SORT BY Relevancy
Just in the last year alone, the world witnessed many unprecented, security breaches. Many of these Cyber based attacks targeted well known retail chains, such as Target and Home Depot. Then of course, was the drama brought by the Sony Corporation, with the security hacks it faced, and the threats posed to it by the launch of its movie, 'The Interview'. No business entity is ever immune from being a target of a Cyber based attack, but there are preventative techniques one can take.
One such proactive technique is that of the auditing of one's IT infrastructure, to pinpoint where the true security vulnerabilities and weaknesses lie. In our podcast today, we intervview Mr. Michael Fimin, CEO of Netwrix Corporation, and learn more about the IT Security audit process.
Piyush Bhatnagar, the CTO of Authomate, discusses the real reasons why users should be at least skeptical – and at most, fearful – of free security solutions, and why you ultimately get what you pay for when it comes to security and authentication software.
In today's world, business owners want complete protection and security offered to their physical premises, both inside and outside. In the past, business owners would be required to purchase and deploy security technologies in "piecmeal". Meaning, only type of security technology served only specific purpose in safeguarding the business. Obviously, this "piecmeal" approach has proven to be not only very expensive for the small business owner to procure and maintain, but the technology also gets outdated very quickly. Thus, the business owner is yet once again faced in deploying newer security technology using the "piecemeal" approach. However, there is a new security solution out there-which is known as "Unified Threat Management" and can provide the business owner a snapshot of the entire security infrastructure of his or her business at a fraction of the cost of the legacy security technologies. In this radio show, we interview Mr. Soren Frederiksen, VP of Development of iView Systems.
This company has come out with the "holistic" view to security for any sized business, which includes the following components:
*Incident Reporting and Risk Management;
*Compliance and Reporting;
Learn more about this and much more in this radio interview!
Join Host Live Chats
- Dr Ritamarie (12 chatters)
- KAS1 (12 chatters)
- The Wacko Network (12 chatters)
- Radio Jihad Network (11 chatters)
- LindaCrystal (6 chatters)
- BeverlyD (5 chatters)
- Mikeisha (3 chatters)
- MRX SYCAMORES PLACE (2 chatters)
- OneSister2Another (2 chatters)
- BennetPomerantz0 (2 chatters)
- Demolishing Strongholds (2 chatters)
- Energy Awareness (2 chatters)
- JASmius (1 chatters)
- Michael Tatlock (1 chatters)
- Coachjeanna (1 chatters)
- NatureofReality (1 chatters)
- TheWellnessCoach (1 chatters)
- We are TOPS (1 chatters)
- WGAG Radio (1 chatters)