Events Search and Views Navigation
Past Events › Company Webinar
Events List Navigation
This is a monthly webinar in which Arecont Vision employees and guests speak about the benefits of Megapixel IP surveillance and cover the basics of the technology and provide guest speakers from NVR/VMS partners. Length: 60 minutes Speakers: Arecont Vision and Guests
Find out more »Internet of Things is a broad-reaching concept traversing virtually every market segment. The IoT space has created a market opportunity valued as high as $14.4 trillion by analysts. IoT implies that devices with information become "smart" by adding connectivity and a means to provide or consume information to and/or from other external systems. The silicon and sensor components play a big role in the capabilities and cost of the IoT device. Software that incorporates connectivity to enable "smart" is required.…
Find out more »MorphoTrak, the nation?s leading provider of biometric identification solutions including facial recognition, Rapid DNA, mobile ID, PIV-based access control, and multimodal biometric systems, will present How to Access Federal Funding for Biometric Technology, Thursday March 5, 10 am ? 11 am Your organization?s struggle to acquire funding for AFIS and other biometric technologies is over. Biometric devices are included on the Authorized Equipment Lists for both the Department of Justice and the Department of Homeland Security, and are an allowable…
Find out more »If you harbor any doubt about the future of facial recognition then Stone Lock? Pro may just change your mind. In this session we will demonstrate a sophisticated biometric device that provides instant, reliable confirmation of identity. You will learn about the use of near-infrared wavelengths and why it is ideal for capturing the instrinsic properties of a face. This technology is well suited for a wide variety of critical access control situations. Facial features are scanned, with a match…
Find out more »Emergency preparedness and personnel tracking processes have been around for years. Yet it?s only recently that these typically arduous and manual processes have become automated, digitized and more widely adopted. Join experts from Avigilon on March 12th at 1 p.m. ET as they provide you with the latest applications and innovations in digital mustering. The time is now to start leveraging actionable data to protect your people, increase organizational efficiencies and save money: Time to gain real-time insight to safety…
Find out more »Attribute Based Access Control (ABAC) may be the future of identity and access management* (just ask analyst Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical ? and they are now being overcome. With the launch of the Axiomatics Policy Server 6.0, Axiomatics is bridging the gap between business and IT by bringing business managers into the policy lifecycle management process ? and giving them a tool whereby they can easily…
Find out more »How does thermal detection technology make for a more secure perimeter? Join an informative session with Sightlogix to learn how! We will help you to better understand how thermal detection is used to detect intrusion in all weather conditions, in addition to which verticals are using perimeter intrusion detection today and how to approach them. Evaluate your options to expand your portfolio of intrusion detection technologies on current and future projects. Who Should Attend? ? Integrators who support critical infrastructure…
Find out more »The AlertEnterprise Airport Audit package is a simple, affordable, and quick way to streamline your audits from scheduling through certification.
Find out more »How challenging will it be to transition to a new access control standard? Join Cypress Integration Solutions to find out more about the Security Industry Association's emerging OSDP standard. Learn what OSDP really is, why some are calling OSDP the new Wiegand, and how to manage the transition.
Find out more »The assessment of risk and vulnerabilities is a key responsibility of every security professional. The ability to properly manage risk by implementing effective security measures is also critical for a successful program. Attendees will gain an understanding of the fundamentals needed to perform a risk assessment
Find out more »In this webinar we will take a look at the Complete Surveillance Solution by Grandstream. Grandstream IP Video Surveillance Solutions include Box IP Cameras, Cube & Mini Dome IP Cameras,
Find out more »Which social, business and technology forces continue to shape business risks and responses Which security technologies and processes work and which ones may be needed in the months ahead How businesses can balance security and risk effectively During 2014 we've seen profound changes in cybersecurity, altering planning, delivery, operations and management in an attempt to keep up with new and increasing threats to the enterprise. Traditional approaches to IT security have limited impact and require changes as well. This webinar…
Find out more »Your users demand access everywhere, any time, via any device. Whether it's a cloud or enterprise application, they still need access to maintain productivity. And what you need is to maintain compliance and minimize access risk. Join (ISC)
Find out more »11:00am - 12:00pm EDT The CSO Roundtable is pleased to host author Marc Goodman to discuss next generation security threats and his new book Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It. The book covers a wide variety of emerging security threats that all CSO?s should be aware of and has been endorsed by the President of Interpol, the Deputy Assistant Director of the FBI and many others.
Find out more »Determined fraudsters today bypass security measures like passwords and knowledge-based authentication, and they use social engineering to collect credentials to take over victims' accounts. Customers who engage with customer service representatives and interactive voice response systems expect businesses to protect their identities and privacy, and do so without materially affecting the convenience of these interactions. In this Webinar, we cover how performance and technology advances are elevating voice biometrics as a viable option for customer authentication and fraud prevention, and…
Find out more »