This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
ON DEMAND: This course will walk security professionals through five steps to creating a realistic security master plan and how to make the business case for funding. We start with where you're at and what capabilities you have.
ON DEMAND: The physical security industry adopts datacenter information technology in bits and pieces, but not to the extent possible. This prevents organizations from making strides in reducing costs and complexity, rapidly responding to change, and delivering on the prime security directives of keeping people and property safe.
ON DEMAND: At the center of an organization's security operation stands its nucleus, one of the most important pieces for overall functionality: the global security operations center (GSOC). But that can look different based on goals, budget and overall vision. However, one commonality remains: the GSOC is where a variety of systems and solutions come together to provide a singular operational picture, mitigate threats and promote enhanced communication during an incident.
ON DEMAND: Risk impacts every organization, and critical events and can cripple your operations if they’re not properly managed. For organizations focused on risk resiliency, the command center is quickly becoming the operational hub of risk management within an organization: the nerve center for risk.
ON DEMAND: With the coronavirus pandemic adding to an evolving set of risks to already challenged security operations and budgets, reducing enterprise risk is more complex than ever.
ON DEMAND: In this webinar, we’ll share quantitative, real-world pay and bill rate data from hundreds of security firms across the U.S. to identify common trends. We’ll review how companies price their services based on location, type of post, and the size of the firm.
ON DEMAND: This webinar will cover the design phase of the Yale Police Department’s existing radar layout at the Yale Bowl and the security challenges it has presented. It will also discuss the need to keep the historical nature of the Yale Bowl building in mind while designing a new surveillance system. In addition, the webinar will cover how the Yale public safety team is using the new surveillance system to identify a suspect to decide, in real time, whether or not to dispatch additional resources.
AVAILABLE ON DEMAND Convergint Technologies describes Quadrant Four as the highest level of enterprise integration. It is where IT, applications and product knowledge are combined to develop solutions that solve customers’ business problems and help them drive business excellence. The development of the Quadrant Four vision, the strategy for how it is being implemented in the market, and the positive results it has garnered are what earned Convergint Technologies SDM’s 2012 Systems Integrator of the Year Award.
AVAILABLE ON DEMAND This webinar examines how Brown Shoe Company uses security technology in its more than 1,300 locations. Join Protection 1’s Lisa Ciappetta, Senior Director Marketing, and Jim Shepherd, National Account Manager, together with their customer, Kevin Darnell, Director of Loss Prevention at Brown Shoe Company, for this webinar!