• 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • 00:08

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 01:00

    Don't Forget To Close That Backdoor In Your Software App Development Process!!!

    in Technology

    In the world of IT, security can often be a nebulous topic to be discussed about.  For example, where does security start and where does it end?  Does it even have an endpoint at all?  Many professionals would argue the point that you can fortify your servers, workstations, network connections, but what good is all of that if the actual software applications you create are not secure themselves?  Well, this is the focal point of today's podcast.  We examine the concept of security from the standpoint of implementing security in the source code itself.  After all, this is the heart of any software application.  If this is not fortified, this can be a major point for attackers and hackers to penetrate into, and from there exploit any other security vulnerabilities and weakensses in the business infrastructure.


    In today's radio show, we interview Ms. Claire Hunsaker, the VP of Marketing and Business Development at Stormpath.  We learn how their API software development products can lead to much more secure, and robust source code creation

  • 00:36

    Introducing The Natural Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the Natural Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • Introducing The National Security Alliance From France - Biometrics & Wireless

    in Technology

    In all of our previous radio shows, we have interviewed C-Level Execs, Sales Directors, and General Managers whom are responsible for the profitability of their own companies.  We never have had the chance to actually the interview the leadership team from an alliance, or a coalition comprised of various Security and Biometric Vendors brought together to for one sole purpose:  To pool resources and knowledge together to establish more secure network and authentication protocols for the wirless applications.  In this podcast, we have both the privilege and the honor the leadership team of the National Security Alliance, based out of France. 


    This organization has developed a much secure two factor authentication protocol, which also makes use of Biometrics. Found out more about all of this in the interview!!!

  • 00:32

    Is Your Cloud Infrastructure At Risk From Cyber Based Attacks? Find Out More!

    in Technology

    Up to this point, most of our podcasts on network security have been about learning how to protect the actual infrastructure of your business - both from the inside and the outside.  But, there is also another critical asset which is just as much at risk.  This is your 'Cloud based Infrastructure'.  In today's business world, many entities now outsource their entire IT system to the Cloud.  The benefits of it are very obvious, such as on demand software services, and low, predicatble costs.


    But, your Cloud Infrastructure is also prone to being the point of major Cyber based attacks and hacks.  In today's podcast, we interview Ms. Michele Borovac of HyTrust Corporation, and learn how a business owner can apply their security solutions in protecting your Cloud.

  • 00:30

    The Security Juggernaut Of All - NEC Corporation of America

    in Technology

    In today's radio show, we have the privilige and honor to be interviewing one of the top executives of one of the largest IT and Security businesses in the world - Mr. Raffie Beroukhim, Vice President of the Biometrics division of NEC Corporation of America.  This garganutan business has collectively, more than 200 Biometric application deployments across 30 nations.  In this interview, we probe deeper into the Biometrics product line of NEC, which include the following:


    *Case Management;


    *Fingerprint Recognition;


    *Facial Recognition;


    *Mobile Solutions;


    *Large Scale Law Enforcement Applications.


    We will learn more from Mr. Beroukhim what makes NEC Corporation of America different from all of the other Biometric Vendors, and how they plan to keep up that strategic and competitive edge in the marketplace.

  • 00:37

    Does Sony Corporation Have You Scared? Our Interview With Brian Pearce

    in Technology

    Do the recent events at Sony Corporation have you startled and scared for your own business?  You are right in thinking that way.  Cyber threats and risks are very real these days, and they can happen at any time, without any notice.  No matter how much you, as a business owner try to stay ahead, the cyber hackers are always one step ahead.  How can one win this so called 'Cat and Mouse Game'?  Well, it could very well be possible with the network security solutions offered by Beyond Security.  Their current product line includes:


    1) Network Security Testing;


    2) Software Security Testing;


    3) Web Application Security Scanning.


    We interview Mr. Brian Pearson, the CMO and COO of Beyond Security.  Also, we get his insight into the Sony Corporation debacle.


     

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • 00:35

    Protecting Your Online Business from Bad Guys with Device-based Intelligence

    in Technology

    In today's radio show, we step out of the world of Biometrics and into the much broader spectrum of Internet Security.  There is no doubt that today, online threats, risks, and hacks are fast becoming the norm.  Very often, online businesses become targets of sophisticated fraud rings and may not even know that they have been hit, or  become the victim of a cyber related crime, until it is too late.  At this point, the damage is done, and the brand reputation that took so long to build up can disappear in a flash.  What is an online business to do?  Obviously, keeping up with the latest in cybercrime is a full time task and businesses need a layered approach, including one that looks at the actual device being used to connect to the business (such as a mobile phone, tablet or computer).


    But, thanks to a revolutionary service called "ReputationManager 360" from Portland-based iovation, online businesses can now stay ahead of the bad guys.  How is this done?  Well, with iovation’s device reputation service, you can now find out the source of the cyber threat, and what device or group of devices, is causing the threat.


    Listen in to this radio show to find how you can finally protect your business from the bad guys!!!

Results Per Page: 12 | 24 | 48
Loading...
Loading...