Please enable JavaScript
Email Marketing by Benchmark
  • Is Facial Recognition Here to Stay?

    webinar

    If you harbor any doubt about the future of facial recognition then Stone Lock? Pro may just change your mind. In this session we will demonstrate a sophisticated biometric device that provides instant, reliable confirmation of identity. You will learn about the use of near-infrared wavelengths and why it is ideal for capturing the instrinsic […]

  • Automating Access Control With Digital Mustering, Webinar

    Emergency preparedness and personnel tracking processes have been around for years. Yet it?s only recently that these typically arduous and manual processes have become automated, digitized and more widely adopted. Join experts from Avigilon on March 12th at 1 p.m. ET as they provide you with the latest applications and innovations in digital mustering. The […]

  • Access Control Obstacles: How to Win the Challenge of IT vs. Business Units

    Webinar , United States

    Attribute Based Access Control (ABAC) may be the future of identity and access management* (just ask analyst Gartner and KuppingerCole) but up until now there have been certain obstacles. In the main these are non-technical ? and they are now being overcome. With the launch of the Axiomatics Policy Server 6.0, Axiomatics is bridging the […]

  • Thermal Detection Technology for a More Secure Perimeter

    webinar

    How does thermal detection technology make for a more secure perimeter? Join an informative session with Sightlogix to learn how! We will help you to better understand how thermal detection is used to detect intrusion in all weather conditions, in addition to which verticals are using perimeter intrusion detection today and how to approach them. […]

  • Access Control: Manage the Transition to a New Industry Standard

    webinar

    How challenging will it be to transition to a new access control standard? Join Cypress Integration Solutions to find out more about the Security Industry Association's emerging OSDP standard. Learn what OSDP really is, why some are calling OSDP the new Wiegand, and how to manage the transition.

  • Risk Assessment – the First Step to Effective Security Measures, Webinar

    Webinar , United States

    The assessment of risk and vulnerabilities is a key responsibility of every security professional. The ability to properly manage risk by implementing effective security measures is also critical for a successful program. Attendees will gain an understanding of the fundamentals needed to perform a risk assessment

  • Top Security Trends for 2015 ? 2016

    Webinar

    Which social, business and technology forces continue to shape business risks and responses Which security technologies and processes work and which ones may be needed in the months ahead How businesses can balance security and risk effectively During 2014 we've seen profound changes in cybersecurity, altering planning, delivery, operations and management in an attempt to […]

  • (ISC)

    Webinar , United States

    Your users demand access everywhere, any time, via any device. Whether it's a cloud or enterprise application, they still need access to maintain productivity. And what you need is to maintain compliance and minimize access risk. Join (ISC)

  • CSO Roundtable: Next Generation Security Threats

    Webinar , United States

    11:00am - 12:00pm EDT The CSO Roundtable is pleased to host author Marc Goodman to discuss next generation security threats and his new book Future Crimes: Everything is Connected, Everyone is Vulnerable and What We Can Do About It. The book covers a wide variety of emerging security threats that all CSO?s should be aware […]

  • Webinar: Fight Fraud and Offer a Better Customer Experience With Voice Biometrics

    Webinar , United States

    Determined fraudsters today bypass security measures like passwords and knowledge-based authentication, and they use social engineering to collect credentials to take over victims' accounts. Customers who engage with customer service representatives and interactive voice response systems expect businesses to protect their identities and privacy, and do so without materially affecting the convenience of these interactions. […]

  • Biometric Enablement Program

    Webinar , United States

    ENTERTECH SYSTEMS hosts a bi-weekly FREE webinar on how to be successful with biometrics.The webinars are designed to provide biometric hardware and software solutions education and tools for systems integrators, installers, dealers and partners

  • Webinar: Is Cloud-Based Recovery Right for Midsize Enterprises?

    Webinar , United States

    The current state of cloud-based recovery provider service maturity Whether cloud-based recovery is a viable solution for your organization Steps midsize organizations should take to minimize monthly service costs Since […]

  • Audio – Axis Communications Webinar

    Webinar , United States

    Dependent upon local laws and regulations, audio can be a useful feature for IP video surveillance solutions. We invite you to join this presentation to learn how audio, a capability […]