In Season 1, we compiled and asked vendors to answer quite a long list of questions, getting them answered properly was talking about an hour. We have listened to your feedback and decided to make the episodes shorter by half.
Many times, I have seen companies focus their partner enablement on what I call, “file, run, setup”. This training focuses heavily on the Sales Engineering team learning how to install and setup the security solution into a customer’s networks
“Eighty percent of what?” I hear you say. Exactly. Most people agree that just showing up equates to eighty percent simply because a gut level it sounds right, but they will not be able to quantify the value of the Pacman Principle or what showing up
Your goal is to sell products that deliver value to your buyers. The buyer’s goal is to find and purchase a product that improves their security, or one that offers an equal level of security at a reduced total cost of ownership.
Traditionally companies, much like baseball managers, will often look at just a few superficial indicators of success, such as the number of employees, their yearly sales, and financial stability.
"You get a very short period of time to execute your intellectual property; you have to execute a go-to-market strategy equally as fast and equally as innovative." ~Dave Dewalt
In the current era, companies are spending 10-20% of their budget on IT and Cyber Security, and both are fundamental to a company’s success and growth.
Digital transformation in the healthcare industry is fully underway. It’s being driven by a number of factors, including the need to scale medical services for a growing population; to serve rural and
Security professionals are losing control of their companies’ security perimeter, both on the virtual and physical aspects. This is evident with millions of people now working from home
General and Architecture question list we compiled to ask SASE vendors for Outbound Browsing functionalities Our audience welcome to use our list as a starting point in your vendor evaluation process.
SASE combines many functions (CASB, SWG/CSWG, ZTA/SDP, Firewall as a Service, IAM, SDWAN, DLP, DNS security, and many more). The topic is so broad that we decided to cover it by multiple seasons.
Our vision taking a different approach to a podcast show. We take an area of interest such as IoT or EDR, analyze the current trends on the market, understand the complexity and ask questio
With much of the world now working remotely and likely to remain this way after the COVID-19 pandemic, the attack surface that could be exploited by cyberattackers has widened, a new study showed.
The following number of short articles will describe several options of modern architecture to secure users’ traffic to the internet and back to the corporate office or company Datacenters (DC).