• 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:29

    The Underbelly of the Financial World

    in Finance

    We all know that there are dangerous financial waters we need to avoid.  Today we'll talk about the worst of the worst, the "Underbelly of the Financial World."  I'll explain why you need to avoid payday lenders like the plague, think twice about title pawning, run away from debt consolidation, and save your money instead of wasting it on lottery tickets.  I'll also share my own (stupid) experiences with all of them!

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • 00:32

    Money Insight ~ Building Financial Security with Eileen Hawe

    in Finance

    MONEY INSIGHT ~ BUILDING FINANCIAL SECURITY with EILEEN HAWE


    Ms. Hawe holds a BA in Communications and a Master's in Education, she is licensed for both Life and Health Insurance in NY and CT and has given workshops and seminars at various organizations and national women’s groups. Her first ten years were spent with two major brokerage firms, Merrill Lynch and Dean Witter Reynolds (now Morgan Stanley).


    On the show we will discuss how Ms. Hawe can help you to get your financial house in order regardless of your personal state of affairs and especially if you find yourself facing life changing circumstances.

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:30

    The Security Juggernaut Of All - NEC Corporation of America

    in Technology

    In today's radio show, we have the privilige and honor to be interviewing one of the top executives of one of the largest IT and Security businesses in the world - Mr. Raffie Beroukhim, Vice President of the Biometrics division of NEC Corporation of America.  This garganutan business has collectively, more than 200 Biometric application deployments across 30 nations.  In this interview, we probe deeper into the Biometrics product line of NEC, which include the following:


    *Case Management;


    *Fingerprint Recognition;


    *Facial Recognition;


    *Mobile Solutions;


    *Large Scale Law Enforcement Applications.


    We will learn more from Mr. Beroukhim what makes NEC Corporation of America different from all of the other Biometric Vendors, and how they plan to keep up that strategic and competitive edge in the marketplace.

  • 00:40

    Now That He's Gone - Financial Security for Women with Brown and Freeman

    in Women

    Today, we'll be talking about Social Security - Myths and Concerns


    ABOUT PLAID FOR WOMEN:


    Plaid for Women radio is produced to give you information, advice and resources to be YOUR wise advisor. Our goal is to help you achieve your goals, gain influence, and be heard. 


    Every show, we are committed to bringing you new ideas and offering new ways of thinking to give you opportunities to change your thinking and change your life. You CAN live the life you've imagined!


    LET’S GET SOCIAL!


    FB: http://www.Facebook.com/PlaidforWomen 


    TW: http://www.twitter.com/plaidforwomen


    CONTACT INFO FOR TODAY'S GUEST:


     


    OUTTRO MUSIC BY JACK T. BLUES

  • 00:37

    Does Sony Corporation Have You Scared? Our Interview With Brian Pearce

    in Technology

    Do the recent events at Sony Corporation have you startled and scared for your own business?  You are right in thinking that way.  Cyber threats and risks are very real these days, and they can happen at any time, without any notice.  No matter how much you, as a business owner try to stay ahead, the cyber hackers are always one step ahead.  How can one win this so called 'Cat and Mouse Game'?  Well, it could very well be possible with the network security solutions offered by Beyond Security.  Their current product line includes:


    1) Network Security Testing;


    2) Software Security Testing;


    3) Web Application Security Scanning.


    We interview Mr. Brian Pearson, the CMO and COO of Beyond Security.  Also, we get his insight into the Sony Corporation debacle.


     

Results Per Page: 12 | 24 | 48
Loading...
Loading...