• 00:16

    Mike Gregoire - Network Security Group

    in Entrepreneur

    Host Kevin Willett is joined by Michael Gregoire from Network Security Group to discuss their second annual Nashoba Valley Resort Network Security Summit. This is a great segment for any business owner concerned about IT Security.

  • 00:41

    Do The Thoughts Of Security Breaches Keep You Up At Night?

    in Technology

     


    Just in the last year alone, the world witnessed many unprecented, security breaches.  Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot.  Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'.  No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.


    One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie.  In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.


     

  • 00:41

    The Next Wave Of Security Technology - Unified Threat Management

    in Technology

    In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside.  In the past, business owners would be required to purchase and deploy security technologies in "piecmeal".  Meaning, only type of security technology served only specific purpose in safeguarding the business.  Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly.  Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach.  However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies.  In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems. 


    This company has come out with the "holistic" view to security for any sized business, which includes the following components:


    *Incident Reporting and Risk Management;


    *Visitor Management;


    *Identification Management;


    *Compliance and Reporting;


    *Responsible Gaming.


    Learn more about this and much more in this radio interview!

  • 00:23

    Mobile Security Is A Love-Hate Relationship

    in Technology

    Caleb Barlow, dives further into the recent findings made by IBM Security --  60% of dating apps are easily hackable. Discover the "love connection" between IBM Security solutions and a more secure mobile world.  Additional perspectives provided by Diana Kelley and Michael Montecillo.  Read the full report at http://securityintelligence.com/datingapps/ 

  • 6 Ways To Avoid Security Cameras Burnout

    in Blogs

    Another reasons why more and more consumers are buying wireless home surveillance cameras is that they could be hidden so well that no-one will know you might have them. These systems let the user to see what will go on, throughout the cameras, utilizing their laptop of smartphone screens because main monitor. Shopping around would really assist you to customize your house safety camera and system you need. With regard to high-security rooms within your establishment or office, experts recommend that use of these particular spots be tied to few individuals. security cameras bismarck nd The gadget freaks also find this revolutionary product with a FM radio equipped having a pause feature that is certainly basically employed to pause a live program for nearly approximately 15 mins.

  • 00:27
  • 00:35

    Welcome to the Network

    in Spirituality

    We will be introducing the KBI Prophetic Radio Network to the world today and giving insight to the things that we will be talking about on this awesome broadcast join Dr. Kepha Ben Isreal as he guides on a trip worthy of going on!!!!

  • 00:54

    Understanding The Israeli Perspective On Security

    in Technology

    As we all know, the typical market applications for Biometrics and related other related Security technologies falls primarily into four distinctive applications:


    1) Physical Access Entry;


    2) Time and Attendance;


    3) Single Sign On;


    4) Multimodal, or multi layered Biometric solutions.


    In this radio show, we have the privilege to speak with Mr. Arie Melamed Yekel, the Chief Marketing Officer of FST Biometrics, a leading Security firm based out of Israel.  Rather than trying to dominate all of the market spaces within Biometrics, FST Biometrics is dominant within the Physical Access Entry market.  From within this, they have developed cutting edge products and solutions which examines and confirms the identity of the entire individual, not just based from one Biometric modality.  Their unique technology fuses all aspects of Security, which include Facial Recognition, Voice Recognition, Behavioral Analytics, Visitor Management, License Plate Recognition, and high level Video Analytics. 

  • 00:58

    Episode 345 Event Security

    in News

    Broadcasting live from Studio B in our home offices.


    Exciting talk radio-learning about working in the event, concert and concert security world!


    Green Mountain Event Security is our guest today.


    This episode will explore the challenges of securiing "soft targets" in today's world while offering
    customer service.
    And we will talk about growing  a diversified security firm.



    We'll look at the breaking news, upcoming events and some exciting news from Armour College!

  • 00:05

    The Best of The JEWEL Network - #TJNFAVORITESFRIDAYS

    in Lifestyle

    Join us every Friday for The Best of The JEWEL Network, where we go through the years and bring the finest episodes from our archives! Visit facebook.com/thejewelnetwork or twitter.com/thejewelnetwork and let us know what shows you want to hear using the hashtag #TJNFAVORITESFRIDAYS


    Listen to shows 24/7 on demand by becoming a radio family member at www.thejewelnetwork.net

  • 00:37

    Does Sony Corporation Have You Scared? Our Interview With Brian Pearce

    in Technology

    Do the recent events at Sony Corporation have you startled and scared for your own business?  You are right in thinking that way.  Cyber threats and risks are very real these days, and they can happen at any time, without any notice.  No matter how much you, as a business owner try to stay ahead, the cyber hackers are always one step ahead.  How can one win this so called 'Cat and Mouse Game'?  Well, it could very well be possible with the network security solutions offered by Beyond Security.  Their current product line includes:


    1) Network Security Testing;


    2) Software Security Testing;


    3) Web Application Security Scanning.


    We interview Mr. Brian Pearson, the CMO and COO of Beyond Security.  Also, we get his insight into the Sony Corporation debacle.


     

Join Host Live Chats