Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Wed, 2013-04-10 01:57 PM

Ramirez, Hotchkiss, Gelfman

AXIS Communications, the IP camera supplier, has established an innovative partnership with the Wentworth Institute of Technology, of Boston, MA, to tap the fertile brains of some of Wentworth's...
Wed, 2013-04-10 08:32 AM

Walli Mujahidh

The second of two men convicted of trying to mount an armed assault on a Seattle military processing center in 2011 will spend 17 years in prison.
Wed, 2013-04-10 08:13 AM

Presidio POE

The Presidio Port of Entry in Texas has a new inspection booth to speed traffic through the facility. U.S. Customs and Border Protection Office of Field Operations is adding a fourth inspection booth...
Wed, 2013-04-10 08:02 AM

Global Entry kiosk

Travelers coming into the U.S. are satisfied with the entry processes put in place by Customs and Border Protection, according to a joint survey released by the agency. CPB, working collaboratively...
Wed, 2013-04-10 07:29 AM
The controversial decision by the TSA to allow small-bladed knives back inside commercial passenger aircraft remains at a low boil in Washington, as members of congress continue to criticize the...
Mon, 2013-04-08 10:47 AM

SiteCOMMANDER
by Sentry View

 Sentry View Systems, Inc. has announced the launch of its SiteCOMMANDER, a flexible command and control solution with unlimited multi-server capabilities and fully mobile...
Mon, 2013-04-08 09:03 AM

James Clapper

Under new security clearance guidelines issued by the Office of the Director of National Intelligence (ODNI), victims of sexual assault don’t have to disclose theit mental health counseling treatment...
Mon, 2013-04-08 07:55 AM

Honolulu International

The TSA, on April 5, officially thanked an off-duty California policeman for fending off an assault of a Transportation Security Officer by a homeless woman at the Honolulu International Airport.
Thu, 2013-04-04 08:43 AM
The U.S. Coast Guard will host four public meetings around the country over four weeks to hear comments about its proposed new rules for the worker identification credential reader. The Coast Guard...
Wed, 2013-04-03 11:09 AM

Charlotte Douglas

International

Many foreign visitors arriving in the U.S. who need to prove their legal-visitor status to employers, schools/universities or government agencies will be able to access their Customs and Border...
Wed, 2013-04-03 09:13 AM
Defense researchers will use $50 million under a new White House initiative to better understand the human brain, mapping the organ’s capabilities and understanding its functions.
Wed, 2013-04-03 08:44 AM

TWIC reader

Even though the Coast Guard recently issued a set of proposed rules for electronic TWIC card readers over two years late, one congressman said the rules still need more public input to insure they’re...

Company News

Milestone Systems, the open platform company in IP video management software (VMS), spotlighted the award-winning XProtect portfolio and sleek Husky NVRs in its busy stand at Intersec 2015, held in Dubai UAE last week. Seven Milestone Solution Partners were also exhibiting in the booth to present integrations based on Milestone open platform software. At the show, Milestone also talked about its growing activities in the Mideast and African (MEA) regions.
TraceSecurity, a provider of cloud-based IT governance, risk and compliance (GRC) management solutions, has announced that Mike Carpenter has joined the TraceSecurity executive leadership team as Vice President of Channel Sales. The appointment of Carpenter, former senior leader and consultant at KPMG, demonstrates TraceSecurity’s focus and commitment to building a premier channel program that enables partners to derive maximum value within their information security and compliance practice.
The National Geospatial-Intelligence Agency (NGA) has awarded BAE Systems a five-year contract with an estimated total value of $43 million to provide mission essential training and instructional support to NGA analysts and intelligence officers stationed across the United States and around the world.
Iron Mountain Incorporated, a provider of storage and information management services, has announced that Bill O’Neill will be joining the company as vice president and general manager for Iron Mountain’s Government Services business. In his new role, O’Neill will lead Iron Mountain’s efforts to generate growth and market share in the Federal government sector by delivering records and information management solutions for the company.
Baton Rouge, LA-based TraceSecurity, a provider of cloud-based IT governance, risk and compliance (GRC) management solutions, has announced that momentum the company has gained throughout 2014 is fueling 2015 to be a year for unprecedented growth. Expected growth is attributed to not only the company’s cloud-based software solution, TraceCSO, but also the public disclosure of security breaches, and the value that TraceCSO brings to its partner network.
The U.S. Navy’s Naval Air Systems Command (NAVAIR) has awarded BAE Systems a five-year contract to provide full life-cycle engineering and technical support for communication and combat systems on land and at sea. The initial award is valued at $28.4 million with the total value of the five-year contract estimated at $146.7 million.
The Seattle-based AlphaCipher Acquisition Corporation (d/b/a “Vadium”), a provider of digital privacy, security and trust solutions, has announced it has appointed Phil Laverson to the board of directors.
The Internet Society has outlined its approach to cyber security policy:The headlines of today regarding hacking, exposure of large quantities of personal data, denial of service attacks, and the continued revelations about pervasive monitoring are deeply disturbing.

Commentary and Opinions

By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
Washington, March 18 – The National Retail Federation has presented Congress with practical, commonsense and achievable solutions to better protect consumers and help businesses prevent cyberattacks and data breaches.“We should not be satisfied with simply determining what to do after a data breach occurs,” NRF senior vice president for Government Relations David French said. “Instead, it is important to look at why such breaches occur and what the perpetrators get out of them so that we can find ways to reduce and prevent not only the breaches themselves but the follow-on harm.”
By Nimrod LuriaPolice and FBI are investigating defacement attacks on numerous North American websites in which attackers placed an ISIS flag banner on website home pages and played an Arabic song in the background, as reported by NBC News.The sites appear to have one thing in common: they are all built on the WordPress content management platform.
By Fraser ThomasLast week the US Congress began the process of making President Obama’s State of the Union address, where he focused on ways to secure the nation's businesses and infrastructure in cyberspace, a reality.On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers’ personal information.
 

Digital Version of March/April 2015
Print Edition

 

Click Here

Digital Version of January/February 2015 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.