Webinars


On Demand

ShellShock is a vulnerability in a bash shell commonly found in Unix, Linux and OS X operating systems.

During this webinar, we will provide the technical details behind ShellShock vulnerability as well as how it is being exploited in the wild (along with telemetry data).

Duration: 1 Hour


Don’t get left in the dark: HD surveillance options for different lighting conditions

Join us to learn what cameras to choose for your environment and how to combine them with powerful VMS software, to get the most out of your security investment.

Duration: 1 Hour


PIAM and IAM Debunked - Security Convergence – Understanding How Logical and Physical Identity Management Work Together for a More Comprehensive Approach

Join Quantum Secure for a FREE webinar to understand how organizations can benefit from the expertise of both worlds by having an integrated approach to managing the physical and digital identities

Duration: 1 Hour


Achieving Interoperability in Prevention, Preparation and Response to School Shootings

This presentation will focus on prevention, preparations and response to a school shooting.

Duration: 1 Hour


Optimize Your Physical Identity Management from Your Secure and Budget-Friendly Cloud

Join Quantum Secure for this FREE webinar on how a Virtual Private Cloud is the ideal solution to manage the physical security and compliance requirements for any organization in a secure and cost effective way.

Duration: 1 Hour


The Importance of Personnel Surety for Critical Infrastructure

An overview of the personnel surety measures that can help facilities achieve CIP and CFATS regulatory compliance.

Duration: 1 Hour


Leveraging Security Analytics to Add Value to the Bottom Line

Join us for this FREE webinar to understand how leveraging security analytics can provide new opportunities to improve the efficiency of day-to-day operations and the effectiveness of strategic planning when armed with the capabilities and technologies to transform huge amounts of transactional physical access data into actionable insights.

Duration: 1 Hour


Critical Components for K-12 Safety and Security

Join this school safety and security webinar to understand school administrators concerns and plausible responses to security within a K-12 environment.

Duration: 1 Hour


4 Steps to Reduce Third-Party Personnel Risk

A systematic process for recognizing and minimizing identity-related personnel risks.

Duration: 1 Hour


Achieve FICAM Conformance with a Unified Approach: Physical Identity & Access Management and Physical Security Information Management Converge

This webinar will demonstrate how to effectively transform this stove-piped infrastructure into a common security operational platform.

Duration: 1 Hour