Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...


Tue, 2013-01-08 10:13 AM

Denis Hebert,
CEO of HID Global

HID Global, a leader in secure identity solutions, announced on Jan. 8 that it has acquired Codebench, a supplier of physical security identity management solutions, particularly for the government...
Mon, 2013-01-07 02:23 PM
In an effort to reduce the risk of identity theft, the Internal Revenue Service has proposed new regulations which would allow certain companies and organizations to issue statements to individual...
Mon, 2013-01-07 08:43 AM

Laredo, TX
border crossing

A Brazilian man has pleaded guilty for his role in an operation that smuggled undocumented immigrants from India into the U.S., through Central America, Mexico and the Caribbean.
Fri, 2013-01-04 06:05 PM
Access Control as a Service (ACaaS) offers additional revenue and end-user penetration opportunities that traditional access control solutions do not, according to a recent study published by IMS...
Fri, 2013-01-04 09:29 AM

Boquillas, Mexico

A new border crossing is set to open in the Big Bend National Big Bend National Park in Texas in the coming days. On Dec. 21, Customs and Border Protection said the Department of Homeland Security’s...
Wed, 2013-01-02 10:46 AM
The Department of Homeland Security published a final rule to establish a process to allow certain individuals to apply for a provisional unlawful presence waiver before they depart the U.S. to...
Fri, 2012-12-28 04:17 PM
The State Department is gathering information from potential vendors who could supply card stock for the department’s credit card-sized Passport Cards and Border Crossing Cards, as well as radio...
Mon, 2012-12-24 09:14 AM

Roma, TX POE

A biometric check of a woman at the Roma, TX, border checkpoint by Customs and Border agents led to the discovery of two children missing from Missouri. CBP officers at the Roma Port of Entry...
Mon, 2012-12-24 09:00 AM
Immigration and Customs Enforcement set out new policy guidance on Dec. 21 which focuses on illegal immigrants convicted of serious crimes or who are facing serious charges, which could also...
Fri, 2012-12-21 11:14 AM
One of the leaders of a human smuggling network that brought illegal south Asian and African immigrants through Central America to the U.S. was deported on Dec. 20. The Guatemalan national, Orlando...
Fri, 2012-12-21 09:03 AM

TSA checkpoint

TSA’s Pre Check pre-approved, trusted traveler program is now in 35 airports nationwide, said the agency. John Wayne Airport (SNA) in Orange County, CA, became the mile-marker facility on Dec. 19,...
Fri, 2012-12-21 08:47 AM
Over a dozen states currently meet the Department of Homeland Security’s REAL ID national identity standards, while the remaining states that don’t currently comply will get extensions to do so come...

Company News

The Port of Cincinnati is the home of the latest Global Entry enrollment center opened by Customs and Border Protection, but two others in Chicago and Milwaukee have also begun operating.

The newest facility, housed at CBP Port of Cincinnati’s Olympic Blvd. building in Erlanger, KY, opened on Feb. 26, said CBP. Cincinnati is located on the north bank of the Ohio River at the Ohio–Kentucky border, near Indiana.

Because of the city’s strong ties to international trade and commerce, the City of Houston opened a satellite enrollment center for Customs and Border Protection’s Global Entry program in its city hall building.

Bethesda, MD-based IT solutions and business strategy consulting firm DMI won a two-year task order to provide operations and maintenance (O&M) Support for the U.S. Immigration and Customs Enforcement (ICE) legacy Alien Criminal Response Information Management (ACRIMe) System.

HID Global, a supplier of secure identity solutions, announced on Jan. 22 that Bridget Burke has joined the company as vice president and chief information officer (CIO), with a goal of enhancing overall information capabilities.

Burke is responsible for HID Global’s business applications, data networking and infrastructure and customer information programs. She will also serve as chief security officer (CSO) responsible for overseeing the company’s security policy compliance.

Diebold, Incorporated announced on Jan. 21 that the company's board of directors has elected Henry D.G. Wallace as chairman of the board. Wallace has been a member of the Diebold board since 2003. He replaces John Lauer, 73, whom the board will not be nominating for re-election to the board at the company's annual meeting of shareholders in April in accordance with the company's retirement policy.

The Will-Burt Company, a manufacturer of telescoping mast and tower elevation solutions for surveillance, communication antenna and scene lighting systems based in Orrville, OH, has acquired two security solution business lines from Diebold, Incorporated. 

Included in the transaction are Diebold’s GSA-approved security filing cabinet and vault door business and its LINX Security Solutions business. 

AMAG Technology, a supplier of access control, IP video and intrusion detection (IDS) solutions, has named Rebecca Law as its new vice president of sales.

Law will manage AMAG’s team of regional sales managers and sales engineers in North America in an effort to grow AMAG’s business, support customers with excellence and espouse AMAG’s “Exceptional Customer Service” philosophy. She reports to Matt Barnette, executive vice president of sales and marketing.

Matica System, a company that designs, manufactures and distributes card personalization and mailing systems and ID card printers, announced on Jan. 10 the addition to its corporate management team of Shane Cunningham as the group’s new director of global marketing. 

Commentary and Opinions

Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.

Car theft is a fruitful field of opportunity for today’s criminals as they seek new and innovative ways for gaining quick profits. Recent reports indicate that prior to committing theft, organized car-theft gangs are doing their homework. They are targeting specific car rental facilities, conducting exhaustive site-studies of the facilities to identify vulnerabilities that will make their job easier.

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.


Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...