Solving the Most Common (and Elusive) Wi-Fi Issues

Roaming failures. Random disconnects. Poor video call quality. These are the Wi-Fi issues that drain IT resources and evade traditional diagnostics.

This session takes a practical approach to troubleshooting common Wi-Fi issues using client-side visibility, synthetic testing, and AI-powered analysis. You’ll learn how historical performance data and root cause insights enable teams to resolve intermittent issues quickly, even when they happen outside business hours or cannot be replicated live.

This is a technical training session and is eligible for CWNP continuing education credits.

View Now

A Deep Dive into the Technical Foundations of WPA3

Wi-Fi security continues to evolve and WPA3 is now the standard for protecting modern networks against today’s threats. With new attack vectors and the growing complexity of connected devices, understanding WPA3’s improvements is essential for network resilience.

This session breaks down the challenges and rewards of deploying WPA3, from stronger encryption and Simultaneous Authentication of Equals (SAE) to Opportunistic Wireless Encryption (OWE) for open networks. They’ll cover both WPA3-Personal and WPA3-Enterprise, discuss transition-mode considerations, and share best practices for deployment and verification.

Whether you are designing enterprise networks, managing public Wi-Fi, or securing IoT devices, this session offers a deep dive and actionable guidance needed to get WPA3 right.

This is a technical training session and is eligible for CWNP continuing education credits.

View Now

Solving the Most Common (and Elusive) Wi-Fi Issues

Roaming failures. Random disconnects. Poor video call quality. These are the Wi-Fi issues that drain IT resources and evade traditional diagnostics.

This session takes a practical approach to troubleshooting common Wi-Fi issues using client-side visibility, synthetic testing, and AI-powered analysis. You’ll learn how historical performance data and root cause insights enable teams to resolve intermittent issues quickly, even when they happen outside business hours or cannot be replicated live.

This is a technical training session and is eligible for CWNP continuing education credits.

View Now

A Deep Dive into the Technical Foundations of WPA3

Wi-Fi security continues to evolve and WPA3 is now the standard for protecting modern networks against today’s threats. With new attack vectors and the growing complexity of connected devices, understanding WPA3’s improvements is essential for network resilience.

This session breaks down the challenges and rewards of deploying WPA3, from stronger encryption and Simultaneous Authentication of Equals (SAE) to Opportunistic Wireless Encryption (OWE) for open networks. They’ll cover both WPA3-Personal and WPA3-Enterprise, discuss transition-mode considerations, and share best practices for deployment and verification.

Whether you are designing enterprise networks, managing public Wi-Fi, or securing IoT devices, this session offers a deep dive and actionable guidance needed to get WPA3 right.

This is a technical training session and is eligible for CWNP continuing education credits.

View Now

The Referral Myth Debunked Webinar

At The Referral Myth Debunked, we unveiled groundbreaking research that proves that referral drives incremental business.

Our extensive research study evidenced how a well-designed referral program can avoid the cannibalization of sales and deliver incremental business value and our best practices highlighted how to optimize your program for success.

You can watch Referral Myth Debunked recording to:

  • Gain exclusive access to fresh, data-driven insights that demystify the success factors behind effective referral programs.
  • Understand the true value of referral programs and learn how to analyze and access this value.
  • Learn directly from industry leaders and pioneers who have been at the forefront of referral marketing innovation.

View Now

Leeds United Security Webinar

In today's digital world, web skimming—also known as Magecart attacks—is a growing threat. This exclusive webinar from Reflectiz gives you a firsthand account of the challenges, impacts, and lessons learned from a Magecart attack on Leeds United Football Club's retail web store.

Hear directly from Graham Peck, IT Information Security & Compliance Manager at Leeds United, as he discusses how the team discovered the breach, the immediate steps they took, and how they now use Reflectiz to proactively protect their digital assets.

Key Takeaways from the Webinar

  • The Attack: A vulnerability in a third-party product, which was assumed to be secure, allowed malicious code to be injected into an API, leading to a Magecart skimming attack.
  • The Impact: The breach resulted in an immediate website shutdown, a significant impact on transactions and revenue, and a loss of customer confidence
  • The Solution: Leeds United moved from a reactive, tool-heavy approach to a proactive, centralized security strategy. By consolidating their security systems and gaining visibility with an agentless tool like Reflectiz, they can now identify risks and interact with suppliers more effectively.
View Now

2025 best practices for mobile pipeline and testing

Watch us and our partners at BrowserStack for a deep dive into what it really takes to build high-performing mobile pipelines and rock-solid testing strategies in 2025. Discover how to consistently ship reliable, value-driven mobile releases faster and with fewer bugs.

In this session, you'll get:

  • Practical advice for teams of all sizes from top mobile engineering and QA experts
  • Proven strategies to level up your mobile CI/CD and testing game
  • Expert guidance on delivering steady value in stable releases
View Now

Boost mobile dev velocity with CI/CD & observability best practices

Learn advanced CI/CD techniques and discover how connecting these to real production date can help your team iterate faster and smarter. From this in-depth conversation with mobile experts from Bitrise and Embrace, you'll learn how to:

  • Use remote caching and parallelization to drastically reduce CI times
  • Identify and eliminate pipeline bottlenecks with key metrics and feedback loops
  • Enhance productivity by integrating AI into your CI/CD pipelines
  • Capture vital production data from published mobile apps
  • Create performance metrics reflecting the most important activity in your app
  • Drill down into the technical details of user experiences to fix issues
  • Align CI/CD efficiency with user-focused observability for better releases
  • Avoid common pitfalls in mobile pipelines and observability setups
  • Empower your dev teams with better data and faster iteration cycles

Whether you're optimizing existing workflows or starting from scratch, this session will equip you with practical tips to supercharge your mobile development lifecycle.

View Now

Lockout tagout fundamentals demo webinar

Hundreds of workers are injured and killed every year due to the unexpected release of stored energy. Additionally, Occupational Safety and Health Administration (OSHA) penalties for lockout/tagout (LOTO) violations can cost as much as $250,000. For these reasons, it’s essential to have an effective LOTO program to protect workers from hazardous energy releases and your organization from OSHA penalties.

EHS Hero® provides LOTO solutions that make building and managing a consistent, compliant LOTO program easy. Whether you’re starting from scratch or are ready to level up your LOTO program, you can protect your workers and achieve compliance with EHS Hero.

Join us for an on-demand demo of EHS Hero’s LOTO compliance and workflow solutions. Matt Hall, client success manager, and Starla Finch, account executive, will walk you through how EHS Hero can help simplify the LOTO fundamentals.

Watch now to learn how to:

  • Ensure compliance with OSHA requirements for LOTO procedures, recordkeeping, auditing, and training
  • Build and manage a configurable, mobile-accessible library of LOTO procedures
  • Simplify and standardize your LOTO processes
  • Implement an effective LOTO program from start to finish

View Now

Preventing Workplace Harassment ─ 2025 Edition

Have your employees met their harassment prevention training requirements for 2025? If so, did they find your training relevant and engaging?

With the year half over, now is the time to ensure your workforce is compliant and protected with harassment prevention training that employees actually enjoy watching and remember. Watch on-demand webinar and demo of our Preventing Workplace Harassment training and learn why legal experts recommend training every employee, regardless of location, to strengthen your compliance posture and legal defense against lawsuits.

  • Relatable story-based learning: First-person narratives and real-world scenarios create a powerful connection with learners.
  • Cinematic-quality videos: Explores “gray area” situations to help employees navigate nuanced challenges.
  • Comprehensive coverage: Beyond sexual harassment, training addresses bias, discrimination, bullying and the ripple effects of seemingly small actions.
  • Empowers bystanders: Equips employees with actionable skills to intervene, recognize boundaries and confront harmful behaviors.
  • Interactive and memorable: Gamified exercises and nuanced scenarios keep learners engaged and drive retention.
  • 100% compliant: Our in-house legal experts ensure training is 50-state compliant and meets federal regulations. Learners have instant access to overviews of state harassment and discrimination laws and can submit questions that our legal experts will quickly answer.
  • Accessible to users with disabilities

Whether in the process of having employees complete annual anti-harassment training or evaluating the effectiveness of your current training program, you don’t want to miss this webinar.

View Now

Discrimination Prevention for Managers ─ After the Executive Orders

Every manager decision can now trigger a discrimination claim.

Executive orders are redrawing compliance lines and employees across every demographic feel empowered to file complaints. Yet most managers have no idea what’s legally protected, what’s just controversial, or where the real risks lie.

Watch our on-demand webinar that’s part learning session, part sneak peek into Traliant’s new Discrimination Prevention for Managers training, our engaging, scenario-based online course designed specifically for today’s workplace. You’ll gain practical insight into how current legal developments are affecting the responsibilities of supervisors and managers, and what HR teams can do to mitigate risk. 

You’ll walk away with:

  • A clear understanding of the new legal risks facing employers now. 
  • Real-world examples of how issues like DEI discrimination, gender identity protections, and “reverse discrimination” are likely to show up in the workplace—and how managers should respond. 
  • Insight into tricky topics such as English-only rules, religious objections and discrimination against majority groups. 
  • A first-hand look at how the course uses interactive storytelling to explain in clear language issues that managers need to be alert to now and how to address them.

View Now

Trump’s Workplace Executive Orders: What Compliance Leaders Need to Know

This on-demand webinar addresses the White House’s new executive orders on workplace training affecting DEI and harassment prevention and recent court rulings.

In the current socio-political climate, shifting legal requirements, political pushback and changing workforce expectations have created new challenges for HR professionals in ensuring compliance while fostering inclusive, respectful workplaces.

This webinar addresses the White House’s new executive orders on workplace training affecting DEI and harassment prevention and recent court rulings, state mandates and organizational risk management considerations. The session will discuss how to balance compliance obligations with the realities of today’s polarized environment while maintaining training programs that are both effective and legally sound.

View Now

Meet FusionAuth: The Most Customizable Auth Solution on the Market

Why is FusionAuth the Most Customizable Auth Solution on the Market?

Everybody wants a customer login experience that feels like it’s their own. Nobody wants to dedicate the time, effort, and developer resources to make it happen. This is one of the many reasons that developers love FusionAuth. It’s a downloadable, single-tenant CIAM (customer identity and access management) solution that gives you complete control over your authentication. Just us for this webinar to learn why FusionAuth is the most customizable customer login solution on the market.

View Now

Meet FusionAuth: The Most Customizable Auth Solution on the Market

Why is FusionAuth the Most Customizable Auth Solution on the Market?

Everybody wants a customer login experience that feels like it’s their own. Nobody wants to dedicate the time, effort, and developer resources to make it happen. This is one of the many reasons that developers love FusionAuth. It’s a downloadable, single-tenant CIAM (customer identity and access management) solution that gives you complete control over your authentication. Just us for this webinar to learn why FusionAuth is the most customizable customer login solution on the market.

View Now

Meet FusionAuth: The Most Customizable Auth Solution on the Market

Why is FusionAuth the Most Customizable Auth Solution on the Market?

Everybody wants a customer login experience that feels like it’s their own. Nobody wants to dedicate the time, effort, and developer resources to make it happen. This is one of the many reasons that developers love FusionAuth. It’s a downloadable, single-tenant CIAM (customer identity and access management) solution that gives you complete control over your authentication. Just us for this webinar to learn why FusionAuth is the most customizable customer login solution on the market.

View Now