Logo

    Beyond the Device with 3Eye Technologies

    3Eye Technologies and their channel partners explore everything in the world of mobile tech - topics range from product deep dives with industry experts, to leadership and business strategy discussions, to how to go to market effectively in a world that is relying more and more on mobile communication.
    en-us34 Episodes

    People also ask

    What is the main theme of the podcast?
    Who are some of the popular guests the podcast?
    Were there any controversial topics discussed in the podcast?
    Were any current trending topics addressed in the podcast?
    What popular books were mentioned in the podcast?

    Episodes (34)

    Beyond The Device: Identity Automation in Healthcare

    Beyond The Device:  Identity Automation in Healthcare

    In this podcast episode of "Beyond The Device," Reid Estreicher of 3Eye Technologies interviews Mike O'Marra from Identity Automation. They discuss the significant role Identity Automation plays in the healthcare sector by providing solutions that streamline access to various systems and applications.

    O'Marra, with almost two decades of experience in healthcare technology, outlines how Identity Automation's products, Exact Access (XA) and Quick Access (QA), have evolved to meet the industry's changing needs. The XA was developed to provide clinical enterprise workflow solutions, easing access to hundreds, if not thousands, of applications, while the QA, a more lightweight RFID badge tap solution, was created to assist in quick and secure login to one resource, such as a local Windows session or virtual desktops.

    Estreicher and O'Marra further discuss the wide-ranging benefits of these solutions for various stakeholders, including clinicians, IT staff, and hospital management. For clinicians, the solutions help save time, enhancing their interaction with patients and their overall work satisfaction. For IT staff, the solutions ensure effective system access and compliance with audit requirements. Hospital management can see measurable improvements in efficiency and finance.

    The conversation also sheds light on how Identity Automation long-term customer, Colorado Health showing the effectiveness of the XA and QA Identity and Access Management solutions for healthcare.










    Beyond the Device: Hypergate

    Beyond the Device:  Hypergate

    Single Sign On is a powerful tool that has tangible benefits in the workplace. With SSO, users no longer need to manually log into each individual resource they access as part of their job - saving them time and energy while also providing an extra layer of security by protecting accounts from being exposed through phishing scams or compromised passwords. Hypergate takes these safeguards one step further with its comprehensive software solution for implementing single sign on across multiple platforms quickly and securely.

    Kris Putrins, Regional Sales Director at Hypergate joins from Switzerland to share how Hypergate Authenticator leverages Kerebos and your existing infrastructure and enables your employees to access company resources on their Android Enterprise and iOS smartphones like they are used to with a computer.

    Beyond The Device: ScaleFusion

    Beyond The Device:  ScaleFusion

    Season 3 |  Episode 36

    In this episode of Beyond the Device, host Reid Estreicher is joined by Amit Poona and Steven Gohl of Scalefusion to show that not all MDM's are created equally. Many of the MDM's in the market today are singularly focused in trying to beat the competition by matching features that are often unused or underutilized in a marketing slick that the competitor has.  "what has helped us a lot, and not making it feature centric but more towards to the features which our users are going to use every day in and out. I think 95% or 96% of times whatever features we have, they have been used. So, that's good to see that what we have built is actually used day to day. The other key thing is though everyone wants to make an easy to use software, and even Scalefusion is easy to use MDM. However, some people need some help, right? And nowadays with the current things. Like support is crazy, right? People have to wait in queues or they're talking to bots and so on. One thing that we have been doing differently is we don't use bots." Noted Amit Ponam

    "At Scalefusion, we have this track record of replying to customers within two minutes. Now, not resolution time, but replying. At least coming back to them saying that hey we are here and we are going to help you with real people. And I think that helps a lot because that gives you that peace of mind that hey I'm not going to be stuck around and not going to get my answers. But somebody telling you, giving you assurance, I'm going to be with you, we do that.  And second response for us is close to four minutes on average. And typical resolution time is within two hours."

    Beyond the Device: OuterFactor

    Beyond the Device:  OuterFactor

    10 years ago Conor Macfarlane founded 3Eye Technologies.  As a specialty distributor focused on mobility, identity and security, Conor identified an unmet market need in that mobile device protection has always been focused as a B2C play.  So if you're a corporate purchaser, if you're in healthcare technology procurement, if you are a government buyer deploying mobile devices and you're looking for affordable and reliable device protection, you've got two options today. The first is really expensive consumer brands that you might know from your experience as a consumer. Because let's face it, everybody's got a device with a case. Or you are taking a chance on something that you find online somewhere that you've never heard of and maybe it's hitting a price point that's more attractive. That is the ethos of OuterFactor. OuterFactor was born to solve an unmet market need.  The need for reliable, rugged, B2B first device protection at a price point that makes sense.  

    President/CEO at 3Eye, Founder of OuterFactor, Conor Macfarlane joins the Beyond the Device Podcast with host, Reid Estreicher to share how OuterFactor is delivering reliable, rugged, B2B first device protection at a price point that makes sense.

    Beyond the Device Episode 34: Syncdog

    Beyond the Device Episode 34:  Syncdog

    What a lot of people don’t understand is how mobile device management works. Oftentimes, people ask if it is software and the answer to that is yes and no. MDM is a solution that uses software as a component in order to provision and protect mobile devices and their data. Organizations practice this by applying not only software but also processes and security policies to their mobile devices and their use.

    Besides provisioning and managing device inventory, MDM is a great way to protect a mobile device’s data, content, and applications from threats.

    So what sets this apart from mobile security?

    Brian Egenrieder and Ted Bienkowski join Reid Estreicher on the Beyond the Device Podcast to discuss mobile security and coming CMMC requirements.

    Beyond the Device: Push to Talk with RAM & AINA

    Beyond the Device:  Push to Talk with RAM & AINA

    Caramie Huntington (AINA) and Kyle Lonzak from RAM Mounts join Reid Estreicher on the Beyond the Device podcast to share how they have joined forces to create a best in class Push-to-Talk bundle available through 3Eye Technologies.

    AINA is compatible with all major PTT applications, enabling instant communication in and around the vehicle while providing clear and crisp audio quality, amplifying all media sounds through a Bluetooth connection. This extremely rugged and water-resistant wireless microphone stays in constant charge, provided by an in-vehicle charging cradle. Designed and manufactured in Europe, a 2-year warranty is included on the microphone when purchased alongside a charging cradle.

    Designed and manufactured in America, RAM® Mounts is trusted by the nation’s largest transportation fleets and OEM’s. RAM® offers a lifetime warranty on mounts and a 3-year warranty on electronics.

    Hosted by:

    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/

    Guests:
    Caramie Huntington, Sr. Enterprise Sales Manager
    https://www.linkedin.com/in/caramie/

    Kyle Lonzak, Business Development Manager at RAM Mounts
    https://www.linkedin.com/in/kyle-m-lonzak-12364520/

    Beyond The Device: Mobilizing Healthcare Workflow with Altus

    Beyond The Device:  Mobilizing Healthcare Workflow with Altus

    Traveling from room to room and floor to floor in a clinical or hospital setting is already exhausting enough. But bringing a heavy and uncomfortable workstation around brings the effort to another level. So nurses want something that’s functional, mobile, and easy to use. That way, they can easily bring workstations wherever needed to improve patients outcomes. 

    Joe Hillebrand and Steven Gapski from Altus join Reid Estreicher and the Beyond the Device Podcast to discuss how Altus-Inc. healthcare workstations and carts increase mobility in clinical environments.   Altus designed carts are built for clinical environments that are ergonomically friendly, easily hold computers, keyboards, and other tools used for data recording, management, and gathering so that nurses can get the vitals of patients from their bedside or in the ER without the need to travel back to the nurse's station to manually input the information.

    Beyond the Device: Push to Talk with AINA

    Beyond the Device:  Push to Talk with AINA

    Caramie Huntington joins the Reid Estreicher and the Beyond the Device Podcast to discuss how AINA has evolved critical Push-to-Talk applications over multiple licensed and unlicensed bands with multiple devices that are worn on body and in-vehicle for law enforcement, first responders (fire/EMS), military, fleet and more.  

    AINA is compatible with all major PTT applications, enabling instant communication in and around the vehicle while providing clear and crisp audio quality, amplifying all media sounds through a Bluetooth connection. This extremely rugged and water-resistant wireless microphone stays in constant charge, provided by an in-vehicle charging cradle. 

    Beyond the Device: RAM Mounts with Kyle Lonzak

    Beyond the Device:  RAM Mounts with Kyle Lonzak

    Reid Estreicher, host of 3Eye Technologies Beyond the Device podcast and Vice President, Business Development discusses RAM Mounts for Laptops and with Kyle Lonzak, Business Development Manager at RAM Mounts.  

    In this episode of Beyond the Device, Kyle Lonzak explains the growing trend of replacing in-vehicle laptops with tablets and ruggedized keyboards for government (police, fire, military and EMS) as well as industrial fleet vehicles.  With RAM's modular design concepts, leveraging existing laptops while transitioning to tablets and other in-vehicle technology stacks becomes simpler and more cost-effective.  

    Beyond The Device: Identity Security with Iuncta

    Beyond The Device:  Identity Security with Iuncta

    Swale Nunez joins us on this episode of Beyond the Device  to discuss Identity Management, Web3 and your identity in the Metaverse.  

    "What we are hoping to do is give users back control over their digital identity," says Swale Nunez.  "You have commoditized my identity and profited off of my identity."

    Identity is the most valuable thing on the Internet.

    "You brought up the word that I use in a lot of the times when I speak is psychographics, right. And they track and monitor our behavioral patterns and things that we're interested in. I've heard people describe that term as a war tool. Because it's so influential and impactful in the sense that it can have a negative impact and affect massive amount of people. And that's one of the things going back to just our platform and we pride ourselves on our ethical practices. Because right now with our competitors right, and just for those who don't know, a social login is what you see whenever you're either creating an account or login into something. They give you the option to either log with Facebook or login with Google because you have existing accounts with them, right?"

    The sites you visit know that, the apps you use know that, the companies that control them know that — but do you know that?

    "In this digital world, our identities are being managed and collected by entities that aren't us. And to make matters worse, they’ve done an absolutely stellar job at profiting off it. Unfortunately, you don't have a good idea of what's being shared, right. And beyond that, this is your social network, right? There's things on there that if I'm opening a new account for my banking information, right. I don't need my bank to know that I was at this place two weeks ago or these are my friends or these are my likes, right. That's unimportant for my bank account," suggests Swale.  "But a lot of that data is being shared. And that's where the privacy concerns come into play. Because again, I shouldn't have to relinquish that information just to open an account. And I'm using bank account as an example, but any account in general. For us, we are transparent in the data that's being shared and nothing is being shared unless you approve it. Here it's the information that's being requested to create this account. Do you want to share that information? Yes I do or No I don't. Whereas in these other platforms, it's you click a button and you don't know what information is being shared, right."

    Proper identity management is integral if you want to take back control of your online identity. 

    "To just to exist in this digital climate now, it involves you having to relinquish that control, right. And that's what we're trying to counter as much as possible, right. And it's twofold, right," says Swale. "As much as we champion the user, we create a platform that is beneficial to our partners as well, right. We help accelerate that onboarding process because we simplify authentication of the user and also data capture, right. Because everybody knows in an onboarding process, the key is to make it as personalized as possible, right. Because as users, I think we are two times or twice as engaged when we realize that this presentation is catered to me specifically, right. 


    Beyond The Device: Identity Management with BIO-Key

    Beyond The Device:  Identity Management with BIO-Key

    Protecting the valuable data that organizations generate, gather, and store from unauthorized access is crucial. Data breaches of any magnitude can have an enormous impact on your company's bottom line and stakeholder confidence. Businesses can improve the security of their data by implementing identity management solutions.

    In a recent podcast, we interviewed biometric identification and access control experts from BIO-key. With Kimberly Biddings, BIO-key International's VP of Product, and Scott Mahnken, BIO-key International's VP of Channel Marketing, we discussed the importance of identity protection and management for businesses. Here are some crucial points.

    What Is Identity Management?

    Identity management offers a layer of security to your company by identifying, verifying, and authorizing individuals and then granting them access to your data systems. It's about making sure that only the individuals with authorization, and only at a level that allows them to execute their tasks successfully, can gain access.

    This is more crucial than ever since as enterprises shift to the cloud, they require more passwords. For instance, a new set of credentials can be needed with each new application — these open businesses up to a greater risk of unauthorized access to sensitive data.

    With BIO-key's identity management systems, users no longer have to provide their password for every program they use due to a single secure login. "The main differentiator for us is that we have identity-bound biometrics, which identifies the person. It is a biometric that's bound to your identity, stored centrally, extremely secure," says Biddings.

    The Bottomline

    Cyberattacks are a persistent and imminent danger. As a result, businesses need to implement cybersecurity safeguards to prevent unauthorized access to their systems. Using identity management solutions from BIO-key provides a necessary layer of defense to protect businesses and their people.


    Beyond The Device - Data Recovery with SecureData

    Beyond The Device - Data Recovery with SecureData

    3Eye joins the team from SecureData to discuss their range of tailored high-level data protection products.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/​

    Guests: 
    Ken Higgins, VP - Vice President of Business Development, SecureData
    https://www.linkedin.com/in/ken-higgins-14a3919/

    Blake Higgins, Sales Manager, SecuraData
    https://www.linkedin.com/in/k-blake-higgins-26802936/

    Peter Carcione, Vice President of Marketing, SecureData
    https://www.linkedin.com/in/pcarcione/

    Company Websites:
    SecureData: https://www.securedatarecovery.com/
    3Eye: https://www.3eyetech.com/​

    Beyond The Device - Contextual Mobility Management With TRUCE Software

    Beyond The Device - Contextual Mobility Management With TRUCE Software

    3Eye joins Pete Plotas from TRUCE Software for another episode of Beyond the Device to discuss how TRUCE helps manage the safe and productive use of mobile technology in the workplace.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/

    Guests: 
    Pete Plotas, Global VP, Alliances & Strategic Development, Truce Software
    https://www.linkedin.com/in/peteplotas

    Company Websites:
    TRUCE Software: https://trucesoftware.com/
    3Eye: https://www.3eyetech.com/

    Beyond The Device - Deploying Your Wireless And Mobile Management Solutions With eSquared

    Beyond The Device - Deploying Your Wireless And Mobile Management Solutions With eSquared

    3Eye joins Josh Fulton from eSquared for another episode of Beyond the Device to discuss deploying wireless and mobile management solutions and how working with eSqaured can help.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/

    Guests: 
    Josh Fulton, Founder / Managing Partner, eSquared
    https://www.linkedin.com/in/josh-fulton-142bb93

    Company Websites:
    eSquared: https://www.e2cc.com/
    3Eye: https://www.3eyetech.com/

    Beyond the Device - Top Mobile Security Stories of 2021 with Zimperium

    Beyond the Device - Top Mobile Security Stories of 2021 with Zimperium

    3Eye joins Krishna Vishnubhotla from Zimperium for another episode of Beyond the Device to discuss some of the biggest mobile security stories of 2021 and how Zimperium works to address security breaches.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/

    Guests: 
    Krishna Vishnubhotla, VP of Product Strategy, Zimperium
    https://www.linkedin.com/in/krishna-v...

    Company Websites:
    Zimperium: https://www.zimperium.com/
    3Eye: https://www.3eyetech.com/

    Beyond The Device - Chrome Extension Security With Zimperium

    Beyond The Device - Chrome Extension Security With Zimperium

    3Eye joins Kern Smith from Zimperium to discuss Chrome Extension security concerns and the impact of these vulnerabilities on the education space.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/​

    Guests: 
    Kern Smith, VP - Pre-Sales America's, Zimperium
    https://www.linkedin.com/in/kernsmith/

    Company Websites:
    Zimperium: https://www.zimperium.com/
    3Eye: https://www.3eyetech.com/​

    How to Prevent Data Leakage in Mobile Apps

    How to Prevent Data Leakage in Mobile Apps

    3Eye joins Krishna Vishnubhotla from Zimperium for another episode of Beyond the Device to discuss how Zimperium addresses mobile security concerns, how to prevent data leakage in mobile apps and Zimperium's Mobile Risk Assessment.  

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/

    Guests: 
    Krishna Vishnubhotla, VP of Product Strategy, Zimperium
    https://www.linkedin.com/in/krishna-vishnubhotla/

    Company Websites:
    Zimperium: https://www.zimperium.com/
    3Eye: https://www.3eyetech.com/

    Beyond The Device - Upgraded Wireless Infrastructure at King City School District with Aura Wireless

    Beyond The Device - Upgraded Wireless Infrastructure at King City School District with Aura Wireless

    3Eye joins Shawn Angulo from King City Union School District and Jason Claybrook from Aura Wireless to discuss how Aura's solutions helped make wireless infrastructure available to King City students.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/​

    Guests: 
    Shawn Angulo, Director of Technology, King City Union School District
    https://www.linkedin.com/in/shawn-angulo-a5691288/

    Jason Claybrook, Head of Sales and Marketing, Aura Wireless
    https://www.linkedin.com/in/jason-claybrook-b829392/

    Company Websites:
    Aura Wireless: https://aurawireless.com/
    3Eye: https://www.3eyetech.com/​

    Beyond the Device - Device Provisioning Demo with Imprivata

    Beyond the Device - Device Provisioning Demo with Imprivata

    3Eye sits down with Victor Pizzolato from Imprivata to give two live demos for device provisioning and checkout solutions for iOs devices.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/​​

    Guests: 
    Victor Pizzolato, Sales Specialist 
    https://www.linkedin.com/in/victor-pi...​

    Company Websites:
    Imprivata: https://www.imprivata.com/​
    3Eye: https://www.3eyetech.com/​​

    Beyond The Device - Aura Wireless and Koplement

    Beyond The Device - Aura Wireless and Koplement

    3Eye joins Holly Davis from Komplément and Jason Claybrook from Aura Wireless to discuss a variety of funding programs available to schools and how the CARES Act and E-Rate are impacting the world of education.

    Hosted by:
    Reid Estreicher, VP of Business Development, 3Eye Technologies
    https://www.linkedin.com/in/thereid/​

    Guests: 
    Holly Davis, CEO, Komplément 
    https://www.linkedin.com/in/hollykdavis/

    Jason Claybrook, Head of Sales and Marketing, Aura Wireless
    https://www.linkedin.com/in/jason-claybrook-b829392/

    Company Websites:
    Aura Wireless: https://aurawireless.com/
    Komplément: https://www.komplementconsulting.com/
    3Eye: https://www.3eyetech.com/​

    Logo

    © 2024 Podcastworld. All rights reserved

    Stay up to date

    For any inquiries, please email us at hello@podcastworld.io