ON DEMAND You’ll leave this webinar with a proactive security strategy that takes advantage of cloud-based technology’s unique capabilities, and you will receive a complimentary eBrief: Six Questions to Ask When Choosing Your Physical Security Vendor.
ON DEMAND Join us for this expert webinar to discuss the importance of mitigating the active shooter threat by understanding the dynamics of the event, planning for the full-cycle of the event and preparing those at risk with the necessary information and skills.
ON DEMAND Whether you are integrating with different technologies to provide a unified solution, implementing cutting solutions to mitigate risk, or upgrading a legacy system, learn what questions to ask, what to look for in a partner and how to implement an affordable, cost-effective security solution
The tragedy of the United States domestic violence situation is impossible to quantify. There is both a sordid history and an on-going crisis; a crisis that has become normalized. Since 2000, approximately more than 20,000 women have been murdered by domestic partners, or "family terrorists". Read More
AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.
AVAILABLE ON DEMAND This webinar examines how Brown Shoe Company uses security technology in its more than 1,300 locations. Join Protection 1’s Lisa Ciappetta, Senior Director Marketing, and Jim Shepherd, National Account Manager, together with their customer, Kevin Darnell, Director of Loss Prevention at Brown Shoe Company, for this webinar!
Terrorism is changing. The Center for Cyber & Homeland Security at George Washington University is striving to bring science to the art of security decision-making. What can their research into cyberattacks, terrorism and the evolving threat environment do to help your enterprise? Read about this, sports security, security culture and awareness and more in the July issue.