Viscount Systems Inc
4585 Tillicum Street V5J 5K9 Burnaby, BC, Canada
Category
General Information
Locality: Burnaby, British Columbia
Phone: +1 604-327-9446
Address: 4585 Tillicum Street V5J 5K9 Burnaby, BC, Canada
Website: www.viscount.com
Likes: 58
Reviews
Facebook Blog
LAST CHANCE to visit the Safe City #GSOC with @vidsys @SalientSys @HPE @HikvisionHQ at the Hyatt Regency! #ASIS16
The Viscount team would like to extend a HUGE thanks to all those who came to the Cool Partners Reception!
It's rainy but we made it to the Cool Partners Reception! @Qognify @emc @CreatInfoTechIn #ASIS16
Big thanks to @SDMmagazine for a great conversation at #ASIS16!
Great day of meetings at #ASIS16! Join us for a @CreatInfoTechIn presentation and some drinks at Hilton suite 975
First day of #ASIS16! Stop by the Hilton Orlando, suite 975 to demo the Freedom identity management solution today.
Hoping everyone has a safe and relaxing #LaborDay !
Panel-free is the way to be. See how #FreedomAccessControl boosts #cybersecurity for government installations: http://bit.ly/298LS2z
Demand outpacing supply of #cybersecurity talent in businesses and countries worldwide, says @SIAonline http://bit.ly/2at2fI7
Declare your Freedom from access control hardware. Learn more about the advantages of Freedom 9.2B: http://bit.ly/1q39Y5x
What are the operational and security benefits of unified access control? Find out more in our new white paper. http://bit.ly/1Uzpn4R
WATCH: Siloed #security systems are no longer enough to defend against the new generation of threats...but why? http://www.viscount.com/FreedomWebinar
Happy #MemorialDay to our colleagues in the U.S.! Hope everyone is having a safe and relaxing weekend.
Don't forget to register for the Freedom 9.2.B webinar this Wednesday, June 1 at 12pm EST! More info: http://bit.ly/23mYsy1
Ever wondered what "Viscount" means? Here's what our #security roots mean to us (and to you): http://bit.ly/26xLWA8
"According to Weinstein, having a centralized authority for cybersecurity can help to create a less federated cybersecurity governance program, leading enterprises to realize better economies of scale through pooling cybersecurity resources and a more efficient, coordinated #cybersecurity incident response." http://bit.ly/1NAe8Xe #NJCCIC #CISO
Viscount Systems spoke with SDM Magazine to identify #accesscontrol pain points and the best #cybersecurity solutions for today's growing adoption of #IT connected devices. Read more: http://bit.ly/1SQilI0
Thank you to everyone who participated in our Freedom Symposiums and came to see us at #iscwest! We had a productive and successful show.
"CISSP is crucial to get your #IT guys to know what's going on." -S. Sieracki speaking with @securitymag at #iscwest
Showing @SecInfoWatch the #Freedom encryption bridge on the final day of #iscwest2016
Sarah James speaking about the value of the Freedom architecture at the symposium. #iscwest2016
"I always ask integrators, 'What does an enterprise mean to you?' And the #IT guys get it." -S. James on the disruption of Freedom #iscwest
Join the Freedom Symposium going on now in Bassano 2604! #iscwest2016
Are you ready for Freedom Symposium, Part 2? Stop by Bassano 2604 for some drinks and an education + networking session.
Thank you to everyone who came out to the @Qognify @emc @ViscountSystems Cool Partners Reception last night!
Thanks to everyone that joined us for last night's Cool Partners Reception! What a great evening! #ISCWest
We've got coffee at Bassano 2604! Come stop by, grab some brew and reclaim your Freedom. #iscwest2016
Excited to meet with partners, customers and media at the show today! Stop by Bassano 2604 to visit Viscount on Day 1 of #iscwest2016
Eye-opening scenarios that will help you understand why stronger network security is a must: Ebay compromised 145 million records. BBC website shut down after hackers attack. Hacker News recently reported that Bangladesh lost $80 million dollars from the Federal Reserve on March 14th of this year. (Thats only 11 days ago!) ... The following article by TheTechNews details crucial reasons for implementing stronger network security. What suggestions do you have to make network security stronger?
With ISC West coming up, we think it's important that you know the answer to this question: "Who is Viscount?" We can answer that: 1. We are innovators. We created Freedom Access Control, an IT-centric software platform designed for more complex threat environments that is inherently flexible to deploy in the evolving IT infrastructure of government and private organizations. 2. We are leaders in access control and identity management. We offer a full suite of security solut...ions and services that address todays physical security, regulatory and risk management challenges. 3. We are relevant in today's market. We offer a fully compliant security solution that protects from a broad range of security risks that can compromise facilities and systems. It's important to protect critical infrastructure from every possible threat. 4. We are a company that offers patented, award-winning technology. We value innovation and technology and we continue to invest in product development and building a strong, IP portfolio. We have 8 core patents and more than 60 claims filed since 2010. Visit with us at ISC West to learn more about us. To schedule a meeting, please visit: http://www.viscount.com/visit-viscount-at-isc-west-2016/
Do you know that Ransomware is responsible for 406,887 attempted infections and approximately $325 million in damages? (Cyber Threat Alliance November 2015) And, ransomware is still running rampant: Methodist Hospital in Henderson, Kentucky was forced to declare an internal state of emergency because cyber criminals started relentlessly attacking on March 18, last Friday, locking down a good amount of the hospital's data. As of this morning, a local TV station reported that... the FBI is investigating the attack. Click on the link below to get more details about this ransomware attack.
In case you haven't heard, this year at ISC West 2016 we, along with Qognify and EMC2, are hosting The Cool Partners Reception at Rockhouse at the Venetian. It will be a great time of mingling, sipping and snacking. Please RSVP by clicking on the link below or email [email protected]. We're excited to see you there for a relaxing moment during ISC West 2016!
What exactly is Freedom? It is an open platform, Web-based security management solution that combines access control management with cyber security protection to provide a highly scalable platform. It easily integrates with other networked-based systems and solutions. Why should Freedom be used? Because it enables users to establish a unified security platform that reduces infrastructure investments and ensures long-term return on investment. Here's the top 5 ways Freedom is ...different: 1. Panel-less architecture - the need for complex and costly proprietary control panels is eliminated and replaced with technology that communicates over encrypted IP-network protocols. 2. Highly security and reliable - Advanced encryption technology eliminates security vulnerabilities while build-in resiliency allows deployment over unlimited devices without fear of failure. 3. Open platform design - integrates with 3rd-party technologies. 4. Accessible anytime, anywhere - Monitor and grant access 24/7 via any Web browser. 5. FICAM compliant - fully compliant with FIPS-201 standard and HSPD-12 initiative. To experience Freedom at ISC West 2016, schedule a visit with us: http://www.viscount.com/visit-viscount-at-isc-west-2016/
Want to learn a little more about our Freedom Access Control before ISC West 2016? Our brochure describes: The Viscount Advantage; An IT approach to access control; How Freedom works by giving a sample enterprise configuration;... Innovative software features; What makes Freedoms Active Directory architecture unique; and Why you should choose Freedom. For a copy of this brochure, go to: http://bit.ly/1Ra65ay
8 Reasons You Should Schedule a Visit with Us at ISC West to Experience Freedom Access Control Solution: 1. Looks and acts like most enterprise IT security applications. 2. True IT topology connects and interacts with cloud services.... 3. Inherently cyber secure, delivering ability to create a hardened network and authentication process. 4. Hardware and breach vulnerability reduced by elimination of control panels. 5. Real-time authentication with Active Directory per card read. 6. Built-in redundancy; not 3rd party app needed. 7. Complete Web-services application built on REST API. 8. Supports FICAM 13.02, FIP201, UL & more. Which are most intriguing to you? While you think about your answer, schedule your meeting with us by visiting: http://bit.ly/1LbJdoF
We just found out and thought you should know - The Electronic Healthcare Network Accreditation Commission is in the process of developing enhanced security criteria to help battle cybersecurity in the healthcare vertical. Here's how EHNAC plans to accomplish this: 1. Collaborate with National Health Information Sharing and Analysis Center;... 2. Raise the privacy and security bar higher; 3. Start an accreditation program focused on infrastructure; and 4. Possibly create a new accreditation program for telemedicine/telehealth vendors. How do you think this accreditation program will help with overall cybersecurity in healthcare?
Popular Listings
DiAlgo
+1 819-329-4489
Business service, Businesses, Local service, Consultation agency, Consulting agency
Visual Communications & Marketing
6-6155 Tomken Rd. L5T 1X3 Mississauga, ON, Canada
+1 647-401-1443
Business service, Advertising agency, Broadcasting & media production company
Coiffure Cizofix 1 INC.
+1 450-665-1791
Business service, Hair salon