
Sign up to save your podcasts
Or
In this episode, Allot's Product Marketing Director, Michael Schachter, is joined by Antje Rozinger, Director of Product Management @ Allot - to discuss the main challenges of small to medium businesses regarding cyber security.
First, we spotlight what or who exactly the SMBs are. The definition changes from one country to another when it comes to the number of employees in different industries. However, specific criteria remain the same across the board.
Then our specialists detail the unique requirement of SMBs for cyber security solutions because they are a relatively easy target for cyber-criminals, primarily due to the lack of workforce, budget, and at times required skills to develop proper cyber defenses for their businesses. We go down the rabbit hole to inquire what exactly are the default security settings SMBs turn to - but no surprise there that these security means need to be improved in scope and capabilities.
We sum it up with the route in which telecommunication providers can and at times, are asked to supply a complete security solution for their business clientele. Moreo
In this episode, Allot's Product Marketing Director, Michael Schachter, is joined by Antje Rozinger, Director of Product Management @ Allot - to discuss the main challenges of small to medium businesses regarding cyber security.
First, we spotlight what or who exactly the SMBs are. The definition changes from one country to another when it comes to the number of employees in different industries. However, specific criteria remain the same across the board.
Then our specialists detail the unique requirement of SMBs for cyber security solutions because they are a relatively easy target for cyber-criminals, primarily due to the lack of workforce, budget, and at times required skills to develop proper cyber defenses for their businesses. We go down the rabbit hole to inquire what exactly are the default security settings SMBs turn to - but no surprise there that these security means need to be improved in scope and capabilities.
We sum it up with the route in which telecommunication providers can and at times, are asked to supply a complete security solution for their business clientele. Moreo