Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Fri, 2014-01-17 11:27 PM
The U.S. House of Representatives passed a bill this week that would increase oversight into how the government conducts background investigations. The bill, H.R. 2860, the OPM IG Act (Office of...
Thu, 2014-01-16 11:51 PM
Mexico recently launched its first trusted traveler program open to U.S. citizens entitled Programa Viajero Confiable. The program is designed to expedite the process for U.S. citizens to enter...
Tue, 2014-01-14 09:43 AM
Worldwide secure identity powerhouse HID Global announced the opening of its new World Headquarters and North American Operations Center in Austin, Texas yesterday before an audience of dignitaries...
Thu, 2014-01-02 11:46 AM
TSA has determined that the system of records it has established for its “TSA Precheck” trusted traveler program will be subject to various exemptions spelled out in the Privacy Act, and that...
Mon, 2013-12-23 02:41 PM
CBP officials estimate that approximately 120,000 operators of private aircraft will arrive in the United States each year and present several documents to CBP inspectors for their review. The number...
Sat, 2013-12-21 01:22 PM

Sarasota Bradenton
International Airport

TSA has issued a presolicitation notice announcing that it intends to hire a small business to provide passenger screening services at Sarasota Bradenton International Airport in Florida. The notice...
Tue, 2013-12-17 04:47 PM
In order to give itself enough time to resolve a bid protest, TSA has decided to award a contract extension on a sole source basis to InfoZen, of Bethesda, MD, to continue providing the operations...
Mon, 2013-12-16 03:56 PM
TSA has issued a solicitation for what it calls “Credential Authentication Technology,” or CAT, which can ensure that only legitimate airport personnel, airline crews, non-traveling passengers using...
Thu, 2013-12-12 05:08 PM
TSA is gathering market research information from small businesses that can provide databases and reporting mechanisms that can monitor the movements of railcars carrying toxic inhalation hazards and...
Sun, 2013-12-08 06:06 PM

London Gateway

Marine terminal operator DP World is constructing London Gateway, the UK’s first major deep-sea container port this century, as part of a development that will include the largest logistics park in...
Sat, 2013-12-07 06:20 PM
The U.S. Secret Service has indicated that it plans to negotiate sole source contracts with one commercial company and one state government in order to gain access to their proprietary databases. In...
Fri, 2013-12-06 04:53 PM
As facial recognition technology moves into the commercial marketplace, the National Telecommunications and Information Administration (NTIA) has laid out a schedule of public meetings in which...

Company News

Dallas, TX-based Zix Corporation (ZixCorp), a provider of email data protection, has announced that ZixOne is available on the Samsung Solutions Exchange, expanding mobile security options for enterprises using Samsung’s mobile devices. The Samsung Solutions Exchange addresses the needs of business owners by creating mobile solutions on a portfolio of enterprise-grade Samsung mobile products.

New York, NY-based Viewpointe, a provider of managed service and a payments provider to regulated industries, has announced a new white paper that highlights how using the appropriate cloud infrastructure can optimize business processes, deliver competitive agility, and address information mismanagement.

Gemalto, Datacard, and Morpho have ranked in the top three positions in ABI Research’s latest “Government & Healthcare ID: Smart Card and Legacy Credentials” competitive assessment. The assessment consists of 1H 2013 smart card market shares alongside a vendor matrix where by the top smart card and legacy credential ecosystem players were measured against a set of innovation and implementation criteria.

Round Rock, TX-based Dell Software has announced availability of two new backup appliances and a host of enhancements to its AppAssure backup, replication and disaster recovery software.

Costa Mesa, CA-based Emulex Corp., a provider of network connectivity, monitoring, and management, has announced the results of a study of 547 U.S. and European-based network and security operations (NetOps and SecOps) professionals, which found that 45% of IT staffs monitor network and application performance manually, instead of implementing network monitoring tools.

Toronto, Canada-based SecureKey, a provider of trusted identity networks, and Oberthur Technologies (OT), a provider of digital security solutions for the mobility space, has announced their collaboration to bring to market a range of solutions compliant with the GSMA-led Mobile Connect initiative that provides secure access and authentication for online services.

State of Montana officials are notifying 1.3 million people regarding a recent incident where hackers gained entry to a Department of Public Health and Human Services (DPHHS) computer server, though officials said there is no knowledge that information on the server was used inappropriately, or was even accessed.

The state is notifying individuals whose personal information was on the server, consistent with state and federal laws. The notification list includes both current and former Montana residents, and in some instances, the estates of deceased individuals.

Uticon Engineering Consultancy has installed the two-factor authentication solution SecurAccess from SecurEnvoy. Personal login details in combination with a passcode obtained via SMS are used in the solution in order to clearly identify employees.

Commentary and Opinions

Every day citizens put their faith and trust in the decisions that government programs make about identities (security clearances, border crossings, benefits and credentials). However, these decisions may not be as trustworthy as you think, because they are often not based upon current and validated information. This lack of information awareness has been accentuated by the onset of Big Data (the dramatic increase in data volumes, sources, types and velocity), which increases the risk of an undetected change in a person’s identity profile.

An important deadline is fast approaching for federal, state, local and tribal law enforcement agencies. Starting September 30, 2014, the FBI will require advanced authentication for anyone accessing its criminal justice information (CJIS) system to keep highly sensitive law enforcement data from falling into the wrong hands. 

It is possible to forecast the types of warfare that one’s terrorist adversary is likely to conduct, whether as an organized group or as “lone wolf” operatives. Such a forecasting capability is especially crucial when complete information about one’s terrorist adversary is lacking. This is important because several recent high visibility terrorist attacks could have been pre-empted and thwarted if the intelligence and law enforcement agencies that were tracking these groups and operatives had possessed such a forecasting capability.

By Todd Musselman and Al Kinney

The value of a robust identity management system has long been recognized; however, the actual development and implementation of an effective identity management system have proven to be more difficult tasks. This challenge has grown more complex as various solutions have emerged and matured, and has become more urgent as threats continue to grow in sophistication.

 

2013 Awards Yearbook

Celebrate the Great
Achievements of 2013


Click on Cover
Page to access

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...