Transcript of a discussion on how a driver risk management software provider protects their business customers from risk by protecting their own IT assets and workers using Bitdefender.
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Dana Gardner
Transcript of a BriefingsDirect podcast on how Liberty Mutual Insurance has adopted a new, heightened security posture that permeates the development process.
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
Transcript of a discussion on how Bruce Auto Group gained deep insights into their systems, apps, and data to manage and reduce risks across their entire IT and services supply chain.
For UK MSP, optimizing customer experience is key to successful security post...Dana Gardner
Transcript of a discussion on how Scottish MSP Grant McGregor takes the customer experience imperative to new heights, even as its users move increasingly to hybrid IT models.
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialDana Gardner
Transcript of a discussion on why more automation, integration, and acquiring security services “as a service” are in hot demand amid rapidly growing IT security costs and the added complexity of protecting distributed workforces.
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Dana Gardner
Transcript of a BriefingsDirect podcast on how Liberty Mutual Insurance has adopted a new, heightened security posture that permeates the development process.
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
Transcript of a discussion on how Bruce Auto Group gained deep insights into their systems, apps, and data to manage and reduce risks across their entire IT and services supply chain.
For UK MSP, optimizing customer experience is key to successful security post...Dana Gardner
Transcript of a discussion on how Scottish MSP Grant McGregor takes the customer experience imperative to new heights, even as its users move increasingly to hybrid IT models.
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialDana Gardner
Transcript of a discussion on why more automation, integration, and acquiring security services “as a service” are in hot demand amid rapidly growing IT security costs and the added complexity of protecting distributed workforces.
The impact of a security breach on MSP's and their clientsJose Lopez
This solution brief outline the financial and reputation impact of a security breach for a MSP and his customers. Choosing the best Antivirus/Antimalware and content control solution for a MSP is critical for protect his customers properly against new and emerging threats.
How the Switch to a Predominantly Remote Workforce Accelerated IT and Securit...Dana Gardner
Transcript of a discussion on how the rapid shift to remote work accelerated the digital transformation of a New York-based publishing organization to reduce risk while preserving a highly creative and distributed culture.
Transcript of a BriefingsDirect podcast on how a major law firm has adopted desktop virtualization and BYOD to give employees more choices and flexibility.
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Dana Gardner
Transcript of a BriefingsDirect podcast on how healthcare provider Lake Health ensures that its internal systems continue to serve patient care, while protecting against outside threats.
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...Dana Gardner
A transcript of a discussion on how comprehensive cloud security solutions need to go beyond on-premises threat detection and remediation to significantly strengthen extended digital business workflows.
How a Minnesota Law Firm Brings Mission Critical Security To Myriad Mobile De...Dana Gardner
Transcript of a discussion on how a Minnesota law firm puts the power of diverse mobility to widespread use and keeps confidential and regulated data under strict control.
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...Dana Gardner
Transcript of a BriefingsDirect podcast from The Open Group Conference on The Open Group Trusted Technology Forum and setting standards for security and reliability.
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Dana Gardner
Transcript of a discussion on how cloud security is rapidly advancing and how enterprises can begin to innovate to prevail over digital disruption by increasingly using cloud-defined security.
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...Dana Gardner
Transcript of a BriefingDirect podcast on the growing need for cybersecurity as an important organizational goal for businesses and government agencies.
Cyber security is becoming increasingly relevant within the insurance industry to the degree, that the National Association of Insurance Commissioners (NAIC) named it as the key initiative for 2015.
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
We offered companies free penetration tests so they could improve their security and better cope with the emerging cyberattacks.
The report covers top security issues we found and experts' recommendations to avoid attacks that disrupt businesses.
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Dana Gardner
Transcript of a sponsored discussion on how improving both development speed and security comes with new levels of collaboration and communication across disparate teams.
Discover how cutting-edge software solutions can fortify your data against evolving cyber threats and ensure the confidentiality, integrity, and availability of your valuable assets. Join us to explore real-world examples, best practices, and actionable insights that empower you to take proactive measures in the face of ever-present security challenges.
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
The IT infrastructure in Dubai is one of the best we have to date. And it makes the cyber threat intelligence Dubai an important topic to discuss and catapult the much-required attention at. As said, the development is happening rapidly and the hackers are a part of this world. They too have highly advanced mechanisms, software, technology & tools to dominate your security approach. Whether you are a business owner or a budding entrepreneur, you need to have the best cybersecurity in place at your premise.
Cyber threat intelligence in Dubai is an essential component of the city's cyber security strategy. Ahad provides excellent cyber security solutions to help clients protect their sensitive data and information.
https://ahad-me.com/solutions/detect-and-response/16
In this webinar we will cover the latest cybersecurity trends and discuss how startups can help addressing them. The cybersecurity market is booming – companies are forecasted to spend up to $ 1 trillion by 2021. Hackers are getting smarter, developing more and more sophisticated ways to take down companies’ IT infrastructure. These new threats and the upcoming regulations require companies to implement ”state- of-the-art” security, which should be any corporate’s number one priority.
During the webinar, we will discuss the latest cybersecurity trends and answer two key questions: Why startups need to be part of the equation and how can they help companies to secure their IT infrastructure?
We invited Jan C. Wendenburg, CEO of certgate, as a guest to share his knowledge from over 20+ years of experience in the industry.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
The impact of a security breach on MSP's and their clientsJose Lopez
This solution brief outline the financial and reputation impact of a security breach for a MSP and his customers. Choosing the best Antivirus/Antimalware and content control solution for a MSP is critical for protect his customers properly against new and emerging threats.
How the Switch to a Predominantly Remote Workforce Accelerated IT and Securit...Dana Gardner
Transcript of a discussion on how the rapid shift to remote work accelerated the digital transformation of a New York-based publishing organization to reduce risk while preserving a highly creative and distributed culture.
Transcript of a BriefingsDirect podcast on how a major law firm has adopted desktop virtualization and BYOD to give employees more choices and flexibility.
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Dana Gardner
Transcript of a BriefingsDirect podcast on how healthcare provider Lake Health ensures that its internal systems continue to serve patient care, while protecting against outside threats.
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...Dana Gardner
A transcript of a discussion on how comprehensive cloud security solutions need to go beyond on-premises threat detection and remediation to significantly strengthen extended digital business workflows.
How a Minnesota Law Firm Brings Mission Critical Security To Myriad Mobile De...Dana Gardner
Transcript of a discussion on how a Minnesota law firm puts the power of diverse mobility to widespread use and keeps confidential and regulated data under strict control.
Industry Moves to Fill Gap for Building Trusted Supply Chain Technology Accre...Dana Gardner
Transcript of a BriefingsDirect podcast from The Open Group Conference on The Open Group Trusted Technology Forum and setting standards for security and reliability.
Cloud Security Crosses the Chasm, How IT Now Goes to the Cloud for Better Sec...Dana Gardner
Transcript of a discussion on how cloud security is rapidly advancing and how enterprises can begin to innovate to prevail over digital disruption by increasingly using cloud-defined security.
Cybersecurity is a Necessity, Not an Option, in the Face of Global Security T...Dana Gardner
Transcript of a BriefingDirect podcast on the growing need for cybersecurity as an important organizational goal for businesses and government agencies.
Cyber security is becoming increasingly relevant within the insurance industry to the degree, that the National Association of Insurance Commissioners (NAIC) named it as the key initiative for 2015.
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
We offered companies free penetration tests so they could improve their security and better cope with the emerging cyberattacks.
The report covers top security issues we found and experts' recommendations to avoid attacks that disrupt businesses.
Capgemini and HPE Team Up to Foster Behavioral Change That Brings Better Cybe...Dana Gardner
Transcript of a sponsored discussion on how improving both development speed and security comes with new levels of collaboration and communication across disparate teams.
Discover how cutting-edge software solutions can fortify your data against evolving cyber threats and ensure the confidentiality, integrity, and availability of your valuable assets. Join us to explore real-world examples, best practices, and actionable insights that empower you to take proactive measures in the face of ever-present security challenges.
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
The IT infrastructure in Dubai is one of the best we have to date. And it makes the cyber threat intelligence Dubai an important topic to discuss and catapult the much-required attention at. As said, the development is happening rapidly and the hackers are a part of this world. They too have highly advanced mechanisms, software, technology & tools to dominate your security approach. Whether you are a business owner or a budding entrepreneur, you need to have the best cybersecurity in place at your premise.
Cyber threat intelligence in Dubai is an essential component of the city's cyber security strategy. Ahad provides excellent cyber security solutions to help clients protect their sensitive data and information.
https://ahad-me.com/solutions/detect-and-response/16
In this webinar we will cover the latest cybersecurity trends and discuss how startups can help addressing them. The cybersecurity market is booming – companies are forecasted to spend up to $ 1 trillion by 2021. Hackers are getting smarter, developing more and more sophisticated ways to take down companies’ IT infrastructure. These new threats and the upcoming regulations require companies to implement ”state- of-the-art” security, which should be any corporate’s number one priority.
During the webinar, we will discuss the latest cybersecurity trends and answer two key questions: Why startups need to be part of the equation and how can they help companies to secure their IT infrastructure?
We invited Jan C. Wendenburg, CEO of certgate, as a guest to share his knowledge from over 20+ years of experience in the industry.
Similar to SambaSafety’s Mission to Reduce Risk Begins in its Own Datacenter (20)
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SambaSafety’s Mission to Reduce Risk Begins in its Own Datacenter
1. Page 1 of 7
SambaSafety’s Mission to Reduce
Risk Begins in its Own Datacenter
Transcript of a discussion on how a driver risk management software provider protects their
business customers from risk by protecting their own IT assets and workers using Bitdefender.
Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: Bitdefender.
Dana Gardner: Welcome to the next edition of BriefingsDirect. I’m Dana Gardner,
Principal Analyst at Interarbor Solutions, your host and moderator.
Security and privacy protection increasingly go hand in hand, especially in sensitive
industries like finance and public safety. For driver risk management software provider
SambaSafety protecting their business customers from risk is core to their mission -- and
that begins with protection of their own IT assets and workers.
Stay with us now as we learn how SambaSafety adopted Bitdefender GravityZone
Advanced Business Security and Full Disk Encryption to improve the end-to-end security
of their operations and business processes.
To share their story, please join me in welcoming Randy Whitten, Director of IT and
Operations at SambaSafety in Albuquerque, New Mexico. Welcome, Randy.
Randy Whitten: Thank you.
Gardner: Randy, you have a very interesting company.
Tell us about SambaSafety, how big it is, and your
unique business approach.
Whitten: SambaSafety currently employs
approximately 280 employees across the United States.
We have four locations. Corporate headquarters is in
Denver, Colorado. Albuquerque, New Mexico is another
one of our locations. There’s Rancho Cordova just
outside of Sacramento, California, and Portland,
Oregon is where our transportation division is.
We also have a variety and handful of remote workers from coast to coast and from
border to border.
Gardner: And you are all about making communities safer. Tell us how you do that.
Whitten: We work with departments of motor vehicles (DMVs) across the United States,
monitoring the drivers for companies. We put a partnership together with state
Whitten
2. Page 2 of 7
governments, and third-party information is provided to allow us to process reporting for
critical driver information.
We seek to transform that data into action to protect the businesses and our customers
from driver and mobility risk. We work to incorporate top-of-the-line security software to
ensure that all of our data is protected while we are doing that.
Data-driven driver safety
Gardner: So, it’s all about getting access to data, recognizing where risks might
emerge with certain drivers, and then alerting those people who are looking to hire those
drivers to make sure that the right drivers are in the right positions. Is that correct?
Whitten: That is correct. Since 1998,
SambaSafety has been the pioneer and leading
provider of driver risk management software in
North America. SambaSafety has led the
charge to protect businesses and improve
driver safety, ultimately making communities
safer on the road.
Our mission is to guide our customers, including employers, fleet managers, and
insurance providers to make the right decisions at the right time by collecting, correlating
and analyzing motor vehicle records (MVRs) and other data resources. We identify
driver risk and enable our customers to modify their drivers’ behaviors, reduce the
accidents, ensure compliance, and assist with lowering the cost, ultimately improving the
driver and the community safety once again.
Gardner: Is this for a cross-section of different customers? You do this for public sector
and private sector? Who are the people that need this information most?
Whitten: We do it across both sectors, public and private. We do it across
transportation. We do it across drivers such as Lyft drivers, Uber drivers, and
transportation drivers -- our delivery carriers, FedEx, UPS, etc. -- those types of
customers.
Gardner: This is such an essential service, because so much of our economy is on four
wheels, whether it’s a truck delivering goods and services, transportation directly for
people, and public safety vehicles. A huge portion of our economy is behind the wheel,
so I think this is a hugely important service you are providing.
Whitten: That’s a good point, Dana. Yes, it is very much. Transportation drivers are
delivering our commodities every day, the food that we consume, the clothes that we
wear, also the parts that fix our vehicles to drive, plus also just to be able to get like
those Christmas packages via UPS or FedEx -- those are the essential items to our
everyday living.
SambaSafety has led the
charge to protect businesses
and improve driver safety,
ultimately making communities
safer on the road.
3. Page 3 of 7
Gardner: So, this is mission-critical on a macro scale. Now, you also are dealing, of
course, with sensitive information. You have to protect the privacy. People are entitled to
information that’s regulated, monitored, and provided accordingly. So you have to be
across-the-board reducing risk, doing it the right way, and you also have to make your
own systems protected because you have that sensitive information going back and
forth. Security and privacy are probably among your topmost mission-critical
requirements.
Securing the sectors everywhere, all the time
Whitten: That is correct. SambaSafety has a SOC 2 Type II compliant certification. It
actually is just the top layer of security we are using within our company, either for our
endpoints or for our external customers.
Gardner: Randy, you described your organization as distributed. You have multiple
offices, remote workers, and you are dealing with sensitive private and public sector
information. Tell us what your top line thinking, your philosophy, about security is and
then how you execute on that.
Whitten: Our top line essentially is to make
sure that our endpoints are protected, that we
are taking care of our employees internally to
be able to set them up for success, so they
don’t have to worry about security. All of our
laptops are encrypted. We have different types
of levels of security within our organization, so
that gives all of our employees a way to ease
their comfort so that they can concentrate on
taking care of our end customer.
Gardner: That’s right, security isn’t just a matter of being very aggressive, it also means
employee experience. You have to give your people the opportunity to get their work
done without hindrance -- and the performance of their machine, of course, is a big part
of that.
Tell us about the pain points, what were the problems you were having in the past that
led you into a new provider when it comes to security software?
Whitten: Some of the things that we have had to deal with within the IT department here
at SambaSafety is when we see our tickets come in, it’s typically about memory usage
as applications were locking up the computers, where it took a lot of resources to be
able to launch the application.
Our top line essentially is to
make sure that our endpoints
are protected, that we are
taking care of our employees
internally to be able to set them
up for success, so they don’t
have to worry about security.
4. Page 4 of 7
We also were seeing threats getting through the previous antivirus solution, and then
just the cost, the cost of that solution was increasing month over month. Every time we
would add a new license it would seem like the price point would jump.
Gardner: I imagine you weren’t seeing them as a partner as much as a hindrance.
Whitten: Yes, that is correct. It started to seem like it was a monthly call, then it turned
into a weekly call to their support center just to be able to see if we could get additional
support and help from them. So that brought up, “Okay, what do we do next and what is
our next solution going to look like?”
Gardner: Tell me about that process. What did you look at, and how did you make your
choices?
Whitten: We did an overall scoping session
and brought in three different antivirus
solutions providers. It just so happens that
they all measured up to be the next vendor
that we were going to work with. Bitdefender
came out on top and it was a solution that we
could put into our cloud-hosted solution, it was
also something that we could work with on our
endpoints and also to be able to ensure that all
of our employees are protected.
Gardner: So you are using GravityZone Advanced Business Security, Full Disk
Encryption, and the Cloud Management Console, all from Bitdefender, is that correct?
Whitten: That is correct. The previous solution for our disk encryption is just about
exhausted. Currently we have about 90 percent of our endpoints for disk encryption on
Bitdefender now and we have had zero issues with it.
Gardner: I have to imagine you are not just protecting your endpoints, but you have
servers and networks, and other infrastructure to protect. What does that consist of and
how has that been going?
Whitten: That is correct. We have approximately 280 employees, which equals 280
laptops to be protected. We have a fair amount of additional hardware that has to be
protected. Those endpoints have to be secured. And then 30 percent of additional
hardware, i.e. the Macs that are within our organization, are also part of that Bitdefender
protection.
Gardner: And everyone knows, of course, that management of operations is essential
for making sure that nothing falls between the cracks -- and that includes patch
management, making sure that you see what’s going on with machines and getting
alerts as to what might be your vulnerability.
Bitdefender … was a solution
that we could put into our cloud-
hosted solution, it was also
something that we could work
with on our endpoints and also
to be able to ensure that all of
our employees are protected.
5. Page 5 of 7
So tell us about the management, the Cloud Console, particularly as you are trying to do
this across a hybrid environment with multiple sites?
See what’s secure to ensure success
Whitten: It’s been vital for the success of Bitdefender and their console that we can log
on and we can see what’s happening. It has been very key to the success. I can’t say
that enough.
And it goes as far as information gathering, dashboard, data analytics, network
scanning, and the vulnerability management - just being able to ensure our assets are
protected has been key.
Also, we could watch the alerting that happens to ensure that the behavior is not
changing from machine intelligence or machine learning (ML) so that our systems do not
get infected in any way.
Gardner: And the more administration and automation you get, the more you are able to
devote your IT operations people to other assets, other functions. Have you been able to
recognize, not only an improvement in security, but perhaps an easing up on the man
hours and labor requirements?
Whitten: Sure. The first 60 days of our implementation I was able to improve return on
investment (ROI) quickly. We were able to allow additional team resources to focus on
other tickets and also other items that came into our work scope within our department.
Bitdefender was already out there, and it
was managing itself, it was doing what we
were paying for it to do -- and it was
actually a really good choice for us. The
partnership with them is very solid, we are
very pleased with it, it is a win-win situation
for both of our companies.
Gardner: Randy, I have had people ask me, “Why do I need Full Disk Encryption? What
does that provide for me? I am having a hard time deciding whether it’s the right thing for
our organization.”
What were your requirements for widespread encryption and why do you think that’s a
good idea for other organizations?
Whitten: The most common reason to have Full Disk Encryption is you are at the store,
someone comes in, they break into your car, they steal your laptop bag or they see your
computer laying out, they take it. As the Director of IT and Operations for SambaSafety,
my goal is to ensure that our assets are protected. So having Full Disk Encryption on
board that laptop gives me a chance to sleep a little easier at night.
Bitdefender was already out there,
and it was managing itself, it was
doing what we were paying it to do
… the partnership is solid … it is a
win-win situation.
6. Page 6 of 7
Gardner: You are not worried about that data leaving the organization because you
know it’s got that encryption wrapper.
Whitten: That is correct. It’s protected all the way around.
Gardner: As we start to close out, let’s look to the future. What’s most important for you
going forward? What would you like to see improve in terms of security, intelligence and
being able to monitor your privacy and your security requirements?
Scope out security needs now and down the road
Whitten: The big trend right now is to ensure that we are staying up to date and
Bitdefender is staying up to date on the latest intrusions so that our software is staying
current and we are pushing that out to our machines.
Also just continue to be right on top of the security game. We have enjoyed our
partnership with Bitdefender to date and we can’t complain, and for sure it has been a
win-win situation all the way around.
Gardner: Any advice for folks that are out there, IT operators like yourself that are
grappling with increased requirements? More people are seeing compliance issues,
audit issues, paperwork and bureaucracy. Any advice for them in terms of getting the
best of all worlds, which is better security and better operations oversight management?
Whitten: Definitely have a good scope of what you are looking for, for your organization.
Every organization is different. What tends to happen is that you go in looking for a
solution and you don’t have all of the details that would meet the needs of your
organization.
Secondly, get the buy-in from your leadership team. Pitch the case to ensure that you
are doing the right thing, that you are bringing the right vendor to the table, so that once
that solution is implemented, then they can rest easy as well.
Every company executive across the world
right now that has any responsibility with
data, definitely security is at the top of their
mind. Security is at the top of my mind
every single day, protecting our customers,
protecting our employees, making sure that
our data stays protected and secured so
that the bad guys can’t have it.
Gardner: I’m afraid we will have to leave it there. You have been listening to a
sponsored BriefingsDirect discussion on how driver risk management software provider
Security is at the top of my mind
every single day, protecting our
customers, protecting our
employees, making sure that our
data stays protected and secured
so that the bad guys can’t have it.
7. Page 7 of 7
SambaSafety protects their business customers from risk, beginning with the protection
and management of their own IT assets and workers.
And we have learned how SambaSafety adopted Bitdefender GravityZone Advanced
Business Security and Full Disk Encryption to improve the end-to-end security of their
distributed operations and important business processes.
So please join me now in thanking our guest. We have been here with Randy Whitten,
Director of IT and Operations at SambaSafety in Albuquerque, New Mexico. Thank you
so much, Randy.
Whitten: Thank you Dana. I appreciate it.
Gardner: I’m Dana Gardner, Principal Analyst at Interarbor Solutions, your host and
moderator for this ongoing series of BriefingsDirect discussions. A big thank you to our
sponsor, Bitdefender, for supporting these presentations.
Lastly, thanks to our audience for joining. Please pass this along to your IT community,
and do come back next time.
Listen to the podcast. Find it on iTunes. Download the transcript. Sponsor: Bitdefender.
Transcript of a discussion on how a driver risk management software provider protects their
business customers from risk by protecting their own IT assets and workers. Copyright Interarbor
Solutions, LLC, 2005-2020. All rights reserved.
You may also be interested in:
• For a UK borough, solving security issues leads to operational improvements and cost-
savings across its IT infrastructure
• How an Architectural Firm Retains Long-Term Security Confidence Across a
Fully Virtualized and Distributed Desktop Environment
• Regional dental firm Great Expressions protects distributed data with lower complexity
thanks to amalgam of Nutanix HCI and Bitdefender security
• How MSPs Leverage Bitdefender’s Layered Approach to Security for Comprehensive
Client Protection
• How a large Missouri medical center developed an agile healthcare infrastructure security
strategy
• Kansas Development Finance Authority gains peace of mind, end-points virtual shield
using Hypervisor-level security
• How a Florida school district tames the Wild West of education security at scale and on
budget
• The next line of defense—How new security leverages virtualization to counter
sophisticated threats
• Cybersecurity standards: The Open Group explores security and safer supply chains