• 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • 00:30

    The Security Juggernaut Of All - NEC Corporation of America

    in Technology

    In today's radio show, we have the privilige and honor to be interviewing one of the top executives of one of the largest IT and Security businesses in the world - Mr. Raffie Beroukhim, Vice President of the Biometrics division of NEC Corporation of America.  This garganutan business has collectively, more than 200 Biometric application deployments across 30 nations.  In this interview, we probe deeper into the Biometrics product line of NEC, which include the following:


    *Case Management;


    *Fingerprint Recognition;


    *Facial Recognition;


    *Mobile Solutions;


    *Large Scale Law Enforcement Applications.


    We will learn more from Mr. Beroukhim what makes NEC Corporation of America different from all of the other Biometric Vendors, and how they plan to keep up that strategic and competitive edge in the marketplace.

  • 00:35

    Protecting Your Online Business from Bad Guys with Device-based Intelligence

    in Technology

    In today's radio show, we step out of the world of Biometrics and into the much broader spectrum of Internet Security.  There is no doubt that today, online threats, risks, and hacks are fast becoming the norm.  Very often, online businesses become targets of sophisticated fraud rings and may not even know that they have been hit, or  become the victim of a cyber related crime, until it is too late.  At this point, the damage is done, and the brand reputation that took so long to build up can disappear in a flash.  What is an online business to do?  Obviously, keeping up with the latest in cybercrime is a full time task and businesses need a layered approach, including one that looks at the actual device being used to connect to the business (such as a mobile phone, tablet or computer).


    But, thanks to a revolutionary service called "ReputationManager 360" from Portland-based iovation, online businesses can now stay ahead of the bad guys.  How is this done?  Well, with iovation’s device reputation service, you can now find out the source of the cyber threat, and what device or group of devices, is causing the threat.


    Listen in to this radio show to find how you can finally protect your business from the bad guys!!!

  • 00:43

    How To Make Your E-Mail Transparent & Vaporize From The Bad Guys

    in Technology

    This is our third podcast now focusing upon Internet Security.  With our last two pocasts, we foused mostly on end to end Network Security, but in this interview, we take a different angle.  For instance, E-Mail Communications is at the crux of any network infrastructure.  When you compose and send a particular E-Mail message, how do you know it is not being intercepted by a malicious, third party, or that your intended recipient has even received that message?  Or, how do you know if the content of your E-Mail Message has not been compromised in any way?


    In today's radio show, we interview Mr. Mike Koclanes, Director of Sales at Vaporstream.  Their technology is very unique in the sense that E-Mail messages vaporize after reading with no data or meta data left on devices or servers. Messages cannot be printed, shared, stored or intercepted.


    Tune into our radio show and learn how to protect your E-Mail!!!

  • 00:33

    How To Protect Your Business From The Cyber Attacker With DeviceLock DLP Suite

    in Technology

    This is our second radio show in which we focus primarily upon Internet and Cyber Security.  A couple of weeks ago, we introduced you to another Cyber Security Vendor which can protect your business at the primary root of network connectivity.  But in today's radio show, we learn about yet another unique product called the 'DeviceLock DLP Suite'.  It is actually a suite of security applications which consist of:


    1) DeviceLock;


    2) NetworkLock;


    3) ContentLock;


    4) Discovery;


    5) Search Server.


    Learn more about about all of these security software applications, and learn how to use them to stay one step ahead of the Cyber Hacker!!!
     

  • 00:47

    The Understanding and Origin of Sacred Information

    in Education

    What is sacred information? Where does it come from? This podcast is a prequil of what is to come in the future of Sacred Information. Here is where we explain who we are and the journey we are about to embark on. 

  • 00:35

    WireLurker - Implications to Enterprise Mobile Security

    in Technology

    Earlier today a new form of malware was disclosed that is targeting iOS devices.  Our team found this particularly interesting as this highly sophisticated malware reportely can impact devices that are not jailbroken, it leverages rogue variants of popular applications and the malware uses code obfuscation to protect itself while taking advantage of mobile applications that are not obfuscated.


    We have quickly assembled a team of experts to talk about what we know about this new form of malware and the potential enterprise mobile security implications.

  • 00:31

    How To Make Your CyberSecurity Defenses The Best Ever

    in Technology

    In today's world, we all know that just about everything and anything based on Internet are prone to Cyber Security attacks and hacks.  Whether it be malware, spyware, trojan horses, botnets, etc. your corporate IT infrastructure is fair game to it all. But, implementing a security strategy to protect your small to medium sized business (SMB) is not only confusing to figure out, but it can also be costly as well.  But, this scenario could very well be changing now. 


    In today's radio show, we interview the CEO (Mr. Andrew Bagrin) of a brand new company called "My Digital Shield". His company has developed a new security solution which is very affordable to the SMB.  All that is required is some hardware, come cabling, and a quick download of their security solution.  All of the security monitoring is done in the Cloud - so you can stay focused on what you do best, which is running your business.


    Listen to our interview with Mr. Bagrin, and find out how you can fortify your lines of Cyber Security defenses further and deeper, with "My Digital Shield".

Results Per Page: 12 | 24 | 48
Loading...
Loading...