Webinars


On Demand

It’s about time: 4 reasons why your access control is on the clock

Join experts from Avigilon on February 25th as they highlight the key topics you need to consider when assessing your physical access control system this year.

Duration: 1 Hour


What Makes Security in a Campus Work; the role Social Media plays in Protecting Students

Security projects where the newest technology has been deployed but did the actual security level increase and lessons learned following the devastating shooting at Sandy Hook Elementary School

Duration: 1 Hour


ShellShock is a vulnerability in a bash shell commonly found in Unix, Linux and OS X operating systems.

During this webinar, we will provide the technical details behind ShellShock vulnerability as well as how it is being exploited in the wild (along with telemetry data).

Duration: 1 Hour


4 Steps to Reduce Third-Party Personnel Risk

A systematic process for recognizing and minimizing identity-related personnel risks.

Duration: 1 Hour


Access Granted: Access Control Checklist for 2015

Join speakers from Avigilon as they provide you with actionable tips that will allow you to take your access control system to the next level in 2015.

Duration: 1 Hour


Transportation Worker Identification Credential (TWIC): Leveraging TWIC’s Identity Management Mediocrity into Better Risk Mitigation

Captain Mark Johnson, VP of Strategic Accounts at Eid Passport® and a seasoned expert in maritime vulnerability assessments, will discuss how maritime risk mitigation can be made more robust by using proven identity management solutions.

Duration: 1 Hour


Transportation Worker Identification Credential (TWIC): Leveraging TWIC’s Identity Management Mediocrity into Better Risk Mitigation

Captain Mark Johnson, VP of Strategic Accounts at Eid Passport® and a seasoned expert in maritime vulnerability assessments, will discuss how maritime risk mitigation can be made more robust by using proven identity management solutions.

Duration: 1 Hour


Meeting the Challenge of Secure Visitor Management for Secure Government Facilities

Join us for this FREE webinar as we detail the reasons why an enterprise visitor management system is absolutely necessary in today’s government facilities.

Duration: 1 Hour


ShellShock is a vulnerability in a bash shell commonly found in Unix, Linux and OS X operating systems.

During this webinar, we will provide the technical details behind ShellShock vulnerability as well as how it is being exploited in the wild (along with telemetry data).

Duration: 1 Hour


Don’t get left in the dark: HD surveillance options for different lighting conditions

Join us to learn what cameras to choose for your environment and how to combine them with powerful VMS software, to get the most out of your security investment.

Duration: 1 Hour