Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Wed, 2014-09-10 08:52 PM

Terry Wade

FBI Director James B. Comey has named Terry Wade special agent in charge of the criminal division at the FBI’s Los Angeles Field Office. Mr. Wade most recently served as section chief of the...
Tue, 2014-09-09 10:45 PM
The Transportation Security Administration (TSA) has expanded its popular TSA Pre✓ program to Bishop International Airport (FNT). Passengers traveling on American Airlines, Delta Air Lines, Southwest...
Tue, 2014-09-09 07:57 PM
More than 20,000 security professionals from 80 countries are expected to attend the ASIS International (ASIS) 2014 60th Annual Seminar and Exhibits taking place 29 Sept.-02 Oct. at the Georgia World...
Mon, 2014-09-08 06:39 PM
The Joint Cybercrime Action Taskforce (J-CAT) was recently launched to further strengthen the fight against cybercrime in the European Union and beyond. Hosted at the European Cybercrime Centre (EC3...
Wed, 2014-09-03 07:53 PM
FBI Director James B. Comey has named Joshua Skule special agent in charge of the FBI’s Intelligence Division of the Washington Field Office (WFO). He most recently served as a deputy assistant...
Thu, 2014-08-28 07:17 PM
Thanks to alerts from concerned readers and advertisers of Government Security News, we learned yesterday that attempts to log into the “GSN” website have resulted in notices to the effect that “...
Wed, 2014-08-27 07:54 PM
Thirty-eight people were charged last week for their role in a large-scale auto insurance fraud ring that resulted in hundreds of thousands of dollars in lost revenue. The charges follow a year-long...
Wed, 2014-08-27 02:09 AM

TSA Admin. John Pistole

The U.S. Department of Homeland Security recently achieved two major milestones for its trusted traveler programs. The Transportation Security Administration Pre✓ application program, which began in...
Tue, 2014-08-26 07:15 PM
A former acting director of cyber security at the U.S. Department of Health and Human Services has been convicted on child pornography charges, according to the Department of Justice (DOJ).Timothy...
Sun, 2014-07-06 09:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...
Thu, 2014-06-26 04:32 AM
The Senate Committee on Homeland Security and Governmental Affairs approved legislation Wednesday that would take a number of steps to modernize and address critical challenges to the nation’s cyber...
Tue, 2014-06-24 09:04 AM

Michael Madsen

GSN parent company World Business Media has announced that Michael Madsen, the company’s first advertising director and longtime sales “MVP,” has been promoted from Associate Publisher to Publisher...

Company News

Santa Clara, CA-based McAfee, part of Intel Security, has announced the latest release of McAfee Next Generation Firewall, which now seamlessly integrates with several key McAfee solutions and technologies, offering businesses and government agencies an ever-expanding ecosystem of threat defenses. Important new integrations with the McAfee Security Connected framework provide McAfee Next Generation Firewall customers with layered protection against the latest threats and evasions, along with improved workflows and operational efficiencies.

Following Symantec's notice that the Backup Exec appliance line is being discontinued, cloud backup and disaster recovery provider Zetta.net has announced a migration program for those Symantec Backup Exec appliance customers whose devices are affected.

San Francisco, CA-based RiskIQ, the company that enables organizations to detect and mitigate customer facing threats, has announced the appointment of former WhiteHat Security executive Arian Evans as vice president of product strategy. Evans brings more than 16 years of expertise in information and application security, software development, systems architecture and financial services to RiskIQ.

Using the ACI (Airports Council International) 2014 Public Safety & Security Fall Conference as a backdrop, AlertEnterprise, a security convergence software vendor, announced the new Insider Alert for Airports software solution.

McLean, VA-based Exelis has announced the release of a new updated CorvusEye 1500 visible color and infrared (IR) sensor that provides day and nighttime wide area airborne surveillance coverage to support the military, law enforcement, border patrol, and first responders. Developed to complement the daytime electro-optical sensor Exelis released in May, the sensors are available as an integrated end-to-end system or separately.

Portland, OR-based Tripwire, a provider of advanced threat, security and compliance solutions, has announced that Lane Thames and Andrew Swoboda, security researchers for the company’s Vulnerability and Exposure Research Team (VERT), will be presenting at Hacker Halted 2014. The conference will take place October 16-17, 2014, at the Georgia World Congress Center in Atlanta, GA.

News of the first reported case of Ebola in the U.S. came last week in Dallas, TX, leading to discussion of a public health emergency and fear of an epidemic or pandemic outbreak of the virus. Events like these often highlight flaws in business continuity planning and are catalysts for future improvement.

Oakdale, MN-based Imation, a provider of data storage and information security, has announced that it has introduced a way for IT administrators to better ensure data security in their archive storage.

Commentary and Opinions

Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.

Car theft is a fruitful field of opportunity for today’s criminals as they seek new and innovative ways for gaining quick profits. Recent reports indicate that prior to committing theft, organized car-theft gangs are doing their homework. They are targeting specific car rental facilities, conducting exhaustive site-studies of the facilities to identify vulnerabilities that will make their job easier.

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...