Senstar is pleased to announce its technical certification training program for its video management solutions and perimeter intrusion detection systems (PIDS) is back in full gear for 2022.

A strictly in-person program before the pandemic, Senstar was able to quickly adapt to online sessions to ensure our customers and partners could continue to receive the training they needed to design, install, and maintain Senstar products,” said Director, Technical Services Luc Boisvert. “In 2022, we are happy to re-introduce some face-to-face sessions, as well as expand online options for certification.”

Training session

Senstar recently held its first post-pandemic in-person training session in Germany, hosting long-time strategic partner Schrödel Haas GmbH.

Senstar technical certification training is region-specific in North America, Europe, and Asia-Pacific. Sessions range from one to three days depending on the product and are taught by Senstar’s technical service experts. Upon completion of a session, participants receive official certification to design, install, and maintain that product. Certification is valid for two years.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...