3Eye Technologies and their channel partners explore everything in the world of mobile tech - topics range from product deep dives with industry experts, to leadership and business strategy discussions, to how to go to market effectively in a world that is relying more and more on mobile communication.
In this podcast episode of "Beyond The Device," Reid Estreicher of 3Eye Technologies interviews Mike O'Marra from Identity Automation. They discuss the significant role Identity Automation plays in the healthcare sector by providing solutions that streamline access to various systems and applications.O'Marra, with almost two decades of experience in healthcare technology, outlines how Identity Automation's products, Exact Access (XA) and Quick Access (QA), have evolved to meet the industry's changing needs. The XA was developed to provide clinical enterprise workflow solutions, easing access to hundreds, if not thousands, of applications, while the QA, a more lightweight RFID badge tap solution, was created to assist in quick and secure login to one resource, such as a local Windows session or virtual desktops.Estreicher and O'Marra further discuss the wide-ranging benefits of these solutions for various stakeholders, including clinicians, IT staff, and hospital management. For clinicians, the solutions help save time, enhancing their interaction with patients and their overall work satisfaction. For IT staff, the solutions ensure effective system access and compliance with audit requirements. Hospital management can see measurable improvements in efficiency and finance.The conversation also sheds light on how Identity Automation long-term customer, Colorado Health showing the effectiveness of the XA and QA Identity and Access Management solutions for healthcare.
Single Sign On is a powerful tool that has tangible benefits in the workplace. With SSO, users no longer need to manually log into each individual resource they access as part of their job - saving them time and energy while also providing an extra layer of security by protecting accounts from being exposed through phishing scams or compromised passwords. Hypergate takes these safeguards one step further with its comprehensive software solution for implementing single sign on across multiple platforms quickly and securely.Kris Putrins, Regional Sales Director at Hypergate joins from Switzerland to share how Hypergate Authenticator leverages Kerebos and your existing infrastructure and enables your employees to access company resources on their Android Enterprise and iOS smartphones like they are used to with a computer.
Season 3 | Episode 36In this episode of Beyond the Device, host Reid Estreicher is joined by Amit Poona and Steven Gohl of Scalefusion to show that not all MDM's are created equally. Many of the MDM's in the market today are singularly focused in trying to beat the competition by matching features that are often unused or underutilized in a marketing slick that the competitor has. "what has helped us a lot, and not making it feature centric but more towards to the features which our users are going to use every day in and out. I think 95% or 96% of times whatever features we have, they have been used. So, that's good to see that what we have built is actually used day to day. The other key thing is though everyone wants to make an easy to use software, and even Scalefusion is easy to use MDM. However, some people need some help, right? And nowadays with the current things. Like support is crazy, right? People have to wait in queues or they're talking to bots and so on. One thing that we have been doing differently is we don't use bots." Noted Amit Ponam"At Scalefusion, we have this track record of replying to customers within two minutes. Now, not resolution time, but replying. At least coming back to them saying that hey we are here and we are going to help you with real people. And I think that helps a lot because that gives you that peace of mind that hey I'm not going to be stuck around and not going to get my answers. But somebody telling you, giving you assurance, I'm going to be with you, we do that. And second response for us is close to four minutes on average. And typical resolution time is within two hours."
10 years ago Conor Macfarlane founded 3Eye Technologies. As a specialty distributor focused on mobility, identity and security, Conor identified an unmet market need in that mobile device protection has always been focused as a B2C play. So if you're a corporate purchaser, if you're in healthcare technology procurement, if you are a government buyer deploying mobile devices and you're looking for affordable and reliable device protection, you've got two options today. The first is really expensive consumer brands that you might know from your experience as a consumer. Because let's face it, everybody's got a device with a case. Or you are taking a chance on something that you find online somewhere that you've never heard of and maybe it's hitting a price point that's more attractive. That is the ethos of OuterFactor. OuterFactor was born to solve an unmet market need. The need for reliable, rugged, B2B first device protection at a price point that makes sense. President/CEO at 3Eye, Founder of OuterFactor, Conor Macfarlane joins the Beyond the Device Podcast with host, Reid Estreicher to share how OuterFactor is delivering reliable, rugged, B2B first device protection at a price point that makes sense.
What a lot of people don't understand is how mobile device management works. Oftentimes, people ask if it is software and the answer to that is yes and no. MDM is a solution that uses software as a component in order to provision and protect mobile devices and their data. Organizations practice this by applying not only software but also processes and security policies to their mobile devices and their use.Besides provisioning and managing device inventory, MDM is a great way to protect a mobile device's data, content, and applications from threats.So what sets this apart from mobile security?Brian Egenrieder and Ted Bienkowski join Reid Estreicher on the Beyond the Device Podcast to discuss mobile security and coming CMMC requirements.
Caramie Huntington (AINA) and Kyle Lonzak from RAM Mounts join Reid Estreicher on the Beyond the Device podcast to share how they have joined forces to create a best in class Push-to-Talk bundle available through 3Eye Technologies.AINA is compatible with all major PTT applications, enabling instant communication in and around the vehicle while providing clear and crisp audio quality, amplifying all media sounds through a Bluetooth connection. This extremely rugged and water-resistant wireless microphone stays in constant charge, provided by an in-vehicle charging cradle. Designed and manufactured in Europe, a 2-year warranty is included on the microphone when purchased alongside a charging cradle.Designed and manufactured in America, RAM® Mounts is trusted by the nation's largest transportation fleets and OEM's. RAM® offers a lifetime warranty on mounts and a 3-year warranty on electronics.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Caramie Huntington, Sr. Enterprise Sales Managerhttps://www.linkedin.com/in/caramie/Kyle Lonzak, Business Development Manager at RAM Mountshttps://www.linkedin.com/in/kyle-m-lonzak-12364520/
Traveling from room to room and floor to floor in a clinical or hospital setting is already exhausting enough. But bringing a heavy and uncomfortable workstation around brings the effort to another level. So nurses want something that's functional, mobile, and easy to use. That way, they can easily bring workstations wherever needed to improve patients outcomes. Joe Hillebrand and Steven Gapski from Altus join Reid Estreicher and the Beyond the Device Podcast to discuss how Altus-Inc. healthcare workstations and carts increase mobility in clinical environments. Altus designed carts are built for clinical environments that are ergonomically friendly, easily hold computers, keyboards, and other tools used for data recording, management, and gathering so that nurses can get the vitals of patients from their bedside or in the ER without the need to travel back to the nurse's station to manually input the information.
Caramie Huntington joins the Reid Estreicher and the Beyond the Device Podcast to discuss how AINA has evolved critical Push-to-Talk applications over multiple licensed and unlicensed bands with multiple devices that are worn on body and in-vehicle for law enforcement, first responders (fire/EMS), military, fleet and more. AINA is compatible with all major PTT applications, enabling instant communication in and around the vehicle while providing clear and crisp audio quality, amplifying all media sounds through a Bluetooth connection. This extremely rugged and water-resistant wireless microphone stays in constant charge, provided by an in-vehicle charging cradle.
Reid Estreicher, host of 3Eye Technologies Beyond the Device podcast and Vice President, Business Development discusses RAM Mounts for Laptops and with Kyle Lonzak, Business Development Manager at RAM Mounts. In this episode of Beyond the Device, Kyle Lonzak explains the growing trend of replacing in-vehicle laptops with tablets and ruggedized keyboards for government (police, fire, military and EMS) as well as industrial fleet vehicles. With RAM's modular design concepts, leveraging existing laptops while transitioning to tablets and other in-vehicle technology stacks becomes simpler and more cost-effective.
Swale Nunez joins us on this episode of Beyond the Device to discuss Identity Management, Web3 and your identity in the Metaverse. "What we are hoping to do is give users back control over their digital identity," says Swale Nunez. "You have commoditized my identity and profited off of my identity."Identity is the most valuable thing on the Internet."You brought up the word that I use in a lot of the times when I speak is psychographics, right. And they track and monitor our behavioral patterns and things that we're interested in. I've heard people describe that term as a war tool. Because it's so influential and impactful in the sense that it can have a negative impact and affect massive amount of people. And that's one of the things going back to just our platform and we pride ourselves on our ethical practices. Because right now with our competitors right, and just for those who don't know, a social login is what you see whenever you're either creating an account or login into something. They give you the option to either log with Facebook or login with Google because you have existing accounts with them, right?"The sites you visit know that, the apps you use know that, the companies that control them know that — but do you know that?"In this digital world, our identities are being managed and collected by entities that aren't us. And to make matters worse, they've done an absolutely stellar job at profiting off it. Unfortunately, you don't have a good idea of what's being shared, right. And beyond that, this is your social network, right? There's things on there that if I'm opening a new account for my banking information, right. I don't need my bank to know that I was at this place two weeks ago or these are my friends or these are my likes, right. That's unimportant for my bank account," suggests Swale. "But a lot of that data is being shared. And that's where the privacy concerns come into play. Because again, I shouldn't have to relinquish that information just to open an account. And I'm using bank account as an example, but any account in general. For us, we are transparent in the data that's being shared and nothing is being shared unless you approve it. Here it's the information that's being requested to create this account. Do you want to share that information? Yes I do or No I don't. Whereas in these other platforms, it's you click a button and you don't know what information is being shared, right."Proper identity management is integral if you want to take back control of your online identity. "To just to exist in this digital climate now, it involves you having to relinquish that control, right. And that's what we're trying to counter as much as possible, right. And it's twofold, right," says Swale. "As much as we champion the user, we create a platform that is beneficial to our partners as well, right. We help accelerate that onboarding process because we simplify authentication of the user and also data capture, right. Because everybody knows in an onboarding process, the key is to make it as personalized as possible, right. Because as users, I think we are two times or twice as engaged when we realize that this presentation is catered to me specifically, right.
Protecting the valuable data that organizations generate, gather, and store from unauthorized access is crucial. Data breaches of any magnitude can have an enormous impact on your company's bottom line and stakeholder confidence. Businesses can improve the security of their data by implementing identity management solutions.In a recent podcast, we interviewed biometric identification and access control experts from BIO-key. With Kimberly Biddings, BIO-key International's VP of Product, and Scott Mahnken, BIO-key International's VP of Channel Marketing, we discussed the importance of identity protection and management for businesses. Here are some crucial points.What Is Identity Management?Identity management offers a layer of security to your company by identifying, verifying, and authorizing individuals and then granting them access to your data systems. It's about making sure that only the individuals with authorization, and only at a level that allows them to execute their tasks successfully, can gain access.This is more crucial than ever since as enterprises shift to the cloud, they require more passwords. For instance, a new set of credentials can be needed with each new application — these open businesses up to a greater risk of unauthorized access to sensitive data.With BIO-key's identity management systems, users no longer have to provide their password for every program they use due to a single secure login. "The main differentiator for us is that we have identity-bound biometrics, which identifies the person. It is a biometric that's bound to your identity, stored centrally, extremely secure," says Biddings.The BottomlineCyberattacks are a persistent and imminent danger. As a result, businesses need to implement cybersecurity safeguards to prevent unauthorized access to their systems. Using identity management solutions from BIO-key provides a necessary layer of defense to protect businesses and their people.
3Eye joins the team from SecureData to discuss their range of tailored high-level data protection products.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Ken Higgins, VP - Vice President of Business Development, SecureDatahttps://www.linkedin.com/in/ken-higgins-14a3919/Blake Higgins, Sales Manager, SecuraDatahttps://www.linkedin.com/in/k-blake-higgins-26802936/Peter Carcione, Vice President of Marketing, SecureDatahttps://www.linkedin.com/in/pcarcione/Company Websites:SecureData: https://www.securedatarecovery.com/3Eye: https://www.3eyetech.com/
3Eye joins Pete Plotas from TRUCE Software for another episode of Beyond the Device to discuss how TRUCE helps manage the safe and productive use of mobile technology in the workplace.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Pete Plotas, Global VP, Alliances & Strategic Development, Truce Softwarehttps://www.linkedin.com/in/peteplotasCompany Websites:TRUCE Software: https://trucesoftware.com/3Eye: https://www.3eyetech.com/
3Eye joins Sarah Heibult and Pete Plotas from TRUCE Software for another episode of Beyond the Device to discuss how TRUCE helps manage the safe and productive use of mobile technology in the workplace.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Sarah Heibult, Channel Manager, TRUCE Softwarehttps://www.linkedin.com/in/sarah-heibultPete Plotas, Global VP, Alliances & Strategic Development, Truce Softwarehttps://www.linkedin.com/in/peteplotasCompany Websites:TRUCE Software: https://trucesoftware.com/3Eye: https://www.3eyetech.com/
3Eye joins Josh Fulton from eSquared for another episode of Beyond the Device to discuss deploying wireless and mobile management solutions and how working with eSqaured can help.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Josh Fulton, Founder / Managing Partner, eSquaredhttps://www.linkedin.com/in/josh-fulton-142bb93Company Websites:eSquared: https://www.e2cc.com/3Eye: https://www.3eyetech.com/
3Eye joins Kern Smith from Zimperium to discuss Chrome Extension security concerns and the impact of these vulnerabilities on the education space.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Kern Smith, VP - Pre-Sales America's, Zimperiumhttps://www.linkedin.com/in/kernsmith/Company Websites:Zimperium: https://www.zimperium.com/3Eye: https://www.3eyetech.com/
3Eye joins Krishna Vishnubhotla from Zimperium for another episode of Beyond the Device to discuss how Zimperium addresses mobile security concerns, how to prevent data leakage in mobile apps and Zimperium's Mobile Risk Assessment. Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Krishna Vishnubhotla, VP of Product Strategy, Zimperiumhttps://www.linkedin.com/in/krishna-vishnubhotla/Company Websites:Zimperium: https://www.zimperium.com/3Eye: https://www.3eyetech.com/
3Eye joins Shawn Angulo from King City Union School District and Jason Claybrook from Aura Wireless to discuss how Aura's solutions helped make wireless infrastructure available to King City students.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Shawn Angulo, Director of Technology, King City Union School Districthttps://www.linkedin.com/in/shawn-angulo-a5691288/Jason Claybrook, Head of Sales and Marketing, Aura Wirelesshttps://www.linkedin.com/in/jason-claybrook-b829392/Company Websites:Aura Wireless: https://aurawireless.com/3Eye: https://www.3eyetech.com/
3Eye sits down with Victor Pizzolato from Imprivata to give two live demos for device provisioning and checkout solutions for iOs devices.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Victor Pizzolato, Sales Specialist https://www.linkedin.com/in/victor-pi...Company Websites:Imprivata: https://www.imprivata.com/3Eye: https://www.3eyetech.com/
3Eye joins Holly Davis from Komplément and Jason Claybrook from Aura Wireless to discuss a variety of funding programs available to schools and how the CARES Act and E-Rate are impacting the world of education.Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Holly Davis, CEO, Komplément https://www.linkedin.com/in/hollykdavis/Jason Claybrook, Head of Sales and Marketing, Aura Wirelesshttps://www.linkedin.com/in/jason-claybrook-b829392/Company Websites:Aura Wireless: https://aurawireless.com/Komplément: https://www.komplementconsulting.com/3Eye: https://www.3eyetech.com/
3Eye sits down with Mack Bickle, Carter Dunbar and Jamie Donally from Identity Automation for a fireside chat to discuss how IT infrastructure impacts instruction in the education world. Hosted by:Reid Estreicher, VP of Business Development, 3Eye Technologieshttps://www.linkedin.com/in/thereid/Guests: Carter Dunbar, Implementation Strategy Manager, Identity Automationhttps://www.linkedin.com/in/carter-du...Mack Bickle, Partner Manager, Identity Automationhttps://www.linkedin.com/in/mack-bick...Jaime Donally, Engagement Director, Identity Automationhttps://www.linkedin.com/in/jaimedonally/Company Websites:Identity Automation: https://www.identityautomation.com/3Eye: https://www.3eyetech.com/Podcast URLS:Apple: https://podcasts.apple.com/us/podcast...Spotify: https://open.spotify.com/episode/2j4o...
3Eye joins Jason Claybrook from Aura Wireless to explore the evolution of community WiFi and the challenges of building out large-scale connectivity deployments in the COVID-19 era.Hosted by:Reid Estreicher, VP of Business Development, 3Eye TechnologiesGuests:Jason Claybrook, Head of Sales and Marketing, Aura Wireless
3Eye joins Identity Automation to discuss the impact COVID-19 has had on Higher Education and where Identity and Access Management (IAM) fits into a remote learning environment. Hosted by:Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests:Carter Dunbar, Implementation Strategy Manager, Identity AutomationTim Till, Director of Sales, Identity AutomationGreg Waddell, Partner Manager, 3Eye Technologies
3Eye sits down with Kyle Lonzak from RAM Mounts to discuss the upcoming ELD Mandate in Canada, how it compares to the ongoing ELD Mandate in the United States, and the implications going forward on the trucking industry.Hosted by Reid Estreicher, Director of Solutions Engineering, 3Eye Technologies
3Eye joins Identity Automation for a discussion focused on the education world, and how schools can adapt to remote learning in a COVID-19 world.Hosted by:Reid Estreicher, 3Eye Technologies, Director of Solutions EngineeringGuests:Mack Bickle, Partner Manager, Identity AutomationCarter Dunbar, Implementation Strategy Manager, Identity AutomationTim Till, Public Sector Sales Manager, Identity Automation
3Eye joins Jason Claybrook from Aura Wireless to discuss how Aura Wireless provides secure, large-scale outdoor wireless coverage areas with their proprietary WiFi antenna technology.Host: Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests:Jason Claybrook, Head of Sales & Marketing, Aura WirelessGreg Waddell, Partner Manager, 3Eye Technologies
3Eye joins Inseego for a conversation on the importance of staying connected, secure and protected in a WFH world.Host:Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests:Steven Brown, Senior Vice President of Sales, InseegoRod McLane, VP - Field/Partner/Channel Marketing, InseegoAmbrose Bregg, Account Manager, 3Eye Technologies
3Eye joins Jake Parker and Kyle Lonzak from RAM Mounts to discuss the new IntelliSkin Next Gen product line.Hosted by:Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests:Kyle Lonzak, Business Development Manager, RAM MountsJake Parker, Director of Sales and Business Development, RAM Mounts
3Eye joins Joel Windels and Jay Klauser from NetMotion for a conversation about how remote connectivity problems can impact a business in the COVID-19 era.Hosted by: Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests:Greg Waddell, Partner Manager, 3Eye TechnologiesJoel Windels, Chief Marketing Officer, NetMotionJay Klauser, VP Worldwide Sales Engineering and Alliances, NetMotion
3Eye joins Mack Bickle and Carter Dunbar from Identity Automation to discuss the importance of Identity and Access Management (IAM) and how Multi-Factor Authntication (MFA) fits into a complete security deployment.Hosted by:Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests:Mack Bickle, Partner Manager, Identity AutomationCarter Dunbar, Implementation Strategy Manager, Identity Automation
3Eye joins Rick Remes and Steve Flowers for a conversation about mobile threat defense, how critical it is for organizations and individuals to be prepared, and then a live demo of a phishing attack and a man in the middle attack.Hosted by: Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests: Greg Waddell, Partner Manager, 3Eye TechnologiesRick Remes, Senior Director of Worldwide Channels, ZimperiumSteve Flowers, Presales Engineer, Zimperium
3Eye joins Bob Weber, CRO of DefendEdge, for a conversation about DefendEdge's groundbreaking threat defense solution, SiON. Hosted by:Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuest:Bob Weber, CRO, DefendEdge
3Eye joins Humanergy co-founder John Barrett to discuss what great leadership looks like and other themes from John's new book, "What Great Teams do Great"Hosted by:Reid Estreicher, Director of Solutions Engineering, 3Eye TechnologiesGuests:Conor Macfarlane, CEO, 3Eye TechnologiesJohn Barrett, Chief Insight Officer, Humanergy