Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...


Fri, 2012-12-07 09:23 AM

DHS detention facility

The Department of Homeland Security formally moved on Dec. 6 to fulfill a presidential order to develop standards aimed at protecting people housed in government detention facilities from sexual...
Fri, 2012-12-07 08:52 AM

TSA checkpoint

The program that has seen 16 airports around the nation move to private screeners at security checkpoints in lieu of TSA agents needs better guidance and a formal process to measure performance...
Wed, 2012-12-05 08:46 AM
A U.S. deputy marshal faces federal charges for allegedly disclosing the identity of an undercover Homeland Security Investigations officer to his father, who was a suspected drug dealer at the time.
Tue, 2012-12-04 02:23 PM

Amistad dam

A modernized U.S. border inspection station on the Rio Grande will open on December 11 to replace a 1960’s era facility near Del Rio, Texas. The new inspection facility at the Amistad Dam replaces an...
Tue, 2012-12-04 11:37 AM

FBI Aldawsari
surveillance image

Two private company managers’ gut instincts spurred the 2011 FBI investigation and arrest of a former Texas Tech university student who planned to cause mayhem and carnage with powerful home-made...
Fri, 2012-11-30 12:46 PM
Government Security News announced winners in 42 different homeland security categories, showering accolades on top achievements by IT and physical security companies, and by federal, state and local...
Fri, 2012-11-30 11:34 AM

CBP's Aguilar

The U.S. and Taiwan agreed to recognize each other's supply chain security standards in an agreement signed on Nov. 26. The American Institute in Taiwan (AIT) and the Taipei Economic and Cultural...
Fri, 2012-11-30 09:30 AM

Sen. Lieberman

A Portland, Maine man will spend six years in prison for mailing threatening letter to the chairmen of the House and Senate homeland security committees between 2010 and 2011. Michael R. Thomas, 52,...
Fri, 2012-11-30 08:27 AM

GSN Awards 2012

Hundreds of the best of the homeland security community’s federal, state and municipal government officials, government contractors, systems integrators, IT vendors and physical security product and...
Thu, 2012-11-29 09:02 AM

TSA checkpoint

A blog post on the Huffington Post news site questioning The Transportation Security Administration’s handling of its Pre Check passenger pre-approval program drew a strong response from the agency...
Thu, 2012-11-29 08:40 AM


The U.S. moved to revoke the passport of American-born Al Qaeda in the Arabian Peninsula (AQAP) leader Anwar al-Awlaki’s passport six months before the cleric was killed in a drone strike in Yemen in...
Tue, 2012-11-27 10:26 AM
Even though the Transportation Security Administration has multiple ways to receive passenger complaints about its operations, it lacks a single agency-wide policy to foster those complaints through...

Company News

BIO-key International, Inc., a supplier of finger biometric solutions, announced on August 15 that the company has signed a letter of intent to acquire Montreal-based S.I.C. Biometrics Inc., a manufacturer of biometric plug-in mobile fingerprint scanners, biometric proximity cards and access control solutions, through a combination of asset purchase and exclusive license arrangements.

AMAG Technology, a security management solution provider, unveiled its Symmetry Intrusion Management module on August 11.

The module combines previously separate access control, video and enterprise-class intrusion detection to create a single, unified solution that enhances security, reduces cost and simplifies administration, says a company news release. AMAG is one of the first in the industry to offer this sophisticated solution.

Codebench, Inc. has integrated its PIVCheck Plus software with the PremiSys access control system from IDenticard offering federal agencies and other government entities a fully compliant HSPD-12 solution.

Cross Match Technologies, Inc., a provider of biometric identity solutions, along with technology partner Digent Co., Ltd., has been selected by the South Korean Ministry of Justice to support its Foreigners’ Fingerprint Verification System.

Lockheed Martin will help the Transportation Security Administration integrate and deploy advanced imagining technology (AIT) scanning equipment in airports in the eastern and central portions of the U.S.

The two task awards from TSA, said Lockheed Martin, total $72 million. The task orders, said the company, were awarded under TSA’s Security Equipment Systems Integration (SESI) Indefinite Delivery/Indefinite Quantity (ID/IQ) vehicle and include one base-year plus one option-year.

Quintron Systems, Inc., the Santa Maria, CA-based producer of physical access control and intrusion detection systems and advanced interoperable voice systems, announced on July 13 that its new version of its AccessNsite solution has satisfied an extensive suite of tests by a General Services Administration (GSA) approved laboratory to be designated as an approved Caching Status Proxy by GSA. It was placed on the approved products list (APL) as #582, in compliance with HSPD-12.

Siemens AG, the German industrial conglomerate, has chosen a Verizon solution to authenticate users of Siemens’ communications systems, thereby increasing the security of its internal and external communications and Web application delivery.

Xtralis, a provider of early detection solutions for fire, gas and security threats whose U.S. operations are based in Norwell, MA, announced on July 5 the acquisition of Germany-based HeiTel Digital Video GmbH. This acquisition enhances significantly Xtralis' position as a manufacturer of video surveillance and central monitoring solutions.

Commentary and Opinions

Every day citizens put their faith and trust in the decisions that government programs make about identities (security clearances, border crossings, benefits and credentials). However, these decisions may not be as trustworthy as you think, because they are often not based upon current and validated information. This lack of information awareness has been accentuated by the onset of Big Data (the dramatic increase in data volumes, sources, types and velocity), which increases the risk of an undetected change in a person’s identity profile.

An important deadline is fast approaching for federal, state, local and tribal law enforcement agencies. Starting September 30, 2014, the FBI will require advanced authentication for anyone accessing its criminal justice information (CJIS) system to keep highly sensitive law enforcement data from falling into the wrong hands. 

It is possible to forecast the types of warfare that one’s terrorist adversary is likely to conduct, whether as an organized group or as “lone wolf” operatives. Such a forecasting capability is especially crucial when complete information about one’s terrorist adversary is lacking. This is important because several recent high visibility terrorist attacks could have been pre-empted and thwarted if the intelligence and law enforcement agencies that were tracking these groups and operatives had possessed such a forecasting capability.


2013 Awards Yearbook

Celebrate the Great
Achievements of 2013

Click on Cover
Page to access

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...