Events and Webinars

From here to there. Find Identiv around the globe at the latest events.

Webinar: Access Control – How to Protect Legacy Systems from Common Vulnerabilities

Webinar: Access Control – How to Protect Legacy Systems from Common Vulnerabilities

Access control infrastructure is purpose-built to be operated for a long time. Under the best of circumstances, there are legacy access control systems that are in operation today which risk exposing vulnerable devices to network attack. This webinar discusses strategies and solutions available to protect those legacy systems by leveraging modern network hardware and services.

Register for Recording »

El Paso International Airport, Smart Airport Tech Expo 2019

El Paso International Airport, Smart Airport Tech Expo 2019

The SMART Airports & Regions Conference & Exhibition is the premier event covering how smart airports and their adjacent regions are leveraging connectivity to stimulate innovation and opportunity.

Learn More »

Federal Mobile Technology by ATARC

Federal Mobile Technology by ATARC

The Advanced Technology Academic Research Center (ATARC) Federal Mobile Technology Summit is a valuable market research tool for IT practitioners within the federal government. This immersive technological learning experience features demonstrations of innovative products and solutions that will provide agencies with greater mission efficiency.

Learn More »

GSX 2019

GSX 2019

ASIS International is the world’s largest association for security management professionals and is the globally recognized leader for education, networking, and information resources. Formerly the ASIS International Annual Seminar and Exhibits, Global Security Exchange (GSX) is the most relevant and pioneering security event that unites the full spectrum of the industry.

Learn More »

2019 AFCEA TechNet Indo-Pacific

2019 AFCEA TechNet Indo-Pacific

TechNet Indo-Pacific is the largest event of its kind in the Indo-Pacific Rim. The conference focuses on the regional issues military leaders have identified, including full spectrum cyber operations as adversaries leverage cyberspace to conduct operations below the threshold of conflict.

Learn More »

Contact

How can we help?

P: +1 888-809-8880
E: sales@identiv.com

Community

Get in-the-know.