Buy PM's
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Hard Facts about SFOR, ProtectID GuardedID - MidnightShift
I found the Found the following PDF Article Full of nice to know information. I've included a few Screen Captures and Quotes to wet the Appitite. Very Long and full of nice to Know Information.
https://csawebsecurity.com/files/CSA_Article9.pdf
StrikeForce offers customers the flexibility to have
ProtectID installed in-house or be processed
through their Cloud Authentication Service (CAS).
StrikeForce completed the development of its
ProtectID platform at the end of June 2004. Early
in 2011, the company was awarded a broad patent
from the U.S. Patent and
Trademark Office on its
Out-of-Band authentica-
tion process, thereby
strengthening the compa-
ny’s competitive position
in the information security
market. The patent comes
at an important time when
large, established corpora-
tions are dealing with
costly data breaches and
stronger regulations, and
who are looking for more
secure alternatives. The
patent went through reex-
amination and came out
in December of 2011
without losing any claims
and even adding 7 more.
In speaking with several
of StrikeForce’s authentication customers, there
was a high level of overall satisfaction with Pro-
tectID. Customers – some of whom have been using
the product for years noted that the product is
effective at providing high-level authentication
security and is at a pricepoint that is attractive rel-
ative to the competition.
There are several com-panies in the market offering competing authentication products, including Authentify, Phone Factor, Swivel, ValidSoft, Verisign, and RSA.
Past Deals Reaffirmed MidnightShift 12/20/16
In a prior MidnightShift Post we presented a Link to a George Waller 43 Minute Interview (Audio and Text) from Nov. 2013 discussing Deals and much more.
Here is another Older Video where Kay Speaks about Past Deals and OEM Partners.
I see nothing there, please take a snapshot and embed it or quote the tweet.
I saw nothing on Twitter about new coming out.
sua sponte - The term is usually applied to actions by a judge taken without a prior motion or request from the parties.
So what did Kay say? Your post is confusing with the Bold Type.
Did Kay say Let me just say this is all you will get from me this is absolutely the wrong time to be selling
Or is that your opinion ?
Yes I got a response from Kay fact is ZERO Dilution this has been all retail selling.
Let me just say this is all you will get from me this is absolutely the wrong time to be selling
Now is the time to load up loaded 2 milly today 3 milly last week am back up to 5.1milly total.
Cyber security is huge SFOR owns "Out of Band authentication patent" for those that do not know google out of band and it will shed light.
Hard to find a company better positioned in OTC.
Again all answers are in filings and Kay is an honest guy and has always shot straight with me all year.
Look at my post history on this back since January
You mean Much Anticipated NEWS
will not be heading up until the much anticipated reverse split.
SingTel - Arm Twisting - LOL
Trustwave is still going through the Arm Twisting process by Blank Rome for better settlement deal?
What anything more call Mark
Prove me wrong once.
How much cash do they have on hand?
ENOUGH TO GET THOUGH 2017
How much do they spend monthy? Not enough to run out in 2017
When will current cash run out unless there is an influx of money. The End of 2017
Answer these questions with facts from financials please, Only facts not "ifs".
I'm waiting. for something other than a "yes it is good because I say so" Back it up. Show me the Money!!!!!!!!!
**********************
Shaley
We reduced it with regular cash inflow and the Microsoft gain as shown in our 10q. We have about $7million in debt that we don’t pay and we have enough cash to get through another year through 2017. We also are doing some things with the patents and lawyers where we hope for some monies prior to a year out. We also have other big deals that are close to closing. We don’t see any issues with every needing a r/s.
Thanks
Mark
The Johnson Space Center is the National Aeronautics and Space Administration's Manned Spacecraft Center. JSC is never involved unless it is a Manned Mission. There are 1 to 2 Rocket Launches Every month either from Cape Canaveral or Vandenberg AFB in California. Houston has nothing to do with them.
A 360 degree view of a Launch, move the camera around to view the Launch and look around.
StrikeForce Technologies European Push
As the StrikeForce's International Patent is in the Process Currently:
It's nice to see Strikeforce's continued Push in to Europe after its successful efforts in the past, beginning with CDSIGroup LTD.
Breach-prevention pilots under way
Security services firm CDISGroup Ltd., the U.K. distributor for StrikeForce Technologies Inc., launched several large breach-prevention pilots at financial services firms, retailers and mortgage lenders.
"In the last 12 months, corporate data breaches and identity theft skyrocketed throughout Europe," said Mark Kay, Chief Executive Officer of StrikeForce. "However, the U.K. seems to be in the center of that hacking hurricane."
One of the world's largest retailers is testing GuardedID for internal use, with potential deployment to its client base of up to 7 million users, according to Mike Lazenby, CEO of CDISGroup. CDIS performs both cloud-based and on-premise authentication services for its clients.
I provide the information I find and offer links to such to backup info I provide, mixed with some graphics, Fun, Videos and Music for those who may benefit and enjoy it.
I don't make stock predictions, that it will be a penny tomorrow, or this week or other such statements.
I work off of the information that I find and take the time to present it.
If you Want more information, You know the number to call.
I am invested and quite happy to await events happen in due time.
All in all, every Deal, every Product Sold, Every Lawsuit is
Yes that is why I sent you the information you were probably asking about and more.
Sorry Montez, I don't understand the question you are asking.
As this 2016?
I believe it's Morgan Stanley, they are a wealth Management Investment Banker.. JPM is Mutual Funds and Asset Management a different.
Morgan Stanley was formed by J.P. Morgan & Co. partners Henry S. Morgan(grandson of J.P. Morgan), Harold Stanley and others in 1935, in response to the Glass-Steagall Act that required the splitting of commercial and investment banking businesses. ... There is no special relationship between JPMorgan and Morgan Stanley.
If you listen to this Video Mark states Morgan Stanley at precisely at 2 Minutes and 47 secs in.
SFOR won Sally Mae over 8 other competitors.
Good Point Trader, Yes Production Installation, as in the Final Stage after Testing.
or it could mean installing it in a Production environment. As in thru with testing.
Remember the Words "Production Installation" ?
Why would SFOR use the Words Production Installation.
Unless their placing the System on Premise behind the Customers Firewall.
Hey I could be wrong ! I'm just trying to Crack the Code. LOL
But if otherwise, then SFOR would be doing it Remotely front within their Cloud Sevices.
SFOR Wars Watch the Movie and Find Out
You have to fight Singer Dragon Breath with SFOR Dragon Fire Power.
A Buyout by Singtel a very good possibility.
Created due to 4sleddogs comments on SingTel, Mrs Woong and the Single Dragon Circling the Court House.
SFOR Wars
4sleddogs - Within a Companies FIREWALL, I'll send you the Link to the info to the Statement from StrikeForces comments about that on ProtectID.
Its due to Ram’s strong background in telephony where he knew how to make that work, this is a big edge over their competitors.
If you were let's say Large Fortune 100 Bank wouldn't you rather be able to have a System such as ProtectID within your Firewall where you have some control over your Cyber Security Authorization System, or would you feel more secure with it out there somewhere in the ether on WWW ( Wild Wild Web )
When a song fits, it just fits. SFOR
You get no where replying like that to another Long.
Read my reply to ZPaul.
I understand the Concept if ProtectID, and once implemented if all the Systems Administrators or other Employees with High Level access to the System of the Bank or Institution follow protocol, a HACKER cannot gain access into the system.
The Risk to any System is the Human Factor.
Unless there is a vulnerable flaw in the Hardware or Software that a Hacker can exploite.
If you want absolutely no chance a Hacker can get in, Don't tie the System to the Internet. Which is not possible when you have Customers.
There is still the possibility of the Human Factor ala SNOWDEN.
The Highly Classified System we used for Range Safety for Launching Rockets with of DOD PAYLOADS was not tied to the Internet, But the the USAF wanted to allow People from other Parts of the Country to be able to Login and make decisions on wheather to Launch or not from Thousands of Miles away from the Cape. LOL.
"Oh were are going to put in an Air Gap Firewall" with their Chest Out like a Proud Strutting Rooster when saying it.
I said let me know when your completed, and I'll have the 17 year old kid down the street hack in.
Millions of Dollars later, after testing and it Failed. Then more Millions of Contracting Dollars and 3 years wasted. It Failed and was still Vulnerable.
Suggest anyone Read the The Cuckoo's Egg: You don't have to be a Techy to understand it.
A book wriiten in 1989 about Tracking a Spy Through the Maze of Computer Espionage. It was written by Clifford Stoll. It is his first-person account of the hunt for a computer hacker who broke into a computer at the Lawrence Berkeley National Laboratory (LBNL). A story that happened in 1986 on the ARPANET, predecessor to the World Wide Web. He was a professor of who lost his Professorship at Berkley, and was forced in to the Basement with the guys that were in charge of Billing for Customers who had Access to ARPANET.
There was also a TV movie made from the Book in 1990 called The KGB, the Computer and Me.
JPAUL -
Ask Mark Kay. On a Brand New System with PROTECTID installed and there was just one System Administrator (Just one person) that accessed the System and followed Proper System Protocal. No one Could Hack in, as long as the we're no holes in the System Hardware that a Hacker could Exploit. I would welcome hearing his reply.
I've Read the White Papers before. As with most White Papers the don't go into System Details.
One of the Areas no one has yet to be able to Duplicate that StrikeForce can do, is Implemente a System like ProtectID behind a Customers FireWall. This is not Patented, but no one has of yet to figure it out.
Hopefully this is one of the New StrikeForce Patents, if it can in fact even be Patented it may be to generic a process to Patent.
At this point, I just know they are the only ones who know how to do it.
I welcome any Feedback from you public or Private.
49'er
Just keep pounding away at those Algorithms and keep those Patents Coming Ram.
(Side Note: I remember one 45th Space Wing Commander who thought he knew more than Range Safety and Said to Launch, while Range Safety said NoGo because of the Potential for Lighting. Lighting hit the Rocket while Launching and a Few hundred Million Dollar Satellite not including the Rocket was Lost) Your Tax Dollars up in Smoke
Major Hack Attacks of 2016 - Lawsuits Rising
FACC
January 25, 2016: FACC, an Austrian-based aerospace parts manufacturer (with clients like Airbus and Boeing), announced they fell victim to hackers in January 2016. The criminals, however, seemed to ignore the company’s data and intellectual property, opting to instead steal approximately €50 million — which is equivalent to about $54.5 million U.S. dollars. FACC says that while they are investigating the extent of the damage and how it happened, their normal operations have not been affected.
University of Central Florida
February 8, 2016: At the beginning of February 2016, the University of Central Florida announced a data breach that affected approximately 63,000 current and former students, faculty, and staff. The breach was discovered in January, but before making the incident public, the university reported it to law enforcement and conducted an internal investigation. Unknown cyber criminals compromised the university’s computer system and stole a variety of information including Social Security numbers, first and last names, and student/employee ID numbers.
U.S. Department of Justice
February 9, 2016: Hackers angry about U.S. relations with Israel tried to call attention to their cause in February 2016 by breaching the U.S. Department of Justice’s database. CNN reported the hackers released data on 10,000 Department of Homeland Security employees one day, and then released data on 20,000 FBI employees the next day. Information stolen included names, titles, phone numbers, and e-mail addresses; the Department of Justice does not believe that any sensitive information, like Social Security numbers, was obtained. Tweeting from the account @DotGovs, the hackers said it took one week for the Department of Justice to realize that their systems had been compromised.
Internal Revenue Service
February 29, 2016: The Internal Revenue Service (IRS) announced that the data breach they uncovered in May 2015 was much larger than initially believed. In May, the IRS said over 100,000 American taxpayers had their personal information compromised when the agency’s “Get Transcript” system was hacked. However, in February 2016, those numbers have been increased to over 700,000. The IRS thinks a sophisticated Russia-based criminal operation is responsible for the data breach and that identities were stolen to file fraudulent tax returns in the future.
UC Berkeley
February 29, 2016: The financial data of more than 80,000 University of California, Berkeley students, alumni, employees, and school officials was compromised around December 2015 and announced to the public in February 2016. The school says that although it was clear their system was hacked, it does not appear that any information was stolen. Those who may have been affected were notified and encouraged to keep an eye on their personal information.
Snapchat
March 3, 2016: 700 current and former Snapchat employees had their personal information stolen when hackers used a phishing scam to trick an employee into e-mailing them the private data. Posing as Snapchat chief executive Evan Spiegel, the attackers simply requested — and received — sensitive employee information including names, Social Security numbers, and wage/payroll data. It is presently unclear who is responsible for the attack or how they may use the information they stole.
21st Century Oncology
March 10, 2016: 21st Century Oncology, a Fort Myers-based company offering cancer care services, revealed in a statement on their website that 2.2 million patients may have had personal information stolen when the company’s system was breached in October 2015. The breach was discovered in November 2015, but the FBI discouraged the company from making a public announcement until March, as the investigation was ongoing. Though there is no evidence that the data has been used in any way, hackers did have access to patient names, Social Security numbers, doctor names, diagnosis and treatment information, and insurance information.
Premier Healthcare
March 10, 2016: A data breach was reported by Premier Healthcare, a multispecialty provider healthcare group, after a laptop computer was stolen from the billing department of their Bloomington, Indiana headquarters. The laptop was protected by a password, but it was not encrypted and contained sensitive data pertaining to more than 200,000 patients. Most victims affected had their names, dates of birth, and other basic information compromised, but Premier Healthcare says that 1,769 individuals may have had their Social Security numbers or financial information taken as well.
Verizon Enterprise Solutions
March 25, 2016: Verizon Enterprise Solutions, a division of Verizon known for providing IT services and data breach assistance to businesses and government agencies around the world, was hit by hackers who stole the information of about 1.5 million customers. The data was found for sale in an underground cybercrime forum by cybersecurity journalist Brian Krebs. Verizon acknowledged the breach, saying that they’ve found the security flaw, and are working to contact affected customers.
Systema Software
March 28, 2016: A data breach at California-based Systema Software was not the result of hackers, but an internal error during a system upgrade in which data storage was set up improperly and made publicly available on the Internet. Chris Vickery, a white-hat hacker, found the information online and reported it to the proper authorities — by that point, customer information had been exposed for 75 days. Affected customers include the Kansas State Self Insurance Fund, the CSAC Express Insurance Authority, American All-Risk Loss Administrators/Risico, Millers Mutual Group, Crosswalk Claims Management, and Salt Lake County. Currently, it is not believed that any of the personal information has been used illegally.
Tidewater Community College
March 28, 2016: Current and former employees of Tidewater Community College (TCC) in Norfolk, Virginia had their personal information stolen in a tax season phishing scam. An employee in the school’s finance department received a request from a fake TCC e-mail address asking for all employee W-2 information. The individual, not realizing the e-mail was fake, responded with sensitive information including names, earnings, and Social Security numbers. TCC’s spokesperson has said that at least 16 TCC employees have reported false tax returns filed under their Social Security numbers.
MedStar Health Inc.
March 30, 2016: The FBI is investigating a computer virus that paralyzed MedStar Health-operated hospitals in Maryland and Washington. Officials are trying to determine whether the virus was ransomware, which holds a company’s systems “hostage” until a specific dollar amount is paid. It is not immediately clear whether any patient information was stolen, but with the popularity of medical identity theft among hackers, it is certainly possible that personal data was compromised.
Philippine Commission on Elections
April 11, 2016: A breach of the database for the Philippe Commission on Elections (COMELEC) prompted Infosecurity Magazine to say it “could rank as the worst government data breach anywhere.” It is believed that the personal information of every single voter in the Philippines — approximately 55 million people — was compromised on March 27, 2016 by Anonymous; LulzSec Pilipinas published the database online a few days later and those private details are now available online for anyone to steal and engage in all different types of identity theft. Anonymous’ actions were allegedly an effort to push COMELEC to turn on security features in the vote counting machines before the national elections on May 9.
Multiple Major E-mail Providers
May 5, 2016: Milwaukee-based Hold Security discovered more than 270 million e-mail usernames and passwords being given away for free in the Russian criminal underground. It is unknown how all of the accounts were stolen, but Hold counted about 57 million Mail.ru accounts, 40 million Yahoo accounts, 33 million Hotmail accounts, and 24 million Gmail addresses. There were also hundreds of thousands of German and Chinese email providers, along with username/password combinations that seem to belong to employees of major banking, manufacturing, and retail companies.
Wendy’s
May 11, 2016: In January 2016, Wendy’s began investigating a potential data breach after receiving reports of unusual activity involving payment cards at some of their restaurant locations. The details of that investigation became public in May, as the fast food chain revealed that less than 5 percent of its restaurants were affected. The company believes that malware infiltrated one particular point of sale system at fewer than 300 of approximately 5,500 franchised North America Wendy’s restaurants, starting in the fall of 2015. Security expert Brian Krebs said many bank and credit unions “have been grumbling about the extent and duration of the breach” and that it seems some breached Wendy’s locations were still leaking customer card data as late as the end of March 2016 into early April.
June 16, 2016 Update: In June 2016, Wendy’s announced that their data breach was worse than they originally thought. The company did not provide much additional information — only that “additional malicious cyber activity has recently been discovered in some franchise-operated restaurants.” They said that they disabled the newly discovered malware, but that “the number of franchise restaurants impacted by these cybersecurity attacks is now expected to be considerably higher than the 300 restaurants already implicated.” Wendy’s is continuing to work with security experts and federal law enforcement who are investigating the breach. Customers with questions can call 888-846-9467 or email PaymentCardUpdate@wendys.com
LinkedIn
May 17, 2016: A 2012 data breach came back to haunt LinkedIn when 117 million email and password combinations stolen by hackers four years ago popped up online. At the time the breach occurred, members who had been affected were told to reset their passwords. That information then became publicly available in May 2016. LinkedIn acted quickly to invalidate passwords of all LinkedIn accounts that were created prior to the 2012 breach and had not undergone a reset since the breach. It is not clear who stole the information or published it online, but LinkedIn is actively working with law enforcement officials.
Newkirk Products
August 12, 2016: In August 2016, Newkirk Products, a service provider that issues healthcare ID cards, announced a data breach that may have affected up to 3.3 million people. Unknown hackers were able to gain access to a server that contained sensitive member information, including names, mailing addresses, dates of birth, and details about health insurance plans. At this time, it does not appear that any of the stolen information has been used maliciously.
Oracle
August 12, 2016: The company that owns the MICROS point-of-sale system, used in more than 330,000 cash registers around the world, became the victim of a data breach, which was announced to the public in August of 2016. At the time the breach was uncovered by security expert Brian Krebs, it was unclear as to the size and scope; Krebs did say that a large Russian cybercrime group was likely to blame and that they had placed malware on company computers and on the MICROS customer support portal to steal usernames and passwords. Many experts also believe the hackers were probably able to plant malware in the MICROS point-of-sale systems and that they could be responsible for major data breaches at retailers around the country.
Dropbox
September 2, 2016: The popular file-hosting service was forced to confront a data breach from four years ago that affected more users than originally believed. In 2012, Dropbox helped a small amount of users secure their accounts after some usernames were stolen. At the end of August 2016, however, it was revealed that more than 68 million Dropbox users had their usernames and passwords compromised in that initial breach. It does not look like the accounts have been illegally accessed at this time, and all Dropbox users who have not reset their passwords since 2012 have been prompted by the company to do so.
Yahoo!
September 22, 2016: In what may be the most expansive data breach of all time, Yahoo announced that a hacker had stolen information from a minimum of 500 million accounts in late 2014. The thief, believed to be working on behalf of a foreign government, stole e-mail addresses, passwords, full user names, dates of birth, telephone numbers, and in some cases, security questions and answers. At the time of the breach announcement, Yahoo was still working with law enforcement and the FBI on an investigation.
Weebly
October 20, 2016: Over 43 million Weebly users were notified about a data breach that happened in February, but was just discovered in October. Stolen data included usernames, passwords, e-mail addresses, and IP information, but Weebly does not believe any type of financial information was stolen because it does not store full credit card numbers on its servers. Hackers were not able to log directly into customer websites because passwords were protected by bcrypt hashing.
National Payment Corporation of India
October 20, 2016: The National Payment Corporation of India (NPCI) was notified by international banks, primarily in the U.S. and China, that some of its customers’ debit cards were being used illegally. Experts believe the breach began with a malware attack that originated at an ATM. The NPCI said that 32 lakh debit cards across 19 Indian banks were compromised, but customers were contacted to change the debit card PINs and customers they couldn’t reach had their cards canceled and were issued new ones.
Cisco
November 3, 2016: An incorrect security setting on the mobile version of Cisco’s “Professional Careers” website created a privacy hole that exposed the personal information of job-seekers. Discovered by an independent researcher, the security vulnerability made sensitive data available between August and September 2015, and again from July to August 2016. That data included names, addresses, e-mails, phone numbers, usernames, passwords, answers to security questions, resumes, cover letters, and voluntary information such as gender, race, veteran status, and disability.
At this time, there is no evidence that any other parties accessed the job-seekers’ information, other than the independent researcher. Cisco did say, however, that “there was an instance of unexplained, anomalous connection to the server during that time, so we are taking precautionary steps.” Those steps include alerting all Cisco job-seekers to the breach, requiring all users to reset their passwords, and offering to put 90-day fraud alerts on accounts for interested users.
AdultFriendFinder.com
November 13, 2016: AdultFriendFinder, an X-rated website, was targeted by hackers for the second time in two years. This time, though, the amount of accounts compromised was immense — approximately 412 million users had personal information stolen and published in online criminal marketplaces. The breached data included e-mail addresses, passwords, VIP member status, browser info, last IP address to log in, and purchases. LeakedSource is responsible for finding and reporting the breach to the public; AdultFriendFinder has only admitted to finding a vulnerability and has not confirmed the attack yet.
San Francisco Municipal Transportation Agency
November 25, 2016: San Francisco’s public railway system, known as Muni, was infected with malware over the Thanksgiving weekend; this resulted in locked kiosks and computers and two days of free rides for passengers until the system went back online on Sunday, November 27. Fortune reached out to the hackers, who said the attack was not targeted — it was an automated attack, also known as a “spray and pray.” In this type of attack, an automated system sends links to malware out to many prospective victims; an IT admin at the transportation agency allegedly clicked on the link and unknowingly downloaded the malware files.
The hackers claim to have 30GB of stolen data, which includes the personal information of employees and riders. They want the agency to fix its vulnerable systems and pay a ransom of 100 Bitcoins, or about $73,000 — if their demands aren’t met, they say they will release all of the personal information. The agency’s systems are back online, but as of now, it does not appear that they have paid the hackers.
Class-action cyber attack lawsuit against Banner Health may be the first of many
Lawsuits against government over hack are adding up
Yahoo Hack Attack Lawsuits Starting to Pile Up
Sony Hack Class Action Settlement Gets Final Approval
Bangladesh Bank weighs lawsuit against NY Fed over hack
Class action suit brought against Excellus over hack
Hacker puts up 167 Million LinkedIn Passwords for Sale
T-Mobile, Experian Sued Over Data Hack Affecting 15 Million
Now It’s Three: Ecuador Bank Hacked via Swift
Obviously you did not see ZPAULS Post with information as to why Patent Infringement Cases are Consolidated and the practical outcome of Joiner Cases.
The cases could settle at anytime unless we here the preceding will move on to a Markman hearing or Jury trial in which case they may drag on for another 6 months to a couple of years.
To put the following Words into Context, read the post and links associated.
Often, the practical result of joinder was that many defendants chose to <<<simply settle>>> at the nuisance value of the lawsuit rather than seek adjudication on the merits
Go back and listen to Miller's rant.
Thumbs Up !
maronti1 No one said they are using it illegally.
You were replying to my Bank Post.
The Waller Statement was "We Have" as in SFOR or its OEM Partners.
Waller made no statement about anyone using our technology in the entire 43 minute interview.
Call George and ask before making Statements on things not said.
And above ALL, WE DON'T NOT HAVE CUSTOMERS IN COURT
they using it illigaly
have you missed the list of customers from our 3 in court?
I am sure you did..haha
Surfkast - LIST OF BANKS USING SFOR PRODUCTS. LINK TO BANKS USING SFOR PRODUCTS?
I Have only listed the reference to My Statement a dozen times beginning in October And I Quote
And to you and both NCAR who wants names of banks ???
It's a figgin Security Product are you guys Hackers who want to pick the Lock ?
_________________________________________________________________
Roy: Are there any major companies that have purchased your technology, that are using it that you can mention?
George: Most of them, since it is a security product, most of our customers are all under contract that we can’t mention them because one of the strategies of any sound security professional is never tell the people what you’re using.
It’s hard enough to keep the bad guys out but when you tell them what you’re using you’re kind of focusing in on saying, ‘Here’s the lock. I dare you to pick it.’ I can tell you this, we have Fortune banks using it.
We have major healthcare institutions using it, we have universities using it, we have government agencies using it, we have SMBs and mid-size organizations. We’ve got one of the largest silicone chip manufacturers in the mobile space using it.
We have a lot of people using it around the world, using our technology to protect themselves.
Roy: Are there any names you can mention?
George: I’d honestly have to look into see, because I can’t divulge anyone’s name without approval.
Roy: When you say Fortune, you’re saying Fortune 100 companies.
George: No. I’m talking about we have Fortune 10, Fortune 50, Fortune 100. We have banks within all of those.
For this 43 Minute Long and Enlightening Interview with Clients, history, charges for Products and Sevices, here is the Link
Link is near the Bottom of this MidnightShift Post
The SFOR MidnightShift is just producing a Cauldron of information to help relieve the Mis-Information and bring Old but New information to light, to Help Brake the Fever of unknown Knowledge and inform the masses of info not known. Based on FACTS, when not prceed by IMO.
The MidnightShift VAT of Gurgle and Brew. Go Ahead Take a Sip, it won't Kill you.
Way To Go 4sleddogs and ZPaul Thank You
NCAR - BANKS are Using SFOR Patented Technology.
Not that I agree with the first part of your statement either, but
Putting it on the shelf in stores is not going to sell this product. You have to advertise it to companies. The average consumer doesn't care about it. They rely on the company they are purchasing from or doing business with to provide the security. Like their bank or online retailer.
EsterProbverbs31 - Sorry Again your WRONG - Licensing
Again I'm Growing very tired of correcting you over and over and over again ! It's becoming a Full Time Job.
Just trying in vein to keep the FACTS Straight from Misleading Posters, who can't seem to do Research before posting!
______________________
According to there qz they dont have any type of licensing agreement what so ever with msft. They are raking in cash by the billions while we just sit back with our 183 thousand dollar revenue. Unreal.
EsterProbverbs31- That would be a Fluff PR.
Putting out a PR about a Product being a Best Seller on Amazon ?
This would just be a Fluff PR. If you have noticed StrikeForce does not put out Fluff PR's. Instead and they announce the Amazon Best Seller on their Twitter. Whish is the correct way to announce things such as that. As a shareholder, I would think you would be Following their Tweets.
The Target announcement was a New Distributor DEAL. Big News...
When releasing a PR there is no guarantee it will be published, they have to be approved by an Editor. Editors at press release distribution services, newspapers, and online news websites are stringent. These Editors are all fervent studiers of the English language, AP style, tone, and prose. They don’t see any wiggle room in proper grammar or adherence to style; they see only black and white with no spatial gray area in between.
Twitter Post
Well I had no clue about this. This is great. Why was there no pr about this. He put out a pr about target stores. This actually great to here. Thx.