AFCEA Home   AFCEA
Defense Foundation Europe Homeland Security Industry Intelligence SIGNAL Magazine    


     Member Login
Search
 
 
Member ID Password
Forgot: Password | Member ID            
                        
Join or renew today to connect with the premier network of thought leaders in the global security community.

Join/Renew Links:

 


Shortcuts

AFCEA Weekly Digest
Chapter News
Committees
Event Presentations
Online Directories
PDC Preferred Providers
AFCEA Shopping
Strategic Partners
Women in AFCEA
Working the Frontline:
Job Guide for Veterans

Share

The AFCEA Corporate Member Directory is the all-inclusive directory of AFCEA member that specialize in information technology solutions for the defense, security, and intelligence communities.

Back to Results | Email this Listing | Update this Listing | Print this Listing
SolPass  
6767 South Spruce St.
Centennial, Colorado 80112 
Telephone:
1 303-721-5002
Facsimile:
 
Email:
jennifer@sol-pass.com
Web Home Page:
www.sol-pass.com
Facebook:
www.facebook.com/solpassinc
LinkedIn:
www.linkedin.com/company/solpass-llc
Twitter:
twitter.com/solpassLLC
President:
Rich Wilcox
CEO:
John Napoli
COO:
Kent Schneider
Business Focus:
SolPass, based in Denver, is the developer of an innovative hardware and software identity verification solution that is designed to build a chain of trust from the individual user to the server. Using biometrics, SolPass assures that only authorized users of the system are given access and implements a rights management system that prevents further unauthorized access. By focusing on the prevention of cyber crime and data breaches, SolPass has introduced a new perspective on cybersecurity.
Products/ Services:
Learning the Hard Way: Cybercrime is dealing a crushing blow to companies, governments and citizens. Over 552 million identities were exposed in breaches last year, and the cost was estimated to be a trillion dollars in the U.S. alone. Cyber-attacks are expensive, in more ways than one; consultants and security experts to patch up the breach, lost profits, damage to reputation, business interruptions, lost opportunity costs, lost jobs, loss of sensitive business information and expensive monitoring for future breaches. Hundreds of millions of dollars have been spent on cyber security solutions, yet billions of dollars continue to be lost along with the theft of private data. Target, Home Depot, JP Morgan, Sony, and even the US Postal Service are just a few of the recent victims of significant data breaches. There will certainly be more. Media reports have made cybercrime, data breaches and cyber fraud appear to be inevitable, saying it's not a matter of if, but when we see the next massive breach of private information. That shadow of inevitability is misplaced. With the right controls, criminals can be stopped from hacking into systems. The right controls must include two things, identity verification and assured rights management. The Truth About Hackers: The simple truth is that hackers enter systems disguised as an authorized user. Most Cyber crime and data breaches occur via the impersonation of a valid user. They are most frequently the result of access being granted to a system via misappropriation and misuse of a valid user name and password. If hackers cannot get valid user credentials, they can be cut off at the knees. While everyone seems intent on detecting hackers and minimizing damage, the focus instead should be on keeping criminals and users who have stolen credentials out of systems. Consumers should demand better protection of their data from the people with whom they do business, as well as their government entities. Passwords are Not Secure: Passwords alone offer little protection. Humans make mistakes: They lose or misplace laptops, tablets, and phones. They create too-simple passwords. They misplace their passwords. They may trust vendors with access that is easily stolen (Target). They may think they're saving the world by exposing data (Snowden). They may even sell their credentials for profit. Organizational insiders commit up to a third of cybercrimes. We all fear criminal hackers in a lawless country working around the clock to crack our security. But we must protect ourselves from unethical or criminal insiders, too. The human element needs to be taken out of the loop when it comes to data security. Those human mistakes can be avoided. Our technology stops the criminal from impersonating a valid user and gaining access to the system. Containment Vs. Prevention: Detection services aren not adequate. You cannot fix the problem when the data has already been breached. Hackers are relentless and will find entry into systems that don't have adequate controls. Patchwork fixes to stop the flood of data breaches are useless; only systemic change will be effective. More money is being spent on patchwork fixes than the actual loss from theft. The current cyber security establishment is focused on the treatment rather than the cure of cyber crime.
Clients:
Governments Financial Services Entertainment Retail Wireless Communications Transportation Healthcare Energy Hospitality
Business Categories:
  • Authentication Means and Services
  • Biometric Products/Services
  • Cloud Computing
  • Collaborative Tools
  • Consulting
  • Cryptographic Products
  • Cyber
  • Detection/Identification
  • Education
  • Homeland Security
  • Information Assurance
  • Information Security
  • Internet Technologies
  • Intranet Technologies
  • Networking Technologies
  • Public Key Infrastructure & Systems
  • Risk Management
  • Secure Communications
  • Security Devices
  • Security Management
  • Standards
  • Systems Integration
  • Trusted Computer Systems
  • Wireless Communications
Small Business Status:
  • Small Business
NAICS Industry:
 

Companies provide the information for publication in AFCEA directories. To be included, organizations must offer products and/or services that are relevant to a directory's focus and to the AFCEA community. AFCEA reserves the right to edit or remove material that does not meet these criteria.

Tips, Guides and Resources for Using the Directories click here

To update existing company directory information click here

LEARN MORE ABOUT PREMIUM CORPORATE PROFILE ENHANCEMENTS Click Here

Click here for a list of all AFCEA directories

Share [Back to Top]

About AFCEA
Mission
Fact Sheet
Board of Directors
Committees
Leadership


Membership
Individual Membership
Corporate Membership Member Portal

Chapters
List of Chapters
Find a Chapter
Student Chapter
Chapter Resources

Courses
Current Courses
Leadership Forum

Events
Overview
Listing of Events
Calendar
Presentations

News
Press Releases
AFCEA in the News
SIGNAL Media
Presidents
  Commentary

Publications
SIGNAL Magazine
Connections
Directories
Webinars
White Papers

Scholarships
Annual Awards
Available Scholarships
STEM Initiatives
Donate
The Armed Forces Communications
and Electronics Association



  © AFCEA International  
Tarpit