Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2015-02-26 08:53 PM
We are members of a non-partisan group of former government officials and policy experts in the fields of national security and counterterrorism. At a time when the threats to the homeland are...
Thu, 2015-02-26 12:39 AM
President Obama Wednesday directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will be a national intelligence center...
Wed, 2015-02-25 06:37 PM
The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, has announced a reward of up to $3 million for...
Thu, 2015-02-19 07:26 PM
A multinational gang of cyber criminals has stolen up to $1 billion from about 100 international banks over the past two years, according to an announcement earlier this week from the Russian...
Tue, 2015-02-17 04:54 PM
In recent days I have repeatedly stressed the need for a DHS appropriations bill for FY 2015, unburdened by politically charged amendments that attempt to defund our executive actions on immigration...
Mon, 2015-02-16 09:27 PM
Director James B. Comey has named John S. Adams the special agent in charge of the FBI’s Norfolk Division. Adams most recently served as deputy assistant director of the Counterterrorism Division (...
Sun, 2015-02-15 07:55 PM
The White House has issued a Presidential Memorandum to promote economic competitiveness and innovation while safeguarding privacy, civil rights, and civil liberties in the domestic use of unmanned...
Tue, 2015-02-10 08:23 PM
Director James B. Comey has named Richard Frankel special agent in charge (SAC) of the FBI’s Newark Division. Frankel most recently served as SAC of the Criminal Division in the New York Field Office.
Sun, 2015-02-08 08:22 PM
Following a four-week trial, A California man was found guilty Wednesday in New York on all seven counts in connection with his operation and ownership of Silk Road, a hidden website designed to...
Mon, 2015-02-02 05:31 PM
The Department of Health and Human Services' (HHS) Office of the National Coordinator for Health Information Technology (ONC) has released Connecting Health and Care for the Nation: A Shared...
Sun, 2015-01-25 09:09 PM
Jonathan Freed has been appointed as the National Security Agency's new Associate Director for Strategic Communications. Freed, a longtime public relations professional and former journalist, most...
Thu, 2015-01-22 09:20 PM
The Department of Energy (DOE) will provide a $25 million grant over the next five years to support the creation of a new cybersecurity consortium consisting of 13 Historically Black Colleges and...

Company News

Tyler Technologies, Inc. has signed an agreement with the city of Gadsden, AL, for the company’s Tyler Public Safety and Incode solutions. The agreement includes related professional services, training and support.
Portland, OR-based Tripwire, a provider of advanced threat, security and compliance solutions, has announced that Dwayne Melancon, chief technology officer for Tripwire, will present at The Chertoff Group Security Series. The event takes place March 5, 2015, at the Four Seasons Hotel in Houston, TX.
According to a recent Solid State Disk (SSD) technology use survey, Kroll Ontrack, a provider of data recovery and ediscovery, revealed that while nearly 90 percent of respondents leverage the performance and reliability benefits of SSD technology within their organization, one-third confirmed they experienced some sort of SSD technology malfunction.
LMI has strategically hired Rick Lipsey to expand its cyber-related work, drawing on his extensive, expert leadership in military cybersecurity. Lipsey accepted the executive role to help the not-for-profit government consultancy meet a pressing public sector need to operationalize cybersecurity.
Citrix has announced an extension of its long-standing collaboration with Google by providing XenMobile support for Android for Work. This announcement builds on the multi-year collaboration between Citrix and Google that includes virtual app and desktop delivery on Chrome devices and existing enterprise mobility management (EMM) support for Android smartphones and tablets.
Minneapolis, MN-based Transition Networks, a provider of fiber access technology, a wholly owned subsidiary of Communications Systems, has announced a new family of hardened Ethernet serial device servers with data encryption capabilities that improve security and scalability for connecting industrial equipment to Ethernet networks in harsh environments.
Entrust Datacard has announced the new Datacard TruCredential Suite Software which is designed to help organizations of all sizes deploy a secure ID program that meets a wide range of application requirements -- from basic photo IDs to high-assurance credentials.The new software suite can be used to issue a variety of credentials such as student, faculty or visitor IDs; employee or contract badges; patient and staff healthcare IDs; credentials for local government programs; membership and customer loyalty cards; and transit passes.
E-SignLive by Silanis, the e-signature choice for business, has announced an integration that will allow businesses and enterprises using Box to digitally, securely and independently send, sign and store documents using e-SignLive directly from their Box account.

Commentary and Opinions

By Fraser ThomasLast week the US Congress began the process of making President Obama’s State of the Union address, where he focused on ways to secure the nation's businesses and infrastructure in cyberspace, a reality.On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers’ personal information.
The following is a guest editorial provided by Michael D. Helm, the national commander of The American Legion:Most Americans do not know who Ali al-Marri is and it is my sincere hope that they never find out because of another horrendous attack. Nonetheless, it is extremely alarming that not only has our government released the convicted al-Qaeda operative from U.S. custody to Qatar, but that it has also gone largely unnoticed by the mainstream media.
National Association of Federal Credit Unions (NAFCU) President and CEO Dan Berger renewed the association’s push for national data security and breach notification standards for retailers amid news of a possible data breach at Chick-fil-A chain restaurants.
With more than 10 million purported attempts to break into Pentagon systems and servers each day, it was not surprising when the White House confirmed that individuals thought to be working for the Russian government attempted to hack its servers.
From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.
 

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.