In this episode, host Matthew Lewis, Director of Product Marketing, is joined by Don Campbell, Senior Director of Product Management, and Scott Galvin, Pre-Sales Senior Solutions Architect, for a deep dive into the evolving landscape of physical security in financial services. Together, the trio explores: Insider threat types and how to detect themThe role of visitor management in preventing social engineeringHow mobile credentials are reshaping secure accessDesigning frictionless environment...
All content for HID - Workforce Identity and Access Management is the property of HID and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode, host Matthew Lewis, Director of Product Marketing, is joined by Don Campbell, Senior Director of Product Management, and Scott Galvin, Pre-Sales Senior Solutions Architect, for a deep dive into the evolving landscape of physical security in financial services. Together, the trio explores: Insider threat types and how to detect themThe role of visitor management in preventing social engineeringHow mobile credentials are reshaping secure accessDesigning frictionless environment...
Best Practices to Improve the Outpatient Experience
HID - Workforce Identity and Access Management
22 minutes
2 years ago
Best Practices to Improve the Outpatient Experience
Matthew Lewis, Darwin Rivera, and Duane Foote focus on the best ways to improve the outpatient experience. They capture the behind-the-scenes of the technology used to improve visitor security and discuss how reports can help security and personnel planning.
HID - Workforce Identity and Access Management
In this episode, host Matthew Lewis, Director of Product Marketing, is joined by Don Campbell, Senior Director of Product Management, and Scott Galvin, Pre-Sales Senior Solutions Architect, for a deep dive into the evolving landscape of physical security in financial services. Together, the trio explores: Insider threat types and how to detect themThe role of visitor management in preventing social engineeringHow mobile credentials are reshaping secure accessDesigning frictionless environment...