Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Fri, 2013-04-12 08:49 AM
Not knowing his mother’s maiden name and a non-existent tattoo were the first tips that the man trying to pass through customs at Baltimore Washington International Airport on April 5 with a U.S....
Thu, 2013-04-11 02:32 PM

SAFE CIV
Credential

The requirement that federal employees and federal contractors trying to gain access to federal buildings and computer networks possess Personal Identification Verification (PIV) compliant smart...
Wed, 2013-04-10 03:43 PM

SiteCOMMANDER

Sentry View Systems, Inc.has announced the launch of its SiteCOMMANDER, a flexible command and control solution with unlimited multi-server capabilities and fully mobile functionality.
Wed, 2013-04-10 01:57 PM

Ramirez, Hotchkiss, Gelfman

AXIS Communications, the IP camera supplier, has established an innovative partnership with the Wentworth Institute of Technology, of Boston, MA, to tap the fertile brains of some of Wentworth's...
Wed, 2013-04-10 08:32 AM

Walli Mujahidh

The second of two men convicted of trying to mount an armed assault on a Seattle military processing center in 2011 will spend 17 years in prison.
Wed, 2013-04-10 08:13 AM

Presidio POE

The Presidio Port of Entry in Texas has a new inspection booth to speed traffic through the facility. U.S. Customs and Border Protection Office of Field Operations is adding a fourth inspection booth...
Wed, 2013-04-10 08:02 AM

Global Entry kiosk

Travelers coming into the U.S. are satisfied with the entry processes put in place by Customs and Border Protection, according to a joint survey released by the agency. CPB, working collaboratively...
Wed, 2013-04-10 07:29 AM
The controversial decision by the TSA to allow small-bladed knives back inside commercial passenger aircraft remains at a low boil in Washington, as members of congress continue to criticize the...
Mon, 2013-04-08 10:47 AM

SiteCOMMANDER
by Sentry View

 Sentry View Systems, Inc. has announced the launch of its SiteCOMMANDER, a flexible command and control solution with unlimited multi-server capabilities and fully mobile...
Mon, 2013-04-08 09:03 AM

James Clapper

Under new security clearance guidelines issued by the Office of the Director of National Intelligence (ODNI), victims of sexual assault don’t have to disclose theit mental health counseling treatment...
Mon, 2013-04-08 07:55 AM

Honolulu International

The TSA, on April 5, officially thanked an off-duty California policeman for fending off an assault of a Transportation Security Officer by a homeless woman at the Honolulu International Airport.
Thu, 2013-04-04 08:43 AM
The U.S. Coast Guard will host four public meetings around the country over four weeks to hear comments about its proposed new rules for the worker identification credential reader. The Coast Guard...

Company News

LemonFish Technologies, an analytics-as-a-service (AaaS) insider threat detection company, has launched to meet the growing need for insider threat detection and continuous evaluation technologies to uncover security risks within an organization.
Booz Allen Hamilton has partnered with the Health Information Trust (HITRUST) Alliance to hold a CyberRX 2.0 cyber preparedness, education and simulation event in Washington, D.C., on March 25, 2015. The Cyber Town Hall event will feature participants from the healthcare industry as well as from the U.S. Department of Health and Human Services (HHS), Federal Bureau of Investigation (FBI) and the U.S. Department of Homeland Security (DHS).
Tenable Network Security, Inc., a provider of continuous network monitoring, has announced it has been named Iron Bow Technologies’ Cyber Security Partner of the Year for 2014. Iron Bow bestows this recognition on the partner whose financial performance and strategic alignment have significantly enhanced Iron Bow’s cyber security practice.
The Cloud Standards Customer Council (CSCC) has announced that registration for its CSCC Cloud Privacy Summit is now open. The Summit will be held March 26 at the Hyatt Regency Hotel in Reston, VA.
Imation Corp., a global data storage and information security company, has announced the addition of the IronKey S1000 USB 3.0 Flash Drive to its IronKey product line. The S1000 builds upon IronKey’s history of providing secure USB storage devices, offering customers a choice between IronKey’s USB 2.0 devices as well as the high-performance USB 3.0 solutions.
Chicago, IL-based Kroll, a provider of risk mitigation and response solutions, has announced that Michael Cabonargi has joined the firm as an associate managing director in the firm’s Investigations and Disputes practice. Cabonargi will be based in Chicago.
The University of the Virgin Islands has been awarded a five-year $1.3 million grant from the U.S. Department of Energy’s (DOE) National Nuclear Security Administration (NNSA), as part of a White House initiative to strengthen cybersecurity expertise in America.In January, Vice President Joe Biden announced the creation of the Cybersecurity Workforce Pipeline, which is designed to create a consortium composed of 13 Historically Black Colleges and Universities (HBCUs), two national labs, and a k-12 school district.
Tenable Network Security, Inc., a provider of continuous network monitoring, has announced new capabilities for its line of cybersecurity products with the availability of agent-based scanning in Nessus Manager, a new and improved version of Tenable’s award-winning Nessus vulnerability management platform designed with enterprise users in mind.

Commentary and Opinions

By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
 

Digital Version of March/April 2015
Print Edition

 

Click Here

Digital Version of January/February 2015 Print Edition

Click Here

Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.