ON DEMAND: Remote collection & analysis is an important part of any internal investigation within your corporate network. Pulling a full forensic image of an endpoint can be time-intensive and can consume network resources, but a targeted collection can alleviate these concerns.
ON DEMAND: The threat environment in commercial real estate has changed dramatically over the past 10 years, including the real threat of pandemics, active shooters, explosive devices, extreme weather and natural disasters, among other significant threats to commercial facilities.
ON DEMAND: Apple Mac computer use is growing in the corporate space. Having the solutions and the knowledge base to respond to events that include Mac computers is just as important as their Windows counterparts.
ON DEMAND: Should your business say goodbye to disjointed systems? Explore the advantages and capabilities of merging network audio, analytics, physical access control, video recording, and intercoms into a cohesive platform.
ON DEMAND:The 2023 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments and business partners.
ON DEMAND: The U.S. Securities and Exchange Commission (SEC) adopted new disclosure requirements relating to cybersecurity and risk management processes, strategy, governance and leadership oversight.
ON DEMAND: In this webinar, Joey Hunter, Director of Security and Emergency Management at San Gorgonio Memorial Hospital, shares steps for making the right security hire and increasing retention rates in healthcare security roles.
ON DEMAND: Georgetown University, a major international research university with nine schools, an affiliated hospital, and many highly-ranked academic programs, has a mature, layered security program.
ON DEMAND: In this webinar, Regina Lester, Vice President of Security & Safety Operations at Toledo Zoo, will share her insights on implementing security technologies in the entertainment sector and the challenges all organizations face — large and small — when it comes to balancing budget and security.