Comments: 1 Comment
This is the interview on KDKA Radio News 1020AM, Pittsburgh, PA. This interview was on our ITS SafeTM Security appliance. Only the ITS Safe security appliance is a managed service.
The KDKA Radio website posted the following for your review:
If the computer network of your company or business is not protected, the ITS Safe security appliance would be a great tool to have.
“Virus scanners and firewalls attempt to block things. In reality, a virus scanner is looking to see if it can identify that you’ve already had a breach. It’s a reactive tool, not a preventive tool,” said Albert Whale, Founder of IT Security Solutions, inc. during an interview with KDKA Radio on Tuesday.
“Our tool looks at the packets coming in, on the network and determines if they are good or bad. If they are bad, we drop them and we block the hackers from getting to your computers.”
Private information can be leaked and identities can be stolen if an individual breaks in to the network of a business; it can be very serious.
“Sysco came out with some other marketing for our webinar, and they said 43% of companies fail within six months after a data breach,” Whale explains.
ITS Safe is different from other platforms because they identify attacks that are in progress.
“We have controls in place that detect this malicious activity, and then we can block it before it hits your computer.”
Comments: No Comments
Cyber Security conversation with Brad Stoller and Albert Whale
Many organizations are overwhelmed with today’s efforts to secure the organization. Whether they are a small to mid-sized business, or a global organization. Today in the US we are short more than 3.5 Million experienced Cyber Security professionals.
If we think of a Computer Virus as something similar to a virus that you can catch (like the flu), how effective are the tools you are using currently? The typical organization using both Firewalls and Virus Scanners, has less than a 40% chance of discovering the infection.
The premise of the Virus Scanner is a reactive tool which is attempting to discover the initial infection, after the breach has already occurred. These tools are used as a reactionary tool, and are less than 40% effective.
The ITS SafeTM security appliance works differently, because we are reviewing the traffic BEFORE it reaches the end point destination. That makes our ITS SafeTM appliance a differentiator, because we are being proactive, and stopping the malicious attacks before they reach your computing environment.
IT Security Solutions, Inc. is a cyber security organization which wants to improve and protect your organization with the latest tools and services for improving your organization’s security. The first question we want to ask you, when was your last security assessment? How often do you have an assessment performed? Would you consider that Constant monitoring could benefit your organization?
Let’s start with a conversation today. You can reach us at email@example.com or at 412-889-6870.