What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Webinars


Upcoming

Giving the Campus the Security Advantage

There is growing concern about security and safety issues on America’s campuses. Rightly so. For Stone Security, developing a security plan on campus begins with a best of breed product selection, but it also means making sure the equipment is tied together in a way that is logical and effective.

Date: Aug 20, 2015

Time: 2:00 PM ET

Duration: 1 Hour


On Demand

Why Today’s Customers Buy Electronic Security

Learn how to position your company as a provider of business solutions, not products

Duration: 1 Hour


Stopping Unwanted Elements

Listen to and participate in a Perimeter Security discussion by Baker Hughes Inc. security staff.

Duration: 1 Hour


How to Secure Your School and Campus

Each school and district faces its own different challenges. A risk assessment serves as the framework to identify the right strategies for each school and budget.

Duration: 1 Hour


Busy Airports Require Fundamental Security Solutions

This webinar will focus on security access control at access points throughout an airport facility, and perimeter security covering the expanse of a facility, to the flight line.

Duration: 1 Hour


It’s about time: 4 reasons why your access control is on the clock

Join experts from Avigilon on February 25th as they highlight the key topics you need to consider when assessing your physical access control system this year.

Duration: 1 Hour




What Makes Security in a Campus Work; the role Social Media plays in Protecting Students

Security projects where the newest technology has been deployed but did the actual security level increase and lessons learned following the devastating shooting at Sandy Hook Elementary School

Duration: 1 Hour


ShellShock is a vulnerability in a bash shell commonly found in Unix, Linux and OS X operating systems.

During this webinar, we will provide the technical details behind ShellShock vulnerability as well as how it is being exploited in the wild (along with telemetry data).

Duration: 1 Hour


4 Steps to Reduce Third-Party Personnel Risk

A systematic process for recognizing and minimizing identity-related personnel risks.

Duration: 1 Hour


Access Granted: Access Control Checklist for 2015

Join speakers from Avigilon as they provide you with actionable tips that will allow you to take your access control system to the next level in 2015.

Duration: 1 Hour


  • Security Products
  • Environmental Protection
  • Occupational Health and Safety