Sam Eldin - IT Profile |
---|
Home | CV - Resume | Tools 4 Sharing | Architects 2 Show | Big Data Presentation | Android Training | Java-Unix Code Templates | Interviews QA & Code |
---|---|---|---|---|---|---|---|
|
Security - The Next Generation (Linkedin Post) |
---|
According to FBI Director James Comey: “There are two kinds of big companies in the United States. There are those who’ve been hacked…and those who don’t know they’ve been hacked.” Security is more critical than ever since:
OUR Simple Approach:
Possible Big Clients: Department of Defense: Department of Defense (DoD) is the biggest client in the world and has personnel, equipment, mobile phones, satellites, arm forces, airplanes, ground bases, ships, ... etc which need communications (wireless or not) that are secure, fast, consistent, dynamic and hacker proof. Especially with the mobile phones that are currently used by personnel at all levels. Wireless Communication Vendors and Clients: The wireless technologies have changed the landscape, but once the data is in air, the wireless data (signals) is an open invitation for the taking. The data streaming speed and the size do have a big role in the wireless system performance. The last and most important part is data security. Cloud Businesses: The same wireless principles apply to the cloud technologies where data is being transmitted between hosts and service providers. The data streaming speed and the size do have a big role in system latency and performance, plus data security is also a must. Big Businesses Databases: Until now, the existing database technologies, vendors and firewalls cannot stop hackers (internal and external) from breaching their system. We would be more than happy to present our approaches, tools and answer all questions and concerns. |
---|