ON DEMAND: In this webinar, we will outline the Security Growth Curve, which provides you with the context of the different levels of maturity to effectively assess where you are relative to the industry in terms of value and maturity. If you are trying to improve your financing with your current provider, looking to expand into new markets or new products, keep key employees, or looking to take some money off the table, you should invest 50 minutes of your valuable time.
ON DEMAND: Locations that were once considered safe havens such as schools, places of worship and healthcare institutions are no longer immune to acts of violence. The session will be specific to unique risks in healthcare settings and address preparedness and response through training, education and communication.
ON DEMAND: In today's tumultuous global climate, where corporations span countries and employee travel is essential to doing business, crises are inevitable. This is why corporate security teams must always be ready for the unexpected and have procedures and plans in place to respond quickly and efficiently. A lag in crisis response or an ineffective response can cost money, resources, and even lives.
ON DEMAND: User experience. You’ve probably heard this term used in reference to some of your favorite apps and devices like Facebook or Twitter, but what does “user experience” have to do with physical security?
ON DEMAND: No environment is completely safe. While shootings in schools, nightclubs, churches and concerts capture many new headlines, more than 80 percent of active shooter incidents occur in the workplace, according to FBI data.
ON DEMAND: While large high tech and Fortune 500 companies have been delivering unprecedented levels of security, safety, emergency, and HR resources to their employees, vendors, user base, etc. at work and at home, the Global Security Operations Center as a Service (GSOCaas) model can now offer mid-size and fast-growing companies the same level of care and risk mitigation.
ON DEMAND: The term “Internet of Things” is becoming increasingly common in the vocabulary of IT and physical security professionals. While IoT may seem like a foreign concept, it’s probably more familiar than you realize. Of the 17.5 million petabytes of data generated by IoT applications, 84% comes from video surveillance! Additional IoT data is generated by integrated security sensors, access control systems and other physical security applications.
ON DEMAND: With so many recent high-profile breaches accomplished through compromising passwords on privileged accounts, Privileged Access Management is now everyone’s priority (Gartner puts it at the top of their “Top Security Projects” list for 2 years in a row). But where do you start? And how do you know which PAM solution will work best to protect your organization without sacrificing productivity?
ON DEMAND: Boeing is the world's largest aerospace company and leading manufacturer of commercial jetliners, defense, space and security systems, and service provider of aftermarket support. The company supports airlines and U.S. and allied government customers in more than 150 countries and employs more than 150,000 people across the United States and in more than 65 countries.
AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.
This month in Security magazine: meet the global security team at Boston Scientific - five female professionals with diverse background and skills who are creating a best-in-class enterprise security team while ensuring the safety and security of employees, customers and patients. Also this month, we highlight Kristin Lenardson and her successful career in protective services. Security experts discuss whistleblowing, the CCPA and more.