World” each day of Embedded World in the theater at Booth #3A-536 as part of the RISC-V Foundation’s exhibit.
RSA Conference conducts information security events around the world, as well as delivering insights via blogs, webcasts and newsletters on cyber threats. More than 42 thousand attended the 2019 event in San Francisco.
Embedded World is a trade show for embedded-system technologies and reported approximately 31 thousand attendees at the 2019 event.
To request a meeting with the Intrinsic ID team at RSA or Embedded World please visit the Intrinsic ID website.
RSA Where & When:Moscone Center747 Howard StreetSan Francisco, Calif. 94103
Intrinsic ID is exhibiting in Booth #3327, in Moscone Center’s South Hall.
RSA exhibits will be open Feb. 24-27, 2020
February 24: 5 p.m. to 7 p.m. PST
February 25: 10 a.m. to 6 p.m. PST
February 26: 10 a.m. to 6 p.m. PST
February 27: 10 a.m. to 3 p.m. PST
Embedded World Where & When:Exhibition CentreNuremberg, Germany
Intrinsic ID is exhibiting in Hall 3A, in Booth #3A-536 with the RISC-V Foundation.
Embedded World exhibits will be open Feb. 25-27, 2020
February 25: 9 a.m. to 6 p.m. Central European Time
February 26: 9 a.m. to 6 p.m. Central European Time
February 27: 9 a.m. to 5 p.m. Central European Time
About Intrinsic IDIntrinsic ID is the world’s leading digital authentication company, providing the Internet of Things with hardware-based root-of-trust security via unclonable identities for any IoT-connected device. Based on Intrinsic ID’s patented SRAM PUF technology, the company’s security solutions can be implemented in hardware or software. Intrinsic ID security, which can be deployed at any stage of a product’s lifecycle, is used to validate payment systems, secure connectivity, authenticate sensors, and protect sensitive government and military systems. Intrinsic ID technology has been deployed in more than 150 million devices. Award recognition includes the Cyber Defense Magazine InfoSec Award, the IoT Breakthrough Award, the IoT Security Excellence Award, the Frost & Sullivan Technology Leadership Award and the EU Innovation Radar Prize. Intrinsic ID security has been proven in millions of devices certified by Common Criteria, EMVCo, Visa and multiple governments. Intrinsic ID’s mission: Authenticate EverythingTM. Visit Intrinsic ID online at http://www.Intrinsic-ID.com.
BroadKey, QuiddiKey, Intrinsic ID and the Intrinsic ID logo are trademarks or registered trademarks of Intrinsic ID, B.V., and are protected by trademark laws of the United States and other jurisdictions. All other product and company names are trademarks or registered trademarks of their respective companies.

Share article on social media or email:

5-Year Follow-Up Outpatient of L4-L5 Fixation with Inspan Device for Degenerative Spinal Stenosis Demonstrates Improved Results

INSPAN LLC is pleased to announce the successful results from a long-term follow-up clinical study of outpatient L4-L5 lumbar interspinous fixation for degenerative spinal stenosis using the Inspan interspinous fixation device (INSPAN LLC)(PRWeb February 11, 2020)Read the full story at https://www.prweb.com/releases/5_year_follow_up_outpatient_of_l4_l5_fixation_with_inspan_device_for_degenerative_spinal_stenosis_demonstrates_improved_results/prweb16896859.htm

FDAnews Announces — Early Bird Pricing Ends on Feb. 18 for FDA Data Integrity: For Device and Pharma Firms, and Their Suppliers Workshop March 17-18, 2020 – Philadelphia

FDA is keeping pressure on device and drug firms with data integrity shortcomings.(PRWeb February 11, 2020)Read the full story at https://www.prweb.com/releases/fdanews_announces_early_bird_pricing_ends_on_feb_18_for_fda_data_integrity_for_device_and_pharma_firms_and_their_suppliers_workshop_march_17_18_2020_philadelphia/prweb16846104.htm

Alpine Security Introduces Evolutions for Medical Device Cybersecurity Assessment and Penetration Testing

Alpine Security’s Medical Device Cybersecurity Assessment and Penetration Testing Evolutions Secure Medical Devices from Cyberattacks

“Attacks against medical devices are often high risk and may harm or kill a patient. Our goal is to assist medical device manufacturers with cybersecurity so they can fulfill their mission of improving medicine and healthcare.” – Christian Espinosa, Alpine Security CEO

ST. LOUIS (PRWEB) February 10, 2020
St. Louis-based firm Alpine Security (“Alpine”) aims to secure the healthcare industry from cyberattacks. One way Alpine is securing healthcare is by working with medical device manufacturers to help ensure their devices are safe from cybercriminals. Medical devices range from external systems, such as drug infusion pumps or patient monitoring systems to implantable (internal) devices, like pacemakers. Cybercriminals go after medical devices for four main reasons:
1. To steal Protected Health Information (PHI) (Motive: Financial Gain)2. Ransomware (Motive: Financial Gain)3. To harm or kill a patient (Motive: Terrorism or Assassination)4. To use the medical device as a beachhead for enemy advancement (Motive: Foothold to Expand Operations)
Alpine developed and introduced its “Evolution” methodology for medical device cybersecurity assessments and testing to help medical device manufacturers mature the cybersecurity of their devices. Alpine’s Evolution approach is based on Navy SEAL Evolutions. The SEALs use Evolutions to describe each progressive event in a training schedule. The general idea is that as you progress through each Evolution you mature and evolve. Alpine assists medical device manufacturers to evolve the cybersecurity of their medical devices using a structured, phased approach.
Alpine’s medical device cybersecurity assessment and penetration testing methodology has two main Evolutions and can include as many as necessary. During each Evolution, the medical device is thoroughly assessed and tested. The first Evolution establishes a cybersecurity baseline for the medical device. This baseline includes all the ways an attacker could gain entry to and compromise the device, as well as the risk associated with each method of compromise. Higher rated risks typically affect patient safety or privacy. After the first Evolution, the medical device manufacturer works to fix the vulnerabilities identified by Alpine Security. The next Evolution validates the vulnerabilities were fixed and checks for any new vulnerabilities that may have been introduced. This process, the Evolution, repeats as many times as necessary to get the medical device to an acceptable risk level.
Alpine’s Evolutions include the following activities, in addition to a technical “white box” penetration test:– Identification and prioritization of risk pertaining to confidentiality, integrity, and availability– Identification and assessment of all entry points into the device (system)– Assessment of existing cybersecurity controls– Identification and assessment of data flows– Identification and assessment of use case risk– Threat (Attack) Tree development– Assessment of the cybersecurity Traceability Matrix– Assessment of medical device standard operating procedures– Assessment of software cybersecurity architecture
For more information on Alpine Security’s medical device cybersecurity assessment and testing, contact Alpine Security at 844-925-7463 / info@alpinesecurity.com or visit their website at http://www.alpinesecurity.com.

Share article on social media or email:

FDA Grants Breakthrough Device Designation to nQ Medical for Parkinson’s Disease Management Platform

The breakthrough device designation reaffirms that the nQ’s brain monitoring solution enables better treatment of patients by providing more precise and timely feedback to clinicians

WASHINGTON (PRWEB) February 06, 2020
The U.S. Food and Drug Administration (FDA) has granted “Breakthrough Device” designation to nQ Medical for its neuroQWERTY brain health monitoring solution. The designation is granted for “The neuroQWERTY software as a medical device platform intended to characterize abnormalities in psychomotor performance and fine motor function by analyzing mechanical keyboard and touchscreen device interactions in adults with, or suspected of having, Parkinson’s Disease (PD).” The approved use is for 24/7 remote patient monitoring of disease progression and measurement of the impact of therapy in PD patients to more effectively treat symptoms of the disease, a challenge for movement disorder specialists today as they routinely only see one to two times a year.
PD is a debilitating chronic condition that affects millions of lives globally. Although disease modifying therapies for PD are still in drug discovery phases, early detection, continuous disease progression management, and proper measurement of the effects of treatment can provide significant opportunity for better patient outcomes. “The breakthrough device designation reaffirms that the nQ’s brain monitoring solution enables better treatment of patients by providing more precise and timely feedback to clinicians,” said Rahul Mahajan, MD, chief medical officer of nQ Medical, “The FDA’s recognition of enabling novel and effective digital therapies that demonstrate clinical evidence benefits helps the thousands of sufferers of Parkinson’s disease.”
There is rich information hidden in the way our fingers interact with smart devices that allows for cognitive and motor impairment tracking and early detection of neurodegenerative disease onset. nQ’s computational biomarker is characterized as software as a medical device (SaMD) and measures brain-finger connection activity via keystroke and touchscreen dynamics. It is the result of 5 clinical trials in six years and 5 peer-review clinical publications and promises to be an effective indicator of neuromotor and neurocognitive brain condition. Clinical data has demonstrated that nQ may be effective for diseases such as sleep inertia, substance inebriation, Alzheimer’s disease, and Parkinson’s disease. Further clinical trials are underway in mild cognitive impairment (MCI), Amyotrophic Lateral Sclerosis (ALS), Multiple Sclerosis (MS), and Concussion (mTBI).
“Everyone has a unique typing and touchscreen signature. Research has revealed that the way we interact with computers and mobile devices can reveal with startling accuracy the presence of certain neuromotor, neurocognitive, and neurobehavioral disorders,” commented R. A. Bavasso, Co-Founder and CEO of nQ Medical. The nQ platform was developed in conjunction with the Massachusetts Institute of Technology and funded, in part, by the Michael J. Fox Foundation to deliver a validated artificial intelligence tool to open a broad opportunity to better diagnose disease(s), use real-world evidence to monitor disease progression, and track therapeutic intervention effectiveness.
Machine learning algorithms detect subtle psychomotor impairment typical of these diseases by analyzing the timing of keystrokes and device pressure. Consistent with HIPAA, no information on what is typed/touched is captured, only “how” it is typed/touched. No investment in a proprietary device or no unnatural tasks are required. “Just live your life as you normally do with your chosen personal device and we can collect and feed back to you and your physician the status of your brain health,” added Bavasso. The AI tool provides unified data management across the entire clinical lifecycle, from clinical trials to physician dashboards, from patient engagement to population health allowing for a completely integrated experience. The machine learning approach provides a complete perspective from individual baseline data.nQ may aid in the diagnosis of neurodegenerative disease earlier than current gold standard tools. (Read the Clinical Studies). Physicians can now prescribe Rx with confidence, having unparalleled access to 24/7 real-time data from patient’s personal devices. With earlier diagnosis, granular tracking of disease progression, and ongoing measurement of therapeutic impact, nQ reveals insights to help the clinician “see” what is happening with their patients in real time.
About the FDA Breakthrough Devices Program
The FDA Breakthrough Devices Program is a voluntary program for medical devices and device-led combination products that provide for more effective treatment or diagnosis of life-threatening or irreversibly debilitating diseases or conditions. To learn more, visit the FDA page here.
About Parkinson’s disease
More than 10 million people worldwide are living with PD. Approximately 60,000 Americans are diagnosed with PD each year. The combined direct and indirect cost of PD, including treatment, social security payments and lost income, is estimated to be nearly $25 billion per year in the United States alone. To learn more, visit the Michael J. Fox Foundation here.

Share article on social media or email: