Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...


Fri, 2013-01-04 09:29 AM

Boquillas, Mexico

A new border crossing is set to open in the Big Bend National Big Bend National Park in Texas in the coming days. On Dec. 21, Customs and Border Protection said the Department of Homeland Security’s...
Wed, 2013-01-02 10:46 AM
The Department of Homeland Security published a final rule to establish a process to allow certain individuals to apply for a provisional unlawful presence waiver before they depart the U.S. to...
Fri, 2012-12-28 04:17 PM
The State Department is gathering information from potential vendors who could supply card stock for the department’s credit card-sized Passport Cards and Border Crossing Cards, as well as radio...
Mon, 2012-12-24 09:14 AM

Roma, TX POE

A biometric check of a woman at the Roma, TX, border checkpoint by Customs and Border agents led to the discovery of two children missing from Missouri. CBP officers at the Roma Port of Entry...
Mon, 2012-12-24 09:00 AM
Immigration and Customs Enforcement set out new policy guidance on Dec. 21 which focuses on illegal immigrants convicted of serious crimes or who are facing serious charges, which could also...
Fri, 2012-12-21 11:14 AM
One of the leaders of a human smuggling network that brought illegal south Asian and African immigrants through Central America to the U.S. was deported on Dec. 20. The Guatemalan national, Orlando...
Fri, 2012-12-21 09:03 AM

TSA checkpoint

TSA’s Pre Check pre-approved, trusted traveler program is now in 35 airports nationwide, said the agency. John Wayne Airport (SNA) in Orange County, CA, became the mile-marker facility on Dec. 19,...
Fri, 2012-12-21 08:47 AM
Over a dozen states currently meet the Department of Homeland Security’s REAL ID national identity standards, while the remaining states that don’t currently comply will get extensions to do so come...
Thu, 2012-12-20 09:08 AM

Seized cash

A child’s purse and hidden compartments figured into the seizure of tens of thousands of dollars in unreported cash in three separate incidents at border crossings near El Paso, TX, in December. U.S...
Wed, 2012-12-19 11:03 AM

Asylum application

Federal law enforcement agents on Dec. 18 arrested 26 people, including six lawyers, alleging that they helped concoct lies for would-be immigrants who claimed religious or political persecution in...
Wed, 2012-12-19 08:51 AM

Operation Bear III

Separate criminal alien enforcement actions in two southern states the week of Dec. 10 produced 107 arrests of criminal aliens, immigration law violators, and immigration fugitives in south Texas and...
Mon, 2012-12-17 10:30 AM

Los Angeles
International Airport

During the week of Dec. 10, ICE and CBP surged customs enforcement agents into key west coast cargo shipping and mail centers in a stepped-up enforcement actions against shipments of counterfeit...

Company News

HID Global, a supplier of secure identity solutions, announced on Jan. 22 that Bridget Burke has joined the company as vice president and chief information officer (CIO), with a goal of enhancing overall information capabilities.

Burke is responsible for HID Global’s business applications, data networking and infrastructure and customer information programs. She will also serve as chief security officer (CSO) responsible for overseeing the company’s security policy compliance.

Diebold, Incorporated announced on Jan. 21 that the company's board of directors has elected Henry D.G. Wallace as chairman of the board. Wallace has been a member of the Diebold board since 2003. He replaces John Lauer, 73, whom the board will not be nominating for re-election to the board at the company's annual meeting of shareholders in April in accordance with the company's retirement policy.

The Will-Burt Company, a manufacturer of telescoping mast and tower elevation solutions for surveillance, communication antenna and scene lighting systems based in Orrville, OH, has acquired two security solution business lines from Diebold, Incorporated. 

Included in the transaction are Diebold’s GSA-approved security filing cabinet and vault door business and its LINX Security Solutions business. 

AMAG Technology, a supplier of access control, IP video and intrusion detection (IDS) solutions, has named Rebecca Law as its new vice president of sales.

Law will manage AMAG’s team of regional sales managers and sales engineers in North America in an effort to grow AMAG’s business, support customers with excellence and espouse AMAG’s “Exceptional Customer Service” philosophy. She reports to Matt Barnette, executive vice president of sales and marketing.

Matica System, a company that designs, manufactures and distributes card personalization and mailing systems and ID card printers, announced on Jan. 10 the addition to its corporate management team of Shane Cunningham as the group’s new director of global marketing. 

Genetec has entered into strategic alliance with Microsoft to develop Windows Azure-based security solutions aimed at bringing high-end security applications to a broader market and enhance current on-premises offerings.

Montreal-based unified IP security solutions provider Genetec unveiled its new plans to bring physical security software to the cloud in conjunction with a strategic multi-year alliance with Microsoft Corp.

Colleen Conyngham was named special agent in charge of the administrative division at the Washington Field Office by FBI Director Robert Mueller on Nov. 19.

Conyngham most recently served as section chief in the security division at FBI Headquarters in Washington, DC.

Visualant, Inc., a provider of chromatic-based identification and diagnostic solutions, announced on Nov. 12 that it has received its fourth patent on its ChromaID technology that uses an exclusive Spectral Pattern Matching (“SPM”) technique.

Commentary and Opinions

Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.

Car theft is a fruitful field of opportunity for today’s criminals as they seek new and innovative ways for gaining quick profits. Recent reports indicate that prior to committing theft, organized car-theft gangs are doing their homework. They are targeting specific car rental facilities, conducting exhaustive site-studies of the facilities to identify vulnerabilities that will make their job easier.

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.


Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...