Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Mon, 2014-09-15 09:00 PM
Attorney General Eric Holder announced Monday that the Justice Department will launch a new series of pilot programs in cities across the country to bring together community representatives, public...
Mon, 2014-09-15 08:13 PM
The New York City Fire Department (FDNY) has added new technology to 15 firefighting trucks to help it keep track of firefighters’ location.Through the technology, the FDNY can automatically see...
Wed, 2014-09-10 08:52 PM

Terry Wade

FBI Director James B. Comey has named Terry Wade special agent in charge of the criminal division at the FBI’s Los Angeles Field Office. Mr. Wade most recently served as section chief of the...
Tue, 2014-09-09 10:45 PM
The Transportation Security Administration (TSA) has expanded its popular TSA Pre✓ program to Bishop International Airport (FNT). Passengers traveling on American Airlines, Delta Air Lines, Southwest...
Tue, 2014-09-09 07:57 PM
More than 20,000 security professionals from 80 countries are expected to attend the ASIS International (ASIS) 2014 60th Annual Seminar and Exhibits taking place 29 Sept.-02 Oct. at the Georgia World...
Mon, 2014-09-08 06:39 PM
The Joint Cybercrime Action Taskforce (J-CAT) was recently launched to further strengthen the fight against cybercrime in the European Union and beyond. Hosted at the European Cybercrime Centre (EC3...
Wed, 2014-09-03 07:53 PM
FBI Director James B. Comey has named Joshua Skule special agent in charge of the FBI’s Intelligence Division of the Washington Field Office (WFO). He most recently served as a deputy assistant...
Thu, 2014-08-28 07:17 PM
Thanks to alerts from concerned readers and advertisers of Government Security News, we learned yesterday that attempts to log into the “GSN” website have resulted in notices to the effect that “...
Wed, 2014-08-27 07:54 PM
Thirty-eight people were charged last week for their role in a large-scale auto insurance fraud ring that resulted in hundreds of thousands of dollars in lost revenue. The charges follow a year-long...
Wed, 2014-08-27 02:09 AM

TSA Admin. John Pistole

The U.S. Department of Homeland Security recently achieved two major milestones for its trusted traveler programs. The Transportation Security Administration Pre✓ application program, which began in...
Tue, 2014-08-26 07:15 PM
A former acting director of cyber security at the U.S. Department of Health and Human Services has been convicted on child pornography charges, according to the Department of Justice (DOJ).Timothy...
Sun, 2014-07-06 09:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...

Company News

Boston, MA-based Wealth Management Systems (WMSI) has announced that Doug Perkins has joined the firm as information security officer. An industry veteran with extensive experience in software development, project management, quality assurance, and operations and information security, Perkins is assuming responsibility for the design and future development of WMSI’s enterprise-wide information security strategies and policies. Mr. Perkins reports to BJ Ralston, WMSI’s chief compliance officer, and is based in WMSI’s Boston Office.

Princeton, NJ-based IXP Corporation, a public safety and emergency response provider that has partnered with Johns Hopkins University (JHU) for the past 10 years, has announced an innovation that raises campus security to the next level.

ASIS International, the preeminent organization for security professionals worldwide, has selected its 2014 ASIS Accolades Award winners. ASIS Accolades is an awards competition that recognizes the security industry’s most innovative new products, services, and/or solutions.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a $220K contract to provide its IM2610 TWIC Plus readers to the Port of New Orleans in Louisiana. The new contract is for a web-hosted TWIC card reading system. The readers will provide TWIC card authentication and Be On the Lookout (BOLO) checks.

London, England-based Brit PLC, a global specialty insurer and reinsurer, has developed a unique insurance service to protect companies operating critical infrastructure and industrial machinery from terrorist and other malicious attacks, such as sabotage, espionage and theft.

Belgium-based Betafence, a provider of comprehensive solutions for high security perimeter protection, has announced the acquisition of SecureUSA, a successful U.S provider of access control systems and solutions.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a $137K contract to provide its TWIC Plus IM2610 identification card readers to the Port of Houston in Texas. The facility has been an Intellicheck Mobilisa customer since September 2010. The new contract is for a web-hosted TWIC reading system. The readers will provide TWIC card authentication and driver’s license reading capability.

San Mateo, CA-based Norse, a provider of live attack intelligence, has announced that Brian Contos has joined the company as a senior vice president and chief security strategist. In this new position, Conto will help guide the company’s market strategy, technical solutions, and field engineering.

Commentary and Opinions

Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.

Car theft is a fruitful field of opportunity for today’s criminals as they seek new and innovative ways for gaining quick profits. Recent reports indicate that prior to committing theft, organized car-theft gangs are doing their homework. They are targeting specific car rental facilities, conducting exhaustive site-studies of the facilities to identify vulnerabilities that will make their job easier.

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...