Social Icons

Thursday, January 30, 2014

Dyman & Associates Risk Management Projects: US brings fraud charges against background check company

View Source

The Justice Department filed a civil complaint Wednesday against the company that handled the background checks of National Security Agency leaker Edward Snowden and Navy Yard shooter Aaron Alexis for allegedly submitting thousands of unfinished investigations as complete, and then attempting to conceal their actions after government officials caught wind of what they were doing.

At least 665,000 investigations – or 40 percent of cases submitted to the government over a four-year period – were affected by U.S. Investigations Services’ (USIS) actions, the Justice Department said. The alleged fraud continued through at least September 2012.

The complaint said that USIS engaged in a practice known inside the company as "dumping" or "flushing." It involved releasing incomplete background checks to the government but claiming they were complete in order to increase revenue and profit. The company did so knowing that there could potentially be quality issues associated with those reports, the government alleged.

USIS was involved in a background investigation of Snowden in 2011, but his particular job doesn't factor into the lawsuit. The government has contracted USIS since 1996 to vet individuals seeking employment with federal agencies.

[Are you getting the most out of your security data? See Dyman & Associates Risk Management Projects on Patch for techniques and security trends.]

The Falls Church, Va.-based company conducts hundreds of thousands of background checks for government employees and has more than 100 contracts with federal agencies.

In response to the complaint, USIS officials said that integrity and excellence are core values at USIS, which has 6,000 employees.

The government paid the company $11.7 million in performance awards for the years 2008, 2009 and 2010, according to the Justice Department court filing.

USIS senior management "was fully aware of and, in fact, directed the dumping practices," the government complaint said. Beginning in March 2008, USIS' president and CEO established revenue goals for the company. USIS's chief financial officer determined how many cases needed to be reviewed or dumped to meet those goals, the complaint added, and conveyed those numbers to other company leaders.

According to one internal company document, a USIS employee said, "They will dump cases when word comes from above,” such as from the president of the investigative service division and the president and CEO.

The background investigations that were dumped spanned most government agencies – including the Justice Department, the Department of Homeland Security, the Defense Department, the Defense Intelligence Agency, the Department of Health and Human Services, the Transportation Department and the Treasury Department.

In one example, the federal Office of Personnel Management (OPM) in April 2011 had raised concerns with USIS after tests showed that a large number of investigation reports were identified as complete when computer metadata revealed that the reports had never been opened by a reviewer. In a response to OPM, USIS falsely attributed the problems to a variety of software issues, said the Justice Department filing.

In addition, USIS ensured that all dumping practices stopped when OPM was on site conducting audits – and then resumed after OPM's auditors were gone, the government alleged.

"Most of the September miss should `flush' in October," an email from USIS's chief financial officer said to the vice president of the investigative service division.

For more details visit our website.

Wednesday, January 29, 2014

Dyman & Associates Risk Management Projects: VMware Buys Mobile Security Firm for $1.54 Billion

Looking to shift its software offerings, VMware has struck a $1.54 billion deal to bolster its mobile technology.

VMware said on Wednesday that it had agreed to buy AirWatch, a start-up based in Atlanta that makes mobile management and security software for businesses. VMware is paying about $1.18 billion in cash and $365 million in installment payments and assumed unvested equity.

The acquisition will be financed in part with about $1 billion of debt to be provided by EMC, the majority owner of VMware. The deal, subject to regulatory approval, has been approved by the boards of VMware and AirWatch and is expected to close by the end of March.

The announcement came as VMware, based in Palo Alto, Calif., released its preliminary results for the fourth quarter, saying it expected revenue of $1.48 billion, 15 percent higher than in the period a year earlier. VMware’s stock was up nearly 3 percent in trading before the market opened on Wednesday.

[Are you getting the most out of your security data? See Dyman & Associates Risk Management Projects Blogspot Page for techniques and security trends.]

The company’s deal for AirWatch is its latest move to redefine its product portfolio in response to a changed technology landscape.

“With this acquisition VMware will add a foundational element to our end-user computing portfolio that will enable our customers to turbocharge their mobile work force without compromising security,” Patrick P. Gelsinger, VMware’s chief executive, said in a statement.

With more companies allowing employees to use their own mobile devices, AirWatch makes software to manage mobile applications and data, including a security component. The company says it has more than 10,000 customers around the world and more than 1,600 employees.

VMware has been active as both a buyer and seller in recent years. In 2013, it completed a plan to sell assets as part of its broader shift in strategy.

“By joining a proven innovator like VMware, we now have an opportunity to bring our leading-edge solutions to an even broader set of customers and partners to help them optimize for the mobile-cloud world,” Alan Dabbiere, the co-founder and chairman of AirWatch, said in a statement.

The AirWatch team is expected to continue to report to the company’s chief executive, John Marshall, as part of VMware’s end-user computing group.

Morrison & Foerster provided legal advice to VMware.

For more software offerings, visit Dyman & Associates Risk Management Projects.

Sunday, January 26, 2014

Dyman & Associates Risk Management Projects: How To Get The Most Out Of Risk Management Spend

Even with most security budgets growing or at least staying flat for 2014, no organization ever has unlimited funds for protecting the business. That's where a solid risk management plan can be a lifesaver.

Dark Reading recently spoke with a number of security and risk management experts, who offered practical tips for getting the most out of risk management. They say smart risk management strategies can make it easier to direct security funds to protect what matters most to the business. Organizations that use them typically can base their spending decisions on actual risk factors for their businesses, rather than employing a shotgun strategy that chases after every threat under the sun. Here are a couple of ways to start making that happen.

Establish A Risk And Security Oversight Board
If an organization is going to get more for its IT risk management buck, then the first thing it has to remember is that security risk is only one facet of business risk. That is why it is important to engage with cross-functional teams, says Dwayne Melancon, chief technology officer for Tripwire, who explains doing so makes it easier to look at risk holistically.

Melancon says he has seen many customers establish "Risk and Security Oversight Boards" that are made up with leaders like the CFO, chief legal counsel, and other stakeholders from across the business.

"This board discusses, prioritizes, and champions actions and investments based on a risk registry developed through cross-functional debate and agreement," he says. "This approach ensures that the business ‘puts their money where their mouth is’ and helps align different parts of the business around the short list of risks that have the potential to cause most harm to the business."

Get A Second Opinion
Even if an oversight board may not be practical, getting a second opinion from the business as to where IT risk management should focus stands as a crucial way to set priorities.

"One way we've seen success with this is to engage with legal, finance, and PR instead of the IT executives," says J.J. Thompson, CEO and managing director for Rook Security. "They identify the real issues with simplicity and have not been brainwashed by the IT industry, who still struggles to realize what really matters to business."

For example, in one consulting engagement, Thompson says his CIO contact was caught up in focusing on standard ISO 27000x practices around SOC services Rook would offer his firm. But when his consultants talked to that firm's legal department, they were most concerned about how that SOC outsourcing would affect their largest defense contractor client. That was the No. 1 risk priority.

"The business was simply concerned about the highest area of risk: that which directly pertained to their largest client," Thompson says. "We shifted focus to the controls that directly reduced the risk of such a compromise occurring and tailored custom control monitoring that focused on creating a sensitive data map, and setting custom anomaly detection triggers when the sensitive data is accessed."

[Are you getting the most out of your security data? See Dyman & Associates Risk Management Projects blog updates for techniques and security trends.]

Map Risk To A Business Bloodline
What's the business bloodline for your company? In other words, what are the areas of the business for which security threats could truly disrupt the way in which the organization operates? This is exceedingly important to determine -- and one that second opinion should help deliver. Once you figure that out, start mapping technical elements to it in order to understand what kind of events could do the organization the most harm, says Amichai Shulman, chief technology officer for Imperva.

"For some companies, a POS system or its database full of credit cards may be its most valuable assets; for some it may be Social Security numbers and the personal information attached," he says.

"For a company that bases its livelihood on transactions and uptime, the loss of revenue or customer loyalty caused by a DDoS could be devastating."

Communicate Risk Visually
A big part of risk management is communicating identified risks both up to senior management and down to the security managers who will put practices in place to mitigate them. One of the most effective ways to do that is to make those results visual.

"Pursuing risk management purely within security can help you make better decisions, but it can't help you get the right level of funding unless you can show people outside what you're doing," says Mike Lloyd, chief technology officer for RedSeal Networks. "Helping executives outside to understand is hard. Doing this with formulae won't work -- you will need pictures."

For example, Rick Howard, chief security officer for Palo Alto Networks, says that any time he starts a proposal to the executive suite; he begins with a business heat map that shows the top 10 to 15 business risks to the company on a grid. Typically cyber-risk is in that top 15, which makes it easier to get the company to address those risks more fully.

"Once that is done, I like to build a risk heat map just for cyber," he says. "I take the one bullet on the business heat map and blow it up to show all of the cyber-risks that we track. Again, this is not technical -- it is an overview. We are not trying to show the 1,000 potential ways that an adversary can get into the network. We want to show the C-suite who the adversary is."

To read more about Risk Management Projects articles, visit our website.

Saturday, January 25, 2014

CyberSecurity Malaysia: Beware, your Cyberfling could turn into a Blackmail Scam, Dyman & Associates Risk Management Projects

KUALA LUMPUR: National cybersecurity specialist agency CyberSecurity Malaysia today alerted the public to the dangers of ‘cyber flirts’, saying it is linked to a rising trend in cyber blackmail scams.

Victims are targeted via social networking sites such as Facebook, Tagged and online video chat services such as Skype, with the perpetrators believed to be foreign nationals creating a scam hub in various locations including Malaysia. 

As the victims have thus far been mainly teenage boys and middle aged men, the culprits are suspected to be working with female accomplices.

An analysis of the 80 or so reported incidents thus far revealed the modus operandi of a typical cyber blackmail scam: The perpetrator would usually create a profile on a social networking site portraying him or herself as a beautiful Asian woman, where “she” would befriend and flirt with potential victims, and subsequently invite them to intimate video chats with her using Skype.

Unbeknownst to the victims however, “she” would then secretly record the victims during the video chats and blackmail them into remitting sums of money ranging from RM500 to RM5,000 via Western Union or a third party bank account. Failure to do so would result in the video footage being circulated on the Internet.

“Only four incidents of cyber blackmail scams were reported to our Cyber999 Help Centre in 2012, but by mid-2013 we saw an upward trend,” said Dr. Amirudin Abdul Wahab, chief executive officer of CyberSecurity Malaysia.

He added that by the end of 2013 that number had increased exponentially to 73 cases, leading CyberSecurity Malaysia to believe that there could be many more unreported incidents.

“Malaysians are advised to be extra careful and not to entertain online seductions from women whom they got to know only in social media, but have never really known in person,” stressed Dr. Amirudin.

What to do if you are a victim of such a scam:

· Stop communicating with the perpetrator. Ignore all calls, SMSes or messages from the perpetrator.
· Remove the perpetrator from all your social media friends or contact lists, or add her to your list of ‘blocked’ contacts.

· Make all your social networking accounts private so the perpetrator will not be able to reach you or your friends.

· Keep all relevant data such as chat logs, screenshots, and e-mail messages as evidence for reporting and prosecution purposes.

· Never pay the scammers as it may further propagate the scam.

· Lodge a police report at a nearby police station together with evidence for further investigations.

· Report the incident(s) to CyberSecurity Malaysia’s Cyber999 Help Centre for further assistance, either by sending an e-mail to or by calling 1-300-88-2999 (monitored during business hours). In case of an emergency outside regular working hours, send a text message to 019-266 5850.

CyberSecurity also added general words of advice to Internet users:

· Be aware that anything you do on the Internet, including video and voice calls, can be recorded and manipulated for malicious purposes.

· Adhere to best practices, and religious or social ethics, when on social networking sites and online chat forums.

· Be very cautious who you befriend, and do not feel obligated to fulfill all requests from other users while online.

· Be alert and suspicious of unusual activities on the Net and immediately report it to relevant authorities.

· As a preventive measure, configure your Skype account to restrict communications with only your existing contact list by doing the following: Go to > Tools > Options > Privacy > Only Allow IMs, Calls etc from People on my Contact List > SAVE.

· Always make sure your software and systems are up-to-date, and that you are using up-to-date security software.

· Never use your webcam to video call someone you do not know.

Thursday, January 23, 2014

Dallas Firm iSight Vaults to National Attention with Cyber Scam Report, Dyman & Associates Risk Management Projects

Target shoppers won't be the only ones who have had their personal information breached, says John Watters of iSight Partners.

In business, when a customer of a company becomes an investor in the company, that’s a strong endorsement.

An even stronger endorsement might be when a company emerges as an ally of the U.S. Secret Service and the Department of Homeland Security in the effort to track cyber scammers who stole the personal information of tens of millions of credit and debit card customers.

Both are true for iSight Partners, a global cyber intelligence firm started here in 2006 by Dallas native John Watters.

“That’s two signs of credibility,” Watters said in an interview Friday, a day after iSight issued a joint publication with federal agencies that said the security breach during the holiday shopping season was part of a sophisticated cyber scam that affected several retailers.

Last year, iSight received funding from Blackstone, the giant investment firm. During the previous year, Blackstone had been a customer, relying on iSight to better understand the cyber threats it faced.

With iSight’s new report, Watters and his company vaulted to national attention.
He said his Friday was packed with news interviews. And he warned that the fallout from this round of cyber-attacks is probably not over.

“There’s likely a heck of a lot of victims out there who don’t yet know they are victims,” Watters said.

“This is going to unfold over days, weeks and months.”

He said iSight couldn’t mention specific names of retailers involved. News reports have indicated at least two, Target and Neiman Marcus.
Watters said that while the origin of the malware source code used was Russian, iSight and federal authorities do not know where the attacks originated. “It’s like buying a gun in Russia and selling it in Brazil,” he said.

He said his company detected the malicious software — dubbed Kaptoxa (Kar-toe-sha) — being sold around the world last summer. By now, it has potentially infected a large number of retail information systems, he said.

Watters, an entrepreneur, said that he started investing in cyber security firms in the early 2000s. He became chairman and CEO of Virginia-based I Defense, a security intelligence firm acquired by VeriSign for $40 million in 2005, according to reports then.

“I bought it for $10 out of bankruptcy in 2002,” Watters said of I Defense.

On its website, iSight says its network of security analyst’s numbers more than 200 in Washington, D.C., the Netherlands, Brazil, Ukraine, India and China. The company operates in 24 languages in 16 countries.

Using a sports analogy, Watters said his company creates playbooks to help organizations defend against potential adversaries in different circumstances. These plans provide specific information to counter discrete threats, such as the recent attacks on retailers’ point-of-sale systems.

“We give them the equivalent of an audible,” Watters said.

In an interview with ExecutiveBiz in 2010, Watters said his business “always tries to intersect the future rather [than] replicating the current.”

“It’s a risky way to roll, but way more fun,” he said


On its website, iSight advises retailers who believe their point-of-sale system has been compromised to immediately contact the local Secret Service/Electronic Crimes Task Force field office.

The company advises consumers to be vigilant but not worried:

Regularly check bank statements for fraudulent charges, monitor credit statements for unusual activity, and do not open email from unknown or suspicious sources.

If you receive an email from what appears to be your bank or financial institution, do not open the email or click on any links. Instead, contact your financial institution directly via phone or website to avoid any phishing scams.

Wednesday, January 22, 2014

Target Security Breach Appears to be Part of Broader Scam, Dyman & Associates Risk Management Projects

NEW YORK — The security breach that hit Target during the holiday season appears to have been part of a broader and highly sophisticated scam that potentially affected a large number of retailers, according to a report published by a global cyber intelligence firm that works with the U.S. Secret Service and the Department of Homeland Security.

The report, made public Thursday by iSight Partners of Dallas, offers more insight into the breach at Target. That attack affected 40 million credit and debit card accounts and led to the theft of personal information, including e-mail addresses and names, of as many as 70 million customers.

The report said a malicious program vacuuming personal data from terminals at store checkout stations was “almost certainly derived” from BlackPOS, a crude but effective piece of software that contained malware scripts with Russian origins.

“The use of malware to compromise payment information storage systems is not new,” the report said. “However, it is the first time we have seen this attack at this scale and sophistication.”

[Reuters reported that on Thursday the U.S. government provided merchants with information gleaned from its confidential investigation into the data breach at Target in a move aimed at identifying and thwarting similar attacks that may be ongoing. ISight helped prepare the report, called “Indicators for Network Defenders,” along with the Department of Homeland Security’s National Cybersecurity and Communications Integration Center, the U.S. Secret Service and the Financial Sector Information Sharing and Analysis Center, an industry security group.]

Starting in June, iSight said it noticed the malicious software codes on the black market, the report said.

Criminals bought the original malware on the black market and then created their own attack method to target retailers’ terminals at store checkout stations, iSight chief executive John P. Watters said.

“It’s less about the malware but more about the sophistication of the attacks,” Watters said in an interview.

The iSight report noted that because this kind of software can “cover its own tracks,” it’s not possible to determine the scale, scope and reach of the breach without detailed forensic analysis.

“Organizations may not know they are infected,” the report said. “Once infected, they may not be able to determine how much data has been lost.”

Last week, Neiman Marcus said thieves stole some of its customers’ payment information and made unauthorized charges over the holidays. At the time, it said it was working with the Secret Service on the breach.

Tuesday, January 7, 2014

Facebook users being the targets by the scammers with PlayStation 4 offers

 The unsuspecting and unwary Facebook users are being lured by cybercriminals with the promises of shiny gadgets. These scammers took advantage of the time when everyone is looking out for last minute deals ahead of Christmas. They are all over where they could defraud busy Christmas shoppers, they were jumping on the bandwagon and offering free gadgets and games on social networking sites in return for personal information.

Kaspersky Lab has seen scammers trying to interest Facebook users with pages on PlayStation 4 offers, and on new Apple iPhones and iPads during the lead up to this festive period and there were even pages about an iPhone 8, which doesn’t exist.

According to Kaspersky, despite the unofficial-looking posts, many are falling for them and lending credence to the scam campaigns. One supposed Christmas competition offering PlayStation 4 consoles had received over 776 shares.

Kaspersky risk management projects Lab notifies public that liking these false Facebook offers could leave them at risk of hacking and malware.

“Scammers use numerous techniques to get people to give away their Facebook logins. Clicking on an email link entitled ‘Facebook Christmas Specials’, for example, could open a fake Facebook portal in which users are required to enter their login details,” warned Kaspersky.

“As the interface appears identical to the real social media platform, users don’t realise what’s happening. Once the victims have entered their details, the hacker has their passwords. As most people tend to use the same password for services such as eBay, Amazon and webmail, this can trigger a dangerous chain reaction.”

Kaspersky said that social media users should never click links that don’t come from trusted parties. Even if a link has been posted from a friend they should still be wary, as that friend may have been hacked.

Monday, January 6, 2014

What is Bitcoin? The virtual currency built on math, hope and hype

Bitcoin is a currency forged through hardcore mathematics and buoyed by promises of financial liberation from banks.  Its climb has been very thrilling.

Many are embracing bitcoin as a viable means of exchange and a valuable investment and it is rapidly increasing.   Since it is free from meddling by central banks and what some view as untrustworthy financial systems.

Satoshi Nakamoto, a pseudonymous programmer, developed the Bitcoin system.  It was released a white paper in 2008 while in early 2009, the network launched uses peer-to-peer software to transfer bitcoins.

Bitcoin is a purely digital currency; basically a secret number that is transmitted from one party to another using public key cryptography.  The people running high-end computers that verify the transactions are called “miners”, they are awarded newly minted bitcoins for their efforts.

One reason why this so called bitcoin is so attractive is that its distance from the established financial system and lack of regulation.  Compare to those virtual currency projects that failed in the past years, bitcoin has so far defied predictions it would meet the same fate.

Bitcoin “seems to resonate quite deeply” with people who don’t trust banks, even if the rosy predictions of its potential are baseless in standard economic theory, said Dick Bryan, a professor with the Department of Political Economy at the University of Sydney.

No one can create an accurate economic model for Bitcoin, and everyone who thinks they can give an explanation is posturing,” Bryan said.

Bitcoin’s early supporters have been very happy since if you bought the virtual currency in early 2011 at US$1 each instead of a new pair of $600 snakeskin cowboy boots, you’d be up roughly $600,000, depending on fluctuating exchange rates.

According to the first report on Bitcoin released Dec. 5, Bank of America Merrill Lynch predicted a value of $1,300 per bitcoin if it becomes a force in e-commerce and money transfers.

It’s easy to be overwhelmed by the numbers.  And when proponents promote Bitcoin from a clever system for transferring value to a potential replacement for government-issued currency, it seems that it has no limit.

“Buy bitcoins now. Take 5 percent of your net worth, and put it into Bitcoin,” said Steve Kirsch[cq], CEO of OneID, a startup that provides encryption services to protect people’s data, at the Future of Money and Technology conference in San Francisco in early December.

“You won’t be sorry,” Kirsch said. “I think for the next few years, any time you buy bitcoins and hold onto them, and then sell it, you’ll make substantial amounts of money. You’ll be so happy.”

Bitcoin is sometimes being confused to a Ponzi scheme.  This is a type of scam where money from new investments is used to pay off a few early investors with the rest skimmed until the scheme goes bust.  But Bitcoin is clearly not a Ponzi scheme, the frenzied get-in-now enthusiasm of late belies the fact that it is a very new and immature software experiment.

Consequently, Bitcoin’s buzz is offset by suspicion, doubt and, occasionally, contempt.

“I’ve always had the view that Bitcoin is a very beta project,” said Evan Schmidt, who runs, a mocking blog. “It seems a lot of people are basically saying ‘Get some bitcoins, hold onto them forever and you’ll be rich’.”

He launched in mid-2011 after becoming fascinated by the community around Bitcoin — libertarians, scammers, developers, hackers, early-adopters — as well as its embrace by the Silk Road online drugs market.

“There were a lot of weird things that were going on,” Schmidt said.

Buttcoin immortalizes Bitcoin supporters at their most hyperbolic moments, with heavy doses of sarcasm. The blog gets more than 15,000 hits a month, said Schmidt, who said he’s fine with Bitcoin as a speculative play but doubtful of it as a currency.

Bitcoin could have a positive effect for e-commerce.  Similar to a cash deal, once a bitcoin is sent, the transaction can’t be reversed unless the receiver gives it back.   That’s good for merchants, who may end up responsible if someone uses another person’s credit card to pay for goods and the money is reclaimed in what’s known as a “chargeback.”

Moreover, consumers don’t have to submit personal information when sending bitcoins, reducing opportunities for identity theft.

For vendors of illegal goods, Bitcoin is close to perfect. “I think it is one of the best innovations coming from the modern computing era,” said a former Silk Road methamphetamine and heroin dealer, via instant message. The dealer, who confirmed his role in Silk Road, has a strong background in technology and said he’d place Bitcoin high on the list of the most important creations in the last few hundred years.

Saturday, January 4, 2014

Dyman Review: Park Associates, Bluetooth Smart Technology Connects Wearables to any Smartphone or Tablet

Watches, bracelets, gloves and hats, are currently being updated with Bluetooth wireless technology which allows them to collect data and send it back to a smartphone or tablet application. Bluetooth Smart is fast becoming the connectivity solution or wearable technology by appealing to consumers with both wearable sports and fitness trackers.

Bluetooth Smart, an intelligent and power-friendly version of Bluetooth wireless technology, is making wearables accessible for the mass market. The power-efficiency technology was created for devices needing to run off a small battery for an extended period of time and its applications is compatible with any smartphone or tablet. Bluetooth Smart also makes it easy for developers and OEMs to create solutions that will work with the billions of Bluetooth enabled products already in the market.

Friday, January 3, 2014

Dyman Review: Park Associates, Networked Medical Devices to exceed 14 million unit sales in 2018

Firm sees Health Data Gateway as Strategic Investment Focus for device makers, care providers

New digital health research from Parks Associates predicts U.S. unit sales of networked medical devices will exceed 14 million units by 2018, more than five times the sales from 2012. In the report Networked Medical Devices: Innovations & Business Models, analysts attribute multiple factors in driving this market, including an aging population and reforms spearheaded by the Affordable Care Act (ACA).

"The addressable market for networked medical devices includes 68 million Americans with hypertension and 26 million with diabetes," said Harry Wang, Director, Health & Mobile Product Research, Parks Associates. "Consumers are also demanding more autonomy in managing their care, which will drive the market in 2014 to improve patients' self-care experience. Network connectivity will enable new business models built on health software and services instead of hardware and consumable sales."

Parks Associates reports networked medical devices, including weight scales, glucometers, and ECGs, will use a variety of networking protocols, such as Wi-Fi, Bluetooth, and ANT+, to enable patient self-care and point-of-care diagnosis.The networking functions on these medical devices create the need to aggregate sensor, test, and behavioral data, so solutions such as Qualcomm Life’s 2Net platform, which aggregates device data and can transmit to the cloud, will become more important in 2014.

"The health data gateway market will garner substantial interest from both device makers and care providers,” Wang said. “Health data will be a hot commodity in this ACA era. Device makers and health data gateway providers, both incumbents and start-ups, will leverage these data to build new revenue opportunities and create new business partnerships."

Parks Associates analysts noted Alere’s acquisition of MedApps adds a cloud-based solution to the company's offerings. Omron Healthcare’s Bluetooth blood-pressure monitor is competing with smartphone-based WiThings’ solution, and Insulet’s OmniPod Insulin Pump will face challenges from San Diego-based Tandem Diabetes Care and U.K.-based CellNovo. In niche device categories such as pulse oximeter and sleep apnea test devices, innovations from incumbents such as Nonim, Masimo, and ResMed and start-ups such as iHealth Labs and NovaSom will broaden the use cases of these devices for both end users and care professionals.

Device categories analyzed in Networked Medical Devices: Innovations & Business Models include weight scale, blood-pressure monitor, glucometer, insulin pump, ECG, pulse oximeter, sleep apnea test, and home INR test.

About Parks Associates: Parks Associates is an internationally recognized market research and consulting company specializing in emerging consumer technology products and services. Founded in 1986, Parks Associates creates research capital for companies ranging from Fortune 500 to small start-ups through market reports, primary studies, consumer research, custom research, workshops, executive conferences, and annual service subscriptions.

The company's expertise includes digital media and platforms, entertainment and gaming, home networks, Internet and television services, digital health, mobile applications and services, support services, consumer apps, advanced advertising, consumer electronics, energy management, and home control systems and security.

Each year, Parks Associates hosts industry webcasts, the CONNECTIONS™ Conference Series, and Smart Energy Summit: Engaging the Consumer.

Thursday, January 2, 2014

Dyman Review: Parks Associates CEO honored at 2014 Legacy Awards

Tricia Parks, Chairman, Founder, and CEO of Parks Associates, was recently recognized by Women in CE as a 2014 Legacy Awards honoree. Other honorees include: Sandra Benedetto, director of product management for THX; Deena Ghazarian, vice president of global sales and strategy for Monster Products; Kathleen Thomas, vice president of domestic sales for AudioQuest; Deb Kassoff of CEA; and Nicole Yelland, director of marketing and communications for Livio.

The organization described this year’s honorees as CE leaders who are committed to innovation, growth, and continuous improvement within the industry.

The 2014 Legacy Awards will take place on January 7, during International CES.

Wednesday, January 1, 2014

Dyman Review: Park Associates, Company

Parks Associates is an internationally recognized market research and consulting company specializing in emerging consumer technology products and services. Since 1986, we have provided research and analysis to companies ranging from Fortune 500 to small start-ups through market reports, primary studies, consumer research, custom research, consultation, workshops, executive conferences, and annual service subscriptions.

Scope of Research

› Global markets
› Features and differentiation
› Innovations and disruptive technologies
› Market participants and company profiles
› SWOT analysis
› Customer preferences and purchase intentions
› Consumer behavior and usage habits
› Adoption and price sensitivity  
› Consumer segmentation
› Optimal bundles
› Channel dynamics
› Market trends
› Market sizing & forecasts
› Value chain analysis
› Branding

With each category, Parks Associates provides:

>Primary Consumer Research
>Industry and Competitive Analysis
>Focus Groups
>Forecasting and Distribution Analysis
>Strategic Seminars and Workshops
>Executive Conferences
>Custom Projects and Consulting


Parks Associates produces multiple events for industry executives throughout the year.  Our core industry events – CONNECTIONS™: The Digital Home Conference and Showcase – hosts over 500 industry executives each year. CONNECTIONS™ Europe examines digital living issues specific to the European continent, and CONNECTIONS™ Summit at CES reviews the year in digital product and services each year and looks ahead to the major consumer and industry trends.

Parks Associates also hosts research Webcasts every month.

Job Opportunities - We are hiring!

Parks Associates is currently hiring. If you are interested in an opportunity to work for a leading market research firm, please contact Elizabeth Parks today. 

>Research Intern
>Marketing Intern
>Research Analyst
>Research Director
>Marketing Associate
>Business Development Associate