Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Wed, 2013-02-13 02:02 PM
The U.S. and the European Union (EU) now mutually recognize each other’s trusted trader programs. The announcement on Feb. 8 by U.S. Customs and Border Protection (CBP) and the EU said the mutual...
Mon, 2013-02-11 11:49 AM
TSA is planning to award a non-competitive firm fixed-price “bridge” contract to the American Association of Airport Executives to continue providing fingerprint and photo processing services for an...
Mon, 2013-02-11 08:12 AM

Arizona border

Border Patrol apprehensions in Arizona dropped to record low levels in fiscal year 2012, as the number of agents and the use of more advanced technology increased, said the agency on Feb. 8...
Mon, 2013-02-11 07:48 AM

Christopher Dorner

The ex-Los Angeles policeman who has allegedly shot and killed three people, including a police officer, and vowed to hunt down other officers now has million dollar bounty on his head for what the...
Fri, 2013-02-08 12:36 PM
Access control, generally, and biometrics, more specifically, are witnessing innovative developments on a number of fronts simultaneously. This special section of our August issue shines a spotlight...
Fri, 2013-02-08 08:22 AM

Southwestern border

DHS Secretary Janet Napolitano urged quick action on immigration reform legislation, pointing to declining attempts to cross the U.S. border illegally resulting from stepped up enforcement efforts.
Thu, 2013-02-07 09:32 AM

Toy warehouse

U.S. customs enforcement agents busted up a ring of companies that they said continually flouted import and intellectual property rights rules to bring toxic, potentially-dangerous knock-off toys...
Wed, 2013-02-06 03:46 PM

Rep. Michael McCaul

The chairman of the House Homeland Security Committee said he plans to frame his vision for “gaining control” of U.S. borders next week. “Americans have seen that promises of border security are...
Wed, 2013-02-06 03:44 PM

Student with RFID card
in school in San Antonio

Don Erickson, CEO of the Security Industry Association (SIA), has sent a letter to legislators in the Texas House and Senate in opposition to proposed legislation that would amend the state’s...
Wed, 2013-02-06 03:32 PM

Family Research Council

The man who opened fire at a Washington, DC, conservative values organization’s offices in the District last August  -- severely wounding a security guard,  pleaded guilty to one terrorism...
Wed, 2013-02-06 03:07 PM
In this section on maritime and port security, we’ve taken a look at the topic from three different perspectives.
Wed, 2013-02-06 11:23 AM

Artist rendering of
Royal Princess

SISCO's A-PASS 6 patent-pending wireless mobile life safety and security access control system has been chosen to be installed on the new Royal Princess. The Royal Princess is the first of two 1082-...

Company News

Hillsboro, OR-based Eid Passport, a provider of high-assurance identity management solution providers, will partner with HID Global, a provider of secure identity solutions, to further enhance its RAPIDGate Premier solution to secure physical and digital assets for commercial, government and military organizations.

Cyber crime and data breaches cost the global economy about $445 billion annually, and it is estimated that more than 800 million individual records were affected by cyber crime in 2013. In response to the growing cyber criminality threatening Canadian companies, industrial insurance specialist Allianz Global Corporate & Specialty (AGCS) has launched Allianz Cyber Protect, a comprehensive suite of coverages with market leading capacity to protect a company in the event of a data loss or a cyber security incident.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has appointed William Georges and Jack Davis, Maj. Gen. USMC, to its Board of Directors, effective immediately. This brings the total number of board members to seven.

Toronto, Canada-based SecureKey, a provider of organizations that deliver online consumer services, has announced that the Province of British Columbia (BC) is using SecureKey briidge.net Connect 3.0 as the foundation for the BC Services Card, the world’s first public sector Services Card for online authentication. The implementation also includes support from the world’s leading supplier of secure smart card microcontrollers, NXP Semiconductors.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has appointed William H. Roof, Ph.D. to chief operating officer, a newly created position, effective August 11. Roof previously served as the company’s senior vice president and chief scientist from May 2009 to April 2011.

Indianapolis, IN-based STANLEY Security has announced that Joshua Jackson, director - Global Product Integration, has been elected as vice chairman of the Physical Security Interoperability Alliance (PSIA). Jackson will join new Chairman, Mohammad Soleimani, CTO and executive vice president of Kastle Systems, to help develop specifications for enabling standards-based sharing of digital data and intelligence throughout the physical security and enterprise ecosystems.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a contract to provide two of its TWIC Plus IM2620 identification card readers to the Port of Cleveland in Ohio.

The contract is for a web-hosted TWIC reading system, similar to the one the company recently provided to the Port of Portland in Oregon. The readers will provide TWIC card authentication for reporting purposes to keep track of which personnel are entering the facility at specific times.

Boulder, CO-based LogRhythm, a security intelligence company, has released a new analytics suite that monitors honeypots to track would-be attackers, enabling customers to analyze nefarious tactics and generate targeted threat intelligence that facilitates an ongoing adaptive defense posture. The new Honeypot Security Analytics Suite is the latest in a series of innovations from LogRhythm Labs designed to expedite the detection, prioritization and response to advanced cyber threats.

Commentary and Opinions

With more than 10 million purported attempts to break into Pentagon systems and servers each day, it was not surprising when the White House confirmed that individuals thought to be working for the Russian government attempted to hack its servers.

From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.

With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.

 

Technology Sectors

Market Sectors

Essential Guides

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.