Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Sun, 2015-01-25 09:09 PM
Jonathan Freed has been appointed as the National Security Agency's new Associate Director for Strategic Communications. Freed, a longtime public relations professional and former journalist, most...
Thu, 2015-01-22 09:20 PM
The Department of Energy (DOE) will provide a $25 million grant over the next five years to support the creation of a new cybersecurity consortium consisting of 13 Historically Black Colleges and...
Wed, 2015-01-21 08:31 PM
During bilateral meetings in Washington last week, President Obama and Prime Minister David Cameron agreed to further strengthen and deepen cybersecurity cooperation between the United States and the...
Tue, 2015-01-20 07:29 PM

John Walsh

The MacDonnell Group of Halifax, Nova Scotia has announced that John Walsh, CEO of Port Canaveral, will deliver the opening presentation and welcome remarks at its 2015 Port Security Operations...
Tue, 2015-01-13 06:47 PM
Director James B. Comey has named Roger C. Stanton special agent in charge of the FBI’s Birmingham Division. Stanton most recently served as section chief of the Counter-Improvised Explosive Devices...
Mon, 2015-01-12 06:59 PM
Director James B. Comey has named Scott Bean special agent in charge of the FBI’s Administrative Division of the Washington Field Office (WFO). Bean most recently served as section chief for the...
Tue, 2015-01-06 01:30 AM

Timothy DeFoggi

The former acting director of cyber security at the U.S. Department of Health and Human Services was sentenced to 25 years in federal prison Monday for engaging in a child exploitation enterprise and...
Tue, 2014-12-30 04:15 PM
U.S. Customs and Border Protection has announced a reciprocal arrangement with Germany for each nation’s trusted traveler program -- the U.S. Global Entry program and the German EasyPASS. Global...
Tue, 2014-12-23 11:21 PM

Lawrence Dietz

Cyber security is an all-engulfing term that has different meanings depending on the context. For example: cyber security in the utility industry is not like cyber security in the legal profession,...
Tue, 2014-12-23 06:10 PM

Sarah Saldana

In comments made following the confirmation of former U.S. Attorney Sarah R. Saldana of the Northern District of Texas as Assistant Secretary of U.S. Immigration and Customs Enforcement (ICE), DHS...
Tue, 2014-12-23 04:17 PM
Director James B. Comey has named David Bowdich the assistant director in charge of the Los Angeles Field Office. Since September 2012, Bowdich has served as special agent in charge (SAC) of the Los...
Mon, 2014-12-22 05:51 PM
Attorney General Eric Holder announced last week that the number of people in the adult correctional systems in the United States has fallen to its lowest level since 2003. The finding is highlighted...

Company News

LMI has strategically hired Rick Lipsey to expand its cyber-related work, drawing on his extensive, expert leadership in military cybersecurity. Lipsey accepted the executive role to help the not-for-profit government consultancy meet a pressing public sector need to operationalize cybersecurity.
Citrix has announced an extension of its long-standing collaboration with Google by providing XenMobile support for Android for Work. This announcement builds on the multi-year collaboration between Citrix and Google that includes virtual app and desktop delivery on Chrome devices and existing enterprise mobility management (EMM) support for Android smartphones and tablets.
Minneapolis, MN-based Transition Networks, a provider of fiber access technology, a wholly owned subsidiary of Communications Systems, has announced a new family of hardened Ethernet serial device servers with data encryption capabilities that improve security and scalability for connecting industrial equipment to Ethernet networks in harsh environments.
Entrust Datacard has announced the new Datacard TruCredential Suite Software which is designed to help organizations of all sizes deploy a secure ID program that meets a wide range of application requirements -- from basic photo IDs to high-assurance credentials.The new software suite can be used to issue a variety of credentials such as student, faculty or visitor IDs; employee or contract badges; patient and staff healthcare IDs; credentials for local government programs; membership and customer loyalty cards; and transit passes.
E-SignLive by Silanis, the e-signature choice for business, has announced an integration that will allow businesses and enterprises using Box to digitally, securely and independently send, sign and store documents using e-SignLive directly from their Box account.
Cybergy Holdings, Inc., a provider of cybersecurity, smart grid technologies and renewable energy, is pleased to announce the launch of Level 21, a suite of products and related managed security services to combat cyberattacks where they pose the greatest threats, including the most challenging human user level. Level 21 is a joint initiative between Cybergy and RazorThreat, a U.S. software company that develops advanced cybersecurity technologies.
The U.S. crime rate continues to fall, according to the latest FBI's release based on Uniform Crime Reporting from police departments, but researchers say those numbers, which have been on a downward slide since the 1990s, don't tell the whole story.That's because the federal report does not track online property crime, credit card fraud, or identity theft, all of which are increasing, according to researchers at the University of New Haven and the State University of New York at Albany.
LemonFish Technologies, an analytics-as-a-service (AaaS) insider threat detection company, has launched to meet the growing need for insider threat detection and continuous evaluation technologies to uncover security risks within an organization.

Commentary and Opinions

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.
With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
 

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.